<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Publications and Working Papers</title>
<link href="https://hdl.handle.net/1721.1/141102" rel="alternate"/>
<subtitle/>
<id>https://hdl.handle.net/1721.1/141102</id>
<updated>2026-04-08T17:44:46Z</updated>
<dc:date>2026-04-08T17:44:46Z</dc:date>
<entry>
<title>Policy Analytics for Cybersecurity of  Cyber-Physical Systems</title>
<link href="https://hdl.handle.net/1721.1/146917" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Agarwal, Gaurav</name>
</author>
<id>https://hdl.handle.net/1721.1/146917</id>
<updated>2022-12-22T02:17:44Z</updated>
<published>2022-12-14T00:00:00Z</published>
<summary type="text">Policy Analytics for Cybersecurity of  Cyber-Physical Systems
Choucri, Nazli; Agarwal, Gaurav
Cyber-physical systems (CPS) are embedded in an increasingly complex ecosystem of cybersecurity policies, guidelines, and compliance measures designed to support all aspects of operation during all phases of system’s life cycle. By definition, such guidelines and policies are written in linear and sequential text form—word after word—often with different directives parts presented in different documents. This situation makes it difficult to integrate or understand policy-technology-security interactions. As a result, it also impedes effective risk assessment. Individually or collectively, these features inevitably undermine initiatives for cybersecurity. Missing are fundamental policy analytics to support CPS cybersecurity and facilitate policy implementation. This project is designed to develop a set of text-to-analytics methods and tools—for policy directives and for CPS properties—and provide a “proof of concept” focused on the smart grid of electric power systems.
</summary>
<dc:date>2022-12-14T00:00:00Z</dc:date>
</entry>
<entry>
<title>Analytics for Cybersecurity Policy of Cyber-Physical Systems</title>
<link href="https://hdl.handle.net/1721.1/146916" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Agarwal, Gaurav</name>
</author>
<id>https://hdl.handle.net/1721.1/146916</id>
<updated>2022-12-22T03:47:41Z</updated>
<published>2022-11-14T00:00:00Z</published>
<summary type="text">Analytics for Cybersecurity Policy of Cyber-Physical Systems
Choucri, Nazli; Agarwal, Gaurav
Guidelines, directives, and policy statements are usually presented in “linear” text form—word after word, page after page. However necessary, this practice impedes full understanding, obscures feedback dynamics, hides mutual dependencies and cascading effects and the like—even when augmented with tables and diagrams. The net result is often a checklist response as an end in itself. All this creates barriers to intended realization of guidelines and undermines potential effectiveness. We present a solution strategy using text as “data”, transforming text into a structured model, and generate network views of the text(s), that we then can use for vulnerability mapping, risk assessments, and control point analysis. For proof of concept, we draw on NIST conceptual model and analysis of guidelines for smart grid cybersecurity, more than 600 pages of text.
</summary>
<dc:date>2022-11-14T00:00:00Z</dc:date>
</entry>
<entry>
<title>Ethics in Artificial Intelligence: Toward Foundations for Global Policy</title>
<link href="https://hdl.handle.net/1721.1/146915" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<id>https://hdl.handle.net/1721.1/146915</id>
<updated>2022-12-22T03:46:57Z</updated>
<published>2022-12-21T00:00:00Z</published>
<summary type="text">Ethics in Artificial Intelligence: Toward Foundations for Global Policy
Choucri, Nazli
Matters of ethics are becoming more salient at all levels of politics, almost everywhere. In the scientific community, ethics in AI is increasingly gaining attention. The fact is that the rate of change in AI innovations and applications are growing much faster than our general appreciation or understanding of content or of consequences. There is a large variety of statements, but few ethical practices by countries, corporations, and individuals that are desirable in the ethics domain for the broad area of Artificial intelligence. Occurring far less frequently—if at all—are the operational applications of ethics codes in the innovation, practice, and policy of AI. To date, the focus of attention is on scientific and technical advances, as well as enhanced computational advances.
