Abstract
In the first ever issue of PC Magazine published in January 1982, Bill Gates predicted that computers and related technologies would change the way people worked. Twenty-five years later in the same publication, Gates reflected that this technology had indeed changed the way we worked but, more importantly, it was changing how we lived.1
Chapter PDF
Keywords
- Cloud Computing
- Augmented Reality
- North Atlantic Treaty Organization
- International Telecommunication Union
- Internet Governance
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Notes
N.L. Rudenstein (2001), Pointing Our Thoughts: Reflections on Harvard and Higher Education, 1991–2001 (Cambridge, MA: Harvard University), p. 140.
E.J. Wilson III (1998), Globalization, Information Technology, and Conflict in the Second and Third Worlds: A Critical Review of the Literature (New York: Rockefeller Brothers Fund), p. 6.
J.P. Singh (2002), ‘Introduction: Information Technologies and the Changing Scope of Global Power and Governance’ in J.N. Rosenau and J.P. Singh (eds) Information Technologies and Global Politics: The Changing Scope of Power and Governance (Albany, NY: State University of New York Press), p. 2.
R. Silberglitt, P.S. Anton, D.R. Howell, A. Wong, N. Gassman, B.A. Jackson, E. Landree, S. L. Pfleeger, E.M. Newton and F. Wu (2006), The Global Technology Revolution 2020—In-Depth Analyses: Bio/Nano/Materials/Information Trends, Drivers, Barriers, and Social Implications (Santa Monica, CA: RAND), p. 14.
J.R. Okin (2005), The Internet: The Not-for-Dummies Guide to the History, Technology, and Use of the Internet (Winter Harbor, ME: Ironbound Press), p. 24.
Ibid., p. 26.
A. Paris (2008), ‘Cyberethics: The Emerging Codes of Online Conduct’, Policy Innovations, A Publication of the Carnegie Council, 9 April, http://www.policyinnovations.org/ideas/briefings/data/000046, date accessed 4 August 2010.
A.G.K. Solomon (2005), Technology Futures and Global Power, Wealth, and Conflict (Washington, D.C.: Center for Strategic and International Studies), p. vi.
Okin (2005), The Internet: The Not-for-Dummies Guide to the History, Technology, and Use of the Internet, p. 4.
D. Tapscott and A.D. Williams (2008), Wikinomics: How Mass Collaboration Changes Everything, expanded edn (London: Atlantic Books), p. 19.
N.R.F. Al-Rodhan (2007), The Emergence of Blogs as a Fifth Estate and Their Security Implications (Geneva: Slatkine), p. 29.
Ibid., p. 16.
Ibid., p. 29.
Ibid.
International Telecommunication Union (ITU) (2009), Confronting the Crisis: ICT Stimulus Plans for Economic Growth, 2nd edn (Geneva: ITU), p. 62.
D. Talbot (2009), ‘TR10: HashCache’, MIT Technology Review, March/April, http://www.technologyreview.com/printer_friendly_article.aspx?id=22119&channel=specialsections§ion=tr10, date accessed 17 August 2010.
Ibid.
Ibid.
J. Stokes (2008), ‘Understanding Moore’s Law’, Ars Technica, 27 September, http://arstechnica.com/hardware/news/2008/09/moore.ars/5, date accessed 4 August 2010.
W. Drake (2004), ‘Reframing Internet Governance Discourse: Fifteen Baseline Propositions. Memo #2 for the Social Science Research Council’s Research Network on IT and Governance, Paper Based on Presentation at the Workshop on Internet Governance, ITU, Geneva, 26–27 February and the UN ICT Task Force Global Forum on Internet Governance’, New York City, 25–26 March, http://www.un-ngls.org/orf/drake.pdf, date accessed 17 August 2010, p. 5.
