Publications

Summary of Scholarly Works

Summary of scholarly works completed under Explorations in Cyber International Relations program listed by lead institution.

Type Harvard University MIT Total
Program Website - 1 1
Final Report - 1 1
Workshop Reports - 7 7
Books 1 3 4
Book Chapters 4 3 7
Theses - 11 11
Journal Articles 15 15 30
Working Papers 15 27 42
Online Articles 22 1 23
Conference Proceedings 3 32 35
Posters Sessions 1 14 15
Grand Total 61 115 176

List of Scholarly Works

List of scholarly works by scholars at MIT and Harvard University completed under Explorations in Cyber International Relations program (2009–2014). Research for publications dated 2015–2022 done during the program duration.

Program Website (1)

S.No. Publication
1 Choucri, N. (2020, September 21). Exploration in Cyber International Relations (ECIR) (Website). Massachusetts Institute of Technology.
 link to an external website.

Final Report (1)

S.No. Publication
1 Choucri, N. (2015). Explorations in International Relations (Final Program Report ver. 1.2). MIT Political Science Department.
 link to the article hosted on DSpace@MIT.

Workshop Reports (7)

S.No. Publication
1 Choucri, N. (2014). Proceedings of the ECIR Workshop on "Cyber Security & the Governance Gap: Complexity, Contention, Cooperation," January 6–7, 2014, MIT, Cambridge, MA. MIT Political Science Department.
2* Deibert, R., Hurwitz, R. & Nye-Jr., J. S., (2014). Proceedings of the Cyber Norms Workshop 2014, April 7–8, 2014, MIT, Cambridge, MA.
3 Choucri, N. (2012). Proceedings of the ECIR Workshop on "Who Controls Cyberspace? A Puzzle for National Security and International Relations," November 6–7, 2012, MIT, Cambridge, MA. MIT Political Science Department.
4* Deibert, R., Hurwitz, R. & Nye-Jr., J. S., (2012). Proceedings of the Cyber Norms Workshop 2012, September 12–14, 2012, MIT, Cambridge, MA.
5 Choucri, N. (2011). Proceedings of the ECIR Workshop on "People, Power and CyberPolitics," December 7–8, 2011, MIT, Cambridge, MA. MIT Political Science Department.
6* Hurwitz, R. & Nye-Jr., J. S., (2011). Proceedings of the Cyber Norms Workshop 2011, October 19–21, 2011, MIT, Cambridge, MA.
7* Choucri, N. (2010). Proceedings of the ECIR Workshop on "Cyber International Relations: Emergent Realities of Conflict and Cooperation," October 13–14, 2010, MIT, Cambridge, MA. MIT Political Science Department.
link to the article hosted on DSpace@MIT. * link takes to the publisher's website or online catalogue.

Books (4)

S.No. Publication
1 Choucri, N., & Clark, D. D. (2019). International relations in the cyber age: The co-evolution dilemma. MIT Press.
2 2. Clark, D. D. (2018). Designing an Internet. MIT Press.
3 3. Choucri, N. (2012). Cyberpolitics in international relations. MIT Press.
4 4. Clarke, R. A., & Knake, R. (2010). Cyber war: The next threat to national security and what to do about it. Harper Collins.
 link takes to the publisher's website or online catalogue.

Book Chapters (7)

