Finance:Technology policy

From HandWiki
Short description: Form of policy

There are several approaches to defining the substance and scope of technology policy.

According to the American scientist and policy advisor Lewis M. Branscomb, technology policy concerns the "public means for nurturing those capabilities and optimizing their applications in the service of national goals and interests".[1] Branscomb defines technology in this context as "the aggregation of capabilities, facilities, skills, knowledge, and organization required to successfully create a useful service or product".[1]

Other scholars differentiate between technology policy and science policy, suggesting that the former is about "the support, enhancement and development of technology", while the latter focuses on "the development of science and the training of scientists".[2] Rigas Arvanitis, at the Institut de recherche pour le développement in France, suggests that "science and technology policy covers all the public sector measures designed for the creation, funding, support and mobilisation of scientific and technological resources".[3]

Technology policy is a form of "active industrial policy", and effectively argues, based on the empirical facts of technological development as observed across various societies, industries and time periods, that markets rarely decide industrial fortunes in and of their own and state-intervention or support is required to overcome standard cases of market-failure (which may include, for example, under-funding of Research & Development in highly competitive or complex markets).[4]

Technology policy may be more broadly defined, and Michael G. Pollitt offers a multidisciplinary approach with social science and humanities perspective on "good" policy.[5]

Technology management

Technology management at a policy or organisational level, viewed through the lens of complexity, involves the management of an inherently complex system. Systems that are "complex" have distinct properties that arise from these relationships, such as nonlinearity, emergence, spontaneous order, adaptation, and feedback loops, among others. According to Richard Cook, of the Cognitive technologies Laboratory at the University of Chicago "Complex systems are intrinsically hazardous systems. All of the interesting systems (e.g. transportation, healthcare, power generation) are inherently and unavoidably hazardous by the own nature. The frequency of hazard exposure can sometimes be changed but the processes involved in the system are themselves intrinsically and irreducibly hazardous. It is the presence of these hazards that drives the creation of defenses against hazard that characterize these systems."[6] The success or failure of organisations or firms depends on the effective management of innovation through technology policy programmes [7]

Technological determinism

Technological determinism presumes that a society's technology drives the development of its social structure and cultural values.[8] The term is believed to have been coined by Thorstein Veblen (1857–1929), an American sociologist and economist. The most radical technological determinist in the United States in the 20th century was most likely Clarence Ayres who was a follower of Thorstein Veblen and John Dewey. William Ogburn was also known for his radical technological determinism.

Viewed through the lens of Science policy, public policy can directly affect the funding of capital equipment, intellectual infrastructure for industrial research, by providing tax incentives, direct funding or indirect support to those organizations who fund, and conduct, research. Vannevar Bush, director of the office of scientific research and development for the U.S. government in July 1945, wrote "Science is a proper concern of government"[9] Vannevar Bush directed the forerunner of the National Science Foundation, and his writings directly inspired researchers to invent the hyperlink and the computer mouse. The DARPA initiative to support computing was the impetus for the Internet Protocol stack. In the same way that scientific consortiums like CERN for high-energy physics have a commitment to public knowledge, access to this public knowledge in physics led directly to CERN's sponsorship of development of the World Wide Web and standard Internet access for all.

The first major elaboration of a technological determinist view of socioeconomic development came from the German philosopher and economist Karl Marx, whose theoretical framework was grounded in the perspective that changes in technology, and specifically productive technology, are the primary influence on human social relations and organizational structure, and that social relations and cultural practices ultimately revolve around the technological and economic base of a given society. Marx's position has become embedded in contemporary society, where the idea that fast-changing technologies alter human lives is all-pervasive.[8] Although many authors attribute a technologically determined view of human history to Marx's insights, not all Marxists are technological determinists, and some authors question the extent to which Marx himself was a determinist. Furthermore, there are multiple forms of technological determinism.[10] On the subject of technology as a means to liberation or enslavement, David Cooper wrote, "people myopically impressed by the world as an object of beauty or worship die out. Those who are myopically impressed by it as a source of energy do not: they even prosper".[11]

