Advertisement

Information and Communications Technology (ICT)

  • Nayef R. F. Al-Rodhan
Part of the St Antony’s Series book series

Abstract

In the first ever issue of PC Magazine published in January 1982, Bill Gates predicted that computers and related technologies would change the way people worked. Twenty-five years later in the same publication, Gates reflected that this technology had indeed changed the way we worked but, more importantly, it was changing how we lived.1

Keywords

Cloud Computing Augmented Reality North Atlantic Treaty Organization International Telecommunication Union Internet Governance 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. 2.
    N.L. Rudenstein (2001), Pointing Our Thoughts: Reflections on Harvard and Higher Education, 1991–2001 (Cambridge, MA: Harvard University), p. 140.Google Scholar
  2. 3.
    E.J. Wilson III (1998), Globalization, Information Technology, and Conflict in the Second and Third Worlds: A Critical Review of the Literature (New York: Rockefeller Brothers Fund), p. 6.Google Scholar
  3. 4.
    J.P. Singh (2002), ‘Introduction: Information Technologies and the Changing Scope of Global Power and Governance’ in J.N. Rosenau and J.P. Singh (eds) Information Technologies and Global Politics: The Changing Scope of Power and Governance (Albany, NY: State University of New York Press), p. 2.Google Scholar
  4. 5.
    R. Silberglitt, P.S. Anton, D.R. Howell, A. Wong, N. Gassman, B.A. Jackson, E. Landree, S. L. Pfleeger, E.M. Newton and F. Wu (2006), The Global Technology Revolution 2020—In-Depth Analyses: Bio/Nano/Materials/Information Trends, Drivers, Barriers, and Social Implications (Santa Monica, CA: RAND), p. 14.Google Scholar
  5. 16.
    J.R. Okin (2005), The Internet: The Not-for-Dummies Guide to the History, Technology, and Use of the Internet (Winter Harbor, ME: Ironbound Press), p. 24.Google Scholar
  6. 17.
    Ibid., p. 26.Google Scholar
  7. 18.
    A. Paris (2008), ‘Cyberethics: The Emerging Codes of Online Conduct’, Policy Innovations, A Publication of the Carnegie Council, 9 April, http://www.policyinnovations.org/ideas/briefings/data/000046, date accessed 4 August 2010.
  8. 19.
    A.G.K. Solomon (2005), Technology Futures and Global Power, Wealth, and Conflict (Washington, D.C.: Center for Strategic and International Studies), p. vi.Google Scholar
  9. 21.
    Okin (2005), The Internet: The Not-for-Dummies Guide to the History, Technology, and Use of the Internet, p. 4.Google Scholar
  10. 26.
    D. Tapscott and A.D. Williams (2008), Wikinomics: How Mass Collaboration Changes Everything, expanded edn (London: Atlantic Books), p. 19.Google Scholar
  11. 28.
    N.R.F. Al-Rodhan (2007), The Emergence of Blogs as a Fifth Estate and Their Security Implications (Geneva: Slatkine), p. 29.Google Scholar
  12. 29.
    Ibid., p. 16.Google Scholar
  13. 30.
    Ibid., p. 29.Google Scholar
  14. 31.
  15. 35.
    International Telecommunication Union (ITU) (2009), Confronting the Crisis: ICT Stimulus Plans for Economic Growth, 2nd edn (Geneva: ITU), p. 62.Google Scholar
  16. 45.
    D. Talbot (2009), ‘TR10: HashCache’, MIT Technology Review, March/April, http://www.technologyreview.com/printer_friendly_article.aspx?id=22119&channel=specialsections&section=tr10, date accessed 17 August 2010.
  17. 46.
  18. 47.
  19. 52.
    J. Stokes (2008), ‘Understanding Moore’s Law’, Ars Technica, 27 September, http://arstechnica.com/hardware/news/2008/09/moore.ars/5, date accessed 4 August 2010.
  20. 59.
    W. Drake (2004), ‘Reframing Internet Governance Discourse: Fifteen Baseline Propositions. Memo #2 for the Social Science Research Council’s Research Network on IT and Governance, Paper Based on Presentation at the Workshop on Internet Governance, ITU, Geneva, 26–27 February and the UN ICT Task Force Global Forum on Internet Governance’, New York City, 25–26 March, http://www.un-ngls.org/orf/drake.pdf, date accessed 17 August 2010, p. 5.Google Scholar
