Summary of Scholarly Works
Summary of scholarly works completed under Explorations in Cyber International Relations program listed by lead institution.
Type | Harvard University | MIT | Total |
Program Website | - | 1 | 1 |
Final Report | - | 1 | 1 |
Workshop Reports | - | 7 | 7 |
Books | 1 | 3 | 4 |
Book Chapters | 4 | 3 | 7 |
Theses | - | 11 | 11 |
Journal Articles | 15 | 15 | 30 |
Working Papers | 15 | 27 | 42 |
Online Articles | 22 | 1 | 23 |
Conference Proceedings | 3 | 32 | 35 |
Posters Sessions | 1 | 14 | 15 |
Grand Total | 61 | 115 | 176 |
List of Scholarly Works
List of scholarly works by scholars at MIT and Harvard University completed under Explorations in Cyber International Relations program (2009–2014). Research for publications dated 2015–2022 done during the program duration.
Program Website (1)
S.No. | Publication |
---|---|
1 | Choucri, N. (2020, September 21). Exploration in Cyber International Relations (ECIR) |
Final Report (1)
S.No. | Publication |
---|---|
1 | Choucri, N. (2015). Explorations in International Relations (Final Program Report ver. 1.2) |
Workshop Reports (7)
S.No. | Publication |
---|---|
1 | Choucri, N. (2014). Proceedings of the ECIR Workshop on "Cyber Security & the Governance Gap: Complexity, Contention, Cooperation |
2* | Deibert, R., Hurwitz, R. & Nye-Jr., J. S., (2014). Proceedings of the Cyber Norms Workshop 2014 |
3 | Choucri, N. (2012). Proceedings of the ECIR Workshop on "Who Controls Cyberspace? A Puzzle for National Security and International Relations |
4* | Deibert, R., Hurwitz, R. & Nye-Jr., J. S., (2012). Proceedings of the Cyber Norms Workshop 2012 |
5 | Choucri, N. (2011). Proceedings of the ECIR Workshop on "People, Power and CyberPolitics |
6* | Hurwitz, R. & Nye-Jr., J. S., (2011). Proceedings of the Cyber Norms Workshop 2011 |
7* | Choucri, N. (2010). Proceedings of the ECIR Workshop on "Cyber International Relations: Emergent Realities of Conflict and Cooperation |
Books (4)
S.No. | Publication |
---|---|
1 | Choucri, N., & Clark, D. D. (2019). International relations in the cyber age: The co-evolution dilemma |
2 | 2. Clark, D. D. (2018). Designing an Internet |
3 | 3. Choucri, N. (2012). Cyberpolitics in international relations |
4 | 4. Clarke, R. A., & Knake, R. (2010). Cyber war: The next threat to national security and what to do about it |
Book Chapters (7)
S.No. | Publication |
---|---|
1 | Choucri, N. (2016). Emerging trends in cyberspace: Dimensions and dilemmas |
2 | Choucri, N. (2014). Cyberpolitics |
3* | Kello, L. (2014). Security |
4 | Hurwitz, R. (2013). A new normal? The cultivation of global norms as part of a cyber security strategy |
5* | Hathaway, M. E. (2012). Falling prey to cybercrime: Implications for business and the economy |
6* | Hathaway, M. E., & Klimburg, A. (2012). Preliminary considerations: On national cyber security |
7* | Nye Jr., J. S. (2011). Soft power |
Theses (11)
S.No. | Publication |
---|---|
1. | Sowell, J. H. (2015). Finding order in a contentious Internet |
2. | Salim, H. M. (2014). Cyber safety: A systems thinking and systems theory approach to managing cyber security risks |
3. | Cho, Y. (2012). Strategic philanthropy for cyber security: An extended cost-benefit analysis framework to study cybersecurity |
4. | Fay, M. P. (2012). Enabling imagination through story alignment |
5. | Finlayson, M. (2012). Learning narrative structure from annotated folktales |
6. | Krakauer, C. E. (2012). Story retrieval and comparison using concept patterns |
7. | Wolff, J. C. P. (2012). Unraveling internet identities: Accountability & anonymity at the application layer |
8. | Low, H. W. C.-IV. (2011). Story understanding in Genesis: Exploring automatic plot construction through commonsense reasoning |
