5. RESEARCH PAPERS

5.1 ECIR Research Papers - Massachusetts Institute of Technology.

1. Camiña, S., Madnick, S., Choucri, N., and Woon, W. L. (2011). Exploring Terms and Taxonomies Relating to the Cyber International Research Field: or are ‘Cyberspace’ and Cyber Space’ the same? CISL Working Paper No. 2011-03. pdf
2. Chiesa, A., Micali, S. and Zhu Z. A. (2012). Knightian Auctions. ECIR Working Paper. pdf
3. Cho, Y. (2012). Lessons for Cyber security international cooperation. ECIR Working Paper. n.a.
4. Cho, Y., (2012). Strategic Philanthropy for Cyber Security: An extended cost-benefit analysis framework to study cybersecurity. CISL Working Paper No. 2012-06. pdf
5. Choucri, N., and Agarwal, G. (2016). The Theory of Lateral Pressure Highlights of Quantification & Empirical Analysis. MIT Political Science Department Research Paper No. 2016-35. link pdf
6. Choucri, N., and Clark, D. D. (2012). Integrating Cyberspace and International Relations: The Co-Evolution Dilemma. MIT Political Science Department Research Paper No. 2012-29. link
7. Choucri, N., Elbait, G. D., and Madnick, S. (2012). What is Cybersecurity? Explorations in Automated Knowledge Generation. MIT Political Science Department Research Paper No. 2012-30.  link
8. Choucri, N., and Jackson, C. (Eds.). (2016). Perspectives on Cybersecurity: A Collaborative Study. MIT Political Science Department Research Paper No. 2016-2. link
9. Clark, D. D. (2009). The Expressive Power of the Internet. Working Paper. pdf
10. Clark, D. D. (2009). Toward the design of a Future Internet. Working Paper. pdf
11. Clark, D. D. (2010). Characterizing Cyberspace: Past, Present, and Future. ECIR Working Paper. pdf
12. Clark, D. D. (2010). Tools of engagement: mapping the tussles in cyberspace. ECIR Working Paper. pdf
13. Clark, D. D. (2011). Three Views of Cyberspace. ECIR Working Paper pdf
14. Clark, D. D. (2012). Control Point Analysis. ECIR Working Paper. link
15. Gamero-Garrido, A., (2014). Cyber Conflicts in International Relations: Framework and Case Studies. ECIR Working paper. pdf
16. Goldsmith, D., and Siegel, M. (2010). Understanding Cyber Complexity: Systems Modeling and the Financial Services Sector. ECIR Working Paper. pdf
17. Goldsmith, D., and Siegel, M. (2012). Systematic Approaches to Cyber Insecurity. ECIR Working Paper. pdf
18. Hung, S. (2012). The Chinese Internet: Control Through the Layers. ECIR Working Paper. pdf
19. Hurwitz, R. (2012). The Budapest Cyberspace Conference on Cyberspace 2012. Trip report: October 3 – 5, 2012. n.a.
20. Madnick, S., Choucri, N., Camiña, S., Fogg, E., and Xitong, L. (2009). Experiences and Challenges with Using CERT Data to Analyze International Cyber Security. MIT Sloan Research Paper No. 4759-09. link
21. Madnick, S., Woon, W. L., Henschel, A., Firat, A., Ziegler, B., Camiña, A., ... Dawelbait, G. (2011). Technology Forecasting Using Data Mining and Semantics: Third & Final Annual Report. CISL Working Paper No. 2011-01. pdf
22. Madnick, S., Choucri N., Xitong, L., and Ferwerda, J. (2011). Comparative Analysis of Cybersecurity Metrics to Develop New Hypotheses. CISL Working Paper No. 2011-08. pdf
23. Micali, S. (n.d.). Fair Electronic Exchange with Virtual Trusted Parties.  pdf
24. Micali, S., Chen, J., and Hassidim, A. (2013). Resilient and Virtually Perfect Revenue from Perfectly Informed Players. ECIR Working Paper. pdf
25. Micali, S., Choucri, N., Chen, J., and Williams, C. (2013). Resilient Mechanism Design Foundations for Governance of Cyberspace: Exploration in Theory, Strategy, and Policy. MIT Political Science Department Research Paper No. 2013-30. link
26. Rady, M. (2013). Anonymity Networks: New Platforms for Conflict and Contention. MIT Political Science Department Research Paper No. 2013-5. link
27. Siegel, M., and Goldsmith, G. (2010). Simulation Modeling for Cyber Resilience. ECIR Working Paper. pdf
28. Sowell, J. H. (2010). Mixed Context and Privacy. ECIR Working Paper. pdf
29. Testart, C. (2014). Understanding ICANN's complexity in a growing and changing Internet. Technology and Policy Program, Massachusetts Institute of Technology. ECIR Working Paper. pdf
30. Williams, C. (2010). Applications of ECIR Modeling Work to Cyber Policy Problems. ECIR Working Paper. pdf
31. Woon, W. L., Henschel, A. and Madnick, S. (2009). A Framework for Technology Forecasting and Visualization. MIT Sloan Research Paper No. 4757-09. link
32. Young, W. (2013). A System Safety Approach to Assuring Air Operations Against Cyberspace Disruptions. ECIR Working Paper. n.a.

 

5.2 ECIR Research Papers - Harvard Kennedy School.

1. Belk, R., and Matthew, N.  (2012). On the Use of Offensive Cyber Capabilities: A Policy Analysis on Offensive US Cyber Policy. Paper, Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
2. Hathaway, M. E. (2011). Taking a Byte Out of Cybercrime. Paper, Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
3. Hathaway, M. E. and Savage, J. E. (2012). Duties for Internet Service Providers. Paper, Munk School of Global Affairs, University of Toronto. link
4. Hathaway, M. E,. (2012). Strategic Advantage: Why America Should Care About Cybersecurity. Discussion Paper 2009-12, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
5. Hill, J. F. (2012). Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers. Paper, Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
6. Kello, L. (n.d.). Cyber Disorders: Rivalry & Conflict in a Global Information Age. Presentation, Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School. pdf
7. Maurer, T. (2011). Cyber Norm Emergence at the United Nations—An Analysis of the UN's Activities Regarding Cyber-security. Discussion Paper 2011-11, Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
8. Maurer, T. (2011). WikiLeaks 2010: A Glimpse of the Future? Discussion Paper 2011-12,” Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
9. Mohan, V. (2012). Cloud and Mobile Privacy: The Electronic Communications Privacy Act. Discussion Paper 2012-02, Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
10. Narayanamurti, V., Odumosu, T., and Vinsel, L. (2013). The Discovery-Invention Cycle: Bridging the Basic/Applied Dichotomy. Discussion Paper 2013-02, Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
11. Nye, J. S. (2010). Cyber Power. Paper, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
12. Ramtin, A. (2010). Controlling Behavior - Not Arms: Moving Forward on an International Convention for Cyberspace. Project Minerva Working Paper. pdf
13. Sechrist, M., and Peritz, A. (2010). Protecting Cyberspace and the U.S. National Interest. Discussion Paper, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
14. Sechrist, M. (2010). Cyberspace in Deep Water: Protecting Undersea Communication Cables by Creating an International Public-Private Partnership. Discussion Paper, Belfer Center for Science and International Affairs, Harvard Kennedy School. link
15. Sechrist, M. (2012). New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems. Discussion Paper 2012-03, Science, Technology, and Public Policy Program, Belfer Center for Science and International Affairs, Harvard Kennedy School. link