Technology policy

Last updated

There are several approaches to defining the substance and scope of technology policy.

Contents

According to the American scientist and policy advisor Lewis M. Branscomb, technology policy concerns the "public means for nurturing those capabilities and optimizing their applications in the service of national goals and interests". [1] Branscomb defines technology in this context as "the aggregation of capabilities, facilities, skills, knowledge, and organization required to successfully create a useful service or product". [1]

Other scholars differentiate between technology policy and science policy, suggesting that the former is about "the support, enhancement and development of technology", while the latter focuses on "the development of science and the training of scientists". [2] Rigas Arvanitis, at the Institut de recherche pour le développement in France, suggests that "science and technology policy covers all the public sector measures designed for the creation, funding, support and mobilisation of scientific and technological resources". [3]

Technology policy is a form of "active industrial policy", and effectively argues, based on the empirical facts of technological development as observed across various societies, industries and time periods, that markets rarely decide industrial fortunes in and of their own and state-intervention or support is required to overcome standard cases of market-failure (which may include, for example, under-funding of Research & Development in highly competitive or complex markets). [4]

Technology policy may be more broadly defined, and Michael G. Pollitt offers a multidisciplinary approach with social science and humanities perspective on "good" policy. [5]

Technology management

Technology management at a policy or organisational level, viewed through the lens of complexity, involves the management of an inherently complex system. Systems that are "complex" have distinct properties that arise from these relationships, such as nonlinearity, emergence, spontaneous order, adaptation, and feedback loops, among others. According to Richard Cook, of the Cognitive technologies Laboratory at the University of Chicago "Complex systems are intrinsically hazardous systems. All of the interesting systems (e.g. transportation, healthcare, power generation) are inherently and unavoidably hazardous by the own nature. The frequency of hazard exposure can sometimes be changed but the processes involved in the system are themselves intrinsically and irreducibly hazardous. It is the presence of these hazards that drives the creation of defenses against hazard that characterize these systems." [6] The success or failure of organisations or firms depends on the effective management of innovation through technology policy programmes [7]

Technological determinism

Technological determinism presumes that a society's technology drives the development of its social structure and cultural values. [8] The term is believed to have been coined by Thorstein Veblen (1857–1929), an American sociologist and economist. The most radical technological determinist in the United States in the 20th century was most likely Clarence Ayres who was a follower of Thorstein Veblen and John Dewey. William Ogburn was also known for his radical technological determinism.

Viewed through the lens of Science policy, public policy can directly affect the funding of capital equipment, intellectual infrastructure for industrial research, by providing tax incentives, direct funding or indirect support to those organizations who fund, and conduct, research. Vannevar Bush, director of the office of scientific research and development for the U.S. government in July 1945, wrote "Science is a proper concern of government" [9] Vannevar Bush directed the forerunner of the National Science Foundation, and his writings directly inspired researchers to invent the hyperlink and the computer mouse. The DARPA initiative to support computing was the impetus for the Internet Protocol stack. In the same way that scientific consortiums like CERN for high-energy physics have a commitment to public knowledge, access to this public knowledge in physics led directly to CERN's sponsorship of development of the World Wide Web and standard Internet access for all.

The first major elaboration of a technological determinist view of socioeconomic development came from the German philosopher and economist Karl Marx, whose theoretical framework was grounded in the perspective that changes in technology, and specifically productive technology, are the primary influence on human social relations and organizational structure, and that social relations and cultural practices ultimately revolve around the technological and economic base of a given society. Marx's position has become embedded in contemporary society, where the idea that fast-changing technologies alter human lives is all-pervasive. [8] Although many authors attribute a technologically determined view of human history to Marx's insights, not all Marxists are technological determinists, and some authors question the extent to which Marx himself was a determinist. Furthermore, there are multiple forms of technological determinism. [10] On the subject of technology as a means to liberation or enslavement, David Cooper wrote, "people myopically impressed by the world as an object of beauty or worship die out. Those who are myopically impressed by it as a source of energy do not: they even prosper". [11]

