LEADER 06808nam 2200769 a 450 001 9910462191503321 005 20200520144314.0 010 $a1-280-49912-5 010 $a9786613594358 010 $a0-262-30164-4 024 8 $a9786613594358 024 8 $aebc3339418 035 $a(CKB)2670000000161968 035 $a(EBL)3339418 035 $a(SSID)ssj0000623005 035 $a(PQKBManifestationID)11400740 035 $a(PQKBTitleCode)TC0000623005 035 $a(PQKBWorkID)10647499 035 $a(PQKB)10959941 035 $a(MiAaPQ)EBC3339418 035 $a(OCoLC)782916586 035 $a(MdBmJHUP)muse24518 035 $a(OCoLC)782916586$z(OCoLC)787852695$z(OCoLC)926258485$z(OCoLC)1055333933$z(OCoLC)1066628785$z(OCoLC)1081234834 035 $a(OCoLC-P)782916586 035 $a(MaCbMITP)9147 035 $a(Au-PeEL)EBL3339418 035 $a(CaPaEBR)ebr10546483 035 $a(CaONFJC)MIL359435 035 $a(EXLCZ)992670000000161968 100 $a20111017d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aInnovation, dual use, and security$b[electronic resource] $emanaging the risks of emerging biological and chemical technologies /$fedited by Jonathan B. Tucker ; foreword by Richard Danzig 210 $aCambridge, Mass. $cMIT Press$d2012 215 $a1 online resource (367 p.) 300 $aDescription based upon print version of record. 311 $a0-262-51696-9 311 $a0-262-01717-2 320 $aIncludes bibliographical references and index. 327 $aIn Memoriam; Contents; Foreword; Chapter 1. Introduction; Defining Dual Use; The Dual-Use Landscape, Past and Present; The Rise of Synthetic Genomics; Technical Hurdles to Bioterrorism; The Changing Nature of Security Threats; Harm versus Misuse; Misuse Scenarios; Structure of the Book; Acknowledgments; Notes; Part I. Assessing and Managing Dual-Use Risks; Chapter 2. Review of the Literature on Dual Use; Assessing Uncertain Risks; Dual Use as a Societal Process; Approaches to Technology Governance; International Governance Regimes; Conclusions; Notes 327 $aChapter 3. Current Dual-Use Governance MeasuresArms Control and Disarmament Treaties; National Biosafety and Biosecurity Measures; Soft-Law and Informal Measures; Conclusions; Notes; Chapter 4. The Decision Framework; Technology Monitoring; Technology Assessment; Selection of Governance Measures; Testing the Decision Framework; Conclusions; Notes; Part II. Contemporary Case Studies; A. Technologies for the Acquisition of Novel Biologicalor Molecular Diversity; Chapter 5. Combinatorial Chemistry and High-Throughput Screening; Overview of the Technology; Potential for Misuse 327 $aCharacteristics of the Technology Relevant to GovernanceConclusions; Notes; Chapter 6. DNA Shuffling and Directed Evolution; Overview of the Technology; Potential for Misuse; Characteristics of the Technology Relevant to Governance; Conclusions; Acknowledgments; Notes; B. Technologies for Directed Design; Chapter 7. Protein Engineering; Overview of the Technology; Potential for Misuse; Characteristics of the Technology Relevant to Governance; Conclusions; Notes; Chapter 8. Synthesis of Viral Genomes; Overview of the Technology; Potential for Misuse 327 $aCharacteristics of the Technology Relevant to GovernanceConclusions; Notes; Chapter 9. Synthetic Biology with Standard Parts; Overview of the Technology; Potential for Misuse; Characteristics of the Technology Relevant to Governance; Conclusions; Notes; C. Technologies for the Manipulation of Biological Systems; Chapter 10. Development of Psychoactive Drugs; Overview of the Technology; Potential for Misuse; Characteristics of the Technology Relevant to Governance; Conclusions; Notes; Chapter 11. Synthesis of Peptide Bioregulators; Overview of the Technology; Potential for Misuse 327 $aCharacteristics of the Technology Relevant to GovernanceConclusions; Notes; Chapter 12. Immunological Modulation; Overview of the Technology; Potential for Misuse; Characteristics of the Technology Relevant to Governance; Conclusions; Notes; Chapter 13. Personal Genomics; Overview of the Technology; Potential for Misuse; Characteristics of the Technology Relevant to Governance; Conclusions; Notes; Chapter 14. RNA Interference; Overview of the Technology; Potential for Misuse; Characteristics of the Technology Relevant to Governance; Conclusions; Notes 327 $aChapter 15. Transcranial Magnetic Stimulation 330 $aRecent advances in disciplines such as biotechnology, nanotechnology, and neuropharmacology entail a "dual-use dilemma" because they promise benefits for human health and welfare yet pose the risk of misuse for hostile purposes. The emerging field of synthetic genomics, for example, can produce custom DNA molecules for life-saving drugs but also makes possible the creation of deadly viral agents for biological warfare or terrorism. The challenge for policymakers is to prevent the misuse of these new technologies without forgoing their benefits . Innovation, Dual Use, and Security offers a systematic approach for managing the dual-use dilemma. The book presents a "decision framework" for assessing the security risks of emerging technologies and fashioning governance strategies to manage those risks. This framework is applied to fourteen contemporary case studies, including synthetic genomics, DNA shuffling and directed evolution, combinatorial chemistry, protein engineering, immunological modulation, and aerosol vaccines. The book also draws useful lessons from two historical cases: the development of the V-series nerve agents in Britain and the use and misuse of LSD by the U.S. Army and the CIA. Innovation, Dual Use, and Security offers a comprehensive, multifaceted introduction to the challenges of governing dual-use technologies in an era of rapid innovation. The book will be of interest to government officials and other practitioners as well as to students and scholars in security studies, science and technology studies, biology, and chemistry. 606 $aBiotechnology$xSocial aspects 606 $aNanotechnology$xSocial aspects 606 $aBiological weapons 606 $aChemical agents (Munitions) 608 $aElectronic books. 615 0$aBiotechnology$xSocial aspects. 615 0$aNanotechnology$xSocial aspects. 615 0$aBiological weapons. 615 0$aChemical agents (Munitions) 676 $a660.6/3 701 $aTucker$b Jonathan B$01033939 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462191503321 996 $aInnovation, dual use, and security$92452762 997 $aUNINA