Browsing 4. CyberPolitics & International Relations by Title
Now showing items 9-28 of 60
-
Building global digital supply chain hub by cybersecurity commitment: Singapore's strategic role in the digital age
(© GlobalPolicyJournal, 2020-10-19)Digital trade is growing in importance: it contributed to 10% of the global GDP in the last decade by enabling cross-border e-commerce. However, accompanied by sustained digital innovations, weak cybersecurity is becoming ... -
Co-evolution of cyberspace and international relations: New challenges for the social sciences
(© International Political Science Association., 2013-10-13)Created by human ingenuity, cyberspace is a fact of daily life. Until recently, this arena of virtual interaction was considered largely a matter of low politics— the routine, background, and relatively non-contentious. ... -
Comparative analysis of cybersecurity metrics to develop new hypotheses
(© Elsevier B.V., 2011-11)Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metrics, especially in the international perspective across multiple countries, multiple years, and multiple categories. As ... -
Comparative analysis of cybersecurity metrics to develop new hypotheses
(Explorations in Cyber International Relations, 2011-12-07)Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metrics, especially in the international perspective across multiple countries, multiple years, and multiple categories. ... -
Complexity of International Law for Cyber Operations
(© IEEE, 2021-11-08)Policy documents are usually written in text form—word after word, sentence after sentence etc.— which often obscures some of their most critical features. Text cannot easily situate interconnections among elements, or ... -
Complexity of International Law for Cyber Operations
(© Massachusetts Institute of Technology, 2022-07-09)Policy documents are usually written in text form—word after word, sentence after sentence, page after page, section after section, chapter after chapter—which often masks some of their most critical features. The text ... -
The concept of AI-government: Core concepts for the design of AI-government
(© Boston Global Forum, & Michael Dukakis Institute for Leadership and Innovation, 2018-06-25)E-Government is the use of communication and information technology for improving the performance of public sector agencies. AI-Government transcends E-Government by applying AI to assist decision making for all critical ... -
The convergence of cyberspace and sustainability
(© E-International Relations., 2012-04-20)This paper highlights the emerging synergy between cyberspace (a new arena of interaction) and sustainability (a new initiative on the global agenda), and their convergence on the global policy agenda. This convergence is ... -
Cyber Acquisition: Policy Changes to Drive Innovation in Response to Accelerating Threats in Cyberspace
(Army Cyber Institute (ACI) at West Point / © 2019 Authors., 2018-11-14)The United States of America faces great risk in the cyber domain because our adversaries are growing bolder, increasing in number, improving their capabilities, and doing so rapidly. Meanwhile, the associated technologies ... -
Cyber international relations as an integrated system
(© Springer Science+Business Media, LLC, 2017-11-17)The purpose of this paper is to conceptualize the hitherto separate domains of Cyberspace and Interna- tional Relations into an integrated socio-technical system that we jointly call the cyber International Relations ... -
Cyber international relations as an integrated system
(© INCOSE, 2012-06-18)International Relations (IR) – whether in pursuit of wealth or power – have been traditionally predicated upon the dominance of the State and the effectiveness of geographical boundaries. The Internet has shattered these ... -
CyberIR@MIT: Knowledge for Science, Policy, Practice
(© Massachusetts Institute of Technology, 2022-07-09)This paper presents a brief introduction to CyberIR@MIT—a dynamic, interactive knowledge and networking system focused on the evolving, diverse, and complex interconnections of cyberspace and international relations. The ... -
Cyberpolitics
(© Oxford University Press, 2014-05-15) -
Cyberpolitics in international relations
(© MIT Center for International Studies, 2013) -
Cyberspace Operations Functional Capability Reference Architecture from Document Text
(© MIT Sloan School of Management, 2020-09)The COMET project applies structured text analysis, semantic similarity and ontology learning theory, along with NLP to investigate automated and semi-automated methods for extracting knowledge from text policy documents ... -
The dynamics of managing undersea cables: When solution becomes the problem
(Explorations in Cyber International Relations, 2012-11-06)In the U.S., approximately 95% of all international Internet and phone traffic travels via undersea cables. Nearly all government traffic, including sensitive diplomatic and military orders, travels these cables to reach ... -
The dynamics of undersea cables: Emerging opportunities and pitfalls
(© The System Dynamics Society, 2012-07-26)Cyberspace is built on physical foundations that support the “virtual” manifestations we know of and use in everyday computing. Physical infrastructure can include wired, fiber optic, satellite and microwave links, as well ... -
Emerging trends in cyberspace: Dimensions and dilemmas
(U.S. Army War College Press, 2016-08-01) -
Ethics in Artificial Intelligence: Toward Foundations for Global Policy
(© MIT Political Science Department, 2022-12-21)Matters of ethics are becoming more salient at all levels of politics, almost everywhere. In the scientific community, ethics in AI is increasingly gaining attention. The fact is that the rate of change in AI innovations ... -
The evolution of network based cybersecurity norms: An analytical narrative
(© IEEE, 2014-08-13)We examine coordination dilemmas in cybersecurity policy by using an already developed evolutionary game theoretical model [2]. We suggest that norms to encourage network based security systems may not evolve independently ...