D. McGuire (2003), ‘U.N. Summit to Focus on Internet’, Washington Post, 5 December, http://pqasb.pqarchiver.com/washingtonpost/access/477322551.html?FMT=ABS&FMTS=ABS:FT&date=Dec+5%2C+2003&author=David+McGuire&pub=The+Washington+Post&edition=&startpage=E.05&desc=U.N.+Summit+to+Focus+on+Internet%3B+Officials+to+Discuss+Shifting+of+C ontrol+to+International+Body, date accessed 10 August 2010.
M.L. Mueller, J. Mathiason and H. Klein (2007), ‘The Internet and Global Governance: Principles and Norms for a New Regime’, Global Governance, Vol. 13, No. 2, April–June, 238.
‘ICANN Be Independent’ (2009), The Economist, 26 September, Vol. 392, No. 8650, http://www.economist.com/node/14517430, date accessed 10 August 2010.
W. J. Drake (2001), ‘Communications’ in P.J. Simmons and C. de Jonge Oudraat (eds) Managing Global Issues: Lessons Learned (Washington, D.C.: Carnegie Endowment for International Peace), p. 41.
Ibid.
Ibid.
E.A. Fischer (2005), ‘Creating a National Framework for Cybersecurity: An Analysis of Issues and Options’ in L.V. Choi (ed.) Cybersecurity and Homeland Security (New York: Nova Science Publishers, Inc.), p. 1.
J.J. Hamre, P. Ambegaonkar and K.C. Zuback (2006), ‘Bringing International Governance to Cyber Space’ in J.A. Lewis (ed.) Cyber Security: Turning National Solutions into International Cooperation (Washington, D.C.: Center for Strategic and International Studies), p. 116.
S.E. Goodman (2006), ‘Toward a Treaty-Based International Regime on Cyber Crime and Terrorism’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. 74.
N. Miwa (2006), ‘Informal, Non-Treaty-Based Multilateral Coordination’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. 103.
N.R.F. Al-Rodhan (ed.) (2006), ‘Editorial of Policy Brief on Information Technology, Terrorism, and Global Security’, Policy Briefs on the Transcultural Aspects of Security and Stability (Berlin: LIT), p. 181.
Ibid.
Ibid.
S. Ham and R.D. Atkinson (2001), A Third Way Framework for Global E-Commerce (Washington, D.C.: Progressive Policy Institute).
Ibid.
B.S. Buckland, F. Schreider and T.H. Winkler (2010), Democratic Governance Challenges of Cyber Security, DCAF Horizon 2015 Working Paper Series 1 (Geneva: DCAF), p. 12.
Ibid.
F. Assandri and D. Martings (eds) (2009), From Early Tang Court Debates to China’s Peaceful Rise (Amsterdam: ICAS/Amsterdam University Press), pp. 143–144.
S. Lafraniere (2010), ‘China Moves to Tighten Data Controls’, The New York Times, 27 April, http://www.nytimes.com/2010/04/28/world/asia/28china.html?_r=1&scp=1&sq=China%20moves%20to%20tighten%20Data%20Controls%E2%80%99&st=cse, date accessed 10 August 2010.
Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency (2008), Securing Cyberspace for the 44th Presidency (Washington, D.C.: Center for Strategic and International Studies), pp. 1–3.
J. Markoff (2010), ‘Step Taken to End Impasse Over Cybersecurity Talks’, The New York Times, 16 July, http://www.nytimes.com/2010/07/17/world/17cyber.html?ref=john_markoff, date accessed 19 August 2010.
Buckland et al. (2010), Democratic Governance Challenges of Cyber Security, p. 29.
S. Buckley (2000), ‘Radio’s New Horizons: Democracy and Popular Communication in the Digital Age’, International Journal of Cultural Studies, Vol. 3, No. 2, 181.
J.S. Nye (2010), Cyber Power (Cambridge, MA: Harvard Kennedy School, Belfer Center), p. 11.
J.A. Lewis (2006), ‘Introduction’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. xiii.
Ibid.
E.B. Skolnikoff (2001), ‘International Governance in a Technological Age’ in J. De La Mothe (ed.) Science, Technology and Governance (Trombridge, Wilts: Crombrell Press), p. 4.