Although technological determinists believe in the continuous innovation of technology, many scientists believe that this innovation should be slowed down.[12] For example, with artificial intelligence gaining prominence throughout society, scientists fear that its potential of developing the cognitive skills of humans could force many individuals out of jobs and even put the lives of innocent people in danger.[13] Most famously, scientist and entrepreneur Elon Musk has is very public with the current progression of computing and AI; he believes that the fast rate at which artificial intelligence become smarter will place man in a vulnerable position where these newly created AI algorithms will identify humans as being expendable.[14] Although extreme, Musk and many other remain cautious around the progression of artificial intelligence and other technological advances that may render the power of man and do the opposite of technological determinism by destroying societies.[14]

Technology policy and economics

Technology policy takes an "evolutionary approach" to technical change, and hereby relates to evolutionary growth theory, developed by Luigi Pasinetti, J.S. Metcalfe, Pier Paolo Saviotti, and Koen Frenken and others, building on the early work of David Ricardo.[15][16] J.S. Metcalfe noted in 1995 that "much of the traditional economic theory of technology policy is concerned with so-called 'market failures' which prevent the attainment of Pareto equilibria by violating one or other of die conditions for perfect competition".[17]

In contrast to the evolutionary paradigm, classic political science teaches technology as a static "black box". Similarly, neoclassical economics treats technology as a residual, or exogenous factor, to explain otherwise inexplicable growth (for example, shocks in supply that boost production, affecting the equilibrium price level in an economy). In the United States, the creation of the U.S. Office of Science and Technology Policy responded to the need policy approaches wherein not all technologies were treated as identical based on their social or economic variables. Technology policy is distinct from science studies but both have been influenced by Thomas Samuel Kuhn. Research in the technology policy domain recognizes the importance of, amongst others, Vannevar Bush, Moses Abramovitz, William J. Abernathy and James M. Utterback.

Technology policy approaches science as the pursuit of verifiable or falsifiable hypotheses, while science studies has a post-modern view whereby science is not thought to get at an objective reality. Technology policy is rarely post-modern. Its goal is the improvement of policy and organizations based on an evolutionary view, and understanding, of the underlying scientific and technological constraints involved in economic development, but also their potential. For example, some clean coal technologies via carbon sequestration and allocating electromagnetic spectrum by auction are ideas that emerged from technology policy schools. The Dominant design paradigm, developed by William J. Abernathy and James M. Utterback, is an idea with significant implications for innovation, market structure and competitive dynamics both within and between nations that emerged from empirical research in technology management, a domain of technology policy.

Regulating the internet

In the United States, net neutrality has been greatly discussed in politics; the idea of it is that corporations, governments, and internet providers should not discriminate against content on the internet.[18] This came about in the early 2000s when some internet providers such as Comcast and AT&T were restricting its customers from doing this like accessing virtual private network (VPNs) and using Wi-Fi routers. The term "net neutrality" was created by Tim Wu, a Columbia University law professor, who called for net neutrality laws due to his concern that restricting certain internet access would greatly inhibit long-term innovation.[19] Shortly after in 2005, the Federal Communications Commission (FCC), under the Bush administration, issued a policy statement restricted providers from disallowing users to access legal content on the internet while allowing American citizens to freely connect their devices to whichever internet connections they desire.[19] Shortly after its creation, the FCC began enforcing these new rules when in 2005 it found a North Carolina internet provider, Madison River, guilty of interrupting internet phone calls: the FCC dealt the company fines and demanded Madison River to halt its unlawful actions.[20]

It wasn't long until this policy statement's authority came into question when in 2008 Comcast sued the FCC. A federal court found that the FCC did not have the legal power to enforce the 2005 policy statement when they attempted to restrict Comcast from slowing its customers' connection to BitTorrent due to it greatly contributing to piracy.[21] This did not greatly impact the FCC's power, however, because in 2009 it forced Apple and AT&T to discontinue restricting its customers from making Skype calls.[20] With the Comcast case looming over the FCC, it desired to restructure its rules to make them stronger in court and in 2010, under the Obama administration, it did just that.   

