Window of opportunity: mitigating threats from disruptive technologies before widespread adoption
Approved for public release; distribution is unlimited === As the pace of technology increases, so does the potential development of disruptive technology-related threats. However, by enacting proactive safety and security measures during the window of opportunity, a government can cost-effectively...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California: Naval Postgraduate School
2014
|
Online Access: | http://hdl.handle.net/10945/43940 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-43940 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-439402015-02-11T03:55:46Z Window of opportunity: mitigating threats from disruptive technologies before widespread adoption Knapp, Christopher R. Nieto-Gómez, Rodrigo Halladay, Carolyn National Security Affairs Approved for public release; distribution is unlimited As the pace of technology increases, so does the potential development of disruptive technology-related threats. However, by enacting proactive safety and security measures during the window of opportunity, a government can cost-effectively protect an unsuspecting and ill-prepared society before an emerging disruptive technology is widely adopted without stifling its future development. The basis for the threat mitigation approach described herein is to inject the protective measures into the innovation cycle prior to a technology being adopted by the early majority in Everett Rogers’s technology adoption cycle. This period of time (the window of opportunity) occurs when the GartnerGroup’s hype cycle’s trough of disillusionment aligns with Geoffrey Moore’s chasm. This thesis explores two possible courses of action for mitigating domestic security and safety threats once a new technology’s window of opportunity is identified. First, domestic law enforcement can use this information to mitigate future security and safety concerns. Second, the state could design a flexible regulatory framework around the window in order to provide innovators and producers of an emerging disruptive technology with information highlighting its potential for illicit appropriation. 2014-12-05T20:10:27Z 2014-12-05T20:10:27Z 2014-09 Thesis http://hdl.handle.net/10945/43940 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California: Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
Approved for public release; distribution is unlimited === As the pace of technology increases, so does the potential development of disruptive technology-related threats. However, by enacting proactive safety and security measures during the window of opportunity, a government can cost-effectively protect an unsuspecting and ill-prepared society before an emerging disruptive technology is widely adopted without stifling its future development. The basis for the threat mitigation approach described herein is to inject the protective measures into the innovation cycle prior to a technology being adopted by the early majority in Everett Rogers’s technology adoption cycle. This period of time (the window of opportunity) occurs when the GartnerGroup’s hype cycle’s trough of disillusionment aligns with Geoffrey Moore’s chasm. This thesis explores two possible courses of action for mitigating domestic security and safety threats once a new technology’s window of opportunity is identified. First, domestic law enforcement can use this information to mitigate future security and safety concerns. Second, the state could design a flexible regulatory framework around the window in order to provide innovators and producers of an emerging disruptive technology with information highlighting its potential for illicit appropriation. |
author2 |
Nieto-Gómez, Rodrigo |
author_facet |
Nieto-Gómez, Rodrigo Knapp, Christopher R. |
author |
Knapp, Christopher R. |
spellingShingle |
Knapp, Christopher R. Window of opportunity: mitigating threats from disruptive technologies before widespread adoption |
author_sort |
Knapp, Christopher R. |
title |
Window of opportunity: mitigating threats from disruptive technologies before widespread adoption |
title_short |
Window of opportunity: mitigating threats from disruptive technologies before widespread adoption |
title_full |
Window of opportunity: mitigating threats from disruptive technologies before widespread adoption |
title_fullStr |
Window of opportunity: mitigating threats from disruptive technologies before widespread adoption |
title_full_unstemmed |
Window of opportunity: mitigating threats from disruptive technologies before widespread adoption |
title_sort |
window of opportunity: mitigating threats from disruptive technologies before widespread adoption |
publisher |
Monterey, California: Naval Postgraduate School |
publishDate |
2014 |
url |
http://hdl.handle.net/10945/43940 |
work_keys_str_mv |
AT knappchristopherr windowofopportunitymitigatingthreatsfromdisruptivetechnologiesbeforewidespreadadoption |
_version_ |
1716730453797371904 |