Now showing items 56-75 of 113

    • Improving interdisciplinary communication with standardized cyber security terminology: A literature review 

      Ramirez, Robert; Choucri, Nazli (© IEEE, 2016-03-21)
      The growing demand for computer security, and the cyberization trend, are hallmarks of the 21st century. The rise in cyber-crime, digital currency, and e-governance has been well met by a corresponding recent jump in ...
    • Institutions for cyber security: International responses and global imperatives 

      Choucri, Nazli; Madnick, Stuart E.; Ferwerda, Jeremy (© Informa UK Limited (trading as Taylor & Francis Group), 2013-10-22)
      Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for ...
    • Integrating cyberspace and international relations: The co-evolution dilemma 

      Choucri, Nazli; Clark, David D. (© Massachusetts Institute of Technology, 2012-11-06)
      Cyberspace is a fact of daily life. Until recently cyberspace was considered largely a matter of low politics – the term used to denote background conditions and routine decisions and processes. By contrast high politics ...
    • International data exchange and a trustworthy host: Focal areas for international collaboration in research and education 

      Mallery, John C. (BIC Annual Forum, 2011-11-29)
      A key message is the acknowledgement that international cooperation is nascent and a more global approach is urgently needed because there is ultimately just one, single global information environment, consisting of the ...
    • International relations in the cyber age: The co-evolution dilemma 

      Choucri, Nazli; Clark, David D. (© MIT Press, 2019-04)
      In our increasingly digital world, data flows define the international landscape as much as the flow of materials and people. How is cyberspace shaping international relations, and how are international relations shaping ...
    • Introduction 

      Clark, David D. (MIT Press / © David D. Clark, 2011-10-01)
    • Introduction 

      Choucri, Nazli (H-Diplo | ISSF Roundtable Reviews/© Nazli Choucri, 2016-12-05)
    • Knightian auctions 

      Chiesa, Alessandro; Micali, Silvio; Zhu, Zeyuan Allen (© Massachusetts Institute of Technology, 2012-01-10)
      We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor δ ∈ (0, 1), and the mech- anism designer knows δ. The classical notions of implementation ...
    • Learning legal principles to enable law at cyber speeds 

      Finlayson, Mark A. (Explorations in Cyber International Relations, 2011-12-07)
      Goal: Law at Cyber Speeds. If we are to enable the creation of Automatic Cyber Targeting Systems to respond in network time to cyberattacks, we must be able to do legal analyses at network speeds
    • Learning narrative structure from annotated folktales 

      Finlayson, Mark (Mark Alan), 1977- (Massachusetts Institute of Technology, 2012)
      Narrative structure is an ubiquitous and intriguing phenomenon. By virtue of structure we recognize the presence of Villainy or Revenge in a story, even if that word is not actually present in the text. Narrative structure ...
    • Leveraging possibilistic beliefs in unrestricted combinatorial auctions 

      Chen, Jing; Micali, Silvio (MDPI AG/© Jing Chen, & Silvio Micali, 2016-10-26)
      In unrestricted combinatorial auctions, we put forward a mechanism that guarantees a meaningful revenue benchmark based on the possibilistic beliefs that the players have about each other’s valuations. In essence, the ...
    • Lost in cyberspace: Harnessing the Internet, international relations, and global security 

      Choucri, Nazli; Goldsmith, Daniel (Sage Journals/© 2012 Nazli Choucri, & Daniel Goldsmith, 2012-03-01)
      Early in the twenty-first century, new, cyber-based threats to the well-being of individuals, economies, and societies added a new dimension to the well-understood threats of the twentieth century. For the first time in ...
    • A matrix based integrated framework for multi disciplinary exploration of cyber-international relations 

      Gaurav, Agarwal (Massachusetts Institute of Technology, 2010)
      Cyberspace is the most pervasive and rapidly adopted communication media and the most disruptive until date. It is now indispensable for almost every facet of modern society and touches, practically, everyone by providing ...
    • Mechanism design with set-theoretic beliefs 

      Chen, Jing; Micali, Silvio (© IEEE, 2011-10-22)
      In settings of incomplete information, we put forward (1) a very conservative -- indeed, purely set-theoretic -- model of the beliefs (including totally wrong ones) that each player may have about the payoff types of his ...
    • Mixed context and privacy 

      Sowell, Jesse (© TRPC, 2010-08-15)
      Users engaging online service providers (OSPs) such as Google, Amazon, and Facebook encounter environments architected by a single actor (the OSP), but comprised of content and executable elements potentially provided by ...
    • Modeling the influence of narratives on collective behavior 

      Houghton, James; Siegel, Michael; Goldsmith, Daniel (© The System Dynamics Society, 2013-07-21)
      This paper considers the problem of understanding the influences of narratives or stories on individual and group behavior. Narrative theory describes how stories help people make sense of the world, and is being used to ...
    • The next 50 years: A personal view 

      Winston, Patrick Henry (© Elsevier B.V., 2012-04-24)
      I review history, starting with Turing’s seminal paper, reaching back ultimately to when our species started to outperform other primates, searching for the questions that will help us develop a computational account of ...
    • The order independence of iterated dominance in extensive games 

      Chen, Jing; Micali, Silvio (John Wiley & Sons, Inc./© Jing Chen, & Silvio Micali, 2013-01-22)
      Shimoji and Watson (1998) prove that a strategy of an extensive game is rationalizable in the sense of Pearce if and only if it survives the maximal elimination of conditionally dominated strategies. Briefly, this process ...
    • Perspectives on cybersecurity: A collaborative study 

      Choucri, Nazli; Jackson, Chrisma (© Massachusetts Institute of Technology, 2015)
    • Possibilistic beliefs and higher-level rationality 

      Chen, Jing; Micali, Silvio; Pass, Rafael (© Massachusetts Institute of Technology, 2014-06-09)
      We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ...