Browsing Publications by Title
Now showing items 1-20 of 167
-
2010 ECIR Workshop on "Cyber International Relations: Emergent Realities of Conflict and Cooperation"
(Explorations in Cyber International Relations, 2010-10-13)An event of the MIT-Harvard multidisciplinary Minerva Project on "Explorations in Cyber International Relations" (ECIR), this conference seeks to adjust traditional views to the cyber realities of the 21st century. Of the ... -
2011 ECIR Workshop on "People, Power and CyberPolitics"
(Explorations in Cyber International Relations, 2011-12-07)The People, Power, and CyberPolitics Conference is a joint project of MIT and Harvard University on Explorations in Cyber International Relations (ECIR). Co-sponsored by the Council on Foreign Relations, this workshop is ... -
2012 ECIR Workshop on "Who Controls Cyberspace? A Puzzle for National Security and International Relations"
(Explorations in Cyber International Relations, 2012-12-07)This Workshop proceeds from the assumption that we have as yet no overarching and complete accounting of who controls what, when, and how, nor do we fully understand what are the precise points of control, where they are ... -
2014 ECIR Workshop on"Cyber Security & the Governance Gap: Complexity, Contention, Cooperation"
(Explorations in Cyber International Relations, 2014-01-06)This workshop focuses on the dynamics shaping these dual features—cyber threats and cyber governance—while also taking into account operational, pragmatic, and normative aspects, as well as potential policy responses. At ... -
Accelerating Cyber Acquisitions: Introducing a Time-Driven Approach to Manage Risks with Less Delay
(© ITEA, 2021)The highly dynamic nature of the cyber domain demands that cyber operators are capable of rapidly evolving and adapting with exquisite timing. These forces, in turn, pressure acquisition specialists to accoutre cyber ... -
The AIWS 7-Layer Model to Build Next Generation Democracy
(© Boston Global Forum, & Michael Dukakis Institute for Leadership and Innovation., 2018-04-26)The Artificial Intelligence World Society (AIWS) is a set of values, ideas, concepts and protocols for standards and norms whose goal is to advance the peaceful development of AI to improve the quality of life for all ... -
Alternative futures: An exercise in forecasting
(© W.H. Freeman & Company, 1987) -
Analytical and behavioral perspectives: Causes of war and strategies for peace
(© United States Institute of Peace, 1991) -
Analytical specifications of the world oil market: A review and comparison of twelve models.
(© Sage Publications, 1979)One discernible reaction to the oil price increases of October 1973 is a variety of arguments and position papers about different features of the "crisis," yielding both diagnoses of the "problem" and prescriptions for its ... -
Analytics for Cybersecurity Policy of Cyber-Physical Systems
(© IEEE, 2022-11-14)Guidelines, directives, and policy statements are usually presented in “linear” text form—word after word, page after page. However necessary, this practice impedes full understanding, obscures feedback dynamics, hides ... -
Analytics for Smart Grid Cybersecurity
(© IEEE, 2017-04-25)Guidelines, directives, and policy statements are usually presented in “linear” text form – word after word, page after page. However necessary, this practice impedes full understanding, obscures feedback dynamics, hides ... -
Analyzing oil production in developing countries: A case study of Egypt
(© International Association for Energy Economics, 1990)This article presents a detailed simulation analysis of the domestic oil sector in Egypt; a near-typical, non-OPEC, oil-producing developing country. Egypt is a small producer by international standards, yet significant ... -
Applications of econometric analysis to forecasting in international relations
(© Peace Science Society (International) Papers., 1973)The apparent neglect of quantitative methodology in political analysis can be explained partly by the absence of a common paradigm or frame of reference for political inquiry and partly by the lack of experience with ... -
Applications of econometric analysis to forecasting in international relations
(© W.H. Freeman & Company, 1978)This chapter examines some key issues and difficulties encountered in the course of applying econometric analysis to forecasting in international relations. We will note the problems involved and the solutions adopted, and ... -
The Arab world in the 1980s: Macro-politics and economic change
(© Middle East Studies Association of North America, 1982-04-30)The events of the early 1970's -- preceded by gradual changes which culminated in the war of 1973 and the oil price increases of October that year -- created realities that cannot be comprehended through conventional ... -
Asians in the Arab world: Labor migration and public policy
(© Informa UK Limited (trading as Taylor & Francis Group), 1986)Ten years after the first oil price rises were declared in 1973 the countries of the Middle East were still struggling to understand the implications of these momentous events. Economic changes induced by events of 1973 ... -
An assessment of documentation standards for ten computer models of political problems
(© Zakład Narodowy Imienia Ossolińskich, 1978) -
Background conditions to the outbreak of the First World War
(© Peace Research Society (International) Papers, 1968)This paper focuses on a comparative analysis of the attributes and capa- bilities of the major European states between the years 1870-1914. When war broke out in the summer of 1914 it was largely unexpected. The bipolarization ... -
Book Review: Manpower and employment in Arab countries: Some critical issues
(International Migration Review, 1976)Book Review. -
Building global digital supply chain hub by cybersecurity commitment: Singapore's strategic role in the digital age
(© GlobalPolicyJournal, 2020-10-19)Digital trade is growing in importance: it contributed to 10% of the global GDP in the last decade by enabling cross-border e-commerce. However, accompanied by sustained digital innovations, weak cybersecurity is becoming ...