S.No. Publication
1 Choucri, N. (2016). Emerging trends in cyberspace: Dimensions and dilemmas. In P. Williams, & D. Fiddner (Eds.), Cyberspace: Malevolent actors, criminal opportunities, and strategic competition (pp. 53–74). U.S. Army War College Press.
2 Choucri, N. (2014). Cyberpolitics. In J. Krieger (Ed.), The Oxford companion to international relations (pp 267–271). Oxford University Press. 
3* Kello, L. (2014). Security. In J. Krieger (Ed.), The Oxford companion to international relations. Oxford University Press.
4 Hurwitz, R. (2013). A new normal? The cultivation of global norms as part of a cyber security strategy. In P. A. Yannakogeorgos, & A. Lowther (Eds.), Conflict and cooperation in cyberspace: The challenge to national security (pp. 233–264). CRC Press.
5* Hathaway, M. E. (2012). Falling prey to cybercrime: Implications for business and the economy. In R. N. Burns, J. Price, J. S. Nye Jr., B. Scowcroft (Eds.), Securing cyberspace: A new domain for national security. Aspen Institute.
6* Hathaway, M. E., & Klimburg, A. (2012). Preliminary considerations: On national cyber security. In A. Klimburg (Ed.), National cyber security framework manual (pp. 1–43). NATO Cooperative Cyber Defense Center of Excellence.
7* Nye Jr., J. S. (2011). Soft power. In J. S. Nye Jr., The future of power (pp. 81–109). PublicAffairs.
link to the article hosted on DSpace@MIT. * link takes to the publisher's website or online catalogue.

Theses (11)

S.No. Publication
1. Sowell, J. H. (2015). Finding order in a contentious Internet [Ph. D thesis, Engineering Systems Division]. Massachusetts Institute of Technology. 
2. Salim, H. M. (2014). Cyber safety: A systems thinking and systems theory approach to managing cyber security risks [S.M. thesis, System Design and Management Program]. Massachusetts Institute of Technology. 
3. Cho, Y. (2012). Strategic philanthropy for cyber security: An extended cost-benefit analysis framework to study cybersecurity [S.M. thesis, Engineering Systems Division]. Massachusetts Institute of Technology. 
4. Fay, M. P. (2012). Enabling imagination through story alignment [S.M. thesis, Dept. of Electrical Engineering and Computer Science]. Massachusetts Institute of Technology. 
5. Finlayson, M. (2012). Learning narrative structure from annotated folktales [Ph. D thesis, Dept. of Electrical Engineering and Computer Science]. Massachusetts Institute of Technology. 
6. Krakauer, C. E. (2012). Story retrieval and comparison using concept patterns [M. Eng. thesis, Dept. of Electrical Engineering and Computer Science]. Massachusetts Institute of Technology. 
7. Wolff, J. C. P. (2012). Unraveling internet identities: Accountability & anonymity at the application layer [Ph. D thesis, Engineering Systems Division]. Massachusetts Institute of Technology. 
8. Low, H. W. C.-IV. (2011). Story understanding in Genesis: Exploring automatic plot construction through commonsense reasoning [M. Eng. thesis, Dept. of Electrical Engineering and Computer Science]. Massachusetts Institute of Technology. 
9. Agarwal, G. (2010). A matrix based integrated framework for multi disciplinary exploration of cyber-international relations [S.M. thesis, System Design and Management Program]. Massachusetts Institute of Technology. 
10. Camiña, S. (2010). A comparison of taxonomy generation techniques using bibliometric methods: Applied to research strategy formulation [M. Eng. thesis, Dept. of Electrical Engineering and Computer Science]. Massachusetts Institute of Technology. 
11. Nackoul, D. D. (2010). Text to Text: plot unit searches generated from English [M. Eng. thesis, Dept. of Electrical Engineering and Computer Science]. Massachusetts Institute of Technology. 
link to the article hosted on DSpace@MIT. * link takes to the publisher's website or online catalogue.

Journal Articles (30)

