Patterns of Chinese Policies on Technology Transfer

2000 ◽  
Vol 9 (1-2) ◽  
pp. 107-128
Author(s):  
Evan A. Feigenbaum

AbstractHigh-technology issues have dominated U.S.-China relations in the last years of the twentieth century. In sectors related to national security, allegations of compromising transactions and thefts of proprietary American commercial and military technology plagued bilateral ties in the late 1990s. The apparent transfer of sophisticated space-launch information prompted a congressional investigation of two major U.S. multinationals, Hughes Electronics and Loral Space and Communications. Then, allegations of Chinese espionage at U.S. nuclear weapons laboratories produced a bipartisan Select Committee, chaired by Representative Christopher Cox (R-Calif.), charged with scrutinizing all aspects of U.S.-China technology relations, from corporate technology transfers to academic exchanges of scientific personnel between the two countries.

2021 ◽  
pp. 162-200
Author(s):  
Michael E. O’Hanlon

This chapter delves much deeper into three areas — nuclear weapons, space and satellites, and missile defense. It argues that these are among the subjects in military technology that are both simple enough to be accessible to the generalist, and important and enduring enough that they can be expected to remain relevant for policymakers well into the future. The chapter also discusses the significance of space and its purposes for military activities, noting the basic principles of the national security space subject are grounded in immutable principles of physics. It examines the approach used in the study which suggests a methodology for diving deeper into other key areas of defense technology. Ultimately, the chapter contends that constructing adequate defenses, stable military balances of power, and robust means of national protection is fated to be a very difficult undertaking. To put it bluntly, two opposing countries or blocs of nations with roughly comparable military capabilities are generally not inherently safe from each other.


2008 ◽  
Author(s):  
PACIFIC AIR FORCES HICKAM AFB HI CHECO DIV

1990 ◽  
Author(s):  
Ronald A. Finkler ◽  
Gordon L. Boezer ◽  
Erling J. Foss ◽  
Norman D. Jorstad ◽  
A. J. Ramsbotham

Author(s):  
Michael C. Desch

This chapter assesses whether academic social science had any influence on nuclear strategy. Social science did have important effects on strategy. At times this was direct. More often it was indirect, working not through the formulation of doctrine or the drafting of operational plans, but rather by providing the intellectual frameworks and mental road maps that shaped senior policymakers' and presidents' thinking about the utility of nuclear weapons during confrontations with other nuclear states. Academic strategists such as Thomas Schelling reputedly exercised such influence that the period between 1945 and 1961 is regarded as the “golden age” of academic national security studies. However, scientific strategists reached a dead end by privileging internal disciplinary concerns like logical rigor and the use of sophisticated methods over addressing concrete policy problems.


Author(s):  
Ian Hurd

This chapter explores the legality of latter-day weapons—specifically, nuclear arms and lethal drones—to consider the potential for voids in the coverage of international law. When technological or other developments enable previously inconceivable kinds of warfare, states face open legal questions. Recent debates over the legality of U.S. drones illustrate this, as do earlier debates about the legality of nuclear arms. The weapons arise in a kind of legal vacuum, empty of specific regulation. Drawing on these examples, the chapter considers the power of the international rule of law in situations where there may be no law. With respect to nuclear weapons, the International Court of Justice decided that despite there being no directly applicable laws, use is nonetheless governed by international law. Rules designed for other weapons are relevant, as is a general principle that in the end, international law must defend states' rights to protect their national security as they see fit. These two sets of resources—general principles and analogies to other laws—are also important in legal debates over drones today: the lawfulness of drones as instruments of war is inferred from the legality of what are said to be analogous weapons from earlier times, and the needs of the state are internalized in legality debates through the mechanism of self-defense.


Author(s):  
Hasmiah Kasimin ◽  
Huda Ibrahim

In Malaysia, major information technology transfers in public sector agencies are usually due to policy implementation. This policy-led technology transfer involves central government directives to the implementation agencies. The technology transfer process usually not only involves multi-organizations that consist of many public agencies and private sector organizations but also involved many phases. Each organization plays certain roles and contributes to the achievement of the technology transfer objectives. Each phase serves a different purpose and each role during each phase has different requirements. Coordinating and encouraging the multiple organization participation in each phase is complex and a challenge that may at least result in project delays or technological decision-making that based on non-technical considerations. In such a case, understanding and managing interactions between stakeholders are important in designing activities and strategies for effective technology transfer process suitable to local environment. This is especially true for technology that requires further development to adapt with local environment. This paper explores this issue in a case study of XYZ technology transfer in a Malaysian public agency. We make use an approach based on actor-network theory and the concepts of technology transfer stages. We found that ignoring issues emerged from interactions between stakeholders will not only delay the transfer process but will also render the project’s original objectives as not fully achieved.


Sign in / Sign up

Export Citation Format

Share Document