Department of Political Science: Recent submissions
Now showing items 61-63 of 400
-
The evolution of network based cybersecurity norms: An analytical narrative
(© IEEE, 2014-08-13)We examine coordination dilemmas in cybersecurity policy by using an already developed evolutionary game theoretical model [2]. We suggest that norms to encourage network based security systems may not evolve independently ... -
Improving interdisciplinary communication with standardized cyber security terminology: A literature review
(© IEEE, 2016-03-21)The growing demand for computer security, and the cyberization trend, are hallmarks of the 21st century. The rise in cyber-crime, digital currency, and e-governance has been well met by a corresponding recent jump in ... -
Who controls cyberspace?
(Sage Journals/© Nazli Choucri, & David D. Clark, 2013-09-01)When Wikileaks released hundreds of thousands of Iraq War logs and diplomatic cables in 2010, a horrified US government sprang into action—but the classified information the government hoped to keep from public view quickly ...