S.No. Publication
1. Chen, J., & Micali, S. (2016). Leveraging possibilistic beliefs in unrestricted combinatorial auctions. Games, 7(4), 32–50.
2. Choucri, N. (2016). Introduction. H-Diplo | ISSF Roundtable Reviews, XI(7), 2–3.
3. Ramirez, R., & Choucri, N. (2016). Improving interdisciplinary communication with standardized cyber security terminology: A literature review. IEEE Access, 4, 2216–2243.
4. Chen, J., Micali, S., & Pass, R. (2015). Tight revenue bounds with possibilistic beliefs and level-k rationality. Econometrica, 83(4), 1619–1639.
5. Choucri, N., Madnick, S., & Ferwerda, J. (2014). Institutions for cyber security: International responses and global imperatives. Information Technology for Development, 20(2), 96–121.
6.* Ellis, R. (2014). Regulating cybersecurity: Institutional learning or a lesson in futility? IEEE Security & Privacy, 12(6), 48–54.
7. Chen, J., & Micali, S. (2013). The order independence of iterated dominance in extensive games. Theoretical Economics, 8(1), 125–163.
8. Choucri, N. (2013). Cyberpolitics in international relations. précis, Spring 2013, 6–10, & 28.
9. Choucri, N., & Clark, D. D. (2013). Who controls cyberspace? Bulletin of the Atomic Scientists, 69(5), 21–31.
10.* Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, 38(2), 7–40.
11.* Kello, L. (2013). The skeptics misconstrue the cyber revolution (response to Essay 17). H-Diplo/ISSF.
12. Vaishnav, C., Choucri, N., & Clark, D. D. (2013). Cyber international relations as an integrated system. Environment Systems & Decisions, 33(4), 561–576.
13. Chen, J., & Micali, S. (2012). Collusive dominant-strategy truthfulness. Journal of Economic Theory, 147(3), 1300–1312.
14. Choucri, N., & Goldsmith, D. (2012). Lost in cyberspace: Harnessing the Internet, international relations, and global security. Bulletin of the Atomic Scientists, 68(2), 70–77.
15.* Hathaway, M. E. (2012). Internet service providers are the front line of cyber-defence. Europe'sWorld, 49–50.
16.* Hathaway, M. E. (2012). Leadership and responsibility for cybersecurity. Georgetown Journal of International Affairs, 71–80.
17.* Hill, J. F. (2012). A Balkanized Internet?: The uncertain future of global Internet standards. Georgetown Journal of International Affairs, 49–58.
18. Hurwitz, R. (2012). Depleted trust in the cyber commons. Strategic Studies Quarterly, 6(3), 20–45.
19.* Mohan, V., & Willasenor, J. (2012). Decrypting the fifth amendment: The limits of self-incrimination in the digital era. University of Pennsylvania Journal of Constitutional Law Heightened Scrutiny, 15, 11–28.
20.* Nye Jr., J. S. (2012). The twenty-first century will not be a “post-American” world. International Studies Quarterly, 56(1), 215–217.
21. Winston, P. H. (2012). The next 50 years: A personal view. Biologically Inspired Cognitive Architectures, 1 (July 2012), 92–99.
22. Winston, P. H. (2012). The right way. Advances in Cognitive Systems, 1, 23–36.
23. Clark, D. D. (2011). Introduction. Daedalus, 140(4), 5–16.
24.* Hathaway, M. E. (2011). Creating the demand curve for cybersecurity. Georgetown Journal of International Affairs, 163–170.
25.* Nye Jr., J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly, 5(4), 18–38.
26.* Nye Jr., J. S., & Goldsmith, J. L. (2011). The future of power. Bulletin of the American Academy of Arts and Sciences, lxiv(3), 45–52.
27.* Odumosu, T., & Narayanamurti, V. (2011). Towards a common wireless market: Why the FCC should promote a single interoperable technological market for mobile devices. Issues in Science and Technology, 28(2), 23–25.
28.* Hathaway, M. E. (2010). Power hackers. Scientific American, 303(4), 16–17.
29.* Zittrain, J. (2010). The fourth quadrant. Fordham Law Review, 78(6), 2767–2782.
30.* Clarke, R. (2009). War from cyberspace. National Interest, 104, 31–36.
link to the article hosted on DSpace@MIT. * link takes to the publisher's website or online catalogue.