Although technological determinists believe in the continuous innovation of technology, many scientists believe that this innovation should be slowed down. [12] For example, with artificial intelligence gaining prominence throughout society, scientists fear that its potential of developing the cognitive skills of humans could force many individuals out of jobs and even put the lives of innocent people in danger. [13] Most famously, scientist and entrepreneur Elon Musk has is very public with the current progression of computing and AI; he believes that the fast rate at which artificial intelligence become smarter will place man in a vulnerable position where these newly created AI algorithms will identify humans as being expendable. [14] Although extreme, Musk and many other remain cautious around the progression of artificial intelligence and other technological advances that may render the power of man and do the opposite of technological determinism by destroying societies. [14]

Technology policy and economics

Technology policy takes an "evolutionary approach" to technical change, and hereby relates to evolutionary growth theory, developed by Luigi Pasinetti, J.S. Metcalfe, Pier Paolo Saviotti, and Koen Frenken and others, building on the early work of David Ricardo. [15] [16] J.S. Metcalfe noted in 1995 that "much of the traditional economic theory of technology policy is concerned with so-called 'market failures' which prevent the attainment of Pareto equilibria by violating one or other of die conditions for perfect competition". [17]

In contrast to the evolutionary paradigm, classic political science teaches technology as a static "black box". Similarly, neoclassical economics treats technology as a residual, or exogenous factor, to explain otherwise inexplicable growth (for example, shocks in supply that boost production, affecting the equilibrium price level in an economy). In the United States, the creation of the U.S. Office of Science and Technology Policy responded to the need policy approaches wherein not all technologies were treated as identical based on their social or economic variables. Technology policy is distinct from science studies but both have been influenced by Thomas Samuel Kuhn. Research in the technology policy domain recognizes the importance of, amongst others, Vannevar Bush, Moses Abramovitz, William J. Abernathy and James M. Utterback.

Technology policy approaches science as the pursuit of verifiable or falsifiable hypotheses, while science studies has a post-modern view whereby science is not thought to get at an objective reality. Technology policy is rarely post-modern. Its goal is the improvement of policy and organizations based on an evolutionary view, and understanding, of the underlying scientific and technological constraints involved in economic development, but also their potential. For example, some clean coal technologies via carbon sequestration and allocating electromagnetic spectrum by auction are ideas that emerged from technology policy schools. The Dominant design paradigm, developed by William J. Abernathy and James M. Utterback, is an idea with significant implications for innovation, market structure and competitive dynamics both within and between nations that emerged from empirical research in technology management, a domain of technology policy.

Regulating the internet

In the United States, net neutrality has been greatly discussed in politics; the idea of it is that corporations, governments, and internet providers should not discriminate against content on the internet. [18] This came about in the early 2000s when some internet providers such as Comcast and AT&T were restricting its customers from doing this like accessing virtual private network (VPNs) and using Wi-Fi routers. The term "net neutrality" was created by Tim Wu, a Columbia University law professor, who called for net neutrality laws due to his concern that restricting certain internet access would greatly inhibit long-term innovation. [19] Shortly after in 2005, the Federal Communications Commission (FCC), under the Bush administration, issued a policy statement restricted providers from disallowing users to access legal content on the internet while allowing American citizens to freely connect their devices to whichever internet connections they desire. [19] Shortly after its creation, the FCC began enforcing these new rules when in 2005 it found a North Carolina internet provider, Madison River, guilty of interrupting internet phone calls: the FCC dealt the company fines and demanded Madison River to halt its unlawful actions. [20]

It wasn't long until this policy statement's authority came into question when in 2008 Comcast sued the FCC. A federal court found that the FCC did not have the legal power to enforce the 2005 policy statement when they attempted to restrict Comcast from slowing its customers' connection to BitTorrent due to it greatly contributing to piracy. [19] This did not greatly impact the FCC's power, however, because in 2009 it forced Apple and AT&T to discontinue restricting its customers from making Skype calls. [20] With the Comcast case looming over the FCC, it desired to restructure its rules to make them stronger in court and in 2010, under the Obama administration, it did just that.   