However, under this new legislation, Verizon filed another lawsuit against the FCC, and again, the federal court found that, under Title II of the Communications Act, that the FCC did not have the jurisdiction to regulate corporations who are not "common carriers".[22] To address this issue, the former FCC-chair Tom Wheeler decided to deem broadband carriers, like Verizon, to be "Title II carriers" enabling the agency to regulate them which then sparked the passing of a new net neutrality order in 2015. Still receiving lawsuits from many corporations, the new order finally held strong in federal court when the court declared that the agency's new rules were in fact under the authority of the FCC.[22]

Under the Trump administration, President Donald Trump appointed Ajit Pai as the new FCC chairman in January 2017 which lead to the voting out of the 2015 policy order in December 2017; under the new regulation, the rules of the 2015 order were dropped entirely and the regulation stated that broadband carriers were only required to publicly reveal how they were managing their networks.[23] Supporters of this new regulation claim that in reversing the former net neutrality policy, networks and internet providers will have more incentive to innovate and improve their networks by charging large companies for internet usage and introducing competition.[24] In October 2019, a federal appeals court ruled that the FCC's reversal of the 2015 policy order that imposed regulations was in fact lawful.[25]

Surveillance and censorship

One way governments use technology policy to their benefit is through the mass surveillance of its citizens.[26] Nations around the globe use these technologies and certain polices to listen to people's phone calls, read emails and text messages, track citizens' GPS, and many more actions claiming to be improving national safety for their country.[26]

However, some nations will abuse their power of mass surveillance and inhibit the freedom of its citizens.[26] Here are a few examples of nations currently employing mass surveillance:

Name of Country Examples of surveillance
China

Internet surveillance

  • In 2018, the Chinese government requires major companies (Alibaba, Baidu, ByteDance, and Tencent) to track information on citizens' activity on blog posts, chat rooms, short video platforms and webcasts[27]
  • China prompts its citizens to delete "dangerous content" off of their devices and grants access only to approved applications and content[28]
  • Chinese companies are required to hand over data to the government at a moments notice[29]

Video surveillance

  • Under legislation, China monitors its people using thousands of cameras that use AI and facial recognition to track the actions of its people[30]
  • Chinese law enforcement wears facial-recognition glasses capable of scanning and identifying civilians in just a few seconds[31]
India

Telecommunications surveillance

  • Under legislation, the Indian government is able to intercept telecommunications, with certain checks and balances that prevent a misuse of these actions. However, these written down rules are not clear and it is not clear if the government follows these rules[32]
Iran

Internet censorship

  • In November 2019, the Iranian government shut off internet and mobile data access to more than 80 million of its citizens due to widespread protest against rising gasoline prices to restrict communication[33]
  • With protests and rallies against the government sparking in 2018, the Iranian government has gone threw waves of internet shutdowns on many popular social media sites and regional slowdowns in order to discourage civilian communication[34]
North Korea

Internet and information restrictions

  • North Korea's leader Kim Jong Un controls all public information while serving harsh punishments for individuals who attempt to access content outside of these restrictions[35]
  • With the regime owning all news outlets, North Korea regulates and limits which kinds of information its citizens have access to with some looser restrictions being applied to elites and university students[36]
  • The government gives its people radio and television sets that only have access to government stations with these radio devices needing regular registrations with the police[36]
United States

Telecommunications and internet surveillance

  • Under the FISA Amendment Act passed in 2008 by President Bush, the NSA's power to monitor citizens' electronic communications had been largely expanded and allows them monitor individuals contact with foreigners while also permitting the government to conduct surveillance on people without probable cause[37]

The call for technology policy

In politics

With the prevalence of technology throughout the 2000s, its power in politics have raised concerns about the speed of technological change and difficulty in regulating it.[38] In the 2016 U.S. presidential election, Neil Jenkins, the director in the Office of Cybersecurity and Communications at the Department of Homeland Security, revealed that Russian government actors had hacked into the Democratic National Committee's servers to steal some of their information against the Republican candidate Donald Trump.[39]

The Russian infiltrators did not stop there, when new information showed that someone attempted to breach the election system by viewing the state's voter-registration database and stealing information on the registered voters.[40] Additionally, Arizona received cyber-attacks from the same IP addresses that had been used in the previous Illinois attacks to install malware. Not long after, Jenkins found that many other states had received attacks from this same IP address[40] and reports from the Senate Intelligence Committee that concluded Russia targeted every U.S. state.[41]

Given the breaches in the many different election systems in throughout the 2016 election, political figures nationwide have taken a firm stance against using electronic voting machines to avoid any future interference. One organization that leads the push toward U.S. paper voting is the Verified Voting Foundation; the foundation and its members believe that in order to protect the safety of U.S. elections in the future, government officials must be connected with experts in the field of technology to ensure unsecured and unreliable voting machines are not being used in the electoral process.[42] One of the board of directors, Barbra Simons, has gone as far to proclaiming that voting machines should be forbidden from U.S. elections as she, and many of her colleagues agree, that any data available online is subject to attack.[43]

Also in the 2016 election, the data firm Cambridge Analytica became heavily involved with the enacting of Donald Trump as the 45th president of the United States when his Trump campaign hired the firm to guide the data-collecting process of it. Cambridge Analytica managed to scrape data on over 50 million users that detailed the users' personal information.[44] The data originated from Aleksandr Kogan, a former psychology professor at the University of Cambridge, who gave Cambridge Analytica by using a data-extracting technique utilized at the university in which users filled out a personality survey and download an app.[44]

With this data, the company created personality profiles for the users and mapped their trends in likes and friends to direct certain ads toward the user.[45] Considering that 62% of adults receive their news on social networks like Facebook,[46] Cambridge Analytica influenced the result of the election which leaves many wondering what role big data should have in the electoral process. Due to the influence that big data had in this election, the call to limit access to it and its usage has sparked a movement toward creating policy to restrict companies access to data called the "Great Privacy Awakening".[47] In June 2018, California enacted the California Consumer Privacy Act, which states that companies must declassify what sort of data they collect and grant users the option to delete data.[48] This leaves the rest of the U.S. watching to see the effectiveness of the California law in hopes to further protect U.S. citizens from becoming a victim to more unethical data practices.   

In everyday life

Many technological interventions in the everyday lives of citizens[49] are raising concern for the future of regulation.

Self-driving cars

Self-driving cars has grabbed the attention of many, including rideshare company Uber; in March 2018, the company tested an AI-driven vehicle in Tempe, Arizona, and during this test the vehicle struck and killed a 49-year-old woman.[50] 

A prototype of an autonomous Uber vehicle used in tests nationwide, including the one in Phoenix, Arizona that killed a civilian.

In this test, the self-driving vehicle was monitored by an Uber employee who they deemed a "watchdog".[51] It was later revealed that the reasoning for the accident had been due to an issue with the programming of the vehicle's AI; the company failed to create code capable of detecting jaywalkers. Rather than classifying the jaywalking pedestrian as a human, the code defined the woman as "other" which the code did not have a protocol to perform under; it wasn't until 1.2 seconds before impact that the code detected a bicycle and alerted the vehicle to brake that the car began to slow down which was too late to avoid the accident.[51]

It was later determined by an investigation conducted by the National Transportation Safety Board (NTSB) that the Uber "watchdog" had been distracted by their mobile device;[52] this news called for the U.S. government to create policy to protect citizens from further incidents. In result, the NTSB released new regulation that required companies testing autonomous vehicles on public roads to have their safety procedures thoroughly inspected and hand-recorded which would be subject to regulatory confirmation.[52]

Drones

A civil drone with a live-recording camera that many individuals fear are encroaching on their privacy rights.

Another emerging technology that has captivated individuals worldwide are the civil use of drones. These drones are aerial vehicles controlled from a secondary device like a remote control or cell phone that are commonly equipped with a camera uploading video to the user's device in real time, which has raised concerns about their safety and privacy of them. Many believe that these flying drones intrude on an individual's Fourth amendment right that protects an individual's privacy while others believe that the drones pose a threat of collisions with other aircraft.[53] In response to such concerns, in December 2015 the Federal Aviation Administration (FAA) created rules that stated owners of these civil drones must register them with the FAA while individual states have enforced stricter laws that restrict them from certain public areas.[53]

This innovation has also attracted the attention of corporations, like Amazon, wishing to perfect their operations; in a proposed plan to commercialize drone delivery, the company has created prototypes of Amazon Prime Air drones built to deliver packages to customers in 30 minutes or less.[54] With a vision of hundreds of AI-driven drones flying freely to households nationwide, many opponents of such innovations have privacy concerns, including Marc Rotenberg, the president of the Electronic Privacy Information Center.[55]

With these concerns in mind, in June 2016 the FAA released federal policy that made using drones much easier; companies would be able to fly drones under 55 pounds if they were operated by a person over 16 years old, flown below 400 feet, and were 5 miles away from an airport.[55] Although companies could use these drones, the FAA failed to allow drones to be used for commercial package delivery due to the restriction that the drone must stay in-sight of the operator.[55]

Policy schools

The study of technology policy, technology management or engineering and policy is taught at multiple universities.

Engineering

Information technology

Science and technology

See also

References

  1. 1.0 1.1 Branscomb, L. M. (1995). Confessions of a Technophile. Springer Science & Business Media.
  2. Dodgson, M., & Bessant, J. (1997). "Effective innovation policy: A new approach". Long Range Planning, 30(1), 143.
  3. Arvanitis, Rigas. Science and technology policy. Eolss Publishers Company Limited, 2009.
  4. Borris, M. & Stowsky, J. (1997). "Technology Policy and Economic Growth". UC Berkeley: Berkeley Roundtable on the International Economy.
  5. G., Pollitt, M. (2015-12-02) (in en). In Search of 'Good' Energy Policy: The Social Limits to Technological Solutions to Energy and Climate Problems. Apollo. doi:10.17863/cam.5797. 
  6. "Richard I. Cook (2000), "How Complex Systems Fail"". https://web.mit.edu/2.75/resources/random/How%20Complex%20Systems%20Fail.pdf. 
  7. "Roberto E. Lopez-Martinez, "Management of Technology"". https://www.eolss.net/Sample-Chapters/C15/E1-30-03-03.pdf. 
  8. 8.0 8.1 Smith & Marx, Merrit Roe & Leo (June 1994). Does Technology Drive History? The Dilemma of Technological Determinism. The MIT Press. ISBN 978-0262691673. 
  9. "Vannevar Bush (July 1945), "Science, the Endless Frontier"". https://www.nsf.gov/od/lpa/nsf50/vbush1945.htm. 
  10. Bimber, Bruce (May 1990). "Karl Marx and the Three Faces of Technological Determinism". Social Studies of Science 20 (2): 333–351. doi:10.1177/030631290020002006. 
  11. David E. Cooper (March 1995). "Technology: Liberation or Enslavement?". Royal Institute of Philosophy Supplements (Cambridge University Press) 38: 7–18. doi:10.1017/S1358246100007256. 
  12. Friend, Tad (2018-05-07). "How Frightened Should We Be of A.I.?" (in en). The New Yorker. ISSN 0028-792X. https://www.newyorker.com/magazine/2018/05/14/how-frightened-should-we-be-of-ai. Retrieved 2019-11-27. 
  13. "Artificial Intelligence and the Fear of the Unknown" (in en-US). 2019-03-04. https://interestingengineering.com/artificial-intelligence-and-the-fear-of-the-unknown. 
  14. 14.0 14.1 Piper, Kelsey (2018-11-02). "Why Elon Musk fears artificial intelligence" (in en). https://www.vox.com/future-perfect/2018/11/2/18053418/elon-musk-artificial-intelligence-google-deepmind-openai. 
  15. Pasinetti, Luisi 1981 Structural change and economic growth, Cambridge University Press. J.S. Metcalfe and P.P. Saviotti (eds.), 1991, Evolutionary Theories of Economic and Technological Change, Harwood, 275 pages. J.S. Metcalfe 1998, Evolutionary Economics and Creative Destruction, Routledge, London. Frenken, K., Van Oort, F.G., Verburg, T., Boschma, R.A. (2004). Variety and Regional Economic Growth in the Netherlands – Final Report (The Hague: Ministry of Economic Affairs), 58 p. (pdf)
