The United States leads the world in combining innovation quality and quantity, but the challenges are growing, particularly when it comes to scientific research. Addressing gaps in U.S. innovation policy could help ensure that the United States remains the leading innovation center for decades to come.
The scorecard infographic and accompanying progress report, "Remedial Education: Federal Education Policy," highlights the main challenges facing the U.S. education system and assesses whether federal education policy is effectively addressing them.
The second World Internet Conference (WIC) was held in Wuzhen, China, from December 16-18, 2015. The theme for the conference was "An Interconnected World Shared and Governed by All: Building a Community of Common Future in Cyberspace" and conference leaders proposed the Wuzhen Initiative as a continuation of the work of the World Summit on the Information Society (WSIS).
UN General Assembly Resolution 56/183 in December 2001 endorsed the World Summit on the Information Society (WSIS), which encourages global discussions on how to benefit from the digital revolution while addressing the digital divide. The International Telecommunication Union hosted two phases in Geneva from December 10 to 12, 2003, and in Tunis from November 16 to 18, 2005. From February 25 to 27, 2013, WSIS participants met in Paris to evaluate progress and goals. In December 2015, the UN produced a draft resolution on the outcome of the WSIS from the past ten years and renewed the Internet Governance Forum (IGF) for another ten years.
World Trade Organization (WTO) particpants created the the Information Technology Agreement (ITA) in December 1996, which eliminated tariffs on specific technology product exports. From 2012 to 2015, WTO participants negotiated how to expand the ITA to cover additional technologies.
How can the United States protect cyberspace, the "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.
The U.S. government's effort to persuade other countries to adopt norms of responsibility for cyberspace faces a significant obstacle: computers located in the United States host much of the malicious software used to carry out cyberattacks. Robert K. Knake explains.
Beginning with the Stuxnet virus launched by the United States at an Iranian nuclear facility in 2010 and continuing through to the most recent Sony hacking scandal, A Hacked World Order exposes how the Internet has ushered in a new era of geopolitical maneuvering and reveals the tremendous and terrifying implications for our economic livelihood, security, and personal identity.
Although the United States leads the world in technology innovation, it may fall behind if the government does not address emerging gaps in innovation policy and invest more in scientific research, argues a new progress report and scorecard from the Council on Foreign Relations’ (CFR) Renewing America initiative. The report is authored by Renewing America Associate Director Rebecca Strauss and CFR Bernard L. Schwartz Senior Fellow and Renewing America Director Edward Alden.
President Barack Obama and the Environmental Protection Agency announced the Clean Power Plan on August 3, 2015. The plan provides a toolkit for states to implement to reduce the carbon emissions from existing fossil-fueled power plants. This plan is an update of the 2014 proposed plan and a step in the larger Climate Change Plan.
The United Nations Group of Governmental Experts (GGE) released this consensus report (A/70/172) on rules of behavior in cyberspace, particularly during peacetime. The report recommends that nations should not use information and communication technologies to attack critical infrastructure or interrupt the information systems of emergency services.
National People's Congress of China released this draft text on July 6, 2015, and it will be available for public comment through August 2015. The law outlines the Chinese government's goals for security standards for technical systems, networks, and user data. It requires companies with operations in China to comply with government requests for regulating and restricting technology use. See also the broader National Security Law passed on July 1, 2015.
In recent years, frugal and reverse innovation have gained attention as potential strategies for increasing the quality and accessibility of health care while slowing the growth in its costs. Thomas J. Bollyky argues that the demand for these types of innovation is increasing and outlines three practical questions for policymakers seeking real investments and results.
Robots have the potential to greatly improve the quality of our lives at home, at work, and at play. Customized robots working alongside people will create new jobs, improve the quality of existing jobs, and give people more time to focus on what they find interesting, important, and exciting.
Learn more about CFR’s mission and its work over the past year in the 2015 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »