Person: Nye, Joseph
Loading...
Email Address
AA Acceptance Date
Birth Date
Research Projects
Organizational Units
Job Title
Last Name
Nye
First Name
Joseph
Name
Nye, Joseph
8 results
Search Results
Now showing 1 - 8 of 8
Publication Leadership(Macmillan, 2016) Nye, JosephPublication Public Diplomacy and Soft Power(Sage Publications, 2008) Nye, JosephSoft power is the ability to affect others to obtain the outcomes one wants through attraction rather than coercion or payment. A country's soft power rests on its resources of culture, values, and policies. A smart power strategy combines hard and soft power resources. Public diplomacy has a long history as a means of promoting a country's soft power and was essential in winning the cold war. The current struggle against transnational terrorism is a struggle to win hearts and minds, and the current overreliance on hard power alone is not the path to success. Public diplomacy is an important tool in the arsenal of smart power, but smart public diplomacy requires an understanding of the roles of credibility, self-criticism, and civil society in generating soft power.Publication Transformational and Transactional Presidents(SAGE PUBLICATIONS, 2014) Nye, JosephDuring the 20th century, the United States went from being a second rate power to becoming the world’s sole superpower. Did leaders matter? In the cases I examined in Presidential Leadership and the Creation of the American Era, most presidents mattered, but not necessarily those that one might expect. Leadership experts distinguish transformational leaders with broad visions and an inspirational style (such as Woodrow Wilson or Ronald Reagan) from transactional leaders who have modest vision and a managerial style (such as Dwight Eisenhower or George H.W. Bush). Experts and editorialists generally prefer transformational leaders and consider them both more effective and more ethical. But the concepts have been poorly defined, and the normative preference for transformational leaders is not justified. Leadership theorists need to be more careful in their definitions and assessments.Publication The Information Revolution and Soft Power(Current History, 2014) Nye, JosephThe rise of digital networks is diffusing power to new players. Fourth in a series on soft power.Publication Inevitability and War(Massachusetts Institute of Technology Press (MIT Press), 2014) Nye, JosephPublication The Regime Complex for Managing Global Cyber Activities(Centre for International Governance Innovation and Catham House, 2014) Nye, JosephWhen we try to understand cyber governance, it is important to remember how new cyberspace is. “Cyberspace is an operational domain framed by use of electronics to…exploit information via interconnected systems and their associated infra structure” (Kuehl 2009). While the US Defense Department sponsored a modest connection of a few computers called ARPANET (Advanced Research Projects Agency Network) in 1969, and the World Wide Web was conceived in 1989, it has only been in the last decade and a half that the number of websites burgeoned, and businesses begin to use this new technology to shift production and procurement in complex global supply chains. In 1992, there were only a million users on the Internet (Starr 2009, 52); today, there are nearly three billion, and the Internet has become a substrate of modern economic, social and political life. And the volatility continues. Analysts are now trying to understand the implications of ubiquitous mobility, the “Internet of everything” and storage of “big data.” Over the past 15 years, the advances in technology have far outstripped the ability of institutions of governance to respond, as well as our thinking about governance. Since the 1970s, political scientists have looked at the international governance processes of various global affairs issues through the perspective of regime theory (Keohane and Nye 1977; Ruggie 1982). This paper is a mapping exercise of cyber governance using regime theory. Regimes are the “principles, norms, rules and procedures that govern issue areas in international affairs,” but these concepts have rarely been applied to the new cyber domain (Krasner 1983). In its early days, thinking about cyber governance was relatively primitive. Ideological libertarians proclaimed that “information wants to be free,” portraying the Internet as the end of government controls. In practice, however, governments and geographical jurisdictions have been playing a major role in cyber governance right from the start.Publication Don't Panic: Making Progress on the "Going Dark" Debate(Berkman Center for Internet & Society at Harvard Law School, 2016) Gasser, Urs; Gertner, Nancy; Goldsmith, Jack; Landau, Susan; Nye, Joseph; O'Brien, David; Olsen, Matthew; Renan, Daphna; Sanchez, Julian; Schneider, Bruce; Schwartzol, Larry; Zittrain, JonathanJust over a year ago, with support from the William and Flora Hewlett Foundation, the Berkman Center for Internet & Society at Harvard University convened a diverse group of security and policy experts from academia, civil society, and the U.S. intelligence community to begin to work through some of the particularly vexing and enduring problems of surveillance and cybersecurity. The group came together understanding that there has been no shortage of debate. Our goals were to foster a straightforward, non-talking-point exchange among people who do not normally have a chance to engage with each other and then to contribute in meaningful and concrete ways to the discourse on these issues. A public debate unfolded alongside our meetings: the claims and questions around the government finding a landscape that is “going dark” due to new forms of encryption introduced into mainstream consumer products and services by the companies who offer them. We have sought to distill our conversations and some conclusions in this report. The participants in our group who have signed on to the report, as listed on the following page, endorse “the general viewpoints and judgments reached by the group, though not necessarily every finding and recommendation.” In addition to endorsing the report, some signatories elected to individually write brief statements, which appear in Appendix A of the report and also as individual posts on Lawfareblog.com, written by Jonathan Zittrain, Bruce Schneier, and Susan Landau. Our participants who are currently employed full-time by government agencies are precluded from signing on because of their employment, and nothing can or should be inferred about their views from the contents of the report. We simply thank them for contributing to the group discussions.Publication Nuclear Lessons for Cyber Security?(United States Air Force, 2011) Nye, JosephIdentifying “revolutions in military affairs” is arbitrary, but some inflection points in technological change are larger than others: for example, the gunpowder revolution in early modern Europe, the industrial revolution of the nineteenth century, the second industrial revolution of the early twentieth century, and the nuclear revolution in the middle of the last century. In this century, we can add the information revolution that has produced today’s extremely rapid growth of cyberspace. Earlier revolutions in information technology, such as Gutenberg’s printing press, also had profound political effects, but the current revolution can be traced to Moore’s law and the thousand-fold decrease in the costs of computing power that occurred in the last quarter of the twentieth century. Political leaders and analysts are only beginning to come to terms with this transformative technology.