Browsing Publications and Working Papers by Issue Date
Now showing items 1-20 of 22
-
Analytics for Smart Grid Cybersecurity
(© IEEE, 2017-04-25)Guidelines, directives, and policy statements are usually presented in “linear” text form – word after word, page after page. However necessary, this practice impedes full understanding, obscures feedback dynamics, hides ... -
The Theory of Lateral Pressure: Highlights of Quantification and Empirical Analysis
(© Oxford University Press, 2017-07-27)The term lateral pressure refers to any tendency (or propensity) of states, firms, and other entities to expand their activities and exert influence and control beyond their established boundaries, whether for economic, ... -
Policy-Governed Secure Collaboration: Toward Analytics for Cybersecurity of Cyber- Physical Systems
(Science of Security & Privacy Program / © Authors, 2018-03-13)Mounting concerns about safety and security have resulted in an intricate ecosystem of guidelines, compliance measures, directives and policy reports for cybersecurity of all critical infrastructure. By definition, such ... -
The AIWS 7-Layer Model to Build Next Generation Democracy
(© Boston Global Forum, & Michael Dukakis Institute for Leadership and Innovation., 2018-04-26)The Artificial Intelligence World Society (AIWS) is a set of values, ideas, concepts and protocols for standards and norms whose goal is to advance the peaceful development of AI to improve the quality of life for all ... -
The concept of AI-government: Core concepts for the design of AI-government
(© Boston Global Forum, & Michael Dukakis Institute for Leadership and Innovation, 2018-06-25)E-Government is the use of communication and information technology for improving the performance of public sector agencies. AI-Government transcends E-Government by applying AI to assist decision making for all critical ... -
Cyber Acquisition: Policy Changes to Drive Innovation in Response to Accelerating Threats in Cyberspace
(Army Cyber Institute (ACI) at West Point / © 2019 Authors., 2018-11-14)The United States of America faces great risk in the cyber domain because our adversaries are growing bolder, increasing in number, improving their capabilities, and doing so rapidly. Meanwhile, the associated technologies ... -
Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
(© IEEE, 2019-11-05)Executive Order, May 2019 states: November 5, 2019 “...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious ... -
cyberir.mit.edu
(Massachusetts Institute of Technology., 2020-08-27)This website presents a brief introduction to Cyber-IR@MIT—a dynamic, interactive knowledge and networking system focused on the evolving, diverse, and complex interconnections of cyberspace and international relations. ... -
gssd.mit.edu
(Massachusetts Institute of Technology., 2020-08-27)GSSD is an evolving knowledge networking system dedicated to sustainable development. Designed to help identify and extend innovative approaches toward sustainability—including enabling technologies, policies, and strategies—it ... -
Cyberspace Operations Functional Capability Reference Architecture from Document Text
(© MIT Sloan School of Management, 2020-09)The COMET project applies structured text analysis, semantic similarity and ontology learning theory, along with NLP to investigate automated and semi-automated methods for extracting knowledge from text policy documents ... -
Social Contract for the AI Age
(© Artificial Intelligence World Society Initiative (AIWS), & Michael Dukakis Institute for Leadership and Innovation., 2020-09-09)Just as earlier social contracts helped shape societies for a common purpose, the Social Contract for the AI Age has a transformative vision, one that transcends the technological features of artificial intelligence and ... -
ecir.mit.edu
(2020-09-21)Exploration in Cyber International Relations (ECIR), is the label of a multidisciplinary and multidimensional research project initiated under a grant from the Minerva Program, Department of Defense. A joint project of ... -
Accelerating Cyber Acquisitions: Introducing a Time-Driven Approach to Manage Risks with Less Delay
(© ITEA, 2021)The highly dynamic nature of the cyber domain demands that cyber operators are capable of rapidly evolving and adapting with exquisite timing. These forces, in turn, pressure acquisition specialists to accoutre cyber ... -
A Systematic Framework to Understand Transnational Governance for Cybersecurity Risks from Digital Trade
(Wiley, 2021-08-31)Governing cybersecurity risks from digital trade is a growing responsibility for governments and corporations. This study develops a systematic framework to delineate and analyze the strategies that governments and ... -
A Systematic Framework to Understand Transnational Governance for Cybersecurity Risks from Digital Trade
(Wiley, 2021-08-31)Governing cybersecurity risks from digital trade is a growing responsibility for governments and corporations. This study develops a systematic framework to delineate and analyze the strategies that governments and ... -
Complexity of International Law for Cyber Operations
(© IEEE, 2021-11-08)Policy documents are usually written in text form—word after word, sentence after sentence etc.— which often obscures some of their most critical features. Text cannot easily situate interconnections among elements, or ... -
CyberIR@MIT: Knowledge for Science, Policy, Practice
(© Massachusetts Institute of Technology, 2022-07-09)This paper presents a brief introduction to CyberIR@MIT—a dynamic, interactive knowledge and networking system focused on the evolving, diverse, and complex interconnections of cyberspace and international relations. The ... -
Framework for Global Accord on Artificial Intelligence (AI)
(© Massachusetts Institute of Technology, 2022-07-09)Advances in information and communication technologies – global Internet, social media, Internet of Things, and a range of related science-driven innovations and generative and emergent technologies – continue to shape a ... -
Complexity of International Law for Cyber Operations
(© Massachusetts Institute of Technology, 2022-07-09)Policy documents are usually written in text form—word after word, sentence after sentence, page after page, section after section, chapter after chapter—which often masks some of their most critical features. The text ... -
Analytics for Cybersecurity Policy of Cyber-Physical Systems
(© IEEE, 2022-11-14)Guidelines, directives, and policy statements are usually presented in “linear” text form—word after word, page after page. However necessary, this practice impedes full understanding, obscures feedback dynamics, hides ...