However, under this new legislation, Verizon filed another lawsuit against the FCC, and again, the federal court found that, under Title II of the Communications Act, that the FCC did not have the jurisdiction to regulate corporations who are not "common carriers". [19] To address this issue, the former FCC-chair Tom Wheeler decided to deem broadband carriers, like Verizon, to be "Title II carriers" enabling the agency to regulate them which then sparked the passing of a new net neutrality order in 2015. Still receiving lawsuits from many corporations, the new order finally held strong in federal court when the court declared that the agency's new rules were in fact under the authority of the FCC. [19]

Under the Trump administration, President Donald Trump appointed Ajit Pai as the new FCC chairman in January 2017 which lead to the voting out of the 2015 policy order in December 2017; under the new regulation, the rules of the 2015 order were dropped entirely and the regulation stated that broadband carriers were only required to publicly reveal how they were managing their networks. [19] Supporters of this new regulation claim that in reversing the former net neutrality policy, networks and internet providers will have more incentive to innovate and improve their networks by charging large companies for internet usage and introducing competition. [21] In October 2019, a federal appeals court ruled that the FCC's reversal of the 2015 policy order that imposed regulations was in fact lawful. [22]

Surveillance and censorship

One way governments use technology policy to their benefit is through the mass surveillance of its citizens. [23] Nations around the globe use these technologies and certain polices to listen to people's phone calls, read emails and text messages, track citizens' GPS, and many more actions claiming to be improving national safety for their country. [23]

However, some nations will abuse their power of mass surveillance and inhibit the freedom of its citizens. [23] Here are a few examples of nations currently employing mass surveillance:

Name of CountryExamples of surveillance
China

Internet surveillance

  • In 2018, the Chinese government requires major companies (Alibaba, Baidu, ByteDance, and Tencent) to track information on citizens' activity on blog posts, chat rooms, short video platforms and webcasts [24]
  • China prompts its citizens to delete "dangerous content" off of their devices and grants access only to approved applications and content [25]
  • Chinese companies are required to hand over data to the government at a moments notice [26]

Video surveillance

  • Under legislation, China monitors its people using thousands of cameras that use AI and facial recognition to track the actions of its people [27]
  • Chinese law enforcement wears facial-recognition glasses capable of scanning and identifying civilians in just a few seconds [28]
India

Telecommunications surveillance

  • Under legislation, the Indian government is able to intercept telecommunications, with certain checks and balances that prevent a misuse of these actions. However, these written down rules are not clear and it is not clear if the government follows these rules [29]
Iran

Internet censorship

  • In November 2019, the Iranian government shut off internet and mobile data access to more than 80 million of its citizens due to widespread protest against rising gasoline prices to restrict communication [30]
  • With protests and rallies against the government sparking in 2018, the Iranian government has gone threw waves of internet shutdowns on many popular social media sites and regional slowdowns in order to discourage civilian communication [31]
North Korea

Internet and information restrictions

  • North Korea's leader Kim Jong Un controls all public information while serving harsh punishments for individuals who attempt to access content outside of these restrictions [32]
  • With the regime owning all news outlets, North Korea regulates and limits which kinds of information its citizens have access to with some looser restrictions being applied to elites and university students [33]
  • The government gives its people radio and television sets that only have access to government stations with these radio devices needing regular registrations with the police [33]
United States

Telecommunications and internet surveillance

  • Under the FISA Amendment Act passed in 2008 by President Bush, the NSA's power to monitor citizens' electronic communications had been largely expanded and allows them monitor individuals contact with foreigners while also permitting the government to conduct surveillance on people without probable cause [34]

The call for technology policy

In politics

With the prevalence of technology throughout the 2000s, its power in politics have raised concerns about the speed of technological change and difficulty in regulating it. [35] In the 2016 U.S. presidential election, Neil Jenkins, the director in the Office of Cybersecurity and Communications at the Department of Homeland Security, revealed that Russian government actors had hacked into the Democratic National Committee's servers to steal some of their information against the Republican candidate Donald Trump. [36]

The Russian infiltrators did not stop there, when new information showed that someone attempted to breach the election system by viewing the state's voter-registration database and stealing information on the registered voters. [36] Additionally, Arizona received cyber-attacks from the same IP addresses that had been used in the previous Illinois attacks to install malware. Not long after, Jenkins found that many other states had received attacks from this same IP address [36] and reports from the Senate Intelligence Committee that concluded Russia targeted every U.S. state. [37]

Given the breaches in the many different election systems in throughout the 2016 election, political figures nationwide have taken a firm stance against using electronic voting machines to avoid any future interference. One organization that leads the push toward U.S. paper voting is the Verified Voting Foundation; the foundation and its members believe that in order to protect the safety of U.S. elections in the future, government officials must be connected with experts in the field of technology to ensure unsecured and unreliable voting machines are not being used in the electoral process. [38] One of the board of directors, Barbra Simons, has gone as far to proclaiming that voting machines should be forbidden from U.S. elections as she, and many of her colleagues agree, that any data available online is subject to attack. [39]