Ibid.
Ibid.
Ibid.
C. Arthur (2010), ‘Facebook Privacy Lets You See Where Strangers Plan to Go’, The Guardian, 26 April, http://www.guardian.co.uk/technology/2010/apr/26/facebook-privacy-hole, date accessed 10 August 2010.
R. Waters (2010), ‘Google’s Buzz criticized by Privacy Regulators’, The Financial Times, 20 April, http://www.ft.com/cms/s/0/63d763c4-4ca6-11df-9977-00144feab49a.html, date accessed 10 August 2010.
K. Allison (2007), ‘Key to It All’, The Financial Times, 24 September, http://www.ft.com/cms/s/0/82693014-6a32-11dc-a571-0000779fd2ac.html, date accessed 10 August 2010.
S. Hansell (2009), ‘Agency Skeptical of Internet Privacy Policies’, The New York Times, 12 February, http://www.nytimes.com/2009/02/13/technol-ogy/internet/13privacy.html?scp=1&sq=Agency%20Skeptical%20of%20 Internet%20Privacy%20Policies&st=cse, date accessed 10 August 2010.
R.J. Deibert (2002), ‘Circuits of Power: Security in the Internet Environment’ in J.N. Rosenau and J.P. Singh (eds) Information Technologies and Global Politics: The Changing Scope of Power and Governance (Albany, NY: State University of New York Press), p. 126. Ibid., p. 128.
S. Rodotà (2006), ‘Europe and Cyber Security’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. 83.
Ibid., p. 83.
N. Hodge (2009), ‘Inside Moldova’s Twitter Revolution’, Wired, 8 April, http://www.wired.com/dangerroom/2009/04/inside-moldovas, date accessed 4 August 2010.
N.R.F. Al-Rodhan (2006), ‘Editorial of Policy Brief on Xenophobia, Media Stereotyping, and Their Role in Global Insecurity’ in Al-Rodhan (2006), Policy Briefs on the Transcultural Aspects of Security and Stability, p. 38.
Ibid.
G. Herd and N.R.F. Al-Rodhan (2006), ‘Danish Cartoons: A Symptom of Global Insecurity’ in Al-Rodhan (2006), Policy Briefs on the Transcultural Aspects of Security and Stability, p. 49.
Ibid.
Ibid., p. 50.
L.F. Baron Porras (2003), ‘IC(K)Ts, Civil Society and New Social Debates’, Center of Research & Popular Education (CINEP), March, p. 2.
M. Vatis (2006), ‘International Cyber-Security Cooperation: Informal Bilateral Models’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. 10.
D. Ventre (2009), Information Warfare (Hoboken, NJ, London: Wiley-ISTE), p. 213.
McAfee and SDA (2010), Cyber Security: A Transatlantic Perspective, p. 11.
World Economic Forum (WEF) (2008), Global Risks 2008: A Global Risk Network Report, A World Economic Forum Report in Collaboration with Citigroup, Marsh & McLennan Companies (MMC), Swiss Re, Wharton School Risk Center, Zurich Financial Services (Cologny/Geneva: WEF), p. 22.
M. Vatis (2006), ‘The Next Battlefield’, Harvard International Review, Vol. 28, No. 3, 60.
Ibid.
Nye (2010), Cyber Power, p. 1.
S. Gorman (2008), ‘Cyberattacks on Georgian Web Sites Are Reigning a Washington Debate’, The Wall Street Journal, 14 August, http://online.wsj.com/article/SB121867946115739465.html?mod=googlenews_wsj, accessed 4 August 2010.
J.A. Lewis (2009), ‘Crisis in Cyberspace’ in N.R.F. Al-Rodhan (ed.) (2009), Potential Global Strategic Catastrophes: Balancing Transnational Responsibilities and Burden-s haring with Sovereignty and Human Dignity (Berlin: LIT), p. 189.
