|
Home
About ECIR
Participants
Research
Working Papers
Seminars
Intranet
Events
2011 IAP Seminar: Explorations in Cyber International Relations
Contact
|
|
Research
- Overview Slides: Understanding the Dynamics of Cyber International Relations
Publications
- Clark, David and Susan Landau. “Untangling Attribution.” Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC:National Academies Press, 2010: 25-40.
- Clarke, Richard and Robert Knake. Cyber War: The Next Threat to National Security and What to Do About It. New York: Ecco, 2010.
- Clarke, Richard. “War From Cyberspace.” The National Interest. December 22, 2009.
- Finlayson, Mark A., Whitman Richards and Patrick Henry Winston. “Computational Models of Narrative: Review of a Workshop.” AI Magazine 31(2), 2010: 97-100.
- Goldsmith, Jack. “The Cyberthreat, Government Network Operations, and the Fourth Amendment.” Government Studies at The Brookings Institute, December 8, 2010.
- Hathaway, Melissa. “Power Hackers: The U.S. Smart Grid Is Shaping Up to be Dangerously Insecure.” Scientific American Magazine, October 5, 2010: 35.
- Hervás, Raquel and Mark Alan Finlayson. “The Prevalence of Descriptive Referring Expressions.” Proceedings of the ACL 2010 Conference Short Papers, pages 49–54, Uppsala, Sweden, 11-16 July 2010.
- Lazer, David, Ines Mergel and Allan Friedman. “Co-Citation of Prominent Social Network Articles in Sociology Journals: The Evolving Canon.” Connections 29 (2009): 1.
- Madnick, Stuart, Nazli Choucri, and Jeremy Ferwerda. “Institutional Foundations for Cyber Security: Current Responses and New Challenges.” Under review by Journal of Information Technology & Politics. September 2010.
- Madnick, Stuart, Xitong Li and Nazli Choucri. “Experiences and Challenges with using CERT Data to Analyze International Cyber Security.” Proceedings of the AIS SIGSEC Workshop on Information Security & Privacy (WISP 2009), Phoenix, Arizona, December 2009, pp. 6-16.
- Micali, Silvio, Chris Peikert, Madhu Sudan, and David A. Wilson. “Optimal Error Correction for Computationally Bounded Noise.” IEEE Transactions on Information Theory 56, no. 11 (November 2010): 5673-5680.
- Moore, Tyler, Allan Friedman and Ariel D. Procaccia. “Would a ‘Cyber Warrior’ Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems.” NSPW’ 10, September 21–23, 2010.
- Nye, Joseph S. The Future of Power. New York: Public Affairs Press, 2011.
- Zittrain, Jonathan. “The Fourth Quadrant.” Fordham Law Review 78 (2010): 101-109.
- Zittrain, Jonathan and Molly Sauter. “Everything You Need to Know About Wikileaks.” MIT Technology Review, December 9, 2010.
In the News
- Cyberspace Wars
- The New York Times, Feb. 27, 2011
Joseph Nye
- Freedom and Anonymity: Keeping the Internet Open
- Scientific American Magazine, Feb. 24, 2011
Jonathan Zittrain
- In an information age, soft power wins
- CNN, Feb. 14, 2011
Joseph Nye
- How events in Egypt affect the US
- PRI’s The World, Feb. 11, 2011
Joseph Nye
- Wielding 'smart power' in world affairs
- The Boston Globe, February 11, 2011
Joseph Nye
- Power and Information in Egypt -- and Beyond
- Huffington Post, Feb. 9, 2011
Joseph Nye
- What does Egypt's Internet ban say about the future of global politics?
- Public Radio Marketplace, Feb. 1, 2011
Jonathan Zittrain
- Egypt unrest: How do you shut down Internet service in an entire country?
- Christian Science Monitor, January 28, 2011
David Clark
- Who Gets Priority on the Web?
- The New York Times, Dec. 2, 2010
Jonathan Zittrain
- NPR’s Fresh Air
- April 19, 2010
Richard Clarke
- Defend America, One Laptop at a Time.
- New York Times. July 1, 2009
Jack Goldsmith
- Can we stop the global cyber arms race?
- Washington Post February 1, 2010
Jack Goldsmith
- A Safe Harbor for our Foes.
- Washington Times, November 25, 2009
Melissa Hathaway
|