Also in the 2016 election, the data firm Cambridge Analytica became heavily involved with the enacting of Donald Trump as the 45th president of the United States when his Trump campaign hired the firm to guide the data-collecting process of it. Cambridge Analytica managed to scrape data on over 50 million users that detailed the users' personal information. [40] The data originated from Aleksandr Kogan, a former psychology professor at the University of Cambridge, who gave Cambridge Analytica by using a data-extracting technique utilized at the university in which users filled out a personality survey and download an app. [40]

With this data, the company created personality profiles for the users and mapped their trends in likes and friends to direct certain ads toward the user. [40] Considering that 62% of adults receive their news on social networks like Facebook, [41] Cambridge Analytica influenced the result of the election which leaves many wondering what role big data should have in the electoral process. Due to the influence that big data had in this election, the call to limit access to it and its usage has sparked a movement toward creating policy to restrict companies access to data called the "Great Privacy Awakening". [42] In June 2018, California enacted the California Consumer Privacy Act, which states that companies must declassify what sort of data they collect and grant users the option to delete data. [43] This leaves the rest of the U.S. watching to see the effectiveness of the California law in hopes to further protect U.S. citizens from becoming a victim to more unethical data practices.   

In everyday life

Many technological interventions in the everyday lives of citizens [44] are raising concern for the future of regulation.

Self-driving cars

Self-driving cars has grabbed the attention of many, including rideshare company Uber; in March 2018, the company tested an AI-driven vehicle in Tempe, Arizona, and during this test the vehicle struck and killed a 49-year-old woman. [45]  

A prototype of an autonomous Uber vehicle used in tests nationwide, including the one in Phoenix, Arizona that killed a civilian. Uber self-driving car2.jpg
A prototype of an autonomous Uber vehicle used in tests nationwide, including the one in Phoenix, Arizona that killed a civilian.

In this test, the self-driving vehicle was monitored by an Uber employee who they deemed a "watchdog". [45] It was later revealed that the reasoning for the accident had been due to an issue with the programming of the vehicle's AI; the company failed to create code capable of detecting jaywalkers. Rather than classifying the jaywalking pedestrian as a human, the code defined the woman as "other" which the code did not have a protocol to perform under; it wasn't until 1.2 seconds before impact that the code detected a bicycle and alerted the vehicle to brake that the car began to slow down which was too late to avoid the accident. [45]

It was later determined by an investigation conducted by the National Transportation Safety Board (NTSB) that the Uber "watchdog" had been distracted by their mobile device; [46] this news called for the U.S. government to create policy to protect citizens from further incidents. In result, the NTSB released new regulation that required companies testing autonomous vehicles on public roads to have their safety procedures thoroughly inspected and hand-recorded which would be subject to regulatory confirmation. [46]

Drones

A civil drone with a live-recording camera that many individuals fear are encroaching on their privacy rights. Drone over a beach (Unsplash).jpg
A civil drone with a live-recording camera that many individuals fear are encroaching on their privacy rights.

Another emerging technology that has captivated individuals worldwide are the civil use of drones. These drones are aerial vehicles controlled from a secondary device like a remote control or cell phone that are commonly equipped with a camera uploading video to the user's device in real time, which has raised concerns about their safety and privacy of them. Many believe that these flying drones intrude on an individual's Fourth amendment right that protects an individual's privacy while others believe that the drones pose a threat of collisions with other aircraft. [47] In response to such concerns, in December 2015 the Federal Aviation Administration (FAA) created rules that stated owners of these civil drones must register them with the FAA while individual states have enforced stricter laws that restrict them from certain public areas. [47]

This innovation has also attracted the attention of corporations, like Amazon, wishing to perfect their operations; in a proposed plan to commercialize drone delivery, the company has created prototypes of Amazon Prime Air drones built to deliver packages to customers in 30 minutes or less. [48] With a vision of hundreds of AI-driven drones flying freely to households nationwide, many opponents of such innovations have privacy concerns, including Marc Rotenberg, the president of the Electronic Privacy Information Center. [49]

With these concerns in mind, in June 2016 the FAA released federal policy that made using drones much easier; companies would be able to fly drones under 55 pounds if they were operated by a person over 16 years old, flown below 400 feet, and were 5 miles away from an airport. [49] Although companies could use these drones, the FAA failed to allow drones to be used for commercial package delivery due to the restriction that the drone must stay in-sight of the operator. [49]

Policy schools

The study of technology policy, technology management or engineering and policy is taught at multiple universities.