Ventre (2009), Information Warfare, pp. 209–210.
Ibid., p. 212.
Buckland et al. (2010), Democratic Governance Challenges of Cyber Security, p. 10.
S. Baker (2008), ‘Cyber-Security: A Hard Sell’, Business Week Online, 9 December, http://www.businessweek.com/technology/content/dec2008/tc2008128_182619.htm, date accessed 6 August 2010.
R.C. Hodgin (2009), ‘FBI Ranks Cyber Attacks Third Most Dangerous behind Nuclear War and WMDs’, TG Daily, 7 January, http://www.tgdaily.com/security-features/40861-fbi-ranks-cyber-attacks-third-most-dangerous-behind-nuclear-war-and-wmds, date accessed 6 August 2010, p. 1.
T. Nakatomi (2001), ‘Threats to the Information Society’, The OECD Observer, January, No. 224, http://www.oecdobserver.org/news/fullstory.php/aid/410/Threats_to_the_information_society.html, date accessed 10 August 2010.
P. Mukundan (2006), ‘Laying the Foundations for a Cyber-Secure World’ in Lewis (2006), Cyber Security: Turning National Solutions into International Cooperation, p. 31.
Ibid. p. 32.
J. Markoff (2009), ‘Do We Need a New Internet?’ The New York Times, 14 February, http://www.nytimes.com/2009/02/15/weekinreview/15markoff.html?_r=1&scp=1&sq=internetpercent20security&st=cse, date accessed 6 August 2010.
United Nations Conference on Trade and Development (UNCTAD) (2006), The Digital Divide Report: ICT Diffusion Index 200 (New York and Geneva: United Nations), p. iii.
Ibid.
A. Cane (2006), ‘Digital Divide Stops Growing’, The Financial Times, 4 December, http://www.ft.com/cms/s/0/9341842e-833b-11db-a38a-0000779e2340.html, date accessed 6 August 2010.
R.D. Atkinson and A.S. McKay (2007), ‘Digital Prosperity: Understanding the Economic Benefits of the Information Technology Revolution’, The Information Technology & Innovation Foundation Website, March, http://archive.itif.org/index.php?id=34, date accessed 18 August 2010.
K. Banks (2008), ‘Mobile Phones and the Digital Divide’, PC World, 29 July, http://www.pcworld.com/article/149075/mobile_phones_and_the_dig-ital_divide.html, date accessed 6 August 2010.
E. Hansberry (2009), ‘Are Mobile Devices Closing the Digital Divide?’ Information Week, 30 July, http://www.informationweek.com/blog/main/archives/2009/07/are_mobile_devi_1.html;jsessionid=BGBO1EYZ1HTDT QE1GHPCKHWATMY32JVN, date accessed 6 August 2010.
Al-Rodhan (2007), The Emergence of Blogs as a Fifth Estate and Their Security Implications, p. 57.
Ibid.
E. MacAskill (2005), ‘Tighter Restrictions on Military Blogs Angers U.S. Soldiers’, The Guardian, 5 May, http://www.guardian.co.uk/technology/2007/may/05/news.usnews, date accessed 6 August 2010.
Al-Rodhan (2007), The Emergence of Blogs as a Fifth Estate and Their Security Implications, p. 149.
Ibid., pp. 150–151.
Ibid., p. 154.
Ibid., p. 155.
Ibid., p. 156.
Author information
Authors and Affiliations
Copyright information
© 2011 Nayef R.F. Al-Rodhan
About this chapter
Cite this chapter
Al-Rodhan, N.R.F. (2011). Information and Communications Technology (ICT). In: The Politics of Emerging Strategic Technologies. St Antony’s Series. Palgrave Macmillan, London. https://doi.org/10.1057/9780230304949_3
Download citation
DOI: https://doi.org/10.1057/9780230304949_3
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-33164-2
Online ISBN: 978-0-230-30494-9
eBook Packages: Palgrave Business & Management CollectionBusiness and Management (R0)