9. | Agarwal, G. (2010). A matrix based integrated framework for multi disciplinary exploration of cyber-international relations |
10. | Camiña, S. (2010). A comparison of taxonomy generation techniques using bibliometric methods: Applied to research strategy formulation |
11. | Nackoul, D. D. (2010). Text to Text: plot unit searches generated from English |
Journal Articles (30)
S.No. | Publication |
---|---|
1. | Chen, J., & Micali, S. (2016). Leveraging possibilistic beliefs in unrestricted combinatorial auctions |
2. | Choucri, N. (2016). Introduction |
3. | Ramirez, R., & Choucri, N. (2016). Improving interdisciplinary communication with standardized cyber security terminology: A literature review |
4. | Chen, J., Micali, S., & Pass, R. (2015). Tight revenue bounds with possibilistic beliefs and level-k rationality |
5. | Choucri, N., Madnick, S., & Ferwerda, J. (2014). Institutions for cyber security: International responses and global imperatives |
6.* | Ellis, R. (2014). Regulating cybersecurity: Institutional learning or a lesson in futility? |
7. | Chen, J., & Micali, S. (2013). The order independence of iterated dominance in extensive games |
8. | Choucri, N. (2013). Cyberpolitics in international relations |
9. | Choucri, N., & Clark, D. D. (2013). Who controls cyberspace? |
10.* | Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft |
11.* | Kello, L. (2013). The skeptics misconstrue the cyber revolution (response to Essay 17) |
12. | Vaishnav, C., Choucri, N., & Clark, D. D. (2013). Cyber international relations as an integrated system |
13. | Chen, J., & Micali, S. (2012). Collusive dominant-strategy truthfulness |
14. | Choucri, N., & Goldsmith, D. (2012). Lost in cyberspace: Harnessing the Internet, international relations, and global security |
15.* | Hathaway, M. E. (2012). Internet service providers are the front line of cyber-defence |
16.* | Hathaway, M. E. (2012). Leadership and responsibility for cybersecurity |
17.* | Hill, J. F. (2012). A Balkanized Internet?: The uncertain future of global Internet standards |
18. | Hurwitz, R. (2012). Depleted trust in the cyber commons |
19.* | Mohan, V., & Willasenor, J. (2012). Decrypting the fifth amendment: The limits of self-incrimination in the digital era |
20.* | Nye Jr., J. S. (2012). The twenty-first century will not be a “post-American” world |
21. | Winston, P. H. (2012). The next 50 years: A personal view |
22. | Winston, P. H. (2012). The right way |
23. | Clark, D. D. (2011). Introduction |
24.* | Hathaway, M. E. (2011). Creating the demand curve for cybersecurity |
25.* | Nye Jr., J. S. (2011). Nuclear lessons for cyber security? |
26.* | Nye Jr., J. S., & Goldsmith, J. L. (2011). The future of power |
27.* | Odumosu, T., & Narayanamurti, V. (2011). Towards a common wireless market: Why the FCC should promote a single interoperable technological market for mobile devices |
28.* | Hathaway, M. E. (2010). Power hackers |
29.* | Zittrain, J. (2010). The fourth quadrant |
30.* | Clarke, R. (2009). War from cyberspace |
Working Papers (42)
S.No. | Publication |
---|---|
1. | Micali, S. (n.d). Fair electronic exchange with virtual trusted parties |
2. | Choucri, N., & Agarwal, G. (2016). The theory of lateral pressure highlights of quantification & empirical analysis |
3. | Choucri, N., & Jackson, C. (Eds.). (2015). Perspectives on cybersecurity: A collaborative study |
4. | Chen, J., Micali, S., & Pass, R. (2014). Possibilistic beliefs and higher-level rationality |
5. | Gamero-Garrido, A. (2014). Cyber conflicts in international relations: Framework and case studies |
6. | Testart, C. (2014). Understanding ICANN’s complexity in a growing and changing Internet |
7. | Micali, S., Choucri, N., Chen, J., & Williams, C. (2013). Resilient mechanism design foundations for governance of cyberspace: Exploration in theory, strategy, and policy |
