Browsing Articles & Book Chapters by Issue Date
Now showing items 1-19 of 19
-
Introduction
(MIT Press / © David D. Clark, 2011-10-01) -
The right way
(© Cognitive Systems Foundation, 2012-01)I ask why humans are smarter than other primates, and I hypothesize that an important part of the answer lies in the Inner Language Hypothesis, a prerequisite to what I call the Strong Story Hypothesis, which holds that ... -
Collusive dominant-strategy truthfulness
(© Elsevier B.V., 2012-01-17)We show that collusion and wrong beliefs may cause a dramatic efficiency loss in the Vickrey mechanism for auctioning a single good in limited supply. We thus put forward a new mechanism guaranteeing efficiency in a very ... -
Lost in cyberspace: Harnessing the Internet, international relations, and global security
(Sage Journals/© 2012 Nazli Choucri, & Daniel Goldsmith, 2012-03-01)Early in the twenty-first century, new, cyber-based threats to the well-being of individuals, economies, and societies added a new dimension to the well-understood threats of the twentieth century. For the first time in ... -
The convergence of cyberspace and sustainability
(© E-International Relations., 2012-04-20)This paper highlights the emerging synergy between cyberspace (a new arena of interaction) and sustainability (a new initiative on the global agenda), and their convergence on the global policy agenda. This convergence is ... -
The next 50 years: A personal view
(© Elsevier B.V., 2012-04-24)I review history, starting with Turing’s seminal paper, reaching back ultimately to when our species started to outperform other primates, searching for the questions that will help us develop a computational account of ... -
Depleted trust in the cyber commons
(United States Air Force / © Roger Hurwitz, 2012-10-01) -
The cultivation of global norms as part of a cyber security strategy
(© Informa UK Limited (trading as Taylor & Francis Group), 2013) -
Cyberpolitics in international relations
(© MIT Center for International Studies, 2013) -
The order independence of iterated dominance in extensive games
(John Wiley & Sons, Inc./© Jing Chen, & Silvio Micali, 2013-01-22)Shimoji and Watson (1998) prove that a strategy of an extensive game is rationalizable in the sense of Pearce if and only if it survives the maximal elimination of conditionally dominated strategies. Briefly, this process ... -
Who controls cyberspace?
(Sage Journals/© Nazli Choucri, & David D. Clark, 2013-09-01)When Wikileaks released hundreds of thousands of Iraq War logs and diplomatic cables in 2010, a horrified US government sprang into action—but the classified information the government hoped to keep from public view quickly ... -
Institutions for cyber security: International responses and global imperatives
(© Informa UK Limited (trading as Taylor & Francis Group), 2013-10-22)Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for ... -
Cyberpolitics
(© Oxford University Press, 2014-05-15) -
Tight revenue bounds with possibilistic beliefs and level-k rationality
(© The Econometric Society, 2015-07)Mechanism design enables a social planner to obtain a desired outcome by leveraging the players’ rationality and their beliefs. It is thus a fundamental, but yet unproven, intuition that the higher the level of rationality ... -
Improving interdisciplinary communication with standardized cyber security terminology: A literature review
(© IEEE, 2016-03-21)The growing demand for computer security, and the cyberization trend, are hallmarks of the 21st century. The rise in cyber-crime, digital currency, and e-governance has been well met by a corresponding recent jump in ... -
Emerging trends in cyberspace: Dimensions and dilemmas
(U.S. Army War College Press, 2016-08-01) -
Leveraging possibilistic beliefs in unrestricted combinatorial auctions
(MDPI AG/© Jing Chen, & Silvio Micali, 2016-10-26)In unrestricted combinatorial auctions, we put forward a mechanism that guarantees a meaningful revenue benchmark based on the possibilistic beliefs that the players have about each other’s valuations. In essence, the ... -
Introduction
(H-Diplo | ISSF Roundtable Reviews/© Nazli Choucri, 2016-12-05) -
Cyber international relations as an integrated system
(© Springer Science+Business Media, LLC, 2017-11-17)The purpose of this paper is to conceptualize the hitherto separate domains of Cyberspace and Interna- tional Relations into an integrated socio-technical system that we jointly call the cyber International Relations ...