Working Papers (42)

S.No. Publication
1. Micali, S. (n.d). Fair electronic exchange with virtual trusted parties (ECIR Working Paper No. n.d.-1). MIT Political Science Department.
2. Choucri, N., & Agarwal, G. (2016). The theory of lateral pressure highlights of quantification & empirical analysis (ECIR Working Paper No. 2016-2). MIT Political Science Department.
3. Choucri, N., & Jackson, C. (Eds.). (2015). Perspectives on cybersecurity: A collaborative study (ECIR Working Paper No. 2015-1). MIT Political Science Department.
4. Chen, J., Micali, S., & Pass, R. (2014). Possibilistic beliefs and higher-level rationality (ECIR Working Paper No. 2014-1). MIT Political Science Department.
5. Gamero-Garrido, A. (2014). Cyber conflicts in international relations: Framework and case studies (ECIR Working Paper No. 2014-2). MIT Political Science Department.
6. Testart, C. (2014). Understanding ICANN’s complexity in a growing and changing Internet (ECIR Working Paper No. 2014-3). MIT Political Science Department.
7. Micali, S., Choucri, N., Chen, J., & Williams, C. (2013). Resilient mechanism design foundations for governance of cyberspace: Exploration in theory, strategy, and policy (ECIR Working Paper No. 2013-2). MIT Political Science Department.
8.* Narayanamurti, V., Odumosu, T., & Vinsel, L. (2013). The discovery-invention cycle: Bridging the basic/applied dichotomy (Discussion Paper 2013-02). Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School.
9. Rady, M. (2013). Anonymity networks: New platforms for conflict and contention (ECIR Working Paper No. 2013-2). MIT Political Science Department.
10.* Belk, R., & Matthew, N. (2012). On the use of offensive cyber capabilities: A policy analysis on offensive US cyber policy (Paper). Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School.
11. Chiesa, A., Micali, S., & Zhu, Z. A. (2012). Knightian auctions (ECIR Working Paper No. 2012-1). MIT Political Science Department.
12. Cho, Y. (2012). Lessons for cyber security international cooperation (ECIR Working Paper No. 2012-5). MIT Political Science Department.
13. Choucri, N., & Clark, D. D. (2012). Integrating cyberspace and international relations: The co-evolution dilemma (ECIR Working Paper No. 2012-3). MIT Political Science Department.
14. Choucri, N., Elbait, G. D., Madnick, S. E. (2012). What is cybersecurity? Explorations in automated knowledge generation (ECIR Working Paper No. 2012-4). MIT Political Science Department.
15. Goldsmith, D., & Siegal, M. (2012). Systematic approaches to cyber insecurity (ECIR Working Paper No. 2012-5). MIT Political Science Department.
16.* Hathaway, M. E., & Savage, J. E. (2012). Duties for Internet service providers (Paper). Munk School of Global Affairs, University of Toronto.
17.* Hill, J. F. (2012). Internet fragmentation: Highlighting the major technical, governance and diplomatic challenges for US policy makers (Paper). Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School.
18. Hung, S. (2012). The Chinese Internet: Control through the layers (ECIR Working Paper No. 2012-2). MIT Political Science Department.
19.* Mohan, V. (2012). Cloud and mobile privacy: The Electronic Communications Privacy Act (Discussion Paper, 2012-02). Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School.
20.* Sechrist, M. (2012). New threats, old technology: Vulnerabilities in undersea communication cable network management systems (Discussion Paper, 2012-03). Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School.
21. Camiña, S., Madnick, S., Choucri, N., & Woon, W. L. (2011). Exploring terms and taxonomies relating to the cyber international relations research field: Or are "cyberspace" and "cyber space" the same? (ECIR Working Paper No. 2011-3). MIT Political Science Department.