</summary>
<dc:date>2022-12-21T00:00:00Z</dc:date>
</entry>
<entry>
<title>Cyberspace Operations Functional Capability Reference Architecture from Document Text</title>
<link href="https://hdl.handle.net/1721.1/144159" rel="alternate"/>
<author>
<name>Moulton, Allen</name>
</author>
<author>
<name>Madnick, Stuart. E.</name>
</author>
<author>
<name>Choucri, Nazli</name>
</author>
<id>https://hdl.handle.net/1721.1/144159</id>
<updated>2022-08-01T03:05:27Z</updated>
<published>2020-09-01T00:00:00Z</published>
<summary type="text">Cyberspace Operations Functional Capability Reference Architecture from Document Text
Moulton, Allen; Madnick, Stuart. E.; Choucri, Nazli
The COMET project applies structured text analysis, semantic similarity and ontology learning theory, along with NLP to investigate automated and semi-automated methods for extracting knowledge from text policy documents and transforming that knowledge into a structured form for use in a Functional Capability Reference Architecture (FCRA) for cyberspace operations. Progress and results are reported.&#13;
Cyber-physical systems are increasingly significant to modern life. In the military, the advent of net-centric systems means that virtually all operations critically depend on computers and networks (Williams, 2014). The operation of the electric power grid is moving in the same direction (GAO, 2019) as are most other industries. As Choucri and Clark (2019) document, cyberspace has also become increasingly intertwined in international politics. To make cyber- physical systems more effective and to protect from threats that put critical services at risk, organizations rely on policy documents which are written from different perspectives often using different terminology. In many cases, terminology is metaphorical such as maneuver, attack and defense, which draw on analogies to concepts from physical domain military operations. A FCRA will support knowledge transfer across different subject areas and organizations by harmonizing and clarifying concepts (Cloutier et al., 2010).
</summary>
<dc:date>2020-09-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Social Contract for the AI Age</title>
<link href="https://hdl.handle.net/1721.1/144065" rel="alternate"/>
<author>
<name>Dukakis, Michael</name>
</author>
<author>
<name>Vīķe-Freiberga, Vaira</name>
</author>
<author>
<name>Cerf, Vint</name>
</author>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Lagumdzija, Zlatko</name>
</author>
<author>
<name>Nguyen, Tuan Anh</name>
</author>
<author>
<name>Patterson, Thomas</name>
</author>
<author>
<name>Pentland, Alex</name>
</author>
<author>
<name>Rotenberg, Marc</name>
</author>
<author>
<name>Silbersweig, David</name>
</author>
<id>https://hdl.handle.net/1721.1/144065</id>
<updated>2022-07-29T10:36:46Z</updated>
<published>2020-09-09T00:00:00Z</published>
<summary type="text">Social Contract for the AI Age
Dukakis, Michael; Vīķe-Freiberga, Vaira; Cerf, Vint; Choucri, Nazli; Lagumdzija, Zlatko; Nguyen, Tuan Anh; Patterson, Thomas; Pentland, Alex; Rotenberg, Marc; Silbersweig, David
Just as earlier social contracts helped shape societies for a common purpose, the Social Contract for the AI Age has a transformative vision, one that transcends the technological features of artificial intelligence and seeks to provide foundations for a new society. Consider, for example, how the Covid-19 pandemic urgently requires a new society with new structure and order, approach — new ways to share data and coordinate action, accelerated social reliance on digital service across businesses, education, and government services. The Social Contract for the AI Age would create standards for a new international system. It focuses on the conduct of each nation, relations with international business and not for profit entities, and the cooperation of nations. Just as TCP / IP is the platform for communication among internet users, the Social Contract for AI Age is a platform for connection among governments, stakeholders, and private and public institutions.
</summary>
<dc:date>2020-09-09T00:00:00Z</dc:date>
</entry>
<entry>
<title>The concept of AI-government: Core concepts for the design of AI-government</title>
<link href="https://hdl.handle.net/1721.1/144064" rel="alternate"/>
<author>
<name>Dukakis, Michael</name>
</author>
<author>
<name>Tuan, Nguyen Anh</name>
</author>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Patterson, Thomas</name>
</author>
<id>https://hdl.handle.net/1721.1/144064</id>
<updated>2022-12-22T02:16:46Z</updated>
<published>2018-06-25T00:00:00Z</published>
<summary type="text">The concept of AI-government: Core concepts for the design of AI-government
Dukakis, Michael; Tuan, Nguyen Anh; Choucri, Nazli; Patterson, Thomas
E-Government is the use of communication and information technology for improving the performance of public sector agencies. AI-Government transcends E-Government by applying AI to assist decision making for all critical public sector functions – notably provision of public services, performance of civic functions, and evaluation of public officials. At the core of AI-&#13;
Government is the National Decision making and Data Center (NDMD). NDMD collects, stores, analyzes, and applies massive amounts of data relevant to the provision of public services and the evaluation of public programs and officials. It does not replace governance by humans or human decisional processes but guides and informs them, while providing an objective basis for service provision and evaluation.