  21. 63.
    D. McGuire (2003), ‘U.N. Summit to Focus on Internet’, Washington Post, 5 December, http://pqasb.pqarchiver.com/washingtonpost/access/477322551.html?FMT=ABS&FMTS=ABS:FT&date=Dec+5%2C+2003&author=David+McGuire&pub=The+Washington+Post&edition=&startpage=E.05&desc=U.N.+Summit+to+Focus+on+Internet%3B+Officials+to+Discuss+Shifting+of+C ontrol+to+International+Body, date accessed 10 August 2010.
  22. 65.
    M.L. Mueller, J. Mathiason and H. Klein (2007), ‘The Internet and Global Governance: Principles and Norms for a New Regime’, Global Governance, Vol. 13, No. 2, April–June, 238.Google Scholar
  23. 66.
    ‘ICANN Be Independent’ (2009), The Economist, 26 September, Vol. 392, No. 8650, http://www.economist.com/node/14517430, date accessed 10 August 2010.
  24. 68.
    W. J. Drake (2001), ‘Communications’ in P.J. Simmons and C. de Jonge Oudraat (eds) Managing Global Issues: Lessons Learned (Washington, D.C.: Carnegie Endowment for International Peace), p. 41.Google Scholar
  25. 69.
  26. 70.
  27. 71.
    E.A. Fischer (2005), ‘Creating a National Framework for Cybersecurity: An Analysis of Issues and Options’ in L.V. Choi (ed.) Cybersecurity and Homeland Security (New York: Nova Science Publishers, Inc.), p. 1.Google Scholar
  28. 72.
    J.J. Hamre, P. Ambegaonkar and K.C. Zuback (2006), ‘Bringing International Governance to Cyber Space’ in J.A. Lewis (ed.) Cyber Security: Turning National Solutions into International Cooperation (Washington, D.C.: Center for Strategic and International Studies), p. 116.Google Scholar
  29. 73.
    S.E. Goodman (2006), ‘Toward a Treaty-Based International Regime on Cyber Crime and Terrorism’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. 74.Google Scholar
  30. 74.
    N. Miwa (2006), ‘Informal, Non-Treaty-Based Multilateral Coordination’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. 103.Google Scholar
  31. 75.
    N.R.F. Al-Rodhan (ed.) (2006), ‘Editorial of Policy Brief on Information Technology, Terrorism, and Global Security’, Policy Briefs on the Transcultural Aspects of Security and Stability (Berlin: LIT), p. 181.Google Scholar
  32. 76.
  33. 77.
  34. 78.
    S. Ham and R.D. Atkinson (2001), A Third Way Framework for Global E-Commerce (Washington, D.C.: Progressive Policy Institute).Google Scholar
  35. 79.
  36. 86.
    B.S. Buckland, F. Schreider and T.H. Winkler (2010), Democratic Governance Challenges of Cyber Security, DCAF Horizon 2015 Working Paper Series 1 (Geneva: DCAF), p. 12.Google Scholar
  37. 87.
  38. 88.
    F. Assandri and D. Martings (eds) (2009), From Early Tang Court Debates to China’s Peaceful Rise (Amsterdam: ICAS/Amsterdam University Press), pp. 143–144.Google Scholar
  39. 89.
    S. Lafraniere (2010), ‘China Moves to Tighten Data Controls’, The New York Times, 27 April, http://www.nytimes.com/2010/04/28/world/asia/28china.html?_r=1&scp=1&sq=China%20moves%20to%20tighten%20Data%20Controls%E2%80%99&st=cse, date accessed 10 August 2010.
  40. 91.
    Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency (2008), Securing Cyberspace for the 44th Presidency (Washington, D.C.: Center for Strategic and International Studies), pp. 1–3.Google Scholar
  41. 92.
    J. Markoff (2010), ‘Step Taken to End Impasse Over Cybersecurity Talks’, The New York Times, 16 July, http://www.nytimes.com/2010/07/17/world/17cyber.html?ref=john_markoff, date accessed 19 August 2010.
  42. 93.
    Buckland et al. (2010), Democratic Governance Challenges of Cyber Security, p. 29.Google Scholar
  43. 97.
    S. Buckley (2000), ‘Radio’s New Horizons: Democracy and Popular Communication in the Digital Age’, International Journal of Cultural Studies, Vol. 3, No. 2, 181.CrossRefGoogle Scholar