Engineering

Information technology

Science and technology

See also

Related Research Articles

<span class="mw-page-title-main">Internet service provider</span> Organization that provides access to the Internet

An Internet service provider (ISP) is an organization that provides myriad services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.

Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used for baselining application behavior, analyzing network usage, troubleshooting network performance, ensuring that data is in the correct format, checking for malicious code, eavesdropping, and internet censorship, among other purposes. There are multiple headers for IP packets; network equipment only needs to use the first of these for normal operation, but use of the second header is normally considered to be shallow packet inspection despite this definition.

The ethics of technology is a sub-field of ethics addressing ethical questions specific to the technology age, the transitional shift in society wherein personal computers and subsequent devices provide for the quick and easy transfer of information. Technology ethics is the application of ethical thinking to growing concerns as new technologies continue to rise in prominence.

Center for Democracy & Technology (CDT) is a Washington, D.C.–based 501(c)(3) nonprofit organisation that advocates for digital rights and freedom of expression. CDT seeks to promote legislation that enables individuals to use the internet for purposes of well-intent, while at the same time reducing its potential for harm. It advocates for transparency, accountability, and limiting the collection of personal information.

Technology governance means the governance, i.e., the steering between the different sectors—state, business, and NGOs—of the development of technology. It is the idea of governance within technology and its use, as well as the practices behind them. The concept is based on the notion of innovation and of techno-economic paradigm shifts according to the theories by scholars such as Joseph A. Schumpeter, Christopher Freeman, and Carlota Perez.

<span class="mw-page-title-main">Net neutrality</span> Principle that Internet service providers should treat all data equally

Network neutrality, often referred to as net neutrality, is the principle that Internet service providers (ISPs) must treat all Internet communications equally, offering users and online content providers consistent transfer rates regardless of content, website, platform, application, type of equipment, source address, destination address, or method of communication. Net neutrality was advocated for in the 1990s by the presidential administration of Bill Clinton in the United States. Clinton's signing of the Telecommunications Act of 1996, an amendment to the Communications Act of 1934, set a worldwide example for net neutrality laws and the regulation of ISPs.

<span class="mw-page-title-main">Michael Geist</span> Canadian academic on internet and e-commerce law

Michael Allen Geist is a Canadian academic, and the Canada Research Chair in Internet and E-Commerce Law at the University of Ottawa. He is the editor of four books on copyright law and privacy law, and he edits two newsletters on Canadian information technology and privacy law.

The Framework Programmes for Research and Technological Development, also called Framework Programmes or abbreviated FP1 to FP9, are funding programmes created by the European Union/European Commission to support and foster research in the European Research Area (ERA). Starting in 2014, the funding programmes were named Horizon.

<span class="mw-page-title-main">European Digital Rights</span> Advocacy group

European Digital Rights is an international advocacy group headquartered in Brussels, Belgium. EDRi is a network collective of non-profit organizations (NGO), experts, advocates and academics working to defend and advance digital rights across the continent. As of October 2022, EDRi is made of more than 40 NGOs, as well as experts, advocates and academics from all across Europe.

The Information Technology and Innovation Foundation (ITIF) is a U.S. nonprofit public policy think tank based in Washington, D.C., focused on public policy surrounding industry and technology. As of 2019, the University of Pennsylvania ranks ITIF as the most authoritative science and technology policy think tank in the world. In its role in developing industrial and technological policies, ITIF has attracted controversy for its affiliations with various technology companies.

<span class="mw-page-title-main">Computer & Communications Industry Association</span>

The Computer and Communications Industry Association (CCIA) is an international non-profit advocacy organization based in Washington, DC, United States which represents the information and communications technology industries. According to their site, CCIA "promotes open markets, open systems, open networks, and full, fair, and open competition." Established in 1972, CCIA was active in antitrust cases involving IBM, AT&T and Microsoft, and lobbied for net neutrality, copyright and patent reform and against internet censorship and policies, mergers or other situations that would reduce competition. CCIA released a study it commissioned by an MIT professor, which analyzed the cost of patent trolls to the economy, a study on the economic benefits of Fair Use, and has testified before the Senate on limiting government surveillance and on internet censorship as a trade issue.