</summary>
<dc:date>2018-06-25T00:00:00Z</dc:date>
</entry>
<entry>
<title>The AIWS 7-Layer Model to Build Next Generation Democracy</title>
<link href="https://hdl.handle.net/1721.1/144063" rel="alternate"/>
<author>
<name>Dukakis, Michael</name>
</author>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Cytryn, Allan</name>
</author>
<author>
<name>Jones, Alex</name>
</author>
<author>
<name>Nguyen, Tuan Anh</name>
</author>
<author>
<name>Patterson, Thomas</name>
</author>
<author>
<name>Reveron, Derek</name>
</author>
<author>
<name>Silbersweig, David</name>
</author>
<id>https://hdl.handle.net/1721.1/144063</id>
<updated>2022-07-29T10:26:08Z</updated>
<published>2018-04-26T00:00:00Z</published>
<summary type="text">The AIWS 7-Layer Model to Build Next Generation Democracy
Dukakis, Michael; Choucri, Nazli; Cytryn, Allan; Jones, Alex; Nguyen, Tuan Anh; Patterson, Thomas; Reveron, Derek; Silbersweig, David
The Artificial Intelligence World Society (AIWS) is a set of values, ideas, concepts and protocols for standards and norms whose goal is to advance the peaceful development of AI to improve the quality of life for all humanity. It was conceived by the Michael Dukakis Institute for Leadership and Innovation (MDI) and established on November 22, 2017. The World Leadership Alliance – Club de Madrid (WLA-CdM) and the Boston Global Forum (BGF) are partnered with the MDI to collaborate and develop the AIWS initiative. The President of WLA-CdM, Vaira Vike-Freiberga, serves as co-chair of AIWS activities and conferences along with Governor Michael Dukakis.&#13;
The Next Generation Democracy (NGD) is an initiative founded by WLA-CdM with the goal of “enabling democracy to meet the expectations and needs of all citizens and preserve their freedom and dignity while securing a sustainable future.” NGD is a collaboration and forum, coordinated by WLA-CdM. AIWS has partnered with WLA-CdM to promote the development of AI to support the Next Generation Democracy initiative.&#13;
To align the development of AI with the NGD initiative, the AIWS has developed the AIWS 7-Layer Model. This model establishes a set of responsible norms and best practices for the development, management, and uses of AI so that this technology is safe, humanistic and beneficial to society.&#13;
In developing the 7-Layer Model, the AIWS recognizes that we live in a chaotic world with differing, and sometimes conflicting, goals, values and concepts of norms. Hence, the Model is aspirational and even idealistic. Nonetheless, it provides a baseline for guiding AI development to ensure positive outcomes and to reduce the risks of pervasive and realistic risks and the related harms that AI could pose to humanity.&#13;
The Model is based on the assumption that humans ultimately accountable for the develop0ment and use of AI, and must therefore preserve that accountability. Hence, it stresses transparency of AI reasoning, applications, and decision making, which will lead to auditability and validation of the uses of AI systems.
</summary>
<dc:date>2018-04-26T00:00:00Z</dc:date>
</entry>
<entry>
<title>Cyber Acquisition: Policy Changes to Drive Innovation in Response to Accelerating Threats in Cyberspace</title>
<link href="https://hdl.handle.net/1721.1/141746" rel="alternate"/>
<author>
<name>Klemas, Thomas</name>
</author>
<author>
<name>Lively, Rebecca K.</name>
</author>
<author>
<name>Choucri, Nazli</name>
</author>
<id>https://hdl.handle.net/1721.1/141746</id>
<updated>2022-05-05T15:19:51Z</updated>
<published>2018-11-14T00:00:00Z</published>
<summary type="text">Cyber Acquisition: Policy Changes to Drive Innovation in Response to Accelerating Threats in Cyberspace
Klemas, Thomas; Lively, Rebecca K.; Choucri, Nazli
The United States of America faces great risk in the cyber domain because our adversaries are growing bolder, increasing in number, improving their capabilities, and doing so rapidly. Meanwhile, the associated technologies are evolving so quickly that progress to harden and secure this domain is ephemeral, as systems reach obsolescence in just a few years and revolutionary paradigm shifts, such as cloud computing and ubiquitous mobile devices, can pull the rug out from the best laid defensive planning by introducing entirely new regimes of operations. Contemplating these facts in the context of Department of Defense acquisitions is particularly sobering, because many cyber capabilities, bought within the traditional acquisition framework, may be of limited usefulness by the time that they are delivered to the warfighters. Thus, it is a strategic imperative to improve DoD acquisitions pertaining to cyber capabilities. This paper proposes novel ideas and a framework for addressing these challenges.
