{"id":9,"date":"2024-05-22T21:09:57","date_gmt":"2024-05-22T21:09:57","guid":{"rendered":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/research-publications\/"},"modified":"2026-03-26T17:08:43","modified_gmt":"2026-03-26T17:08:43","slug":"publications","status":"publish","type":"page","link":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<div id=\"pl-9\"  class=\"panel-layout\" ><div id=\"pg-9-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-9-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-9-0-0-0\" class=\"so-panel widget widget_mit-pf-wysiwyg widget_mit_pf_wysiwyg panel-first-child panel-last-child\" data-index=\"0\" ><h2 class=\"widget-title\">Publications<\/h2><div class=\"textwidget\"><div id=\"columns\">\n<div class=\"columns-inner clearfix add-gutter\">\n<div id=\"content-column\">\n<div class=\"content-inner\">\n<section id=\"main-content\" role=\"main\">\n<div id=\"content\">\n<div class=\"region region-content\">\n<div id=\"block-system-main\" class=\"block block-system\">\n<div class=\"block-inner clearfix\">\n<div class=\"block-content content\">\n<article id=\"article-11\" class=\"article article-type-page clearfix\" role=\"article\">\n<div class=\"article-content\">\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<h3 class=\"rtejustify\"><strong>Thought Leadership\/Practitioner (Business Press)<\/strong><\/h3>\n<p class=\"rtejustify\">I closely study the cyber risk\/resilience management space (through the help of academics, industry\/government relations, surveys, and case studies) and how they relate with my research ideas and results. <em>I am thankful to leading business press and practitioner venues <\/em>for inviting me to write for them.<\/p>\n<p class=\"rtejustify\">Some thought leadership articles are periodically selected by MIT to appear in <strong>MIT Sloan in the News<\/strong>.<\/p>\n<ol>\n<li>K. Hill, <strong>R. Pal<\/strong>, P. Wedge, and E. Pocock: <em>Smart Systems, Blind Spots: Rethinking Insurance in the AI Era<\/em>. <strong>Gallagher Re Article<\/strong>, March 24, 2026.<\/li>\n<li>T. Lu and B. Nag (quoted <strong>R. Pal<\/strong>): <em>The Rising APT Risk Reshaping Cyber Insurance for Critical Infrastructure.<\/em> <strong>Forbes (I)<\/strong>, March 17, 2026. <strong>[<\/strong>Mentioned in<strong> MIT Sloan in the News].<\/strong><\/li>\n<li>A. Gogar and B. Nag (quoted <strong>R. Pal<\/strong>): <i>Systemic Cyber Risk<\/i>\u00a0- <em>The Growing Threat to Global Supply Chains.<\/em>\u00a0<strong>Forbes (I)<\/strong>, February 19, 2026.\u00a0<strong>[<\/strong>Mentioned in<strong> MIT Sloan in the News].<\/strong><\/li>\n<li><strong>R. Pal, <\/strong>S. Zeijlemaker, and B. Nag: <i>Synthetic Data<\/i>\u00a0- <em>The New Backbone of Next Gen Cybersecurity.<\/em>\u00a0<strong>Forbes (I)<\/strong>, February 5, 2026.<\/li>\n<li><strong>R. Pal, <\/strong>and B. Nag: <em>Cyber-Risk<\/em> <em>in the Boardroom<\/em> - <em>Why Judgement Matters More Than Numbers.<\/em>\u00a0<strong>Forbes (I)<\/strong>, January 19, 2026.\u00a0<strong>[<\/strong>Mentioned in<strong> MIT Sloan in the News].<\/strong><\/li>\n<li><strong>R. Pal, <\/strong>B. Nag, and A. Tuteja: <em>Businesses Need Future-Ready LLM Supply Chains.<\/em>\u00a0<strong>Forbes (I)<\/strong>, December 30, 2025.<\/li>\n<li><strong>R. Pal, <\/strong>Y. Lemiesa, and B. Nag: <em>Future-Proofing Your Company from Quantum Cyber Risks.<\/em>\u00a0<strong>Forbes (I)<\/strong>, December 12, 2025.\u00a0<strong>[<\/strong>Mentioned in<strong> MIT Sloan in the News].<\/strong><\/li>\n<li><strong>R. Pal, <\/strong>C. Robins, and B. Nag: <em>Safeguarding Against the New Frontier of Cyberattacks in AI.<\/em>\u00a0<strong>Forbes (I)<\/strong>, November 12, 2025.<\/li>\n<li><strong>R. Pal, <\/strong>D. Yao, and B. Nag: <em>How Can Companies Secure Their Future with Rise in Agentic AI Adoption.<\/em>\u00a0<strong>Forbes (I)<\/strong>, October 30, 2025. <strong>[<\/strong>Mentioned in<strong> MIT Sloan in the News].<\/strong><\/li>\n<li><strong>R. Pal, <\/strong>B. Nag, and S. Mukherjee: <em>Cyber Risk on India's Electric Roads.<\/em>\u00a0<strong>Forbes (I)<\/strong>, October 16, 2025. [Mentioned in<strong> MIT Sloan in the News]<\/strong>.<\/li>\n<li><strong>R. Pal<\/strong>\u00a0and B. Nag: <em>Quantum Risk, National Fallout: Rethinking Cybersecurity Before its Too Late.<\/em>\u00a0<strong>Forbes (I)<\/strong>, September 30, 2025.\u00a0[Mentioned in<strong> MIT Sloan in the News]<\/strong>.<\/li>\n<li><strong>R. Pal<\/strong>, D. Granillo, and B. Nag: <em>How AI Hallucinations Endanger Software Supply Chain.<\/em>\u00a0<strong>Forbes (I)<\/strong>, August 28, 2025.<\/li>\n<li><strong>R. Pal<\/strong>, S. Mukherjee, and B. Nag: <em>Operational Economics Insights to Boost Cyber Resilience.