Browsing Research Papers by Title
Now showing items 12-26 of 26
-
Perspectives on cybersecurity: A collaborative study
(© Massachusetts Institute of Technology, 2015) -
Possibilistic beliefs and higher-level rationality
(© Massachusetts Institute of Technology, 2014-06-09)We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ... -
Rational robustness for mechanism design
(© Massachusetts Institute of Technology, 2009-11-10)The currently prevailing equilibrium-based approach to mechanism design suffers from a plurality of fundamental problems, and new conceptual frameworks are needed to solve or sufficiently alleviate them. In this paper, ... -
Resilient and virtually perfect revenue from perfectly informed players
(© Massachusetts Institute of Technology, 2010-01-13)We put forward a new extensive-form mechanism that, in a general context with perfectly informed players and quasi-linear utilities, • Virtually achieves optimal revenue at a unique subgame-perfect equilibrium; • Is ... -
Resilient mechanism design foundations for governance of cyberspace: Exploration in theory, strategy, and policy
(© Massachusetts Institute of Technology, 2013-09)Three related trends in world politics – shifting in power relations, increased diversity of actors and entities, and the growing mobilization and politicization of global constituencies are contributing to a global “tussle” ... -
Simulation modeling for cyber resilience
(© Massachusetts Institute of Technology, 2010-10)Identifying high-leverage intervention points to increase cyber resiliency—the ability to provide and maintain acceptable service levels in the face of challenges— requires identifying, integrating, and framing a diverse ... -
System dynamics modeling for pro-active intelligence
(© Massachusetts Institute of Technology, 2009-11-04)The Pro-Active Intelligence (PAINT) program, sponsored by the Intelligence Advanced Research Projects Activity (IARPA), was formed to address the challenges1 posed by distributed human networks, including terrorists and ... -
Systematic approaches to cyber insecurity
(© Massachusetts Institute of Technology, 2012)Recent developments have demonstrated that as the diffusion of cyber enabled technologies increases, so too does dependency on a cyber infrastructure susceptible to failure, outages, and attacks. While current efforts are ... -
The Theory of Lateral Pressure Highlights of Quantification & Empirical Analysis
(SSRN, 2016-11-11)Lateral Pressure refers to any tendency (or propensity) of individuals and societies to expand their activities and exert influence and control beyond their established boundaries, whether for economic, political, military, ... -
Three views of cyberspace
(© Massachusetts Institute of Technology, 2011-01-05)The purpose of this paper is to draw attention to an important but perhaps under- appreciated aspect of the Internet: the emergent idea of a global commons in the use of the Internet, in which people might transcend national ... -
Tools of engagement: Mapping the tussles in cyberspace
(© Massachusetts Institute of Technology, 2012-03-12)This paper has been prepared as part of the Explorations in Cyber International Relations project being carried out at MIT, Harvard and collaborating institutions. The goal of this paper is to lay the groundwork for the ... -
Toward the design of a future Internet
(© Massachusetts Institute of Technology, 2009-10-10)This document is one very preliminary proposal for the design of a Future Internet—an outline of requirements and architecture. This document should only be seen as a first step in such a proposal; there are many parts ... -
Understanding cyber complexity: Systems modeling and the financial services sector
(© Massachusetts Institute of Technology, 2010-02)Recent developments within the financial services sector have demonstrated that as the diffusion of cyber enabled technologies increases, so too does dependency on a cyber infrastructure susceptible to failure, outages, ... -
Understanding ICANN’s complexity in a growing and changing Internet
(© Massachusetts Institute of Technology, 2014)The ever-increasing relevance of the Internet in all aspects of our lives has significantly raised the interest of cyberspace in the political, economical and international spheres. Internet governance and its future design ... -
What is cybersecurity? Explorations in automated knowledge generation
(© Massachusetts Institute of Technology, 2012-11-06)This paper addresses a serious impediment to theory and policy for cybersecurity: Trivial as it might appear on the surface, there is no agreed upon understanding of the issue, no formal definition, and not even a consensus ...