</summary>
<dc:date>2018-11-14T00:00:00Z</dc:date>
</entry>
<entry>
<title>Accelerating Cyber Acquisitions: Introducing a Time-Driven Approach to Manage Risks with Less Delay</title>
<link href="https://hdl.handle.net/1721.1/141745" rel="alternate"/>
<author>
<name>Klemas, Thomas</name>
</author>
<author>
<name>Atkins, Sean</name>
</author>
<author>
<name>Lively, Rebecca K.</name>
</author>
<author>
<name>Choucri, Nazli</name>
</author>
<id>https://hdl.handle.net/1721.1/141745</id>
<updated>2022-08-20T04:30:03Z</updated>
<published>2021-01-01T00:00:00Z</published>
<summary type="text">Accelerating Cyber Acquisitions: Introducing a Time-Driven Approach to Manage Risks with Less Delay
Klemas, Thomas; Atkins, Sean; Lively, Rebecca K.; Choucri, Nazli
The highly dynamic nature of the cyber domain demands that cyber operators are capable of rapidly evolving and adapting with exquisite timing. These forces, in turn, pressure acquisition specialists to accoutre cyber warfighters to keep pace with both cyber domain advancement and adversary progression. However, in the Department of Defense (DoD), a vigorous tug of war exists between time and risk pressures. Risk reduction is a crucial element of managing any complex enterprise and this is particularly true for the DoD and its acquisition program [1]. This risk aversion comes at significant cost, as obsolescence by risk minimization is a real phenomenon in DoD acquisition programs and significantly limits the adaptability of its operational cyber forces.&#13;
Our previous research generated three recommendations for reforming policy to deliver performance at the “speed of relevance” [3]. In this paper we focus on one of the recommendations: “Manage rather than avoid risk—especially time-based risks”. While this advice can apply to many areas of human endeavor, it has elevated urgency in cyberspace. Incomplete risk metrics lead to overly conservative acquisition efforts that imperil timely procurement of advanced cyber capabilities and repel innovators. Effective cyber defense operations require acquisition risk models to be extended beyond fiscal and technical risk metrics of performance, to include risks associated with the cost of failing to meet immediate mission requirements. This paper proposes a time-shifting approach to simultaneously (a) accelerate capability delivery while maintaining traditional rigor, and (b) achieve optimal balance between fiscal, performance, and time risks.
</summary>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>CyberIR@MIT: Knowledge for Science, Policy, Practice</title>
<link href="https://hdl.handle.net/1721.1/141744" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Fairman, Lauren</name>
</author>
<author>
<name>Agarwal, Gaurav</name>
</author>
<id>https://hdl.handle.net/1721.1/141744</id>
<updated>2022-08-07T03:54:47Z</updated>
<published>2022-07-09T00:00:00Z</published>
<summary type="text">CyberIR@MIT: Knowledge for Science, Policy, Practice
Choucri, Nazli; Fairman, Lauren; Agarwal, Gaurav
This paper presents a brief introduction to CyberIR@MIT—a dynamic, interactive knowledge and networking system focused on the evolving, diverse, and complex interconnections of cyberspace and international relations. The goal is to highlight key theoretical, substantive, empirical and networking issues.&#13;
CyberIR@MIT is anchored in a multidimensional ontology. It was initially framed as an experiment during the MIT-Harvard collaboration on Explorations in Cyber International Relations (see ecir.mit.edu) to serve as a forum for quality-controlled content and materials generated throughout the research project.&#13;
The method consists of differentiating among the various facets of human activity in (i) cyberspace, (ii) international relations, and (iii) the intersection of the cyber and “real.” It includes problems created by humans and solution strategies, as well as enabling functions and capabilities, on the one hand, and impediments to behavior and associated barriers, on the other. See https://cyberir.mit.edu for functions. The value of this initiative lies in its conceptual foundations and method of knowledge representation—embedded in an interactive system for knowledge submission, with search and retrieval functions.
</summary>
<dc:date>2022-07-09T00:00:00Z</dc:date>
</entry>
<entry>
<title>Policy-Governed Secure Collaboration: Toward Analytics for Cybersecurity of Cyber- Physical Systems</title>
<link href="https://hdl.handle.net/1721.1/141743" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Agarwal, Gaurav</name>
</author>
<author>
<name>Koutsoukos, Xenofon</name>
</author>
<id>https://hdl.handle.net/1721.1/141743</id>
<updated>2022-05-05T16:19:51Z</updated>
<published>2018-03-13T00:00:00Z</published>
<summary type="text">Policy-Governed Secure Collaboration: Toward Analytics for Cybersecurity of Cyber- Physical Systems
Choucri, Nazli; Agarwal, Gaurav; Koutsoukos, Xenofon
Mounting concerns about safety and security have resulted in an intricate ecosystem of guidelines, compliance measures, directives and policy reports for cybersecurity of all critical infrastructure. By definition, such guidelines and policies are written in linear sequential text form that makes them difficult to integrate, or to understand the policy-technology-security interactions, thus limiting their relevance for science of security. We propose to develop text-to-analytics methods and tools focusing on CPS domains such as smart grids.
</summary>
<dc:date>2018-03-13T00:00:00Z</dc:date>
</entry>
<entry>
<title>Complexity of International Law for Cyber Operations</title>
<link href="https://hdl.handle.net/1721.1/141742" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Agarwal, Gaurav</name>
</author>
<id>https://hdl.handle.net/1721.1/141742</id>
<updated>2022-08-20T04:32:28Z</updated>
<published>2022-07-09T00:00:00Z</published>
<summary type="text">Complexity of International Law for Cyber Operations
Choucri, Nazli; Agarwal, Gaurav
Policy documents are usually written in text form—word after word, sentence after sentence, page after page, section after section, chapter after chapter—which often masks some of their most critical features. The text form cannot easily show interconnections among elements, identify the relative salience of issues, or represent feedback dynamics, for example. These are “hidden” features that are difficult to situate. This paper presents a computational analysis of Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, a seminal work in International Law. Tallinn Manual 2.0 is a seminal document for many reasons, including but not limited to, its (a) authoritative focus on cyber operations, (b) foundation in the fundamental legal principles of the international order and (c) direct relevance to theory, practice, and policy in international relations. The results identify the overwhelming dominance of specific Rules, the centrality of select Rules, the Rules with autonomous standing (that is, not connected to the rest of the corpus), and highlight different aspects of Tallinn Manual 2.0, notably situating authority, security of information -- the feedback structure that keeps the pieces together. This study serves as a “proof of concept” for the use of computational logics to enhance our understanding of policy documents.
</summary>
<dc:date>2022-07-09T00:00:00Z</dc:date>
</entry>
<entry>
<title>Complexity of International Law for Cyber Operations</title>
<link href="https://hdl.handle.net/1721.1/141741" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Agarwal, Gaurav</name>
</author>
<id>https://hdl.handle.net/1721.1/141741</id>
<updated>2022-05-05T15:19:51Z</updated>
<published>2021-11-08T00:00:00Z</published>
<summary type="text">Complexity of International Law for Cyber Operations
Choucri, Nazli; Agarwal, Gaurav
Policy documents are usually written in text form—word after word, sentence after sentence etc.— which often obscures some of their most critical features. Text cannot easily situate interconnections among elements, or identify feedback, nor reveal other embedded features. This paper presents a computational approach to International Law Applicable to Cyber Operations 2.0, Tallinn Manual, a seminal work of 600 pages at the intersection of law and cyberspace. The results identify the dominance of specific Rules, the centrality of select Rules, and Rules with autonomous standing, as well as the feedback structure that holds the system together. None of these features are evident from the text alone.
</summary>
<dc:date>2021-11-08T00:00:00Z</dc:date>
</entry>
<entry>
<title>Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure</title>
<link href="https://hdl.handle.net/1721.1/141740" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Agarwal, Gaurav</name>
</author>
<id>https://hdl.handle.net/1721.1/141740</id>
<updated>2022-05-05T15:19:51Z</updated>
<published>2019-11-05T00:00:00Z</published>
<summary type="text">Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure
Choucri, Nazli; Agarwal, Gaurav
Executive Order, May 2019 states:&#13;
November 5, 2019&#13;
“...foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services ... in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.” [1]&#13;
This paper focuses on the challenges of securing the long chain of global communication infrastructure, presents some illustrative data, and puts forth a multi-method research design for analysis of long-chain systems of information and/or communications technology, infrastructure, services, ownership, providers, and networks -- within a state and outside its jurisdiction – all essential for unimpeded global operations. A proof of concept for data requirements to support end-to-end integrated research is provided, along with highlights of some initial empirical analysis, with China as a case in point.
</summary>
<dc:date>2019-11-05T00:00:00Z</dc:date>
</entry>
<entry>
<title>The Theory of Lateral Pressure: Highlights of Quantification and Empirical Analysis</title>
<link href="https://hdl.handle.net/1721.1/141739" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<id>https://hdl.handle.net/1721.1/141739</id>
<updated>2023-08-22T17:36:27Z</updated>
<published>2017-07-27T00:00:00Z</published>
<summary type="text">The Theory of Lateral Pressure: Highlights of Quantification and Empirical Analysis
Choucri, Nazli
The term lateral pressure refers to any tendency (or propensity) of states, firms, and other entities to expand their activities and exert influence and control beyond their established boundaries, whether for economic, political, military, scientific, religious, or other purposes. Framed by Robert C. North and Nazli Choucri, the theory addresses the sources and consequences of such a tendency. This chapter presents the core features—assumptions, logic, core variables, and dynamics—and summarizes the quantitative work undertaken to date. Some aspects of the theory analysis are more readily quantifiable than others. Some are consistent with conventional theory in international relations. Others are based on insights and evidence from other areas of knowledge, thus departing from tradition in potentially significant ways.&#13;
Initially applied to the causes of war, the theory focuses on the question of: Who does what, when, how, and with what consequences? The causal logic in lateral pressure theory runs from the internal drivers (i.e., the master variables that shape the profiles of states) through the intervening variables (i.e., aggregated and articulated demands given prevailing capabilities), and the outcomes often generate added complexities. To the extent that states expand their activities outside territorial boundaries, driven by a wide range of capabilities and motivations, they are likely to encounter other states similarly engaged. The intersection among spheres of influence is the first step in complex dynamics that lead to hostilities, escalation, and eventually conflict and violence.&#13;
The quantitative analysis of lateral pressure theory consists of six distinct phases. The first phase began with a large-scale, cross- national, multiple equation econometric investigation of the 45 years leading to World War I, followed by a system of simultaneous equations representing&#13;
conflict dynamics among competing powers in the post–World War II era. The second phase is a detailed econometric analysis of Japan over the span of more than a century and two World Wars. The third phase of lateral pressure involves system dynamics modeling of growth and expansion of states from 1970s to the end of the 20th century and explores the use of fuzzy logic in this process. The fourth phase focuses on the state-based sources of anthropogenic greenhouse gases to endogenize the natural environment in the study of international relations. The fifth phase presents a detailed ontology of the driving variables shaping lateral pressure and their critical constituents in order to (a) frame their interconnections, (b) capture knowledge on sustainable development, (c) create knowledge management methods for the search, retrieval, and use of knowledge on sustainable development and (d) examine the use of visualization techniques for knowledge display and analysis. The sixth, and most recent, phase of lateral pressure theory and empirical analysis examines the new realities created by the construction of cyberspace and interactions with the traditional international order.
</summary>
<dc:date>2017-07-27T00:00:00Z</dc:date>
</entry>
<entry>
<title>Analytics for Smart Grid Cybersecurity</title>
<link href="https://hdl.handle.net/1721.1/141738" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Agarwal, Gaurav</name>
</author>
<id>https://hdl.handle.net/1721.1/141738</id>
<updated>2022-05-05T16:20:40Z</updated>
<published>2017-04-25T00:00:00Z</published>
<summary type="text">Analytics for Smart Grid Cybersecurity
Choucri, Nazli; Agarwal, Gaurav
Guidelines, directives, and policy statements are usually presented in “linear” text form – word after word, page after page. However necessary, this practice impedes full understanding, obscures feedback dynamics, hides mutual dependencies and cascading effects and the like, -- even when augmented with tables and diagrams. The net result is often a checklist response as an end in itself. All this creates barriers to intended realization of guidelines and undermines potential effectiveness. We present a solution strategy using text as “data”, transforming text into a structured model, and generate a network views of the text(s), that we then can use for vulnerability mapping, risk assessments and control point analysis. We apply this approach using two NIST reports on cybersecurity of smart grid, more than 600 pages of text. Here we provide a synopsis of approach, methods, and tools. (Elsewhere we consider (a) system-wide level, (b) aviation e- landscape, (c) electric vehicles, and (d) SCADA for smart grid).
</summary>
<dc:date>2017-04-25T00:00:00Z</dc:date>
</entry>
<entry>
<title>Framework for Global Accord on Artificial Intelligence (AI)</title>
<link href="https://hdl.handle.net/1721.1/141737" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<id>https://hdl.handle.net/1721.1/141737</id>
<updated>2022-08-20T04:34:21Z</updated>
<published>2022-07-09T00:00:00Z</published>
<summary type="text">Framework for Global Accord on Artificial Intelligence (AI)
Choucri, Nazli
Advances in information and communication technologies – global Internet, social media, Internet of Things, and a range of related science-driven innovations and generative and emergent technologies – continue to shape a dynamic communication and information ecosystem for which there is no precedent.&#13;
These advances are powerful in many ways. Foremost among these in terms of salience, ubiquity, pervasiveness, and expansion in scale and scope is the broad area of artificial intelligence. They have created a new global ecology; yet they remain opaque and must be better understood— an ecology of “knowns” that is evolving in ways that remain largely “unknown.” Especially compelling is the acceleration of Artificial Intelligence – in all its forms – with far-ranging applications shaping a new global ecosystem for which there is no precedent.&#13;
This chapter presents a brief view of the most pressing challenges, articulates the logic for worldwide agreement to retain the rule of law in the international system, and presents salient features of an emergent International Accord on Artificial Intelligence. The Framework for Artificial Intelligence International Accord (AIIA) is an initial response to this critical gap in the system of international rules and regulations.
</summary>
<dc:date>2022-07-09T00:00:00Z</dc:date>
</entry>
<entry>
<title>cyberir.mit.edu</title>
<link href="https://hdl.handle.net/1721.1/141492" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Fairman, Lauren</name>
</author>
<author>
<name>Agarwal, Gaurav</name>
</author>
<id>https://hdl.handle.net/1721.1/141492</id>
<updated>2022-07-29T11:26:43Z</updated>
<published>2020-08-27T00:00:00Z</published>
<summary type="text">cyberir.mit.edu
Choucri, Nazli; Fairman, Lauren; Agarwal, Gaurav
This website presents a brief introduction to Cyber-IR@MIT—a dynamic, interactive knowledge and networking system focused on the evolving, diverse, and complex interconnections of cyberspace and international relations. The goal is to highlight key theoretical, substantive, empirical and networking issues.&#13;
Cyber-IR@MIT is anchored in a multidimensional ontology. It was initially framed as an experiment during the MIT-Harvard collaboration on Explorations in Cyber International Relations (MIT, 2009-2014) to serve as a forum for quality-controlled content and materials generated throughout the research project.&#13;
The vision for Cyber-IR@MIT is shaped by the research for Cyberpolitics in International Relations, a book written by Nazli Choucri and published by MIT Press in 2012. The operational approach to the knowledge system is influenced by the Global System for Sustainable Development (GSSD), developed earlier and focused on challenges of system sustainability. Cyber-IR@MIT gradually evolved into a knowledge-based system of human interactions in cyberspace and international relations, all embedded in the overarching natural system.&#13;
The method consists of differentiating among the various facets of human activity in (i) cyberspace, (ii) international relations, and (iii) the intersection of the cyber and “real.” It includes problems created by humans and solution strategies, as well as enabling functions and capabilities, on the one hand, and impediments to behavior and associated barriers, on the other. See https://cyberir.mit.edu for functions.The value of this initiative lies in its conceptual foundations and method of knowledge representation – embedded in an interactive system for knowledge submission, with f search and retrieval functions
See related paper: Choucri, N., Fairman, L., &amp; Agarwal, G. (2021). CyberIR@MIT: Knowledge for science, policy, practice (Working Paper No. 2021-1). MIT Political Science Department. http://dx.doi.org/10.2139/ssrn.3936863 https://hdl.handle.net/1721.1/141744
</summary>
<dc:date>2020-08-27T00:00:00Z</dc:date>
</entry>
<entry>
<title>gssd.mit.edu</title>
<link href="https://hdl.handle.net/1721.1/141491" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<id>https://hdl.handle.net/1721.1/141491</id>
<updated>2022-05-05T16:27:45Z</updated>
<published>2020-08-27T00:00:00Z</published>
<summary type="text">gssd.mit.edu
Choucri, Nazli
GSSD is an evolving knowledge networking system dedicated to sustainable development. Designed to help identify and extend innovative approaches toward sustainability—including enabling technologies, policies, and strategies—it tracks diverse aspects of challenges, problems, and emergent solutions to date. Specifically, it is a computer-assisted, organized system linking discrete actors with: (a) A knowledge producing capacity that is,&#13;
(b) combined via common organizing principles, and (c) based on individual autonomy; such that (d) the value of networked knowledge is enhanced, and (e) the stock of knowledge is expanded further.
</summary>
<dc:date>2020-08-27T00:00:00Z</dc:date>
</entry>
<entry>
<title>ecir.mit.edu</title>
<link href="https://hdl.handle.net/1721.1/141490" rel="alternate"/>
<author>
<name>Choucri, Nazli</name>
</author>
<id>https://hdl.handle.net/1721.1/141490</id>
<updated>2022-05-05T16:39:10Z</updated>
<published>2020-09-21T00:00:00Z</published>
<summary type="text">ecir.mit.edu
Choucri, Nazli
Exploration in Cyber International Relations (ECIR), is the label of a multidisciplinary and multidimensional research project initiated under a grant from the Minerva Program, Department of Defense.&#13;
&#13;
A joint project of MIT and Harvard University, ECIR included, but was not limited to Political Science, Economics, Business and Management, Engineering, Computer Science, Artificial Intelligence, and Law and Government. In response to new 21st c. realities, the goal is to construct a cyber-inclusive view of international relations (CyberIRworld) – with theory, data, analyses, simulations – to anticipate and respond to cyber threats and  challenges to national security and international stability.&#13;
&#13;
The research design is modular (organized in core themes and cross cutting issues), supported by a multi-method strategy that enables the "individual" connect to an overarching "whole." ECIR is anchored in empirical analysis, buttressed by modeling, simulations, and the construction of new tools as needed. Basic assumptions are: (1) interdependence of technology and policy, (2) conjunction of uncertainty and regularity in human interactions, and (3) persistence of transformation and change in international relations.&#13;
&#13;
There is limited understanding of how cyberspace influences international relations and how power and politics in international relations influence the conduct and management of cyberspace. Dominant assumptions of the 20th century politics and policy are severely undermined by the 21st century deeply rooted in the cyber age with its dynamic and changing configurations. There are excellent maps and visual materials for international relations and its various facets. There are excellent maps of cyber access, different representations of traffic, and different features of cyberspace. Missing, however, is a combined view so essential for understanding the implications of the cyber domain and if effects on world politics.&#13;
&#13;
This problem is addressed through the use of multiple perspectives, methodologies, databases, and diverse analytical as initially manifested throughout our Explorations in Cyber International Relations (ECIR). More recently, ECIR continued initially as an extension of the original ECIR research, but soon took on new challenges with new directions of inquiry. ECIR continued focuses on four distinctive but interconnected research themes.
