Browsing Department of Political Science by Issue Date
Now showing items 21-40 of 404
-
Policy-Governed Secure Collaboration: Toward Analytics for Cybersecurity of Cyber- Physical Systems
(Science of Security & Privacy Program / © Authors, 2018-03-13)Mounting concerns about safety and security have resulted in an intricate ecosystem of guidelines, compliance measures, directives and policy reports for cybersecurity of all critical infrastructure. By definition, such ... -
Energy consumption and transition dynamics to a sustainable future under a rentier economy
(© Informa UK Limited (trading as Taylor & Francis Group), 2018) -
Cyber international relations as an integrated system
(© Springer Science+Business Media, LLC, 2017-11-17)The purpose of this paper is to conceptualize the hitherto separate domains of Cyberspace and Interna- tional Relations into an integrated socio-technical system that we jointly call the cyber International Relations ... -
Institutions for Cyber Security: International Responses and Data Sharing Initiatives
(© Massachusetts Institute of Technology, 2017-08)Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for ... -
The Theory of Lateral Pressure: Highlights of Quantification and Empirical Analysis
(© Oxford University Press, 2017-07-27)The term lateral pressure refers to any tendency (or propensity) of states, firms, and other entities to expand their activities and exert influence and control beyond their established boundaries, whether for economic, ... -
The New Normal
(© The Mark News, 2017-06-13)As vast as cyberspace is, so too are the threats, exploits and damages that seem to multiply by the day through this network of computer interconnections around the globe — elements that are shaping a new normal which is ... -
Analytics for Smart Grid Cybersecurity
(© IEEE, 2017-04-25)Guidelines, directives, and policy statements are usually presented in “linear” text form – word after word, page after page. However necessary, this practice impedes full understanding, obscures feedback dynamics, hides ... -
Introduction
(H-Diplo | ISSF Roundtable Reviews/© Nazli Choucri, 2016-12-05) -
The Theory of Lateral Pressure Highlights of Quantification & Empirical Analysis
(SSRN, 2016-11-11)Lateral Pressure refers to any tendency (or propensity) of individuals and societies to expand their activities and exert influence and control beyond their established boundaries, whether for economic, political, military, ... -
Emerging trends in cyberspace: Dimensions and dilemmas
(U.S. Army War College Press, 2016-08-01) -
Improving interdisciplinary communication with standardized cyber security terminology: A literature review
(© IEEE, 2016-03-21)The growing demand for computer security, and the cyberization trend, are hallmarks of the 21st century. The rise in cyber-crime, digital currency, and e-governance has been well met by a corresponding recent jump in ... -
Explorations in international relations: Final program report
(© Massachusetts Institute of Technology, 2015)In international relations, the traditional approaches to theory and research, practice, and policy were derived from experiences in the 19th and 20th centuries. But cyberspace, shaped by human ingenuity, is a venue for ... -
Finding order in a contentious Internet
(Massachusetts Institute of Technology, 2015)This inquiry started with the simple question, "Who manages the Internet infrastructure and how?" Since, this question evolved into an evaluation of the routing system and the institutions that manage it. This institutional ... -
Perspectives on cybersecurity: A collaborative study
(© Massachusetts Institute of Technology, 2015) -
Scantegrity Responds to Rice Study on Usability of the Scantegrity II Voting System
(Caltech/MIT Voting Technology Project, 2014-12-28)This note is a response to, and critique of, recent work by Acemyan, Kortum, Bryne, and Wallach regarding the usability of end-to-end verifiable voting systems, and in particular, to their analysis of the usability of the ... -
The evolution of network based cybersecurity norms: An analytical narrative
(© IEEE, 2014-08-13)We examine coordination dilemmas in cybersecurity policy by using an already developed evolutionary game theoretical model [2]. We suggest that norms to encourage network based security systems may not evolve independently ... -
Partisanship and Voter Confidence, 2000-2012
(Caltech/MIT Voting Technology Project, 2014-06-01)To what degree is voter confidence in election procedures driven by satisfaction with the outcome of an election, as opposed to trust in government or objective features of the polling place, such as voting technology? ... -
Cyberpolitics
(© Oxford University Press, 2014-05-15) -
Written Testimony of Charles Stewart III Before the U.S. Senate Committee on Rules and Administration
(Caltech/MIT Voting Technology Project, 2014-05-14)THERE IS A NEED FOR A MORE DATA-CENTERED APPROACH TO ELECTION ADMINISTRATION. Election policymaking would greatly benefit from metrics-based policymaking, and the development of measures similar to those in policy areas ... -
Practical Provably Correct Voter Privacy Protecting End-to-End Voting Employing Multiparty Computations and Split Value Representations of Votes
(Caltech/MIT Voting Technology Project, 2014-05-12)Continuing the work of Rabin and Rivest we present another simple and fast method for conducting end to end voting and allowing public verification of correctness of the announced vote tallying results. This method was ...