Net neutrality in Canada is a debated issue, but not to the degree of partisanship in other nations, such as the United States, in part because of its federal regulatory structure and pre-existing supportive laws that were enacted decades before the debate arose. In Canada, Internet service providers (ISPs) generally provide Internet service in a neutral manner. Some notable incidents otherwise have included Bell Canada's throttling of certain protocols and Telus's censorship of a specific website critical of the company.

Public Knowledge is an American non-profit public interest group based in Washington, D.C. Founded in 2001 by David Bollier, Gigi Sohn, and Laurie Racine, Public Knowledge is primarily involved in the fields of intellectual property law, competition and choice in the digital marketplace, and an open standards/end-to-end internet.

Policies promoting wireless broadband are policies, rules, and regulations supporting the "National Wireless Initiative", a plan to bring wireless broadband Internet access to 98% of Americans.

Net bias is the counter-principle to net neutrality, which indicates differentiation or discrimination of price and the quality of content or applications on the Internet by ISPs. Similar terms include data discrimination, digital redlining, and network management.

Technological determinism is a reductionist theory in assuming that a society's technology progresses by following its own internal logic of efficiency, while determining the development of the social structure and cultural values. The term is believed to have originated from Thorstein Veblen (1857–1929), an American sociologist and economist. The most radical technological determinist in the United States in the 20th century was most likely Clarence Ayres who was a follower of Thorstein Veblen as well as John Dewey. William Ogburn was also known for his radical technological determinism and his theory on cultural lag.

Surveillance capitalism is a concept in political economics which denotes the widespread collection and commodification of personal data by corporations. This phenomenon is distinct from government surveillance, although the two can be mutually reinforcing. The concept of surveillance capitalism, as described by Shoshana Zuboff, is driven by a profit-making incentive, and arose as advertising companies, led by Google's AdWords, saw the possibilities of using personal data to target consumers more precisely.

In the 2010s, personal data belonging to millions of Facebook users was collected without their consent by British consulting firm Cambridge Analytica, predominantly to be used for political advertising.

<span class="mw-page-title-main">Internet Freedom Foundation</span>

Internet Freedom Foundation (IFF) is an Indian digital rights organisation that advances liberty, equality, fraternity and social justice in the digital age. IFF has three verticals of work that include strategic litigation, policy engagement and civic literacy.

Amba Kak is a US-based technology policy expert with over a decade of experience across roles in government, industry, academia, and civil society – and in multiple jurisdictions, including the US, India,and the EU. She is the current Co-Executive Director of AI Now Institute, a US-based research institute where she leads an agenda oriented at actionable policy recommendations to tackle concerns with AI and concentrated power in the tech industry.

