<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="https://hdl.handle.net/1721.1/141483">
<title>Workshop Reports</title>
<link>https://hdl.handle.net/1721.1/141483</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/141627"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/141626"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/141625"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/141623"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/141622"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/141621"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/141620.2"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/141620"/>
</rdf:Seq>
</items>
<dc:date>2026-04-08T19:09:28Z</dc:date>
</channel>
<item rdf:about="https://hdl.handle.net/1721.1/141627">
<title>Cyber Norms Workshop 2014</title>
<link>https://hdl.handle.net/1721.1/141627</link>
<description>Cyber Norms Workshop 2014
Deibert, R.; Hurwitz, Roger; Nye, Joseph
The Cyber Norms Workshop 3.0, April 7-8, 2014, is the third in a series which provides opportunities for computer and social scientists, cyber security practitioners, government officials (past and present) and legal scholars, from liberal democracies, to discuss the need and possibilities for specific international norms at behavioral, policy and technology planes.
This material is based upon work supported by the Office of Naval Research under Grant No. N00014-09-1-0597. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research.
</description>
<dc:date>2014-04-07T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/141626">
<title>Cyber Norms Workshop 2011</title>
<link>https://hdl.handle.net/1721.1/141626</link>
<description>Cyber Norms Workshop 2011
Hurwitz, Roger; Nye, Joseph
An exploratory workshop on international cyber norms met at the Massachusetts Institute of Technology (MIT) in Cambridge, MA, from Oct. 19 through Oct. 21, 2011.
The workshop is sponsored by:&#13;
The Belfer Center for Science and International Affairs at the Harvard Kennedy School of Government.&#13;
The Canada Centre for Global Security Studies and Citizen Lab at the University of Toronto’s Munk School of Global Affairs.&#13;
Explorations in Cyber International Relations (ECIR), a joint Harvard-MIT research project.&#13;
Microsoft Corporation’s Office of Global Security Strategy and Diplomacy (GSSD).&#13;
MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL).&#13;
The John D. and Catherine T. MacArthur Foundation.
</description>
<dc:date>2011-10-19T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/141625">
<title>Cyber Norms Workshop 2012</title>
<link>https://hdl.handle.net/1721.1/141625</link>
<description>Cyber Norms Workshop 2012
Deibert, Ronald; Hurwitz, Roger; Nye, Joseph
A workshop on international cyber norms met for the second time at the Massachusetts Institute of Technology (MIT) in Cambridge, MA, from September 12 to 14, 2012.
The workshop is sponsored by:&#13;
The Belfer Center for Science and International Affairs at the Harvard Kennedy School of Government.&#13;
The Canada Centre for Global Security Studies and Citizen Lab at the University of Toronto’s Munk School of Global Affairs.&#13;
Explorations in Cyber International Relations (ECIR), a joint Harvard-MIT research project.&#13;
Microsoft Corporation’s Office of Global Security Strategy and Diplomacy (GSSD).&#13;
MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL).&#13;
The John D. and Catherine T. MacArthur Foundation.
</description>
<dc:date>2012-09-12T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/141623">
<title>2014 ECIR Workshop on"Cyber Security &amp; the Governance Gap: Complexity, Contention, Cooperation"</title>
<link>https://hdl.handle.net/1721.1/141623</link>
<description>2014 ECIR Workshop on"Cyber Security &amp; the Governance Gap: Complexity, Contention, Cooperation"
Choucri, Nazli
This workshop focuses on the dynamics shaping these dual features—cyber threats and cyber governance—while also taking into account operational, pragmatic, and normative aspects, as well as potential policy responses. At the core is “nature of the gap” between the two—all from different perspectives: people as users; business and industry; states and governments; and the international community, private and public—everywhere. &#13;
&#13;
The question is which trend will dominate: threats to cyber security or the expansion of cyber governance? Does that matter? If so how? If not, why not?
Proceedings of the ECIR Workshop on "Cyber Security &amp; the Governance Gap: Complexity, Contention, Cooperation," January 6–7, 2014, MIT, Cambridge, MA.
</description>
<dc:date>2014-01-06T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/141622">
<title>2012 ECIR Workshop on "Who Controls Cyberspace? A Puzzle for National Security and International Relations"</title>
<link>https://hdl.handle.net/1721.1/141622</link>
<description>2012 ECIR Workshop on "Who Controls Cyberspace? A Puzzle for National Security and International Relations"
Choucri, Nazli
This Workshop proceeds from the assumption that we have as yet no overarching and complete accounting of who controls what, when, and how, nor do we fully understand what are the precise points of control, where they are currently located and where the future ones might be placed. Accordingly, the Workshop is based on first principles, namely, cyber-ecosystems, power in “real” and cyber contexts, and introduce control point analysis. Then it turns to specific control features from four different perspectives: (a) people as users; (b) business and industry; (c) states and governments; and (d) the international community, private and public – across different regions of the world.
