IT304.12 - IT in the Global Economy AIT Department George...

Info icon This preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
IT in the Global Economy AIT Department George Mason University Author: Dr. Anne Marchant
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
ICT and Globalization The world is evolving rapidly, socially, politically, economically, and technologically. Today we will try to look down the road ahead. ICT is both a facilitator and a driver of change. We have talked about some of the exciting technologies just over the horizon: BCI, autonomics, ubiquitous computing, etc. Noam Chomsky on Globalization
Image of page 2
CIA 2015 Report IT-driven globalization will significantly increase interaction among terrorists, narcotraffickers, weapons proliferators, and organized criminals , who in a networked world will have greater access to information, to technology, to finance, to sophisticated deception-and-denial techniques and to each other. Such asymmetric approaches—whether undertaken by states or nonstate actors—will become the dominant characteristic of most threats to the US homeland. They will be a defining challenge for US strategy, operations, and force development, and they will require that strategy to maintain focus on traditional, low-technology threats as well as the capacity of potential adversaries to harness elements of proliferating advanced technologies. At the same time, we do not know the extent to which adversaries, state and nonstate , might be influenced or deterred by other geopolitical, economic, technological, or diplomatic factors in 2015.” From http://www.cia.gov/cia/reports/globaltrends2015/index.html (review other main points there.)
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Terrorism Castells (I, 302-303) argues that transnational terrorist organizations use (‘illegitimate’) violence and hostage taking in response to both the (‘legitimized’) violence and electronic surveillance of networked nation states.
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern