home

Research

Overview Slides: Understanding the Dynamics of Cyber International Relations

Publications

Clark, David and Susan Landau. “Untangling Attribution.” Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC:National Academies Press, 2010: 25-40.
Clarke, Richard and Robert Knake. Cyber War: The Next Threat to National Security and What to Do About It. New York: Ecco, 2010.
Clarke, Richard. “War From Cyberspace.” The National Interest. December 22, 2009.
Finlayson, Mark A., Whitman Richards and Patrick Henry Winston. “Computational Models of Narrative: Review of a Workshop.” AI Magazine 31(2), 2010: 97-100.
Goldsmith, Jack. “The Cyberthreat, Government Network Operations, and the Fourth Amendment.” Government Studies at The Brookings Institute, December 8, 2010.
Hathaway, Melissa. “Power Hackers: The U.S. Smart Grid Is Shaping Up to be Dangerously Insecure.” Scientific American Magazine, October 5, 2010: 35.
Hervás, Raquel and Mark Alan Finlayson. “The Prevalence of Descriptive Referring Expressions.” Proceedings of the ACL 2010 Conference Short Papers, pages 49–54, Uppsala, Sweden, 11-16 July 2010.
Lazer, David, Ines Mergel and Allan Friedman. “Co-Citation of Prominent Social Network Articles in Sociology Journals: The Evolving Canon.” Connections 29 (2009): 1.
Madnick, Stuart, Nazli Choucri, and Jeremy Ferwerda. “Institutional Foundations for Cyber Security: Current Responses and New Challenges.” Under review by Journal of Information Technology & Politics. September 2010.
Madnick, Stuart, Xitong Li and Nazli Choucri. “Experiences and Challenges with using CERT Data to Analyze International Cyber Security.” Proceedings of the AIS SIGSEC Workshop on Information Security & Privacy (WISP 2009), Phoenix, Arizona, December 2009, pp. 6-16.
Micali, Silvio, Chris Peikert, Madhu Sudan, and David A. Wilson. “Optimal Error Correction for Computationally Bounded Noise.” IEEE Transactions on Information Theory 56, no. 11 (November 2010): 5673-5680.
Moore, Tyler, Allan Friedman and Ariel D. Procaccia. “Would a ‘Cyber Warrior’ Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems.” NSPW’ 10, September 21–23, 2010.
Nye, Joseph S. The Future of Power. New York: Public Affairs Press, 2011.
Zittrain, Jonathan. “The Fourth Quadrant.” Fordham Law Review 78 (2010): 101-109.
Zittrain, Jonathan and Molly Sauter. “Everything You Need to Know About Wikileaks.” MIT Technology Review, December 9, 2010.

In the News

Cyberspace Wars
The New York Times, Feb. 27, 2011
Joseph Nye
Freedom and Anonymity: Keeping the Internet Open
Scientific American Magazine, Feb. 24, 2011
Jonathan Zittrain
In an information age, soft power wins
CNN, Feb. 14, 2011
Joseph Nye
How events in Egypt affect the US
PRI’s The World, Feb. 11, 2011
Joseph Nye
Wielding 'smart power' in world affairs
The Boston Globe, February 11, 2011
Joseph Nye
Power and Information in Egypt -- and Beyond
Huffington Post, Feb. 9, 2011
Joseph Nye
What does Egypt's Internet ban say about the future of global politics?
Public Radio Marketplace, Feb. 1, 2011
Jonathan Zittrain
Egypt unrest: How do you shut down Internet service in an entire country?
Christian Science Monitor, January 28, 2011
David Clark
Who Gets Priority on the Web?
The New York Times, Dec. 2, 2010
Jonathan Zittrain
NPR’s Fresh Air
April 19, 2010
Richard Clarke
Defend America, One Laptop at a Time.
New York Times. July 1, 2009
Jack Goldsmith
Can we stop the global cyber arms race?
Washington Post February 1, 2010
Jack Goldsmith
A Safe Harbor for our Foes.
Washington Times, November 25, 2009
Melissa Hathaway
Massachusetts Institute of Technology
Harvard University