22. Clark, D. D. (2011). Three views of cyberspace (ECIR Working Paper No. 2011-1). MIT Political Science Department.
23.* Hathaway, M. E. (2011). Taking a byte out of cybercrime (Paper). Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School.
24.* Maurer, T. (2011). Cyber norm emergence at the United Nations—An analysis of the UN's activities regarding cyber-security (Discussion Paper, 2011-11). Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School.
25.* Maurer, T. (2011). WikiLeaks 2010: A glimpse of the future? (Discussion Paper, 2011-12). Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School. 
26. Williams, C. (2011). Applications of ECIR modeling work to cyber policy problems (ECIR Working Paper No. 2011-2). MIT Political Science Department.
27.* Amin, R. (2010). Controlling behavior - not arms: Moving forward on an international convention for cyberspace (Paper). Belfer Center for Science and International Affairs, Harvard Kennedy School.
28. Chen, J., Hassidim, A., & Micali, S. (2010). Resilient and virtually perfect revenue from perfectly informed players (ECIR Working Paper No. 2010-1). MIT Political Science Department.
29. Clark, D. D. (2010). Characterizing cyberspace: Past, present and future (ECIR Working Paper No. 2010-3). MIT Political Science Department.
30. Clark, D. D. (2010). Tools of engagement: Mapping the tussles in cyberspace (ECIR Working Paper No. 2010-4). MIT Political Science Department. 
31. Goldsmith, D., & Siegal, M. (2010). Understanding cyber complexity: Systems modeling and the financial services sector (ECIR Working Paper No. 2010-2). MIT Political Science Department.
32.* Goldsmith, J. (2010). Cyberthreat, government network operations, and the fourth amendment. Government Studies at The Brookings Institute.
33.* Nye Jr., J. S. (2010). Cyber power (Paper). Belfer Center for Science and International Affairs, Harvard Kennedy School.
34.* Peritz, A., & Sechrist, M. (2010). Protecting cyberspace and the U.S. national interest (Discussion Paper). Belfer Center for Science and International Affairs, Harvard Kennedy School.
35.* Sechrist, M. (2010). Cyberspace in deep water: Protecting undersea communication cables by creating an international public-private partnership. Belfer Center for Science and International Affairs, Harvard Kennedy School.
36. Siegal, M., & Goldsmith, D. (2010). Simulation modeling for cyber resilience (ECIR Working Paper No. 2010-5). MIT Political Science Department.
37. Anderson, E., Choucri, N., Goldsmith D., Madnick, S. E., Siegel, M., & Sturtevant, D. (2009). System dynamics modeling for pro-active intelligence (ECIR Working Paper No. 2009-4). MIT Political Science Department.
38. Chen, J., & Micali, S. (2009). Rational robustness for mechanism design (ECIR Working Paper No. 2009-5, first draft). MIT Political Science Department.
39. Clark, D. D. (2009). The expressive power of the Internet design (ECIR Working Paper No. 2009-1). MIT Political Science Department.
40. Clark, D. D. (2009). Toward the design of a future Internet (ECIR Working Paper No. 2009-3). MIT Political Science Department.
41.* Hathaway, M. E. (2009). Strategic advantage: Why America should care about cybersecurity (Discussion Paper, 2009-12). Belfer Center for Science and International Affairs, Harvard Kennedy School.
42. Madnick, S., Choucri, N., Camiña, S., Fogg, E., Li, X., & Wei, F. (2009). Explorations in cyber international relations (ECIR)—data dashboard report #1: CERT data sources and prototype dashboard system (ECIR Working Paper No. 2009-2). MIT Political Science Department.
link to the article hosted on DSpace@MIT. * link takes to the publisher's website or online catalogue.

