Now showing items 3-22 of 26

    • Characterizing cyberspace: Past, present and future 

      Clark, David D. (© Massachusetts Institute of Technology, 2010-03-12)
      In general terms, most practitioners share a working concept of cyberspace—it is the collection of computing devices connected by networks in which electronic information is stored and utilized, and communication takes ...
    • The Chinese Internet: Control through the layers 

      Hung, Shirley (© Massachusetts Institute of Technology, 2012-10-30)
      China is often described as having the world’s most advanced Internet censorship and surveillance regime.1 It garners much fear and attention in the media and among policymakers, yet most reports focus on specific incidents ...
    • Cyber conflicts in international relations: Framework and case studies 

      Gamero-Garrido, Alexander (© Massachusetts Institute of Technology, 2014)
      Although cyber conflict is no longer considered particularly unusual, significant uncertainties remain about the nature, scale, scope and other critical features of it. This study addresses a subset of these issues by ...
    • Explorations in cyber international relations (ECIR)—data dashboard report #1: CERT data sources and prototype dashboard system 

      Madnick, Stuart E.; Choucri, Nazli; Camiña, Steven; Fogg, Erik; Li, Xitong; e.a. (© Massachusetts Institute of Technology, 2009-08-10)
      Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective and cooperative ...
    • Exploring terms and taxonomies relating to the cyber international relations research field: Or are "cyberspace" and "cyber space" the same? 

      Camiña, Steven; Madnick, Stuart E.; Choucri, Nazli; Woon, Wei Lee (© Massachusetts Institute of Technology, 2011-08)
      This project has at least two facets to it: (1) advancing the algorithms in the sub-field of bibliometrics often referred to as "text mining" whereby hundreds of thousands of documents (such as journal articles) are scanned ...
    • The expressive power of the Internet design 

      Clark, David D. (© Massachusetts Institute of Technology, 2009-04-27)
      The present Internet is not defined in terms of its semantics, at least at the packet level. The loose packet carriage model of “what comes out is what went in” is intentionally almost semantics-free. The packets just carry ...
    • Fair electronic exchange with virtual trusted parties 

      Micali, Silvio (© Massachusetts Institute of Technology, n.d.)
      Assume each of two parties has something the other wants. Then, a Fair exchange is an electronic protocol guaranteeing that either both parties get what they want, or none of them does. Protocols relying on traditional ...
    • Integrating cyberspace and international relations: The co-evolution dilemma 

      Choucri, Nazli; Clark, David D. (© Massachusetts Institute of Technology, 2012-11-06)
      Cyberspace is a fact of daily life. Until recently cyberspace was considered largely a matter of low politics – the term used to denote background conditions and routine decisions and processes. By contrast high politics ...
    • Knightian auctions 

      Chiesa, Alessandro; Micali, Silvio; Zhu, Zeyuan Allen (© Massachusetts Institute of Technology, 2012-01-10)
      We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor δ ∈ (0, 1), and the mech- anism designer knows δ. The classical notions of implementation ...
    • Perspectives on cybersecurity: A collaborative study 

      Choucri, Nazli; Jackson, Chrisma (© Massachusetts Institute of Technology, 2015)
    • Possibilistic beliefs and higher-level rationality 

      Chen, Jing; Micali, Silvio; Pass, Rafael (© Massachusetts Institute of Technology, 2014-06-09)
      We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ...
    • Rational robustness for mechanism design 

      Chen, Jing; Micali, Silvio (© Massachusetts Institute of Technology, 2009-11-10)
      The currently prevailing equilibrium-based approach to mechanism design suffers from a plurality of fundamental problems, and new conceptual frameworks are needed to solve or sufficiently alleviate them. In this paper, ...
    • Resilient and virtually perfect revenue from perfectly informed players 

      Chen, Jing; Hassidim, Avinatan; Micali, Silvio (© Massachusetts Institute of Technology, 2010-01-13)
      We put forward a new extensive-form mechanism that, in a general context with perfectly informed players and quasi-linear utilities, • Virtually achieves optimal revenue at a unique subgame-perfect equilibrium; • Is ...
    • Resilient mechanism design foundations for governance of cyberspace: Exploration in theory, strategy, and policy 

      Micali, Silvio; Choucri, Nazli; Chen, Jing; Williams, Cindy (© Massachusetts Institute of Technology, 2013-09)
      Three related trends in world politics – shifting in power relations, increased diversity of actors and entities, and the growing mobilization and politicization of global constituencies are contributing to a global “tussle” ...
    • Simulation modeling for cyber resilience 

      Siegel, Michael; Goldsmith, Daniel (© Massachusetts Institute of Technology, 2010-10)
      Identifying high-leverage intervention points to increase cyber resiliency—the ability to provide and maintain acceptable service levels in the face of challenges— requires identifying, integrating, and framing a diverse ...
    • System dynamics modeling for pro-active intelligence 

      Anderson, Ed; Choucri, Nazli; Goldsmith, Daniel; Madnick, Stuart E.; Siegel, Michael; e.a. (© Massachusetts Institute of Technology, 2009-11-04)
      The Pro-Active Intelligence (PAINT) program, sponsored by the Intelligence Advanced Research Projects Activity (IARPA), was formed to address the challenges1 posed by distributed human networks, including terrorists and ...
    • Systematic approaches to cyber insecurity 

      Goldsmith, Daniel; Siegel, Michael (© Massachusetts Institute of Technology, 2012)
      Recent developments have demonstrated that as the diffusion of cyber enabled technologies increases, so too does dependency on a cyber infrastructure susceptible to failure, outages, and attacks. While current efforts are ...
    • The Theory of Lateral Pressure Highlights of Quantification & Empirical Analysis 

      Choucri, Nazli; Agarwal, Gaurav (SSRN, 2016-11-11)
      Lateral Pressure refers to any tendency (or propensity) of individuals and societies to expand their activities and exert influence and control beyond their established boundaries, whether for economic, political, military, ...
    • Three views of cyberspace 

      Clark, David D. (© Massachusetts Institute of Technology, 2011-01-05)
      The purpose of this paper is to draw attention to an important but perhaps under- appreciated aspect of the Internet: the emergent idea of a global commons in the use of the Internet, in which people might transcend national ...
    • Tools of engagement: Mapping the tussles in cyberspace 

      Clark, David D. (© Massachusetts Institute of Technology, 2012-03-12)
      This paper has been prepared as part of the Explorations in Cyber International Relations project being carried out at MIT, Harvard and collaborating institutions. The goal of this paper is to lay the groundwork for the ...