
Economy,Society,Cyberspace
How is Art like Bitcoin?
Given that speculative bubbles have long affected markets around the world, bitcoin is hardly the first object to have this gulf between its intrinsic value and market value. Indeed, the world of art is ripe with objects presenting this same phenomenon.

Cyberspace
Our Blockchain Future

Economy,Cyberspace,China
Why are Chinese Internet Users Paying for Digital Content?

Cyberspace
Some in the intelligence community and private sector solutions providers are advocating artificial intelligence as a solution to resolving cyber security vulnerabilities. Artificial intelligence can greatly improve human capabilities in cyber security.

Security,Cyberspace,East Asia
An Electronic and Cyber Warfare Doctrine to Contain North Korea’s Provocations
Through a strategic doctrine of electronic and cyber warfare containment, it would be possible for certain strategically significant actors to contain North Korea, while other strategically significant actors simultaneously work toward a peaceful resolution to the issue.

Society,Cyberspace
Technology Disruption: Policy Implications for Stakeholders
Technologies are developing very quickly. Many of them have the potential to disrupt the way we live. Policy makers and ordinary individuals both must prepare to manage the disruptions that come with technological development.

Security,Cyberspace
The Global Ransomware Outbreak and the Challenge for Cybersovereignty
Among the victims were Renault and Federal Express, UK hospitals, Chinese universities, Russia’s Ministry of Interior, and Spanish telecommunications and energy companies. The efforts of countries like China to impose law and order on the internet are likely to see an urgent boost.

Cyberspace
The French Presidential Election and the Long War on Fake News
Fake news was a prominent problem in the recent French presidential election campaign. In the days before the first round of the election, researchers from Oxford University found that fake news comprised up to “one-quarter of the political links shared on Twitter in France.”

Security,Cyberspace,Hotspots
Do US Actions in the South China Sea Violate International Law?
The US flies hundreds of ISR missions every year to collect communications between the target country’s command-and-control centers and radar and weapons systems. The initial deployment of the Carl Vinson strike force was to the South China Sea. Are these probes and the deployment a violation of the UN Charter?

Society,Cyberspace
How Is Social Media Shaping Our Perspectives?
Among all internet tools, social media is one of the most powerful platforms that shape our perceptions of ourselves, others, and the world. With increasing internet penetration, what seems to be a virtual world to the older generation is in fact indispensable to the younger generations.

Security,Cyberspace,China
China’s Cyber War Against the US: How True?
In recent years, “engaging in cyber warfare” has become part of the parlance used by those who discuss US-China relations. Its use has become even more frequent in the last two or three years. How true are these charges? What is the evidence?

Economy,Cyberspace,China
Behind China’s E-Commerce Success Story
Many people hold the view that economies of scale plus a booming economy are the two sole reasons behind China’ success in e-commerce. Physical infrastructure of telecommunications, information processing, and logistics are also factors.