Online Articles (23)

S.No. Publication
1.* Branscomb, L., and Ryan E. (2013, June 13). Dangerous Cargo: Action Needed on Hazardous Materials. Power & Policy Blog. Belfer Center for Science and International Affairs, Harvard Kennedy School.
2.* Ellis, R. (2013, July 24). Protecting US critical infrastructure: One step forward for cybersecurity, one back? Technology+Policy.
3.* Ellis, R. (2013, March 13). Cyber Security: Defense and intelligence [Projects Podcast]. Defense and Intelligence Projects, Science, Technology, and Public Policy Program. Belfer Center for Science and International Affairs, Harvard Kennedy School.
4.* Mohan, V. (2013, April 12). Why the government matters: A primer for data-minded entrepreneurs. Hive.
5.* Mohan, V. (2013, March 8). Scaling the great firewall. The Indian Express.
6.* Mohan, V. (2013, May 15). Privacy consciousness in the big data era. Hive.
7.* Smith, J. F. (2013, Summer). Confronting complex cybersecurity challenges. Belfer Center Newsletter, Belfer Center for Science and International Affairs, Harvard Kennedy School.
8. Choucri, N. (2012, April 20). The convergence of cyberspace and sustainability. e-International Relations.
9.* Mohan, V. (2012, December 7). Nothing to see here. The Indian Express.
10.* Nye Jr., J. S. (2012, April 10). Cyber war and peace. Project Syndicate.
11.* Odumosu, T. (2012, December 31). Technological somnambulism revisited: Sleeping through the new invisible surveillance technologies. Vignettes @ STS.Next.20.
12.* Tumin, Z. (2012, June 27). Running Al Qaeda. Reuters Magazine.
13.* Tumin, Z. & William B. (2012, April 12). Viral by design: Teams in the networked world. Harvard Business Review.
14.* Clarke R. (2011, June 15). China's cyberassault on America. The Wall Street Journal.
15.* Clarke, R. (2011, July 31). The coming cyber wars: Obama’s cyber strategy is missing the strategy. The Boston Globe.
16.* Hathaway, M. E. (2011, January 14). Regulators can help Obama secure IT. inforisk Today.
17.* Hathaway, M. E. (2011, November). NATO and the EU in cyberspace: The power of both for the good of all. Security Europe.
18.* Hathaway, M. E. (2011, September 18). Dim prospects for cybersecurity law in 2011. GovInfoSecurity.com.
19.* Nye Jr., J. S. (2011, February 27). Cyberspace wars. The New York Times.
20.* Nye Jr., J. S. (2011, February 9). Power and information in Egypt - and beyond. Huffpost.
21.* Zittrain, J. (2011, March 1). Freedom and anonymity: Keeping the Internet open. Scientific American Magazine.
22.* Zittrain, J. (2010, December 2). An impenetrable web of fees (part of Who gets priority on the web?). The New York Times.
23.* Zittrain, J., & Sauter, M. (2010, December 9). Everything you need to know about Wikileaks. Technology Review.
link to the article hosted on DSpace@MIT. * link takes to the publisher's website or online catalogue.

Conference Proceedings (35)

