Now showing items 1-19 of 19

    • Introduction 

      Clark, David D. (MIT Press / © David D. Clark, 2011-10-01)
    • The right way 

      Winston, Patrick Henry (© Cognitive Systems Foundation, 2012-01)
      I ask why humans are smarter than other primates, and I hypothesize that an important part of the answer lies in the Inner Language Hypothesis, a prerequisite to what I call the Strong Story Hypothesis, which holds that ...
    • Collusive dominant-strategy truthfulness 

      Chen, Jing; Micali, Silvio (© Elsevier B.V., 2012-01-17)
      We show that collusion and wrong beliefs may cause a dramatic efficiency loss in the Vickrey mechanism for auctioning a single good in limited supply. We thus put forward a new mechanism guaranteeing efficiency in a very ...
    • Lost in cyberspace: Harnessing the Internet, international relations, and global security 

      Choucri, Nazli; Goldsmith, Daniel (Sage Journals/© 2012 Nazli Choucri, & Daniel Goldsmith, 2012-03-01)
      Early in the twenty-first century, new, cyber-based threats to the well-being of individuals, economies, and societies added a new dimension to the well-understood threats of the twentieth century. For the first time in ...
    • The convergence of cyberspace and sustainability 

      Choucri, Nazli (© E-International Relations., 2012-04-20)
      This paper highlights the emerging synergy between cyberspace (a new arena of interaction) and sustainability (a new initiative on the global agenda), and their convergence on the global policy agenda. This convergence is ...
    • The next 50 years: A personal view 

      Winston, Patrick Henry (© Elsevier B.V., 2012-04-24)
      I review history, starting with Turing’s seminal paper, reaching back ultimately to when our species started to outperform other primates, searching for the questions that will help us develop a computational account of ...
    • Depleted trust in the cyber commons 

      Hurwitz, Roger (United States Air Force / © Roger Hurwitz, 2012-10-01)
    • The cultivation of global norms as part of a cyber security strategy 

      Hurwitz, Roger (© Informa UK Limited (trading as Taylor & Francis Group), 2013)
    • Cyberpolitics in international relations 

      Choucri, Nazli (© MIT Center for International Studies, 2013)
    • The order independence of iterated dominance in extensive games 

      Chen, Jing; Micali, Silvio (John Wiley & Sons, Inc./© Jing Chen, & Silvio Micali, 2013-01-22)
      Shimoji and Watson (1998) prove that a strategy of an extensive game is rationalizable in the sense of Pearce if and only if it survives the maximal elimination of conditionally dominated strategies. Briefly, this process ...
    • Who controls cyberspace? 

      Choucri, Nazli; Clark, David D. (Sage Journals/© Nazli Choucri, & David D. Clark, 2013-09-01)
      When Wikileaks released hundreds of thousands of Iraq War logs and diplomatic cables in 2010, a horrified US government sprang into action—but the classified information the government hoped to keep from public view quickly ...
    • Institutions for cyber security: International responses and global imperatives 

      Choucri, Nazli; Madnick, Stuart E.; Ferwerda, Jeremy (© Informa UK Limited (trading as Taylor & Francis Group), 2013-10-22)
      Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for ...
    • Cyberpolitics 

      Choucri, Nazli (© Oxford University Press, 2014-05-15)
    • Tight revenue bounds with possibilistic beliefs and level-k rationality 

      Chen, Jing; Micali, Silvio; Pass, Rafael (© The Econometric Society, 2015-07)
      Mechanism design enables a social planner to obtain a desired outcome by leveraging the players’ rationality and their beliefs. It is thus a fundamental, but yet unproven, intuition that the higher the level of rationality ...
    • Improving interdisciplinary communication with standardized cyber security terminology: A literature review 

      Ramirez, Robert; Choucri, Nazli (© IEEE, 2016-03-21)
      The growing demand for computer security, and the cyberization trend, are hallmarks of the 21st century. The rise in cyber-crime, digital currency, and e-governance has been well met by a corresponding recent jump in ...
    • Emerging trends in cyberspace: Dimensions and dilemmas 

      Choucri, Nazli (U.S. Army War College Press, 2016-08-01)
    • Leveraging possibilistic beliefs in unrestricted combinatorial auctions 

      Chen, Jing; Micali, Silvio (MDPI AG/© Jing Chen, & Silvio Micali, 2016-10-26)
      In unrestricted combinatorial auctions, we put forward a mechanism that guarantees a meaningful revenue benchmark based on the possibilistic beliefs that the players have about each other’s valuations. In essence, the ...
    • Introduction 

      Choucri, Nazli (H-Diplo | ISSF Roundtable Reviews/© Nazli Choucri, 2016-12-05)
    • Cyber international relations as an integrated system 

      Vaishnav, Chintan; Choucri, Nazli; Clark, David D. (© Springer Science+Business Media, LLC, 2017-11-17)
      The purpose of this paper is to conceptualize the hitherto separate domains of Cyberspace and Interna- tional Relations into an integrated socio-technical system that we jointly call the cyber International Relations ...