Browsing Research Papers by Title
Now showing items 1-20 of 26
-
Anonymity networks: New platforms for conflict and contention
(© Massachusetts Institute of Technology, 2013)Access to information is critical during population uprisings against repressive regimes. As a venue for information and data exchange, cyberspace offers many powerful social platforms for exchange of information. But the ... -
Applications of ECIR modeling work to cyber policy problems
(© Massachusetts Institute of Technology, 2011-03-10)One element of core research underway in Explorations in Cyber International Relations (ECIR) at MIT is dynamic modeling, simulation, and analysis. During 2010 and 2011, this research has pushed forward theoretical frontiers ... -
Characterizing cyberspace: Past, present and future
(© Massachusetts Institute of Technology, 2010-03-12)In general terms, most practitioners share a working concept of cyberspace—it is the collection of computing devices connected by networks in which electronic information is stored and utilized, and communication takes ... -
The Chinese Internet: Control through the layers
(© Massachusetts Institute of Technology, 2012-10-30)China is often described as having the world’s most advanced Internet censorship and surveillance regime.1 It garners much fear and attention in the media and among policymakers, yet most reports focus on specific incidents ... -
Cyber conflicts in international relations: Framework and case studies
(© Massachusetts Institute of Technology, 2014)Although cyber conflict is no longer considered particularly unusual, significant uncertainties remain about the nature, scale, scope and other critical features of it. This study addresses a subset of these issues by ... -
Explorations in cyber international relations (ECIR)—data dashboard report #1: CERT data sources and prototype dashboard system
(© Massachusetts Institute of Technology, 2009-08-10)Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective and cooperative ... -
Exploring terms and taxonomies relating to the cyber international relations research field: Or are "cyberspace" and "cyber space" the same?
(© Massachusetts Institute of Technology, 2011-08)This project has at least two facets to it: (1) advancing the algorithms in the sub-field of bibliometrics often referred to as "text mining" whereby hundreds of thousands of documents (such as journal articles) are scanned ... -
The expressive power of the Internet design
(© Massachusetts Institute of Technology, 2009-04-27)The present Internet is not defined in terms of its semantics, at least at the packet level. The loose packet carriage model of “what comes out is what went in” is intentionally almost semantics-free. The packets just carry ... -
Fair electronic exchange with virtual trusted parties
(© Massachusetts Institute of Technology, n.d.)Assume each of two parties has something the other wants. Then, a Fair exchange is an electronic protocol guaranteeing that either both parties get what they want, or none of them does. Protocols relying on traditional ... -
Integrating cyberspace and international relations: The co-evolution dilemma
(© Massachusetts Institute of Technology, 2012-11-06)Cyberspace is a fact of daily life. Until recently cyberspace was considered largely a matter of low politics – the term used to denote background conditions and routine decisions and processes. By contrast high politics ... -
Knightian auctions
(© Massachusetts Institute of Technology, 2012-01-10)We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor δ ∈ (0, 1), and the mech- anism designer knows δ. The classical notions of implementation ... -
Perspectives on cybersecurity: A collaborative study
(© Massachusetts Institute of Technology, 2015) -
Possibilistic beliefs and higher-level rationality
(© Massachusetts Institute of Technology, 2014-06-09)We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ... -
Rational robustness for mechanism design
(© Massachusetts Institute of Technology, 2009-11-10)The currently prevailing equilibrium-based approach to mechanism design suffers from a plurality of fundamental problems, and new conceptual frameworks are needed to solve or sufficiently alleviate them. In this paper, ... -
Resilient and virtually perfect revenue from perfectly informed players
(© Massachusetts Institute of Technology, 2010-01-13)We put forward a new extensive-form mechanism that, in a general context with perfectly informed players and quasi-linear utilities, • Virtually achieves optimal revenue at a unique subgame-perfect equilibrium; • Is ... -
Resilient mechanism design foundations for governance of cyberspace: Exploration in theory, strategy, and policy
(© Massachusetts Institute of Technology, 2013-09)Three related trends in world politics – shifting in power relations, increased diversity of actors and entities, and the growing mobilization and politicization of global constituencies are contributing to a global “tussle” ... -
Simulation modeling for cyber resilience
(© Massachusetts Institute of Technology, 2010-10)Identifying high-leverage intervention points to increase cyber resiliency—the ability to provide and maintain acceptable service levels in the face of challenges— requires identifying, integrating, and framing a diverse ... -
System dynamics modeling for pro-active intelligence
(© Massachusetts Institute of Technology, 2009-11-04)The Pro-Active Intelligence (PAINT) program, sponsored by the Intelligence Advanced Research Projects Activity (IARPA), was formed to address the challenges1 posed by distributed human networks, including terrorists and ... -
Systematic approaches to cyber insecurity
(© Massachusetts Institute of Technology, 2012)Recent developments have demonstrated that as the diffusion of cyber enabled technologies increases, so too does dependency on a cyber infrastructure susceptible to failure, outages, and attacks. While current efforts are ... -
The Theory of Lateral Pressure Highlights of Quantification & Empirical Analysis
(SSRN, 2016-11-11)Lateral Pressure refers to any tendency (or propensity) of individuals and societies to expand their activities and exert influence and control beyond their established boundaries, whether for economic, political, military, ...