As the pace of technology increases, so does the potential development of disruptive technology-related threats. However, by enacting proactive safety and security measures during the window of opportunity, a government cancost-effectively protect an unsuspecting and ill-prepared society before an emerging disruptive technology is widely adopted without stifling its future development.The basis for the threat mitigation approach described herein is to inject the protective measures into the innovation cycle prior to a technology being adopted by the early majority in Everett Rogers's technology adoption cycle. This period of time (the window of opportunity) occurs when the Gartner Group's hype cycle's trough ofdisillusionment aligns with Geoffrey Moore's chasm.This book explores two possible courses of action for mitigating domestic security and safety threats once a new technology's window of opportunity is identified. First, domestic law enforcement can use this information to mitigate future security and safety concerns. Second, the state could design a flexible regulatory framework aroundthe window in order to provide innovators and producers of an emerging disruptive technology with information highlighting its potential for illicit appropriation.
ThriftBooks sells millions of used books at the lowest
everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We
deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15.
ThriftBooks.com. Read more. Spend less.