Download presentation
1
MIT-Harvard Conference Cyber International Relations (ECIR)
Explorations in Cyber International Relations (ECIR) New Politics in International Relations? Nazli Choucri, Political Science Collaboration: David Clark, CSAIL Stuart Madnick, Sloan School Research Robert Reardon, Ph.D. Political Science Assistance: Gaurav Agarwal, SM, SDM Nancy Chen, Undergraduate UROP Explorations in Cyber International Relations OSD Minerva Research Project at MIT & Harvard
2
Focusing on Basics – Three Questions
1. International relations theories are anchored in 20 C. experience. How portable are they for 21st C. realities? If so how? If not why not? 2. Can we relate the “real” & cyber features of international relation in intellectually defensible ways? What are the “real” factors, the cyber & the linkages? 3. What do we know about cyber conflicts and cyber cooperation to date? Can we define types? Can we identify cases?
3
1. Exploring Portability
Levels of analysis The Individual needs, demands, etc. The State features, constituencies, capacity The International System state & non-state entities The Global System human & natural systems, Contending Theoretical “Lenses” Realism national security & power politics Liberalism the “open society” Institutionalism structured organized collaboration Constructivism cognitive & cultural focus Global Perspective globalization & its effects Cyber access is relevant at all levels. Different theories highlight or “see” different features of cyberspace.
4
2. Connecting “Real” & Cyber IR*
Identifying linkages is based on two major tasks Mapping Cyberspace Identifying Control Points
5
Structure & Process Real & Cyber
International Institutions Level of Analysis in International Relations Actors in the Cyber “Playing Field” Incidents & Intensity 5 Explorations in Cyber International Relations OSD Minerva Research Project at Harvard & MIT
6
3. Cyber Conflicts & Security Threats
TYPES CASES I. Cyber Threats to National Security Militarization of cyberspace Cyber threats to Infrastructure Cyber terrorism Cyber warfare II. Cyber Conflicts for Strategic Advantage State power for political control Political competition via cyber venues Cyber Crime and Cyber Espionage III. Contentions over Cyber Structure & Process End-to end-argument “Code is law” Layers principle “Network neutrality”
7
Source: “War in the Fifth Domain” The Economist July 3, 2010, pg. 26.
Example - Infected IP Addresses Source: “War in the Fifth Domain” The Economist July 3, 2010, pg. 26.
8
4. Cyber Collaboration & Coordination
TYPES CASES I. Cyber Governance Networked Governance Institutions for Cyber Management Institutions for Cyber Security International Cyber Treaties II. Global Norms & Public Goods Politicizing Cyber Rights Consolidating New Norms Facilitating Knowledge Provision III. Toward a Global Agenda Internationalizing Cyber Supports Framing New Cyber Behaviors Exploring Treaty Precedents Supporting Sustainability
9
The following sessions will explore
The following sessions will explore these & related issues in some detail.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.