Now showing items 6-25 of 113

    • Anonymity networks: New platforms for conflict and contention 

      Rady, Mina (© Massachusetts Institute of Technology, 2013)
      Access to information is critical during population uprisings against repressive regimes. As a venue for information and data exchange, cyberspace offers many powerful social platforms for exchange of information. But the ...
    • Applications of ECIR modeling work to cyber policy problems 

      Williams, Cindy (© Massachusetts Institute of Technology, 2011-03-10)
      One element of core research underway in Explorations in Cyber International Relations (ECIR) at MIT is dynamic modeling, simulation, and analysis. During 2010 and 2011, this research has pushed forward theoretical frontiers ...
    • Characterizing cyberspace: Past, present and future 

      Clark, David D. (© Massachusetts Institute of Technology, 2010-03-12)
      In general terms, most practitioners share a working concept of cyberspace—it is the collection of computing devices connected by networks in which electronic information is stored and utilized, and communication takes ...
    • The Chinese Internet: Control through the layers 

      Hung, Shirley (© Massachusetts Institute of Technology, 2012-10-30)
      China is often described as having the world’s most advanced Internet censorship and surveillance regime.1 It garners much fear and attention in the media and among policymakers, yet most reports focus on specific incidents ...
    • Co-evolution of cyberspace and international relations: New challenges for the social sciences 

      Choucri, Nazli (© International Political Science Association., 2013-10-13)
      Created by human ingenuity, cyberspace is a fact of daily life. Until recently, this arena of virtual interaction was considered largely a matter of low politics— the routine, background, and relatively non-contentious. ...
    • Collusive dominant-strategy truthfulness 

      Chen, Jing; Micali, Silvio (© Elsevier B.V., 2012-01-17)
      We show that collusion and wrong beliefs may cause a dramatic efficiency loss in the Vickrey mechanism for auctioning a single good in limited supply. We thus put forward a new mechanism guaranteeing efficiency in a very ...
    • Comparative analysis of cybersecurity metrics to develop new hypotheses 

      Madnick, Stuart E.; Choucri, Nazli; Li, Xitong; Ferwerda, Jeremy (© Elsevier B.V., 2011-11)
      Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metrics, especially in the international perspective across multiple countries, multiple years, and multiple categories. As ...
    • Comparative analysis of cybersecurity metrics to develop new hypotheses 

      Fisher, D.; Madnick, Stuart E.; Choucri, Nazli; Li, X.; Ferwerda, J. (Explorations in Cyber International Relations, 2011-12-07)
      Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metrics, especially in the international perspective across multiple countries, multiple years, and multiple categories. ...
    • A comparison of taxonomy generation techniques using bibliometric methods : applied to research strategy formulation 

      Camiña, Steven L (Massachusetts Institute of Technology, 2010)
      This paper investigates the modeling of research landscapes through the automatic generation of hierarchical structures (taxonomies) comprised of terms related to a given research field. Several different taxonomy generation ...
    • Computational representations of high profile international cyber incidents 

      Hurwitz, Roger; Winston, Patrick Henry (© International Studies Association, 2011-03-16)
      Several high profile incidents have shaped both popular and government understanding of international cyber conflicts. One of the most iconic is the distributed denial of service attack (DDoS) on Estonian government, media ...
    • Control point analysis 

      Clark, David D. (© TRPC, 2012-09-12)
      As the Internet becomes more and more embedded in every sector of society, more and more actors have become concerned with its character, now and in the future. The private sector actors, such as Internet Service Providers ...
    • The convergence of cyberspace and sustainability 

      Choucri, Nazli (© E-International Relations., 2012-04-20)
      This paper highlights the emerging synergy between cyberspace (a new arena of interaction) and sustainability (a new initiative on the global agenda), and their convergence on the global policy agenda. This convergence is ...
    • The Coordinates of cyber international relations 

      Vaishnav, Chintan (Explorations in Cyber International Relations, 2011-12-07)
      As the Internet and International Relations become increasingly interwoven, the properties of information goods such as information security, control, or freedom, or those of international activities such as trade, or ...
    • Corpus annotation in service of intelligent narrative technologies 

      Finlayson, Mark Alan (© Association for the Advancement of Artificial Intelligence, 2011-10-09)
      Annotated corpora have stimulated great advances in the language sciences. The time is ripe to bring that same stimulation, and consequent benefits, to computational approaches to narrative. I describe an effort to construct ...
    • The cultivation of global norms as part of a cyber security strategy 

      Hurwitz, Roger (© Informa UK Limited (trading as Taylor & Francis Group), 2013)
    • Cyber 9/12 student challenge 

      Wolff, Josephine; Young, William E.; Smith, Evann (© Massachusetts Institute of Technology, 2013-06-15)
      On June 15, 2013, the Atlantic Council’s Cyber Statecraft Initiative, with Science Applications International Corporation (SAIC), held the first student competition devoted to high-level policy recommendations for day-after ...
    • Cyber conflicts in international relations: Framework and case studies 

      Gamero-Garrido, Alexander (© Massachusetts Institute of Technology, 2014)
      Although cyber conflict is no longer considered particularly unusual, significant uncertainties remain about the nature, scale, scope and other critical features of it. This study addresses a subset of these issues by ...
    • Cyber defense resources & vulnerabilities 

      Wolff, Josephine (Explorations in Cyber International Relations, 2012-11-06)
      Investment in security is aimed at reducing losses due to security breaches and typically determined by calculating annualized loss expectancy (ALE) metrics. However, in the cybersecurity space there is inadequate data on ...
    • Cyber international relations as an integrated system 

      Vaishnav, Chintan; Choucri, Nazli; Clark, David D. (© Springer Science+Business Media, LLC, 2017-11-17)
      The purpose of this paper is to conceptualize the hitherto separate domains of Cyberspace and Interna- tional Relations into an integrated socio-technical system that we jointly call the cyber International Relations ...
    • Cyber international relations as an integrated system 

      Vaishnav, Chintan; Choucri, Nazli; Clark, David D. (© INCOSE, 2012-06-18)
      International Relations (IR) – whether in pursuit of wealth or power – have been traditionally predicated upon the dominance of the State and the effectiveness of geographical boundaries. The Internet has shattered these ...