S.No. Publication
1. Basuchoudhary, A., & Choucri, N. (2014). The evolution of network based cybersecurity norms: An analytical narrative. Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014), 646–653.
2. Houghton, J., Siegel, M., Wirsch, A., Moulton, A., Madnick, S., & Goldsmith, D. (2014). A survey of methods for data inclusion in system dynamics models: Methods, tools and applications. In Pål Davidsen, & Etiënne A. J. A. Rouwette (Eds.), Proceedings of the 32nd International Conference of the System Dynamics Society. System Dynamics Society.
3.* Abbassi, P., Kaul, M., Mohan, V., Shen, Y., and Winkelman, Z. (2013). Securing the net: Global governance in the digital domain (Report for Global Governance 2022).
4. Choucri, N. (2013, October 13–15). Co-evolution of cyberspace and international relations: New challenges for the social sciences [Conference session]. World Social Science Forum (WSSF) 2013 Montreal, Canada.
5. Houghton, J., Siegel, M., & Goldsmith, D. (2013). Modeling the influence of narratives on collective behavior. In R. Eberlein, & I. J. Martínez-Moyano (Eds.), Proceedings of the 31st International Conference of the System Dynamics Society. System Dynamics Society.
6. Wolff, J., Young, W. E., & Smith, E. (2013). Cyber 9/12 student challenge (Policy Brief). Atlantic Council’s Cyber Statecraft Initiative, Washington, D.C.
7. Azar, P. D., & Micali, S. (2012). Rational proofs. Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing (STOC '12), 1017–1028.
8. Clark, D. D. (2012). Control point analysis. Proceedings of 2012 TRPC Conference.
9. Finlayson, M. A. (2012). Sets of signals, information flow, and folktales. Proceedings of the 8th Turing Centenary conference on Computability in Europe: How The World Computes (CiE'12), 228–236. Springer-Verlag.
10. Goldsmith, D., & Siegel, M. (2012). Cyber politics: Understanding the use of social media for dissident movements in an integrated state stability framework. Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 1321–1328.
11. Hurwitz, R. (2012). Taking care: Four takes on the cyber steward. Proceedings of the CyberDialogue 2012: What is Stewardship in Cyberspace?
12. Hurwitz, R. (2012). The Budapest Conference on Cyberspace 2012, October 3–5, 2012 (Conference trip report). MIT Political Science Department.
13.* Kello, L. (2012, May 3). Cyber disorders: Rivalry & conflict in a global information age [Conference presentation]. Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School.
14. Krakauer, C. E., & Winston, P. H. (2012). Story retrieval and comparison using concept patterns. Proceedings of the 3rd International Workshop on Computational Models of Narrative (CMN'12), Turkey, 119–124.
15. Madnick, S., Camiña, S., Choucri, N., & Woon, W. L. (2012). Towards better understanding cybersecurity: Or are "cyberspace" and "cyber space" the same? Proceedings of the Workshop on Information Security & Privacy (WISP2012), 27.
16. Reardon, R., & Choucri, N. (2012). The role of cyberspace in international relations: A view of the literature. Proceedings of the 2012 ISA Annual Convention, San Diego, CA.
17. Sechrist, M., Vaishnav, C., Goldsmith, D., & Choucri, N. (2012). The dynamics of undersea cables: Emerging opportunities and pitfalls. In E. Husemann, & D. Lane (Eds.), Proceedings of the 30th International Conference of the System Dynamics Society. System Dynamics Society.
18. Shukla, A., & Hurwitz, R. (2012, April 1–4). A framework for organizing national security strategies [Paper presented to the panel]. Comparative Security Strategies at the International Studies Association Annual Meeting, San Diego, CA.
19. Sowell, J. H. (2012, June 4). A view of top-down internet governance [Conference presentation; video]. NANOG 55. Vancouver BC.
20. Sowell, J. H. (2012). Empirical studies of bottom-up internet governance. Proceedings of 2012 TRPC Conference.
21. Vaishnav, C., Choucri, N., & Clark, D. D. (2012). Cyber international relations as an integrated system. Proceedings of the Third International Engineering Symposium (CESUN 2012), Delft University of Technology.
22. Chen, J., & Micali, S. (2011). Mechanism design with set-theoretic beliefs. Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, 87–96.
23. Finlayson, M. A. (2011). Corpus annotation in service of intelligent narrative technologies. Proceedings of the “Intelligent Narrative Technologies” Workshop at the Seventh Artificial Intelligence and Interactive Digital Entertainment Conference (AIIDE-11), 17–20.
24. Finlayson, M. A. (2011). The Story workbench: An extensible semi-automatic text annotation tool. Proceedings of the “Intelligent Narrative Technologies” Workshop at the Seventh Artificial Intelligence and Interactive Digital Entertainment Conference (AIIDE-11), 21–24.
25. Hurwitz, R., & Winston, P. H. (2011). Computational representations of high profile international cyber incidents. Proceedings of the 2011 ISA Annual Convention.
26. Madnick, S., Choucri, N., Li, X., & Ferwerda, J. (2011). Comparative analysis of cybersecurity metrics to develop new hypotheses. Proceedings of the Workshop on Information Security & Privacy (WISP2011) (Jointly hosted by AIS SIGSEC and IFIP TC11.1), Shanghai, China.
27. Mallery, J. C. (2011, November 29). International data exchange and a trustworthy host: Focal areas for international collaboration in research and education [Keynote address]. Digital Ecosystems Network and Information Security and How International Cooperation Can Provide Mutual Benefits, BIC Annual Forum, Radisson Blu Royal Hôtel, Brussels.
28. Mallery, J. C. (2011). Trustworthy cloud computing: Risks, challenges and recommendations. 2011 Workshop on Cyber Security and Global Affairs. Budapest, Hungary.
29. Winston, P. H. (2011). The strong story hypothesis and the directed perception hypothesis. Proceedings of the AAAI Fall Symposium Series, 345–352.
30. Clark, D. D., & Landau, S. (2010). The problem isn't attribution: It's multi-stage attacks. Proceedings of the Re-Architecting the Internet Workshop (ReARCH '10), Article 11, 1–6.
31. Clark, D. D., & Landau, S. (2010). Untangling attribution. In National Research Council, Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy (pp. 25–40). National Research Council.
32.* Friedman, A., Moore, T., & Procaccia, A. D. (2010). Would a ‘cyber warrior’ protect us? Exploring trade-offs between attack and defense of information systems. Proceedings of the 2010 New Security Paradigms Workshop (pp. 85–94). Concord, MA.
33. Hervás, R., & Finlayson, M. A. (2010). The prevalence of descriptive referring expressions in news and narrative. Proceedings of the ACL 2010 Conference Short Papers, 49–54.
34. Sowell, J. H. (2010). Mixed context and privacy. Proceedings of 2010 TRPC Conference.
35. Madnick, S., Xitong, L., & Choucri, N. (2009). Experiences and challenges with using CERT data to analyze international cyber security. Proceedings of the AIS SIGSEC Workshop on Information Security & Privacy (WISP 2009). Phoenix, Arizona.
link to the article hosted on DSpace@MIT. * link takes to the publisher's website or online catalogue.