  44. 99.
    J.S. Nye (2010), Cyber Power (Cambridge, MA: Harvard Kennedy School, Belfer Center), p. 11.Google Scholar
  45. 100.
    J.A. Lewis (2006), ‘Introduction’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. xiii.Google Scholar
  46. 101.
  47. 105.
    E.B. Skolnikoff (2001), ‘International Governance in a Technological Age’ in J. De La Mothe (ed.) Science, Technology and Governance (Trombridge, Wilts: Crombrell Press), p. 4.Google Scholar
  48. 106.
  49. 107.
  50. 108.
  51. 112.
    C. Arthur (2010), ‘Facebook Privacy Lets You See Where Strangers Plan to Go’, The Guardian, 26 April, http://www.guardian.co.uk/technology/2010/apr/26/facebook-privacy-hole, date accessed 10 August 2010.
  52. 113.
    R. Waters (2010), ‘Google’s Buzz criticized by Privacy Regulators’, The Financial Times, 20 April, http://www.ft.com/cms/s/0/63d763c4-4ca6-11df-9977-00144feab49a.html, date accessed 10 August 2010.
  53. 114.
    K. Allison (2007), ‘Key to It All’, The Financial Times, 24 September, http://www.ft.com/cms/s/0/82693014-6a32-11dc-a571-0000779fd2ac.html, date accessed 10 August 2010.
  54. 116.
    S. Hansell (2009), ‘Agency Skeptical of Internet Privacy Policies’, The New York Times, 12 February, http://www.nytimes.com/2009/02/13/technol-ogy/internet/13privacy.html?scp=1&sq=Agency%20Skeptical%20of%20 Internet%20Privacy%20Policies&st=cse, date accessed 10 August 2010.
  55. 117.
    R.J. Deibert (2002), ‘Circuits of Power: Security in the Internet Environment’ in J.N. Rosenau and J.P. Singh (eds) Information Technologies and Global Politics: The Changing Scope of Power and Governance (Albany, NY: State University of New York Press), p. 126. Ibid., p. 128.Google Scholar
  56. 122.
    S. Rodotà (2006), ‘Europe and Cyber Security’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. 83.Google Scholar
  57. 123.
    Ibid., p. 83.Google Scholar
  58. 133.
    N. Hodge (2009), ‘Inside Moldova’s Twitter Revolution’, Wired, 8 April, http://www.wired.com/dangerroom/2009/04/inside-moldovas, date accessed 4 August 2010.
  59. 136.
    N.R.F. Al-Rodhan (2006), ‘Editorial of Policy Brief on Xenophobia, Media Stereotyping, and Their Role in Global Insecurity’ in Al-Rodhan (2006), Policy Briefs on the Transcultural Aspects of Security and Stability, p. 38.Google Scholar
  60. 137.
  61. 138.
    G. Herd and N.R.F. Al-Rodhan (2006), ‘Danish Cartoons: A Symptom of Global Insecurity’ in Al-Rodhan (2006), Policy Briefs on the Transcultural Aspects of Security and Stability, p. 49.Google Scholar
  62. 139.
  63. 140.
    Ibid., p. 50.Google Scholar
  64. 141.
    L.F. Baron Porras (2003), ‘IC(K)Ts, Civil Society and New Social Debates’, Center of Research & Popular Education (CINEP), March, p. 2.Google Scholar
  65. 142.
    M. Vatis (2006), ‘International Cyber-Security Cooperation: Informal Bilateral Models’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. 10.Google Scholar
  66. 143.
    D. Ventre (2009), Information Warfare (Hoboken, NJ, London: Wiley-ISTE), p. 213.Google Scholar
  67. 144.
    McAfee and SDA (2010), Cyber Security: A Transatlantic Perspective, p. 11.Google Scholar
  68. 146.
    World Economic Forum (WEF) (2008), Global Risks 2008: A Global Risk Network Report, A World Economic Forum Report in Collaboration with Citigroup, Marsh & McLennan Companies (MMC), Swiss Re, Wharton School Risk Center, Zurich Financial Services (Cologny/Geneva: WEF), p. 22.CrossRefGoogle Scholar
  69. 147.
    M. Vatis (2006), ‘The Next Battlefield’, Harvard International Review, Vol. 28, No. 3, 60.Google Scholar
  70. 148.
  71. 149.
    Nye (2010), Cyber Power, p. 1.Google Scholar
  72. 152.
    S. Gorman (2008), ‘Cyberattacks on Georgian Web Sites Are Reigning a Washington Debate’, The Wall Street Journal, 14 August, http://online.wsj.com/article/SB121867946115739465.html?mod=googlenews_wsj, accessed 4 August 2010.
