Now showing items 1-20 of 26

    • The expressive power of the Internet design 

      Clark, David D. (© Massachusetts Institute of Technology, 2009-04-27)
      The present Internet is not defined in terms of its semantics, at least at the packet level. The loose packet carriage model of “what comes out is what went in” is intentionally almost semantics-free. The packets just carry ...
    • Explorations in cyber international relations (ECIR)—data dashboard report #1: CERT data sources and prototype dashboard system 

      Madnick, Stuart E.; Choucri, Nazli; Camiña, Steven; Fogg, Erik; Li, Xitong; e.a. (© Massachusetts Institute of Technology, 2009-08-10)
      Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective and cooperative ...
    • Toward the design of a future Internet 

      Clark, David D. (© Massachusetts Institute of Technology, 2009-10-10)
      This document is one very preliminary proposal for the design of a Future Internet—an outline of requirements and architecture. This document should only be seen as a first step in such a proposal; there are many parts ...
    • System dynamics modeling for pro-active intelligence 

      Anderson, Ed; Choucri, Nazli; Goldsmith, Daniel; Madnick, Stuart E.; Siegel, Michael; e.a. (© Massachusetts Institute of Technology, 2009-11-04)
      The Pro-Active Intelligence (PAINT) program, sponsored by the Intelligence Advanced Research Projects Activity (IARPA), was formed to address the challenges1 posed by distributed human networks, including terrorists and ...
    • Rational robustness for mechanism design 

      Chen, Jing; Micali, Silvio (© Massachusetts Institute of Technology, 2009-11-10)
      The currently prevailing equilibrium-based approach to mechanism design suffers from a plurality of fundamental problems, and new conceptual frameworks are needed to solve or sufficiently alleviate them. In this paper, ...
    • Resilient and virtually perfect revenue from perfectly informed players 

      Chen, Jing; Hassidim, Avinatan; Micali, Silvio (© Massachusetts Institute of Technology, 2010-01-13)
      We put forward a new extensive-form mechanism that, in a general context with perfectly informed players and quasi-linear utilities, • Virtually achieves optimal revenue at a unique subgame-perfect equilibrium; • Is ...
    • Understanding cyber complexity: Systems modeling and the financial services sector 

      Goldsmith, Daniel; Siegel, Michael (© Massachusetts Institute of Technology, 2010-02)
      Recent developments within the financial services sector have demonstrated that as the diffusion of cyber enabled technologies increases, so too does dependency on a cyber infrastructure susceptible to failure, outages, ...
    • Characterizing cyberspace: Past, present and future 

      Clark, David D. (© Massachusetts Institute of Technology, 2010-03-12)
      In general terms, most practitioners share a working concept of cyberspace—it is the collection of computing devices connected by networks in which electronic information is stored and utilized, and communication takes ...
    • Simulation modeling for cyber resilience 

      Siegel, Michael; Goldsmith, Daniel (© Massachusetts Institute of Technology, 2010-10)
      Identifying high-leverage intervention points to increase cyber resiliency—the ability to provide and maintain acceptable service levels in the face of challenges— requires identifying, integrating, and framing a diverse ...
    • Three views of cyberspace 

      Clark, David D. (© Massachusetts Institute of Technology, 2011-01-05)
      The purpose of this paper is to draw attention to an important but perhaps under- appreciated aspect of the Internet: the emergent idea of a global commons in the use of the Internet, in which people might transcend national ...
    • Applications of ECIR modeling work to cyber policy problems 

      Williams, Cindy (© Massachusetts Institute of Technology, 2011-03-10)
      One element of core research underway in Explorations in Cyber International Relations (ECIR) at MIT is dynamic modeling, simulation, and analysis. During 2010 and 2011, this research has pushed forward theoretical frontiers ...
    • Exploring terms and taxonomies relating to the cyber international relations research field: Or are "cyberspace" and "cyber space" the same? 

      Camiña, Steven; Madnick, Stuart E.; Choucri, Nazli; Woon, Wei Lee (© Massachusetts Institute of Technology, 2011-08)
      This project has at least two facets to it: (1) advancing the algorithms in the sub-field of bibliometrics often referred to as "text mining" whereby hundreds of thousands of documents (such as journal articles) are scanned ...
    • Systematic approaches to cyber insecurity 

      Goldsmith, Daniel; Siegel, Michael (© Massachusetts Institute of Technology, 2012)
      Recent developments have demonstrated that as the diffusion of cyber enabled technologies increases, so too does dependency on a cyber infrastructure susceptible to failure, outages, and attacks. While current efforts are ...
    • Knightian auctions 

      Chiesa, Alessandro; Micali, Silvio; Zhu, Zeyuan Allen (© Massachusetts Institute of Technology, 2012-01-10)
      We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor δ ∈ (0, 1), and the mech- anism designer knows δ. The classical notions of implementation ...
    • Tools of engagement: Mapping the tussles in cyberspace 

      Clark, David D. (© Massachusetts Institute of Technology, 2012-03-12)
      This paper has been prepared as part of the Explorations in Cyber International Relations project being carried out at MIT, Harvard and collaborating institutions. The goal of this paper is to lay the groundwork for the ...
    • The Chinese Internet: Control through the layers 

      Hung, Shirley (© Massachusetts Institute of Technology, 2012-10-30)
      China is often described as having the world’s most advanced Internet censorship and surveillance regime.1 It garners much fear and attention in the media and among policymakers, yet most reports focus on specific incidents ...
    • Integrating cyberspace and international relations: The co-evolution dilemma 

      Choucri, Nazli; Clark, David D. (© Massachusetts Institute of Technology, 2012-11-06)
      Cyberspace is a fact of daily life. Until recently cyberspace was considered largely a matter of low politics – the term used to denote background conditions and routine decisions and processes. By contrast high politics ...
    • What is cybersecurity? Explorations in automated knowledge generation 

      Choucri, Nazli; Elbait, Gihan Daw; Madnick, Stuart E. (© Massachusetts Institute of Technology, 2012-11-06)
      This paper addresses a serious impediment to theory and policy for cybersecurity: Trivial as it might appear on the surface, there is no agreed upon understanding of the issue, no formal definition, and not even a consensus ...
    • Anonymity networks: New platforms for conflict and contention 

      Rady, Mina (© Massachusetts Institute of Technology, 2013)
      Access to information is critical during population uprisings against repressive regimes. As a venue for information and data exchange, cyberspace offers many powerful social platforms for exchange of information. But the ...
    • Resilient mechanism design foundations for governance of cyberspace: Exploration in theory, strategy, and policy 

      Micali, Silvio; Choucri, Nazli; Chen, Jing; Williams, Cindy (© Massachusetts Institute of Technology, 2013-09)
      Three related trends in world politics – shifting in power relations, increased diversity of actors and entities, and the growing mobilization and politicization of global constituencies are contributing to a global “tussle” ...