Now showing items 1-20 of 113

    • 2010 ECIR Annual Conference on "Cyber International Relations: Emergent Realities of Conflict and Cooperation" 

      Choucri, Nazli (Explorations in Cyber International Relations, 2010-10-13)
      In international relations, the traditional approaches to theory, research, practice and policy were derived from experiences in the 18th and 19th centuries, refined further in the 20th century. But cyberspace has created ...
    • 2010 ECIR Workshop on "Cyber International Relations: Emergent Realities of Conflict and Cooperation" 

      Choucri, Nazli (Explorations in Cyber International Relations, 2010-10-13)
      An event of the MIT-Harvard multidisciplinary Minerva Project on "Explorations in Cyber International Relations" (ECIR), this conference seeks to adjust traditional views to the cyber realities of the 21st century. Of the ...
    • 2011 ECIR Workshop on "People, Power and CyberPolitics" 

      Choucri, Nazli (Explorations in Cyber International Relations, 2011-12-07)
      The People, Power, and CyberPolitics Conference is a joint project of MIT and Harvard University on Explorations in Cyber International Relations (ECIR). Co-sponsored by the Council on Foreign Relations, this workshop is ...
    • 2012 ECIR Workshop on "Who Controls Cyberspace? A Puzzle for National Security and International Relations" 

      Choucri, Nazli (Explorations in Cyber International Relations, 2012-12-07)
      This Workshop proceeds from the assumption that we have as yet no overarching and complete accounting of who controls what, when, and how, nor do we fully understand what are the precise points of control, where they are ...
    • 2014 ECIR Workshop on"Cyber Security & the Governance Gap: Complexity, Contention, Cooperation" 

      Choucri, Nazli (Explorations in Cyber International Relations, 2014-01-06)
      This workshop focuses on the dynamics shaping these dual features—cyber threats and cyber governance—while also taking into account operational, pragmatic, and normative aspects, as well as potential policy responses. At ...
    • Anonymity networks: New platforms for conflict and contention 

      Rady, Mina (© Massachusetts Institute of Technology, 2013)
      Access to information is critical during population uprisings against repressive regimes. As a venue for information and data exchange, cyberspace offers many powerful social platforms for exchange of information. But the ...
    • Applications of ECIR modeling work to cyber policy problems 

      Williams, Cindy (© Massachusetts Institute of Technology, 2011-03-10)
      One element of core research underway in Explorations in Cyber International Relations (ECIR) at MIT is dynamic modeling, simulation, and analysis. During 2010 and 2011, this research has pushed forward theoretical frontiers ...
    • Characterizing cyberspace: Past, present and future 

      Clark, David D. (© Massachusetts Institute of Technology, 2010-03-12)
      In general terms, most practitioners share a working concept of cyberspace—it is the collection of computing devices connected by networks in which electronic information is stored and utilized, and communication takes ...
    • The Chinese Internet: Control through the layers 

      Hung, Shirley (© Massachusetts Institute of Technology, 2012-10-30)
      China is often described as having the world’s most advanced Internet censorship and surveillance regime.1 It garners much fear and attention in the media and among policymakers, yet most reports focus on specific incidents ...
    • Co-evolution of cyberspace and international relations: New challenges for the social sciences 

      Choucri, Nazli (© International Political Science Association., 2013-10-13)
      Created by human ingenuity, cyberspace is a fact of daily life. Until recently, this arena of virtual interaction was considered largely a matter of low politics— the routine, background, and relatively non-contentious. ...
    • Collusive dominant-strategy truthfulness 

      Chen, Jing; Micali, Silvio (© Elsevier B.V., 2012-01-17)
      We show that collusion and wrong beliefs may cause a dramatic efficiency loss in the Vickrey mechanism for auctioning a single good in limited supply. We thus put forward a new mechanism guaranteeing efficiency in a very ...
    • Comparative analysis of cybersecurity metrics to develop new hypotheses 

      Madnick, Stuart E.; Choucri, Nazli; Li, Xitong; Ferwerda, Jeremy (© Elsevier B.V., 2011-11)
      Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metrics, especially in the international perspective across multiple countries, multiple years, and multiple categories. As ...
    • Comparative analysis of cybersecurity metrics to develop new hypotheses 

      Fisher, D.; Madnick, Stuart E.; Choucri, Nazli; Li, X.; Ferwerda, J. (Explorations in Cyber International Relations, 2011-12-07)
      Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metrics, especially in the international perspective across multiple countries, multiple years, and multiple categories. ...
    • A comparison of taxonomy generation techniques using bibliometric methods : applied to research strategy formulation 

      Camiña, Steven L (Massachusetts Institute of Technology, 2010)
      This paper investigates the modeling of research landscapes through the automatic generation of hierarchical structures (taxonomies) comprised of terms related to a given research field. Several different taxonomy generation ...
    • Computational representations of high profile international cyber incidents 

      Hurwitz, Roger; Winston, Patrick Henry (© International Studies Association, 2011-03-16)
      Several high profile incidents have shaped both popular and government understanding of international cyber conflicts. One of the most iconic is the distributed denial of service attack (DDoS) on Estonian government, media ...
    • Control point analysis 

      Clark, David D. (© TRPC, 2012-09-12)
      As the Internet becomes more and more embedded in every sector of society, more and more actors have become concerned with its character, now and in the future. The private sector actors, such as Internet Service Providers ...
    • The convergence of cyberspace and sustainability 

      Choucri, Nazli (© E-International Relations., 2012-04-20)
      This paper highlights the emerging synergy between cyberspace (a new arena of interaction) and sustainability (a new initiative on the global agenda), and their convergence on the global policy agenda. This convergence is ...
    • The Coordinates of cyber international relations 

      Vaishnav, Chintan (Explorations in Cyber International Relations, 2011-12-07)
      As the Internet and International Relations become increasingly interwoven, the properties of information goods such as information security, control, or freedom, or those of international activities such as trade, or ...
    • Corpus annotation in service of intelligent narrative technologies 

      Finlayson, Mark Alan (© Association for the Advancement of Artificial Intelligence, 2011-10-09)
      Annotated corpora have stimulated great advances in the language sciences. The time is ripe to bring that same stimulation, and consequent benefits, to computational approaches to narrative. I describe an effort to construct ...
    • The cultivation of global norms as part of a cyber security strategy 

      Hurwitz, Roger (© Informa UK Limited (trading as Taylor & Francis Group), 2013)