  16. Saviotti, Pier Paolo; Frenken, Koen (2008), "Export variety and the economic performance of countries", Journal of Evolutionary Economics 18 (2): 201–218, doi:10.1007/s00191-007-0081-5 
  17. Metcalfe, J.S., 1995. "Technology systems and technology policy in an evolutionary framework". Cambridge Journal of Economics, 19(1), pp.25-46.
  18. Kenton, Will. "Net Neutrality" (in en). https://www.investopedia.com/terms/n/net-neutrality.asp. 
  19. 19.0 19.1 "Net Neutrality: Here's Everything You Need To Know" (in en). Wired. ISSN 1059-1028. https://www.wired.com/story/guide-net-neutrality/. Retrieved 2019-11-20. 
  20. 20.0 20.1 "A Brief History of Net Neutrality". WIRED. https://www.wired.com/amp-stories/net-neutrality-timeline. Retrieved 2019-11-20. 
  21. "Net Neutrality: Here's Everything You Need To Know" (in en). Wired. ISSN 1059-1028. https://www.wired.com/story/guide-net-neutrality/. Retrieved 2019-11-20. 
  22. 22.0 22.1 "Net Neutrality: Here's Everything You Need To Know" (in en). Wired. ISSN 1059-1028. https://www.wired.com/story/guide-net-neutrality. Retrieved 2019-11-20. 
  23. "Net Neutrality: Here's Everything You Need To Know" (in en). Wired. ISSN 1059-1028. https://www.wired.com/story/guide-net-neutrality. Retrieved 2019-11-20. 
  24. Hellard, Bobby; Curtis, Joe. "The pros and cons of net neutrality" (in en). https://www.itpro.co.uk/go/28115. 
  25. McCabe, David (2019-10-01). "Court Upholds Net Neutrality Repeal, With Some Caveats" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2019/10/01/technology/net-neutrality-repeal-broadband.html. 
  26. 26.0 26.1 26.2 "Surveillance Technologies" (in en). https://www.eff.org/issues/mass-surveillance-technologies. 
  27. "China Steps Up Internet Surveillance by Recording User Activities" (in en-US). 2018-12-19. https://www.cpomagazine.com/data-privacy/china-steps-up-internet-surveillance-by-recording-user-activities. 
  28. Ma, Alexandra. "China is building a vast civilian surveillance network — here are 10 ways it could be feeding its creepy 'social credit system'". https://www.businessinsider.com/how-china-is-watching-its-citizens-in-a-modern-surveillance-state-2018-4. 
  29. Chin, Liza Lin and Josh (30 November 2017). "China's Tech Giants Have a Second Job: Helping Beijing Spy on Its People" (in en-US). Wall Street Journal. https://www.wsj.com/articles/chinas-tech-giants-have-a-second-job-helping-the-government-see-everything-1512056284. 
  30. Chan, Tara Francis. "Parts of China are using facial recognition technology that can scan the country's entire population in one second". https://www.businessinsider.com/china-facial-recognition-technology-works-in-one-second-2018-3. 
  31. Chan, Tara Francis. "Chinese police are using facial-recognition glasses to scan travelers". https://www.businessinsider.com/china-police-using-facial-recognition-glasses-2018-2. 
  32. "State of Surveillance in India" (in en-GB). http://privacyinternational.org/long-read/1165/state-surveillance-india. 
  33. Newman, Lily (2019-11-17). "How Iran's Government Shut Off the Internet" (in en). Wired. ISSN 1059-1028. https://www.wired.com/story/iran-internet-shutoff/. Retrieved 2019-11-27. 
  34. "What You Need to Know about Internet Censorship in Iran" (in en). https://www.cigionline.org/articles/what-you-need-know-about-internet-censorship-iran. 
  35. Jerreat, Jessica (2017-04-24). "North Korean Censorship" (in en). https://www.huffpost.com/entry/north-korean-censorship_b_58fe78afe4b086ce58981445. 
  36. 36.0 36.1 Sedaghat, Nouran (2014-03-17). "North Korea exposed: Censorship in the world's most secretive state". https://www.cjfe.org/north_korea_exposed_censorship_in_the_world_s_most_secretive_state. 
  37. "Documents Confirm How the NSA's Surveillance Procedures Threaten Americans' Privacy" (in en). https://www.aclu.org/fact-sheet/documents-confirm-how-nsas-surveillance-procedures-threaten-americans-privacy. 
  38. Cassidy, Christina; Hartounian, Alaina (2018-11-02). "Voters raise concerns about voting machines, poll access". https://apnews.com/4ce9dcab5248456da4d3267c2a33fd26. 
  39. Zetter, Kim (2018-09-26). "The Crisis of Election Security" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html. 
  40. 40.0 40.1 Zetter, Kim (2018-09-26). "The Crisis of Election Security" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html. 
  41. Sanger, David E.; Edmondson, Catie (2019-07-25). "Russia Targeted Election Systems in All 50 States, Report Finds" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2019/07/25/us/politics/russian-hacking-elections.html. 
  42. "Verified Voting Foundation | Verified Voting" (in en-US). https://www.verifiedvoting.org/about-vvf. 
  43. Leovy, Jill (2017-11-08). "Meet the Computer Scientist Championing Paper Ballots" (in en-US). https://www.theatlantic.com/magazine/archive/2017/12/guardian-of-the-vote/544155/. 
  44. 44.0 44.1 Granville, Kevin (2018-03-19). "Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html. 
  45. Granville, Kevin (2018-03-19). "Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html. 
  46. Allcott, Hunt (Spring 2017). "Social Media and Fake News in the 2016 Election". Journal of Economic Perspectives 31 (2): 211–236. doi:10.1257/jep.31.2.211. 
  47. Lapowsky, Issie (2019-03-17). "How Cambridge Analytica Sparked the Great Privacy Awakening" (in en). Wired. ISSN 1059-1028. https://www.wired.com/story/cambridge-analytica-facebook-privacy-awakening. Retrieved 2019-11-20. 
  48. Farivar, Cyrus; Ingram, David (2019-05-13). "California is bringing law and order to big data. It could change the internet in the U.S." (in en). https://www.nbcnews.com/tech/tech-news/california-bringing-law-order-big-data-it-could-change-internet-n1005061. 
  49. "What is 'Tech Policy'". Washington Center for Technology Policy - WashingTech. https://www.washingtech.org/technology-policy-issues. 
  50. at 05:48, Katyanna Quach 6 Nov 2019. "Remember the Uber self-driving car that killed a woman crossing the street? The AI had no clue about jaywalkers" (in en). https://www.theregister.co.uk/2019/11/06/uber_self_driving_car_death/. 
  51. 51.0 51.1 at 05:48, Katyanna Quach 6 Nov 2019. "Remember the Uber self-driving car that killed a woman crossing the street? The AI had no clue about jaywalkers" (in en). https://www.theregister.co.uk/2019/11/06/uber_self_driving_car_death. 
  52. 52.0 52.1 Beene, Ryan (2019-11-19). "Fatal Self-Driving Uber Crash Prompts Call for Tighter Oversight" (in en-US). https://finance.yahoo.com/news/uber-self-driving-car-unit-190740140.html. 
  53. 53.0 53.1 Wingfield, Nick (2015-11-23). "A Field Guide to Civilian Drones" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/interactive/2015/technology/guide-to-civilian-drones.html,%20https://www.nytimes.com/interactive/2015/technology/guide-to-civilian-drones.html. 
  54. Coombs, Casey (2019-09-03). "With a Fleet of Drones, Amazon Wants To Deliver Packages Within 30 Minutes or Less" (in en). https://www.thedailybeast.com/with-prime-air-amazon-wants-to-deliver-packages-in-30-minutes-or-less-via-drone. 
  55. 55.0 55.1 55.2 Kang, Cecilia (2016-06-21). "F.A.A. Issues Commercial Drone Rules" (in en-US). The New York Times. ISSN 0362-4331. https://www.nytimes.com/2016/06/22/technology/drone-rules-commercial-use-faa.html. 
  • The New Economics of Technology Policy Auth Dominique Foray Ed Edward Elgar ISBN:978 1 84844 349 5
  • Mastering a New Role Shaping Technology Policy for National Economic Performance ED. NAP ISBN:0-309-58407-8
  • Technology and Global Industry Companies and Nations in the World Economy ED. NAP ISBN:0-309-55501-9

External links