Click here to see (IC)3's major projects at a glance
Samples of Research at (IC)3
Listed below are samples of the research work being done by the (IC)3 team.
To hear more about our Cybersecurity Research, learn how you can use this research to increase and improve the Cybersecurity of your organization, and learn how you can interact with the MIT faculty, researchers, and students -- please contact one of the (IC)3 Directors on the People page, and then join (IC)3.
More recent presentations and reports can be found on the Materials for Members page.
Research Overview Documents
Building a Cybersecurity Culture
Cybersecurity Culture Maturity Model
Managing Risk with Cyber Insurance
The Business of the Dark Web (forthcoming)
Cybersecurity Impact on the Adoption of IoT Technology (forthcoming)
Sample of PowerPoint/Poster Presentations
-
Studying the Tension Betwen Digital Innovation and Cybersecurity - as presented at the AMCIS conference, August 2017, by Natasha Nelson and Stuart Madnick.
-
PreventOTPhysDamage: Anticipating and Preventing Catastrophic OT Physical Damage Through System Thinking Analysis - as presented at the CRED-C conference, March 2017, by Matt Angle, Stuart Madnick, James L. Kirtley, and Nabil Sayfayn
-
The Wolves of Vuln Street: The 1st System Dynamics Model of the 0day Market - as presented at the RSA Conference, April 21, 2015, Moscone Center, by (IC)3 Associate Director Michael Siegel, and Katie Moussouris, HackerOne
-
Cyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cybersecurity Applied to TJX Case - as presented at the International Atomic Energy Agency, Vienna, June 2, 2015
-
Advancing Cybersecurity Using System Dynamics Simulation Modeling For System Resilience, Patching, and Software Development - as presented September 3, 2014
-
Advancing Cybersecurity Using System Dynamics Simulation Modeling For Analyzing & Disrupting Cybercrime Ecosystem & Vulnerability Markets - as presented September 3, 2014
A Sampling of Research Papers
Each title below is a link to the actual research paper. To maintain continued and early access to (IC)3, research, models and tools, please JOIN (IC)3 now.
-
Measuring Stakeholders' Perceptions of Cybersecurity for Renewable Energy Systems
-
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems: Applied to Stuxnet
-
Cyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cyber Security Risks (Condensed 37 page version)
-
Cyber Safety: A Systems Thinking and Systems Theory Approach to Managing Cyber Security Risks (Full 157 page version)
-
The House of Security: Stakeholder Perceptions of Security Assessment and Importance (FSTC)
-
Using System Dynamics to Model and Better Understand State Stability (SD)
-
Institutional Foundations for Cyber Security: Current Responses and New Challenges (JITD)
-
Inter-Organizational Information Sharing of Customer Data in Retail
-
Issues in Strategic Management of Large-Scale Software Product Line Development
-
Using System Dynamics to Analyze the Effect of Funding Fluctuation on Software Development (ASEM)
-
Towards better understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the same? (WISP)
-
Comparative Analysis of Cybersecurity Metrics to Develop New Hypotheses (WISP)
-
Institutional Foundations for Cyber Security: Current Responses and New Challenges (revised)
-
Institutional Foundations for Cyber Security: Current Responses and New Challenges
-
Experiences and Challenges with using CERT Data to Analyze International Cyber Security (AIS/WISP)
-
Preventing Accidents and Building a Culture of Safety: Insights from a Simulation Model
-
Enhancing Vehicle Safety Management in Training Deployments: An Application of System Dynamics
-
House of Security: Locale, Roles and Resources for Ensuring Information Security (AMCIS)
-
Understanding & Modeling State Stability: Exploiting System Dynamics (IEEE Aerospace)
-
Policy for the Protection and Reuse of Non-Copyrightable Database Contents
-
To Standardize Enterprise Data or Not? An Economic Analysis of Flexibility versus Control
-
Context Mediation Demonstration of Counter-Terrorism Intelligence (CTI) Integration
-
Research Initiative to Understand & Model State Stability: Exploiting System Dynamics (SD)
-
Global e-Readiness - For What? Readiness for e-Banking (Journal of IT Development)
-
LIGHTS: Laboratory for Information Globalization and Harmonization Technologies and Studies
-
Why Not One Big Database? Principles for Data Ownership (DSS)
Research Impact Overview
Building a Culture of Cybersecurity
Managing Risk with Cyber Insurance