We are seeking research fellows to study policies related to conflict in cyberspace.
Programs and Projects: Cyber Security Project
For: Predoctoral candidates and recent recipients of a Ph.D. or equivalent degree. Mid-career professionals may be considered.
Application Deadline:The application is now open. The application period will close at 11:59pm EST on January 15, 2019. All recommendation letters will be due on February 1, 2019. Decisions will be announced by March 29, 2019.
As our dependence on information technology for all aspects of civilian and military activities grows, so does the challenge of keeping networks secure. One of our primary goals is to help policymakers develop a conceptual arsenal to better understand conflict in cyberspace. While we are particularly interested in researchers working on cyber conflict issues (such as the offense/defense balance and escalation control in cyberspace), we also welcome applications from researchers working on cybersecurity issues more broadly (such as protecting critical infrastructure from cyber attacks or navigating the tradeoffs between privacy and security).
- CV/ Resume
- Unofficial transcript (pre-doctoral fellow applicants only)
- Research statement (3–5 pages)
- The first section should be a statement of no more than 500 words that describes the policy relevance of at least one component of the proposed research. This statement should articulate the intended audience, as well as the problem or problems that the research will help the intended audience address.
- Writing sample (less than 50 pages)
- Should be one published or unpublished piece written by the applicant (co-authored pieces not accepted) in English that will demonstrate his/her English-language writing ability
- Can be a journal article, book chapter, dissertation chapter, white paper, etc. you have produced in your field
- Contact information for 3 recommenders submitting letters on your behalf
For more information click "LINK TO ORIGINAL" below.
This opportunity has expired. It was originally published here: