Search
Now showing items 1-5 of 5
The cultivation of global norms as part of a cyber security strategy
(© Informa UK Limited (trading as Taylor & Francis Group), 2013)
Institutions for cyber security: International responses and global imperatives
(© Informa UK Limited (trading as Taylor & Francis Group), 2013-10-22)
Almost everyone recognizes the salience of cyberspace as a fact of daily life. Given its ubiquity, scale, and scope, cyberspace has become a fundamental feature of the world we live in and has created a new reality for ...
The order independence of iterated dominance in extensive games
(John Wiley & Sons, Inc./© Jing Chen, & Silvio Micali, 2013-01-22)
Shimoji and Watson (1998) prove that a strategy of an extensive game is rationalizable in the sense of Pearce if and only if it survives the maximal elimination of conditionally dominated strategies. Briefly, this process ...
Cyberpolitics in international relations
(© MIT Center for International Studies, 2013)
Who controls cyberspace?
(Sage Journals/© Nazli Choucri, & David D. Clark, 2013-09-01)
When Wikileaks released hundreds of thousands of Iraq War logs and diplomatic cables in 2010, a horrified US government sprang into action—but the classified information the government hoped to keep from public view quickly ...