Skip to main content

Currently Skimming:

6 Recommendations
Pages 91-102

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 91...
... The final assumption is that the management of technology-related risks can be achieved primarily by protecting specific "critical technologies" from unauthorized use, possession, or production. In today's extremely competitive global technology environment, these assumptions are no longer valid.
From page 92...
... approach to managing the risks associated with technologies is based on restrictions on the possession, use, or manufacturing of these technologies, or restrictions on the knowledge or materials needed to develop them. Given the speed and scale of technology innovation and the growing trend of technologies originating in the private sector, the current risk management approach is of limited effectiveness and may in some cases be counterproductive.
From page 93...
... The key characteristics of an open research environment need to be defined specifically, in much the same way that a restricted research   1 A 1982 National Academies report (commonly referred to as the Corson report) highlights that controls on scientific information "can be seen to weaken both military and economic capabilities by restricting the mutually beneficial interaction of scientific investigators, inhibiting the flow of research results into military and civilian technology, and lessening the capacity of universities to train advanced researchers" (IOM, NAS, and NAE, 1982, p.
From page 94...
... The proposed policy approach will put the federal government in the position of making an explicit risk acceptance decision on behalf of the nation. By designating certain research environments at universities or national laboratories as open, funding agencies will decide a priori what work can be performed in those environments despite the accompanying risks of disclosure.
From page 95...
... The readily available pool of international talent, however, has masked issues in training top domestic scientific and engineering talent, leaving the nation unprepared for efforts by other countries to reverse the flow of international talent to the United States. The development of domestic talent will continue to be essential if the United States is to maintain its leadership in science and technology.
From page 96...
... Internationally, the United States needs to find new and better ways to encourage scientists, engineers, and their families to come to this country to work and live. Options include further aligning work visa levels with student visa levels and clearing pathways to citizenship for top international researchers.
From page 97...
... Today, technology is ubiquitous, shared, and multipurpose; thus, the task of distinguishing technologies that pose a specific risk is very difficult and may result in identifying overly broad technology areas, further complicating efforts to manage risk because of unintended effects on innovation itself. Alternatively, one could define a risk management approach that begins with identifying which actors using what means are attempting to use a particular technology against U.S.
From page 98...
... The execution of these risk management strategies should be coordinated and overseen by the above interagency process to ensure a "whole-of government" approach. The strategies resulting from this interagency risk management process should be  proactive, in that they define technology-related threats with national or economic security implications as early in the research and development process as possible;  strategic, in that they are based on global realities, including the plans, actions, intentions, and capabilities of adversaries, and on reasoned risk acceptance decisions about which technologies must, should, or cannot be protected;
From page 99...
... That mechanism should be managed in a manner that allows effective coordination across all affected agencies, including those involved with national security, law enforcement, trade, regulatory matters, international agreements, finance, science and technology, and standards setting. TAILORED APPROACHES TO THE UNIQUE VULNERABILITIES RESULTING FROM SHARED PLATFORMS The changing technological landscape has introduced new challenges to management of the risks posed by shared platforms and their supporting    
From page 100...
... Protecting these national interests typically requires governmental technology policies, such as government involvement in setting standards, regulations, or trade policies. The committee does not believe that, at present, responsibility for identifying and managing the unique risks posed by these shared and powerful platforms is clearly established within the U.S.
From page 101...
... interests;  involving the private sector in specifying the technical features and requirements that should be included in platform development, such as performance standards for security, integrity, interoperability, control features, and user controls;  developing a coherent, whole-of-government strategy for establishing and managing trust relationships among platform developers or users, including international governance mechanisms, use agreements, regulatory approaches, trade agreements, content requirements, and law enforcement cooperation agreements; and  establishing a range of responses to security or trust problems related to the use of shared platforms, with participating agencies planning for and preparing appropriate "incident response" capabilities. In today's interdependent, global innovation system, the greatest threat is that the United States will inadvertently weaken its innovation ecosystem while other countries continue to emulate the actions that have historically yielded U.S.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.