8.* | Narayanamurti, V., Odumosu, T., & Vinsel, L. (2013). The discovery-invention cycle: Bridging the basic/applied dichotomy |
9. | Rady, M. (2013). Anonymity networks: New platforms for conflict and contention |
10.* | Belk, R., & Matthew, N. (2012). On the use of offensive cyber capabilities: A policy analysis on offensive US cyber policy |
11. | Chiesa, A., Micali, S., & Zhu, Z. A. (2012). Knightian auctions |
12. | Cho, Y. (2012). Lessons for cyber security international cooperation (ECIR Working Paper No. 2012-5). MIT Political Science Department. |
13. | Choucri, N., & Clark, D. D. (2012). Integrating cyberspace and international relations: The co-evolution dilemma |
14. | Choucri, N., Elbait, G. D., Madnick, S. E. (2012). What is cybersecurity? Explorations in automated knowledge generation |
15. | Goldsmith, D., & Siegal, M. (2012). Systematic approaches to cyber insecurity |
16.* | Hathaway, M. E., & Savage, J. E. (2012). Duties for Internet service providers |
17.* | Hill, J. F. (2012). Internet fragmentation: Highlighting the major technical, governance and diplomatic challenges for US policy makers |
18. | Hung, S. (2012). The Chinese Internet: Control through the layers |
19.* | Mohan, V. (2012). Cloud and mobile privacy: The Electronic Communications Privacy Act |
20.* | Sechrist, M. (2012). New threats, old technology: Vulnerabilities in undersea communication cable network management systems |
21. | Camiña, S., Madnick, S., Choucri, N., & Woon, W. L. (2011). Exploring terms and taxonomies relating to the cyber international relations research field: Or are "cyberspace" and "cyber space" the same? |
22. | Clark, D. D. (2011). Three views of cyberspace |
23.* | Hathaway, M. E. (2011). Taking a byte out of cybercrime |
24.* | Maurer, T. (2011). Cyber norm emergence at the United Nations—An analysis of the UN's activities regarding cyber-security |
25.* | Maurer, T. (2011). WikiLeaks 2010: A glimpse of the future? |
26. | Williams, C. (2011). Applications of ECIR modeling work to cyber policy problems |
27.* | Amin, R. (2010). Controlling behavior - not arms: Moving forward on an international convention for cyberspace |
28. | Chen, J., Hassidim, A., & Micali, S. (2010). Resilient and virtually perfect revenue from perfectly informed players |
29. | Clark, D. D. (2010). Characterizing cyberspace: Past, present and future |
30. | Clark, D. D. (2010). Tools of engagement: Mapping the tussles in cyberspace |
31. | Goldsmith, D., & Siegal, M. (2010). Understanding cyber complexity: Systems modeling and the financial services sector |
32.* | Goldsmith, J. (2010). Cyberthreat, government network operations, and the fourth amendment |
33.* | Nye Jr., J. S. (2010). Cyber power |
34.* | Peritz, A., & Sechrist, M. (2010). Protecting cyberspace and the U.S. national interest |
35.* | Sechrist, M. (2010). Cyberspace in deep water: Protecting undersea communication cables by creating an international public-private partnership |
36. | Siegal, M., & Goldsmith, D. (2010). Simulation modeling for cyber resilience |
37. | Anderson, E., Choucri, N., Goldsmith D., Madnick, S. E., Siegel, M., & Sturtevant, D. (2009). System dynamics modeling for pro-active intelligence |
38. | Chen, J., & Micali, S. (2009). Rational robustness for mechanism design |
39. | Clark, D. D. (2009). The expressive power of the Internet design |
40. | Clark, D. D. (2009). Toward the design of a future Internet |
41.* | Hathaway, M. E. (2009). Strategic advantage: Why America should care about cybersecurity |
42. | Madnick, S., Choucri, N., Camiña, S., Fogg, E., Li, X., & Wei, F. (2009). Explorations in cyber international relations (ECIR)—data dashboard report #1: CERT data sources and prototype dashboard system |
Online Articles (23)
S.No. | Publication |
---|---|
1.* | Branscomb, L., and Ryan E. (2013, June 13). Dangerous Cargo: Action Needed on Hazardous Materials |
2.* | Ellis, R. (2013, July 24). Protecting US critical infrastructure: One step forward for cybersecurity, one back? |
3.* | Ellis, R. (2013, March 13). Cyber Security: Defense and intelligence |
4.* | Mohan, V. (2013, April 12). Why the government matters: A primer for data-minded entrepreneurs |
5.* | Mohan, V. (2013, March 8). Scaling the great firewall |
6.* | Mohan, V. (2013, May 15). Privacy consciousness in the big data era |
7.* | Smith, J. F. (2013, Summer). Confronting complex cybersecurity challenges |
8. | Choucri, N. (2012, April 20). The convergence of cyberspace and sustainability |
9.* | Mohan, V. (2012, December 7). Nothing to see here |
10.* | Nye Jr., J. S. (2012, April 10). Cyber war and peace |
11.* | Odumosu, T. (2012, December 31). Technological somnambulism revisited: Sleeping through the new invisible surveillance technologies |
12.* | Tumin, Z. (2012, June 27). Running Al Qaeda |
13.* | Tumin, Z. & William B. (2012, April 12). Viral by design: Teams in the networked world |
14.* | Clarke R. (2011, June 15). China's cyberassault on America |
15.* | Clarke, R. (2011, July 31). The coming cyber wars: Obama’s cyber strategy is missing the strategy |
16.* | Hathaway, M. E. (2011, January 14). Regulators can help Obama secure IT |
17.* | Hathaway, M. E. (2011, November). NATO and the EU in cyberspace: The power of both for the good of all |
18.* | Hathaway, M. E. (2011, September 18). Dim prospects for cybersecurity law in 2011 |
19.* | Nye Jr., J. S. (2011, February 27). Cyberspace wars |
20.* | Nye Jr., J. S. (2011, February 9). Power and information in Egypt - and beyond |
21.* | Zittrain, J. (2011, March 1). Freedom and anonymity: Keeping the Internet open |
22.* | Zittrain, J. (2010, December 2). An impenetrable web of fees (part of Who gets priority on the web?) |
23.* | Zittrain, J., & Sauter, M. (2010, December 9). Everything you need to know about Wikileaks |
Conference Proceedings (35)
S.No. | Publication |
---|---|
1. | Basuchoudhary, A., & Choucri, N. (2014). The evolution of network based cybersecurity norms: An analytical narrative |
2. | Houghton, J., Siegel, M., Wirsch, A., Moulton, A., Madnick, S., & Goldsmith, D. (2014). A survey of methods for data inclusion in system dynamics models: Methods, tools and applications |
3.* | Abbassi, P., Kaul, M., Mohan, V., Shen, Y., and Winkelman, Z. (2013). Securing the net: Global governance in the digital domain |
4. | Choucri, N. (2013, October 13–15). Co-evolution of cyberspace and international relations: New challenges for the social sciences |
5. | Houghton, J., Siegel, M., & Goldsmith, D. (2013). Modeling the influence of narratives on collective behavior |
6. | Wolff, J., Young, W. E., & Smith, E. (2013). Cyber 9/12 student challenge |
7. | Azar, P. D., & Micali, S. (2012). Rational proofs |
8. | Clark, D. D. (2012). Control point analysis |
9. | Finlayson, M. A. (2012). Sets of signals, information flow, and folktales |
10. | Goldsmith, D., & Siegel, M. (2012). Cyber politics: Understanding the use of social media for dissident movements in an integrated state stability framework |
11. | Hurwitz, R. (2012). Taking care: Four takes on the cyber steward |
12. | Hurwitz, R. (2012). The Budapest Conference on Cyberspace 2012, October 3–5, 2012 (Conference trip report). MIT Political Science Department. |
13.* | Kello, L. (2012, May 3). Cyber disorders: Rivalry & conflict in a global information age |
14. | Krakauer, C. E., & Winston, P. H. (2012). Story retrieval and comparison using concept patterns |
15. | Madnick, S., Camiña, S., Choucri, N., & Woon, W. L. (2012). Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same? |
16. | Reardon, R., & Choucri, N. (2012). The role of cyberspace in international relations: A view of the literature |
17. | Sechrist, M., Vaishnav, C., Goldsmith, D., & Choucri, N. (2012). The dynamics of undersea cables: Emerging opportunities and pitfalls |
18. | Shukla, A., & Hurwitz, R. (2012, April 1–4). A framework for organizing national security strategies |
19. | Sowell, J. H. (2012, June 4). A view of top-down internet governance |
20. | Sowell, J. H. (2012). Empirical studies of bottom-up internet governance |
21. | Vaishnav, C., Choucri, N., & Clark, D. D. (2012). Cyber international relations as an integrated system |
22. | Chen, J., & Micali, S. (2011). Mechanism design with set-theoretic beliefs |
23. | Finlayson, M. A. (2011). Corpus annotation in service of intelligent narrative technologies |
24. | Finlayson, M. A. (2011). The Story workbench: An extensible semi-automatic text annotation tool |
25. | Hurwitz, R., & Winston, P. H. (2011). Computational representations of high profile international cyber incidents |
26. | Madnick, S., Choucri, N., Li, X., & Ferwerda, J. (2011). Comparative analysis of cybersecurity metrics to develop new hypotheses |
27. | Mallery, J. C. (2011, November 29). International data exchange and a trustworthy host: Focal areas for international collaboration in research and education |
28. | Mallery, J. C. (2011). Trustworthy cloud computing: Risks, challenges and recommendations |
29. | Winston, P. H. (2011). The strong story hypothesis and the directed perception hypothesis |
30. | Clark, D. D., & Landau, S. (2010). The problem isn't attribution: It's multi-stage attacks |
31. | Clark, D. D., & Landau, S. (2010). Untangling attribution |
32.* | Friedman, A., Moore, T., & Procaccia, A. D. (2010). Would a ‘cyber warrior’ protect us? Exploring trade-offs between attack and defense of information systems |
33. | Hervás, R., & Finlayson, M. A. (2010). The prevalence of descriptive referring expressions in news and narrative |
34. | Sowell, J. H. (2010). Mixed context and privacy |
35. | Madnick, S., Xitong, L., & Choucri, N. (2009). Experiences and challenges with using CERT data to analyze international cyber security |
Posters (15)
S.No. | Publication |
---|---|
1. | Rady, M. (2014, January 6–7). Design of action and alliance strategy in defense against anonymous cyber threats |
2. | Clark, D. D., & Hung, S. (2012, November 6–7). Diversity of user experience and alternative future internets |
3. | Houghton, J. (2012, November 6–7). When virtual issues become real world actions |
4. | Rady, M. (2012, November 6–7). Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR) |
5. | Sechrist, M., Vaishnav, C., Goldsmith, D., & Choucri, N. (2012, November 6–7). The dynamics of managing undersea cables: When solution becomes the problem |
6. | Shukla, A. (2012, November 6–7). Understanding "cyber conflict" |
7. | William, E. Y.-Jr. (2012, November 6–7). Cyber mission assurance using STPA |
8. | Wolff, J. (2012, November 6–7). Cyber defense resources & vulnerabilities |
9. | Elbait, G. D. (2011, December 7–8). Representing cyberspace using taxonomies and meta-data analysis |
10. | Finlayson, M. A. (2011, December 7–8). Learning legal principles to enable law at cyber speeds |
11. | Fisher, D., Madnick, S., Choucri, N., Li, X., & Ferwerda, J. (2011, December 7–8). Comparative analysis of cybersecurity metrics to develop new hypotheses |
12. | Reardon, R. (2011, December 7–8). Escalation management in cyber conflict: A research proposal |
13. | Sechrist, M. P., Vaishnav, C., & Goldsmith, D. (2011, December 7–8). The dynamics of managing undersea cables |
14. | Sowell, J. (2011, December 7–8). Finding order in a contentious Internet |
15. | Vaishnav, C. (2011, December 7–8). The Coordinates of cyber international relations |