Browsing Explorations in Cyber International Relations (ECIR) by Title
Now showing items 56-75 of 113
-
Improving interdisciplinary communication with standardized cyber security terminology: A literature review
(© IEEE, 2016-03-21)The growing demand for computer security, and the cyberization trend, are hallmarks of the 21st century. The rise in cyber-crime, digital currency, and e-governance has been well met by a corresponding recent jump in ... -
Institutions for cyber security: International responses and global imperatives
(© Informa UK Limited (trading as Taylor & Francis Group), 2013-10-22)Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for ... -
Integrating cyberspace and international relations: The co-evolution dilemma
(© Massachusetts Institute of Technology, 2012-11-06)Cyberspace is a fact of daily life. Until recently cyberspace was considered largely a matter of low politics – the term used to denote background conditions and routine decisions and processes. By contrast high politics ... -
International data exchange and a trustworthy host: Focal areas for international collaboration in research and education
(BIC Annual Forum, 2011-11-29)A key message is the acknowledgement that international cooperation is nascent and a more global approach is urgently needed because there is ultimately just one, single global information environment, consisting of the ... -
International relations in the cyber age: The co-evolution dilemma
(© MIT Press, 2019-04)In our increasingly digital world, data flows define the international landscape as much as the flow of materials and people. How is cyberspace shaping international relations, and how are international relations shaping ... -
Introduction
(MIT Press / © David D. Clark, 2011-10-01) -
Introduction
(H-Diplo | ISSF Roundtable Reviews/© Nazli Choucri, 2016-12-05) -
Knightian auctions
(© Massachusetts Institute of Technology, 2012-01-10)We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor δ ∈ (0, 1), and the mech- anism designer knows δ. The classical notions of implementation ... -
Learning legal principles to enable law at cyber speeds
(Explorations in Cyber International Relations, 2011-12-07)Goal: Law at Cyber Speeds. If we are to enable the creation of Automatic Cyber Targeting Systems to respond in network time to cyberattacks, we must be able to do legal analyses at network speeds -
Learning narrative structure from annotated folktales
(Massachusetts Institute of Technology, 2012)Narrative structure is an ubiquitous and intriguing phenomenon. By virtue of structure we recognize the presence of Villainy or Revenge in a story, even if that word is not actually present in the text. Narrative structure ... -
Leveraging possibilistic beliefs in unrestricted combinatorial auctions
(MDPI AG/© Jing Chen, & Silvio Micali, 2016-10-26)In unrestricted combinatorial auctions, we put forward a mechanism that guarantees a meaningful revenue benchmark based on the possibilistic beliefs that the players have about each other’s valuations. In essence, the ... -
Lost in cyberspace: Harnessing the Internet, international relations, and global security
(Sage Journals/© 2012 Nazli Choucri, & Daniel Goldsmith, 2012-03-01)Early in the twenty-first century, new, cyber-based threats to the well-being of individuals, economies, and societies added a new dimension to the well-understood threats of the twentieth century. For the first time in ... -
A matrix based integrated framework for multi disciplinary exploration of cyber-international relations
(Massachusetts Institute of Technology, 2010)Cyberspace is the most pervasive and rapidly adopted communication media and the most disruptive until date. It is now indispensable for almost every facet of modern society and touches, practically, everyone by providing ... -
Mechanism design with set-theoretic beliefs
(© IEEE, 2011-10-22)In settings of incomplete information, we put forward (1) a very conservative -- indeed, purely set-theoretic -- model of the beliefs (including totally wrong ones) that each player may have about the payoff types of his ... -
Mixed context and privacy
(© TRPC, 2010-08-15)Users engaging online service providers (OSPs) such as Google, Amazon, and Facebook encounter environments architected by a single actor (the OSP), but comprised of content and executable elements potentially provided by ... -
Modeling the influence of narratives on collective behavior
(© The System Dynamics Society, 2013-07-21)This paper considers the problem of understanding the influences of narratives or stories on individual and group behavior. Narrative theory describes how stories help people make sense of the world, and is being used to ... -
The next 50 years: A personal view
(© Elsevier B.V., 2012-04-24)I review history, starting with Turing’s seminal paper, reaching back ultimately to when our species started to outperform other primates, searching for the questions that will help us develop a computational account of ... -
The order independence of iterated dominance in extensive games
(John Wiley & Sons, Inc./© Jing Chen, & Silvio Micali, 2013-01-22)Shimoji and Watson (1998) prove that a strategy of an extensive game is rationalizable in the sense of Pearce if and only if it survives the maximal elimination of conditionally dominated strategies. Briefly, this process ... -
Perspectives on cybersecurity: A collaborative study
(© Massachusetts Institute of Technology, 2015) -
Possibilistic beliefs and higher-level rationality
(© Massachusetts Institute of Technology, 2014-06-09)We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ...