Now showing items 104-113 of 113

    • Understanding cyber complexity: Systems modeling and the financial services sector 

      Goldsmith, Daniel; Siegel, Michael (© Massachusetts Institute of Technology, 2010-02)
      Recent developments within the financial services sector have demonstrated that as the diffusion of cyber enabled technologies increases, so too does dependency on a cyber infrastructure susceptible to failure, outages, ...
    • Understanding ICANN’s complexity in a growing and changing Internet 

      Testart, Cecilia (© Massachusetts Institute of Technology, 2014)
      The ever-increasing relevance of the Internet in all aspects of our lives has significantly raised the interest of cyberspace in the political, economical and international spheres. Internet governance and its future design ...
    • Understanding “Cyber Conflict” 

      Shukla, Aadya (Explorations in Cyber International Relations., 2012-11-06)
      Problem: Emergence of cyber as the new arena for conflict raises three basic questions: (a) What qualifies as a Cyber Conflict? (multiple definitions exist); (b) Does intervention of cyber in conflict life-cycle requires ...
    • Unraveling Internet identities : accountability & anonymity at the application layer 

      Wolff, Josephine Charlotte Paulina (Massachusetts Institute of Technology, 2012)
      Both anonymity and accountability play crucial roles in sustaining the Internet's functionality, however there is a common misconception that increasing the anonymity of Internet identities necessitates diminishing their ...
    • Untangling attribution 

      Clark, David D.; Landau, Susan (© National Academy of Sciences, 2010-01-01)
      In February 2010, former NSA Director Mike McConnell wrote that, “We need to develop an early- warning system to monitor cyberspace, identify intrusions and locate the source of attacks with a trail of evidence that can ...
    • A view of top-down internet governance 

      Sowell, Jesse (© NANOG, 2012-06-04)
      Does the audience want more government and regulatory involvement in peering and interconnection world?
    • What is cybersecurity? Explorations in automated knowledge generation 

      Choucri, Nazli; Elbait, Gihan Daw; Madnick, Stuart E. (© Massachusetts Institute of Technology, 2012-11-06)
      This paper addresses a serious impediment to theory and policy for cybersecurity: Trivial as it might appear on the surface, there is no agreed upon understanding of the issue, no formal definition, and not even a consensus ...
    • When virtual issues become real world actions 

      Houghton, James (Explorations in Cyber International Relations, 2012-11-06)
    • Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR) 

      Rady, Mina (Explorations in Cyber International Relations, 2012-11-06)
      Anonymity networks have played major roles in censorship circumvention and various benign or malicious activities in the cyber domain. Hence, those networks became well defined targets of repressive regimes or law enforcement. ...
    • Who controls cyberspace? 

      Choucri, Nazli; Clark, David D. (Sage Journals/© Nazli Choucri, & David D. Clark, 2013-09-01)
      When Wikileaks released hundreds of thousands of Iraq War logs and diplomatic cables in 2010, a horrified US government sprang into action—but the classified information the government hoped to keep from public view quickly ...