References

  1. 1 2 Branscomb, L. M. (1995). Confessions of a Technophile. Springer Science & Business Media.
  2. Dodgson, M., & Bessant, J. (1997). "Effective innovation policy: A new approach". Long Range Planning, 30(1), 143.
  3. Arvanitis, Rigas. Science and technology policy. Eolss Publishers Company Limited, 2009.
  4. Borris, M. & Stowsky, J. (1997). "Technology Policy and Economic Growth". UC Berkeley: Berkeley Roundtable on the International Economy.
  5. Pollitt, M. G. (2015-12-02). "In Search of 'Good' Energy Policy: The Social Limits to Technological Solutions to Energy and Climate Problems". Cambridge Working Papers in Economics. University of Cambridge. doi:10.17863/cam.5797.
  6. "Richard I. Cook (2000), "How Complex Systems Fail"" (PDF). Archived (PDF) from the original on 2020-07-09. Retrieved 2020-03-24.
  7. "Roberto E. Lopez-Martinez, "Management of Technology"" (PDF). Archived (PDF) from the original on 2020-08-07. Retrieved 2020-03-24.
  8. 1 2 Smith & Marx, Merrit Roe & Leo (June 1994). Does Technology Drive History? The Dilemma of Technological Determinism. The MIT Press. ISBN   978-0262691673.
  9. "Vannevar Bush (July 1945), "Science, the Endless Frontier"". Archived from the original on 2016-11-07. Retrieved 2018-04-06.
  10. Bimber, Bruce (May 1990). "Karl Marx and the Three Faces of Technological Determinism". Social Studies of Science. 20 (2): 333–351. doi:10.1177/030631290020002006. S2CID   144204186.
  11. David E. Cooper (March 1995). "Technology: Liberation or Enslavement?". Royal Institute of Philosophy Supplements. 38. Cambridge University Press: 7–18. doi:10.1017/S1358246100007256. S2CID   143123119.
  12. Friend, Tad (2018-05-07). "How Frightened Should We Be of A.I.?". The New Yorker. ISSN   0028-792X. Archived from the original on 2021-05-18. Retrieved 2019-11-27.
  13. "Artificial Intelligence and the Fear of the Unknown". interestingengineering.com. 2019-03-04. Archived from the original on 2019-06-24. Retrieved 2019-11-27.
  14. 1 2 Piper, Kelsey (2018-11-02). "Why Elon Musk fears artificial intelligence". Vox. Archived from the original on 2021-04-23. Retrieved 2019-11-27.
  15. Pasinetti, Luisi 1981 Structural change and economic growth, Cambridge University Press. J.S. Metcalfe and P.P. Saviotti (eds.), 1991, Evolutionary Theories of Economic and Technological Change, Harwood, 275 pages. J.S. Metcalfe 1998, Evolutionary Economics and Creative Destruction, Routledge, London. Frenken, K., Van Oort, F.G., Verburg, T., Boschma, R.A. (2004). Variety and Regional Economic Growth in the Netherlands – Final Report (The Hague: Ministry of Economic Affairs), 58 p. (pdf)
  16. Saviotti, Pier Paolo; Frenken, Koen (2008), "Export variety and the economic performance of countries", Journal of Evolutionary Economics , 18 (2): 201–218, doi:10.1007/s00191-007-0081-5, hdl: 1874/387420 , S2CID   154150526
  17. Metcalfe, J.S., 1995. "Technology systems and technology policy in an evolutionary framework". Cambridge Journal of Economics, 19(1), pp.25-46.
  18. Kenton, Will. "Net Neutrality". Investopedia. Archived from the original on 2019-11-04. Retrieved 2019-11-20.
  19. 1 2 3 4 5 6 Finley, Klint (May 5, 2018). "The Wired Guide to Net Neutrality". Wired. ISSN   1059-1028. Archived from the original on 2019-11-30. Retrieved 2024-10-03.
  20. 1 2 "A Brief History of Net Neutrality". WIRED. Archived from the original on 2020-08-21. Retrieved 2019-11-20.
  21. Hellard, Bobby; Curtis, Joe (4 November 2019). "The pros and cons of net neutrality". IT PRO. Retrieved 2019-11-20.
  22. McCabe, David (2019-10-01). "Court Upholds Net Neutrality Repeal, With Some Caveats". The New York Times. ISSN   0362-4331. Archived from the original on 2019-12-17. Retrieved 2019-11-20.
  23. 1 2 3 "Surveillance Technologies". Electronic Frontier Foundation. Archived from the original on 2016-04-26. Retrieved 2019-11-27.
  24. "China Steps Up Internet Surveillance by Recording User Activities". CPO Magazine. 2018-12-19. Archived from the original on 2019-10-19. Retrieved 2019-11-27.
  25. Ma, Alexandra. "China is building a vast civilian surveillance network — here are 10 ways it could be feeding its creepy 'social credit system'". Business Insider. Archived from the original on 2018-11-11. Retrieved 2019-11-27.
  26. Chin, Liza Lin and Josh (30 November 2017). "China's Tech Giants Have a Second Job: Helping Beijing Spy on Its People". Wall Street Journal. Archived from the original on 2019-11-27. Retrieved 2019-11-27.
  27. Chan, Tara Francis. "Parts of China are using facial recognition technology that can scan the country's entire population in one second". Business Insider. Archived from the original on 2019-07-11. Retrieved 2019-11-27.
  28. Chan, Tara Francis. "Chinese police are using facial-recognition glasses to scan travelers". Business Insider. Archived from the original on 2019-09-17. Retrieved 2019-11-27.
  29. "State of Surveillance in India". Privacy International. Archived from the original on 2019-10-26. Retrieved 2019-11-27.
  30. Newman, Lily (2019-11-17). "How Iran's Government Shut Off the Internet". Wired. ISSN   1059-1028. Archived from the original on 2019-11-24. Retrieved 2019-11-27.
  31. "What You Need to Know about Internet Censorship in Iran". Centre for International Governance Innovation. Archived from the original on 2020-11-24. Retrieved 2019-11-27.
  32. Jerreat, Jessica (2017-04-24). "North Korean Censorship". HuffPost. Archived from the original on 2020-04-25. Retrieved 2019-11-27.
  33. 1 2 Sedaghat, Nouran (2014-03-17). "North Korea exposed: Censorship in the world's most secretive state". CJFE | Canadian Journalists for Free Expression. Archived from the original on 2019-03-27. Retrieved 2019-11-27.
  34. "Documents Confirm How the NSA's Surveillance Procedures Threaten Americans' Privacy". American Civil Liberties Union. Archived from the original on 2019-11-25. Retrieved 2019-11-27.
  35. Cassidy, Christina; Hartounian, Alaina (2018-11-02). "Voters raise concerns about voting machines, poll access". AP NEWS. Archived from the original on 2020-09-08. Retrieved 2019-11-20.
  36. 1 2 3 Zetter, Kim (2018-09-26). "The Crisis of Election Security". The New York Times Magazine. ISSN   0362-4331. Archived from the original on 2019-10-16. Retrieved 2024-10-04.
  37. Sanger, David E.; Edmondson, Catie (2019-07-25). "Russia Targeted Election Systems in All 50 States, Report Finds". The New York Times. ISSN   0362-4331. Archived from the original on 2019-07-27. Retrieved 2019-10-16.
  38. "Verified Voting Foundation | Verified Voting". Archived from the original on 2020-04-14. Retrieved 2019-11-20.
  39. Leovy, Jill (2017-11-08). "Meet the Computer Scientist Championing Paper Ballots". The Atlantic. Archived from the original on 2019-07-24. Retrieved 2019-11-20.
  40. 1 2 3 Granville, Kevin (2018-03-19). "Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens". The New York Times. ISSN   0362-4331. Archived from the original on 2018-10-19. Retrieved 2019-10-16.
  41. Allcott, Hunt (Spring 2017). "Social Media and Fake News in the 2016 Election". Journal of Economic Perspectives. 31 (2): 211–236. doi: 10.1257/jep.31.2.211 .
  42. Lapowsky, Issie (2019-03-17). "How Cambridge Analytica Sparked the Great Privacy Awakening". Wired. ISSN   1059-1028. Archived from the original on 2019-11-08. Retrieved 2019-11-20.
  43. Farivar, Cyrus; Ingram, David (2019-05-13). "California is bringing law and order to big data. It could change the internet in the U.S." NBC News. Archived from the original on 2019-10-24. Retrieved 2019-11-20.
  44. "What is 'Tech Policy'". Washington Center for Technology Policy. Washington Center for Technology Policy - WashingTech. Archived from the original on 2023-03-08. Retrieved 2023-03-07.
  45. 1 2 3 Quach, Katyanna (6 Nov 2019). "Remember the Uber self-driving car that killed a woman crossing the street? The AI had no clue about jaywalkers". www.theregister.co.uk. Archived from the original on 2019-11-11. Retrieved 2024-10-03.
  46. 1 2 Beene, Ryan (2019-11-19). "Fatal Self-Driving Uber Crash Prompts Call for Tighter Oversight". finance.yahoo.com. Archived from the original on 2019-11-20. Retrieved 2019-11-16.
  47. 1 2 Wingfield, Nick (2015-11-23). "A Field Guide to Civilian Drones". The New York Times. ISSN   0362-4331 . Retrieved 2019-11-20.
  48. Coombs, Casey (2019-09-03). "With a Fleet of Drones, Amazon Wants To Deliver Packages Within 30 Minutes or Less". Archived from the original on 2019-09-10. Retrieved 2019-11-20.
  49. 1 2 3 Kang, Cecilia (2016-06-21). "F.A.A. Issues Commercial Drone Rules". The New York Times. ISSN   0362-4331. Archived from the original on 2019-05-27. Retrieved 2019-11-20.

Further reading