  73. 153.
    J.A. Lewis (2009), ‘Crisis in Cyberspace’ in N.R.F. Al-Rodhan (ed.) (2009), Potential Global Strategic Catastrophes: Balancing Transnational Responsibilities and Burden-s haring with Sovereignty and Human Dignity (Berlin: LIT), p. 189.Google Scholar
  74. 156.
    Ventre (2009), Information Warfare, pp. 209–210.Google Scholar
  75. 157.
    Ibid., p. 212.Google Scholar
  76. 159.
    Buckland et al. (2010), Democratic Governance Challenges of Cyber Security, p. 10.Google Scholar
  77. 167.
    S. Baker (2008), ‘Cyber-Security: A Hard Sell’, Business Week Online, 9 December, http://www.businessweek.com/technology/content/dec2008/tc2008128_182619.htm, date accessed 6 August 2010.
  78. 168.
    R.C. Hodgin (2009), ‘FBI Ranks Cyber Attacks Third Most Dangerous behind Nuclear War and WMDs’, TG Daily, 7 January, http://www.tgdaily.com/security-features/40861-fbi-ranks-cyber-attacks-third-most-dangerous-behind-nuclear-war-and-wmds, date accessed 6 August 2010, p. 1.
  79. 169.
    T. Nakatomi (2001), ‘Threats to the Information Society’, The OECD Observer, January, No. 224, http://www.oecdobserver.org/news/fullstory.php/aid/410/Threats_to_the_information_society.html, date accessed 10 August 2010.
  80. 174.
    P. Mukundan (2006), ‘Laying the Foundations for a Cyber-Secure World’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. 31.Google Scholar
  81. 175.
    Ibid. p. 32.Google Scholar
  82. 184.
    J. Markoff (2009), ‘Do We Need a New Internet?’ The New York Times, 14 February, http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?_r=1&scp=1&sq=internetpercent20security&st=cse, date accessed 6 August 2010.
  83. 194.
    United Nations Conference on Trade and Development (UNCTAD) (2006), The Digital Divide Report: ICT Diffusion Index 200 (New York and Geneva: United Nations), p. iii.Google Scholar
  84. 195.
  85. 197.
    A. Cane (2006), ‘Digital Divide Stops Growing’, The Financial Times, 4 December, http://www.ft.com/cms/s/0/9341842e-833b-11db-a38a-0000779e2340.html, date accessed 6 August 2010.
  86. 201.
    R.D. Atkinson and A.S. McKay (2007), ‘Digital Prosperity: Understanding the Economic Benefits of the Information Technology Revolution’, The Information Technology & Innovation Foundation Website, March, http://archive.itif.org/index.php?id=34, date accessed 18 August 2010.Google Scholar
  87. 203.
    K. Banks (2008), ‘Mobile Phones and the Digital Divide’, PC World, 29 July, http://www.pcworld.com/article/149075/mobile_phones_and_the_dig-ital_divide.html, date accessed 6 August 2010.
  88. 204.
    E. Hansberry (2009), ‘Are Mobile Devices Closing the Digital Divide?’ Information Week, 30 July, http://www.informationweek.com/blog/main/archives/2009/07/are_mobile_devi_1.html;jsessionid=BGBO1EYZ1HTDT QE1GHPCKHWATMY32JVN, date accessed 6 August 2010.
  89. 205.
    Al-Rodhan (2007), The Emergence of Blogs as a Fifth Estate and Their Security Implications, p. 57.Google Scholar
  90. 206.
  91. 207.
    E. MacAskill (2005), ‘Tighter Restrictions on Military Blogs Angers U.S. Soldiers’, The Guardian, 5 May, http://www.guardian.co.uk/technology/2007/may/05/news.usnews, date accessed 6 August 2010.
  92. 208.
    Al-Rodhan (2007), The Emergence of Blogs as a Fifth Estate and Their Security Implications, p. 149.Google Scholar
  93. 209.
    Ibid., pp. 150–151.Google Scholar
  94. 210.
    Ibid., p. 154.Google Scholar
  95. 211.
    Ibid., p. 155.Google Scholar
  96. 212.
    Ibid., p. 156.Google Scholar

Copyright information

© Nayef R.F. Al-Rodhan 2011

Authors and Affiliations

  • Nayef R. F. Al-Rodhan
    • 1
    • 2
  1. 1.St Antony’s CollegeOxford UniversityUK
  2. 2.Geneva Centre for Security PolicyGenevaSwitzerland

Personalised recommendations