Proceedings of the ECIR Workshop on "Who Controls Cyberspace? A Puzzle for National Security and International Relations," November 6–7, 2012, MIT, Cambridge, MA.
</description>
<dc:date>2012-12-07T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/141621">
<title>2011 ECIR Workshop on "People, Power and CyberPolitics"</title>
<link>https://hdl.handle.net/1721.1/141621</link>
<description>2011 ECIR Workshop on "People, Power and CyberPolitics"
Choucri, Nazli
The People, Power, and CyberPolitics Conference is a joint project of MIT and Harvard University on Explorations in Cyber International Relations (ECIR).  Co-sponsored by the Council on Foreign Relations, this workshop is the second in a series of sustained deliberations and explorations involving leading individuals in academia, government and business.  The outcome of the workshop will be a new understanding of emergent dimensions of cyberpolitics with respect to (i) the evolving pressures on policy and theory, and (ii) the methods and techniques of exploring current conditions and understanding the contours of potential futures.
Proceedings of the ECIR Workshop on "People, Power and CyberPolitics," December 7–8, 2011, MIT, Cambridge, MA.
</description>
<dc:date>2011-12-07T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/141620.2">
<title>2010 ECIR Workshop on "Cyber International Relations: Emergent Realities of Conflict and Cooperation"</title>
<link>https://hdl.handle.net/1721.1/141620.2</link>
<description>2010 ECIR Workshop on "Cyber International Relations: Emergent Realities of Conflict and Cooperation"
Choucri, Nazli
An event of the MIT-Harvard multidisciplinary Minerva Project on "Explorations in Cyber International Relations" (ECIR), this conference seeks to adjust traditional views to the cyber realities of the 21st century. Of the many questions shaping world politics today, few are as daunting as Who Controls Cyberspace? Clear as it might appear, this question is deceptively simple, even elusive. It obscures other hidden or implicit aspects, namely, who can control cyberspace, who will control, and who should control cyberspace. However framed, the issue of control is closely tied to matters of scale and scope as well as authority and legitimacy – and most certainly intent and capacity.&#13;
&#13;
Our vision is to create new understandings of these realities that help: Highlight alternative perspectives and policies as well as institutional requirements; Clarify threats and opportunities in cyberspace for national security, welfare, and influence; Provide analytical tools for understanding and managing transformation and change; and Attract and educate a new generation of researchers, scholars, and analysts. We hope to develop an integrated approach to international relations and help frame cyber theory and practice for the 21st century. Most important of all, we seek to provide foundations for an integrated view of international relations.
Proceedings of the ECIR Workshop on "Cyber International Relations: Emergent Realities of Conflict and Cooperation," October 13–14, 2010, MIT, Cambridge, MA.
</description>
<dc:date>2010-10-13T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/141620">
<title>2010 ECIR Annual Conference on "Cyber International Relations: Emergent Realities of Conflict and Cooperation"</title>
<link>https://hdl.handle.net/1721.1/141620</link>
<description>2010 ECIR Annual Conference on "Cyber International Relations: Emergent Realities of Conflict and Cooperation"
Choucri, Nazli
In international relations, the traditional approaches to theory, research, practice and policy were derived from experiences in the 18th and 19th centuries, refined further in the 20th century. But cyberspace has created new conditions—problems and opportunities—-for which there are no clear precedents. As an environment for communication, a venue for social interaction and an enabler of new mechanisms for power and leverage, cyberspace calls for new perspectives, policies and practices.&#13;
&#13;
An event of the MIT-Harvard multidisciplinary Minerva Project on "Explorations in Cyber International Relations" (ECIR), this conference seeks to adjust traditional views to the cyber realities of the 21st century. Of the many questions shaping world politics today, few are as daunting as Who Controls Cyberspace? Clear as it might appear, this question is deceptively simple, even elusive. It obscures other hidden or implicit aspects, namely, who can control cyberspace, who will control, and who should control cyberspace. However framed, the issue of control is closely tied to matters of scale and scope as well as authority and legitimacy – and most certainly intent and capacity.&#13;
&#13;
Our vision is to create new understandings of these realities that help: Highlight alternative perspectives and policies as well as institutional requirements; Clarify threats and opportunities in cyberspace for national security, welfare, and influence; Provide analytical tools for understanding and managing transformation and change; and Attract and educate a new generation of researchers, scholars, and analysts. We hope to develop an integrated approach to international relations and help frame cyber theory and practice for the 21st century. Most important of all, we seek to provide foundations for an integrated view of international relations.
MIT, Cambridge, MA, October 10, 2010
</description>
<dc:date>2010-10-13T00:00:00Z</dc:date>
</item>
</rdf:RDF>