Posters (15)

S.No. Publication
1. Rady, M. (2014, January 6–7). Design of action and alliance strategy in defense against anonymous cyber threats [Poster session]. ECIR Workshop on "Cyber Security & the Governance Gap: Complexity, Contention, Cooperation," MIT, Cambridge, MA.
2. Clark, D. D., & Hung, S. (2012, November 6–7). Diversity of user experience and alternative future internets [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.
3. Houghton, J. (2012, November 6–7). When virtual issues become real world actions [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.
4. Rady, M. (2012, November 6–7). Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR) [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.
5. Sechrist, M., Vaishnav, C., Goldsmith, D., & Choucri, N. (2012, November 6–7). The dynamics of managing undersea cables: When solution becomes the problem [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.
6. Shukla, A. (2012, November 6–7). Understanding "cyber conflict" [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.
7. William, E. Y.-Jr. (2012, November 6–7). Cyber mission assurance using STPA [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.
8. Wolff, J. (2012, November 6–7). Cyber defense resources & vulnerabilities [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.
9. Elbait, G. D. (2011, December 7–8). Representing cyberspace using taxonomies and meta-data analysis [Poster session]. ECIR Workshop on "People, Power, and CyberPolitics," MIT, Cambridge, MA.
10. Finlayson, M. A. (2011, December 7–8). Learning legal principles to enable law at cyber speeds [Poster session]. ECIR Workshop on "People, Power, and CyberPolitics," MIT, Cambridge, MA.
11. Fisher, D., Madnick, S., Choucri, N., Li, X., & Ferwerda, J. (2011, December 7–8). Comparative analysis of cybersecurity metrics to develop new hypotheses [Poster session]. ECIR Workshop on "People, Power, and CyberPolitics," MIT, Cambridge, MA.
12. Reardon, R. (2011, December 7–8). Escalation management in cyber conflict: A research proposal [Poster session]. ECIR Workshop on "People, Power, and CyberPolitics," MIT, Cambridge, MA.
13. Sechrist, M. P., Vaishnav, C., & Goldsmith, D. (2011, December 7–8). The dynamics of managing undersea cables [Poster session]. ECIR Workshop on "People, Power, and CyberPolitics," MIT, Cambridge, MA.
14. Sowell, J. (2011, December 7–8). Finding order in a contentious Internet [Poster session]. ECIR Workshop on "People, Power, and CyberPolitics," MIT, Cambridge, MA.
15. Vaishnav, C. (2011, December 7–8). The Coordinates of cyber international relations [Poster session]. ECIR Workshop on "People, Power, and CyberPolitics," MIT, Cambridge, MA.
link to the article hosted on DSpace@MIT. * link takes to the publisher's website or online catalogue.