Disclaimer: Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research.
</summary>
<dc:date>2020-09-21T00:00:00Z</dc:date>
</entry>
<entry>
<title>A Systematic Framework to Understand Transnational Governance for Cybersecurity Risks from Digital Trade</title>
<link href="https://hdl.handle.net/1721.1/138136.2" rel="alternate"/>
<author>
<name>Huang, Keman</name>
</author>
<author>
<name>Madnick, Stuart E</name>
</author>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Zhang, Fang</name>
</author>
<id>https://hdl.handle.net/1721.1/138136.2</id>
<updated>2021-11-15T20:22:59Z</updated>
<published>2021-08-31T00:00:00Z</published>
<summary type="text">A Systematic Framework to Understand Transnational Governance for Cybersecurity Risks from Digital Trade
Huang, Keman; Madnick, Stuart E; Choucri, Nazli; Zhang, Fang
Governing cybersecurity risks from digital trade is a growing responsibility for governments and corporations. This study develops a systematic framework to delineate and analyze the strategies that governments and corporations take to address cybersecurity risks from digital trade. It maps out the current landscape based on a collection of 75 cases where governments and corporations interact to govern transnational cybersecurity risks. This study reveals that: first, governing cybersecurity risks from digital trade is a global issue whereby most governments implement policies with concerning that the cybersecurity risks embedded within purchasing transnational digital products can influence their domestic political and societal systems. Second, governments dominates the governance interactions by implementing trade policies whereas corporations simply comply. Corporations do, however, have chances to take more active roles in constructing the governance system. Third, supply chain cybersecurity risks have more significant impacts on governance mode between governments and corporations whereas concerns on different national cybersecurity risks do not. Fourth, the interactions between governments and corporations reveal the exisitence of loops that can amplify or reduce cybersecurity risks. This provides policy implications on transnational cybersecurity governance for policy makers and business leaders to consider their potential options and understand the global digital trade environment when cybersecurity and digital trade overlap.
</summary>
<dc:date>2021-08-31T00:00:00Z</dc:date>
</entry>
<entry>
<title>A Systematic Framework to Understand Transnational Governance for Cybersecurity Risks from Digital Trade</title>
<link href="https://hdl.handle.net/1721.1/138136" rel="alternate"/>
<author>
<name>Huang, Keman</name>
</author>
<author>
<name>Madnick, Stuart</name>
</author>
<author>
<name>Choucri, Nazli</name>
</author>
<author>
<name>Zhang, Fang</name>
</author>
<id>https://hdl.handle.net/1721.1/138136</id>
<updated>2025-05-20T09:56:15Z</updated>
<published>2021-08-31T00:00:00Z</published>
<summary type="text">A Systematic Framework to Understand Transnational Governance for Cybersecurity Risks from Digital Trade
Huang, Keman; Madnick, Stuart; Choucri, Nazli; Zhang, Fang
Governing cybersecurity risks from digital trade is a growing responsibility for governments and corporations. This study develops a systematic framework to delineate and analyze the strategies that governments and corporations take to address cybersecurity risks from digital trade. It maps out the current landscape based on a collection of 75 cases where governments and corporations interact to govern transnational cybersecurity risks. This study reveals that: first, governing cybersecurity risks from digital trade is a global issue whereby most governments implement policies with concerning that the cybersecurity risks embedded within purchasing transnational digital products can influence their domestic political and societal systems. Second, governments dominates the governance interactions by implementing trade policies whereas corporations simply comply. Corporations do, however, have chances to take more active roles in constructing the governance system. Third, supply chain cybersecurity risks have more significant impacts on governance mode between governments and corporations whereas concerns on different national cybersecurity risks do not. Fourth, the interactions between governments and corporations reveal the exisitence of loops that can amplify or reduce cybersecurity risks. This provides policy implications on transnational cybersecurity governance for policy makers and business leaders to consider their potential options and understand the global digital trade environment when cybersecurity and digital trade overlap.
</summary>
<dc:date>2021-08-31T00:00:00Z</dc:date>
</entry>
</feed>