<\/em>\u00a0<strong>Forbes (I)<\/strong>, August 11, 2025.<\/li>\n<li><strong>R. Pal<\/strong>, B. Nag, and E. Jain: <em>Why Does Cybersecurity Management in Enterprises Fail?<\/em>\u00a0<strong>Forbes (I)<\/strong>, July 2, 2025.\u00a0<strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li><strong>R. Pal<\/strong>, and B. Nag: <em>How to Manage Cyber Risk in AI LLM-driven Pharmaceutical Supply Chains.<\/em> <strong>Forbes (I)<\/strong>, June 11, 2025. <strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].\u00a0<\/strong><\/li>\n<li>C. Zhang, <strong>R. Pal<\/strong>, and B. Nag: <em>How to Manage GenAI Cyber Risk in Industrial Control Systems.<\/em> <strong>Forbes (I)<\/strong>, May 9, 2025.<\/li>\n<li><strong>R. Pal, <\/strong>S. Zeijlemaker, and B. Nag: <em>Importance of Boosting Insurance-Driven Cyber Resilience in the Generative AI World.<\/em> <strong>Forbes (I)<\/strong>, March 10, 2025. <strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].\u00a0<\/strong><\/li>\n<li><strong>R. Pal, <\/strong>Y. Lemiesa, M. Siegel, and B. Nag: <em>How Should Managers use AI for Critical Infrastructure Risk Management?<\/em> <strong>Forbes (I)<\/strong>, February 21, 2025.\u00a0<strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li><strong>R. Pal, <\/strong>M. Siegel, and B. Nag: <em>How Systemic Cyber Risk Management in Software Supply Chains Works with BOMs. <\/em><strong>Forbes (I)<\/strong>, December 24, 2024.<\/li>\n<li><strong>R. Pal, <\/strong>P. Liu<strong>, <\/strong>B. Nag, M. Devnani, and S. Kashyap: <em>Five Challenges to Ensuring Cyber Assurance in the Medical AI Business. <\/em><strong>Forbes (I)<\/strong>, November 7, 2024.<\/li>\n<li><strong>R. Pal, <\/strong>M. Siegel<strong>, <\/strong>and<strong>\u00a0<\/strong>B. Nag: <em>Three Action Items for Sustainable Cyber Insurance-Linked Securities Markets. <\/em><strong>Forbes (I)<\/strong>, August 27, 2024.<\/li>\n<li><strong>R. Pal, <\/strong>M. Siegel<strong>, <\/strong>and<strong>\u00a0<\/strong>B. Nag: <em>Three Things Industrial Control System Enterprises Should Do to Boost Cyber-Resilience.\u00a0<\/em><strong>Forbes (I)<\/strong>, April 11, 2024 <strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and<strong>\u00a0<\/strong>B. Nag:\u00a0<em>Considering Insurance to Manage IoT-driven Catastrophic Cyber-Risk.<\/em><em>\u00a0<\/em><strong>Forbes (I)<\/strong>, March 22, 2024\u00a0<strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li class=\"rtejustify\"><strong>B. Evans-Pritchard <\/strong>(quoted\u00a0<strong>R. Pal<\/strong>):\u00a0<em>India Cyber Feels Reinsurance Capacity Pinch.<\/em><em>\u00a0<\/em>Life Annuity Specialist<em>,\u00a0<\/em><strong>(Re)InAsia<\/strong>, March 20, 2024<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>,<strong>\u00a0<\/strong>B. Nag, and M. Siegel:\u00a0<em>Cyber-security Management Landscape of the Indian Automation Industry: Overview, Challenges, Action Points.\u00a0<\/em><strong>Forbes (I)<\/strong>, January 10, 2024\u00a0<strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li class=\"rtejustify\"><strong>A. Smith <\/strong>(quoted\u00a0<strong>R. Pal<\/strong>):\u00a0\u00a0<em>Customers Consider Dumping Carriers over Data Concerns.<\/em><em>\u00a0<\/em>Life Annuity Specialist<em>,\u00a0<\/em><strong>Financial Times<\/strong>, December 4, 2023<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>,<strong>\u00a0<\/strong>C. Zhang, B. Nag, and M. Siegel: <em>Why AI in Cybersecurity Needs to be Part of Business Strategy to Boost Resilience?\u00a0<\/em><strong>Forbes (I)<\/strong>, October 6, 2023\u00a0<strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>,<strong>\u00a0<\/strong>M. Rodrigues,\u00a0and B. Nag:\u00a0<em>The Cyber-Insurance Vision is Failing for Ransomware Attacks in India.\u00a0<\/em><strong>Forbes (I)<\/strong>, September 12, 2023\u00a0<strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li class=\"rtejustify\"><strong>R. Pal <\/strong>and\u00a0B. Nag:\u00a0<em>How Vedic Philosophies Can Help Boost Cybersecurity in Indian Corporations\u00a0<\/em><strong>Forbes (I)<\/strong>, June 12, 2023\u00a0<strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, B. Nag, and S. Madnick:\u00a0<em>How Insurance-Linked Securities Can Improve Cyber-Security in India.\u00a0<\/em><strong>Forbes (I)<\/strong>, May 8, 2023\u00a0<strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and B. Nag:\u00a0<em>Five Ways Indian Medical Administrations Can Boost Hospital Cyber-Security.\u00a0<\/em><strong>Forbes (I)<\/strong>, April 17, 2023\u00a0<strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and B. Nag:\u00a0<em>How Should Regulators Policy Cyber-Insurance for Indian Businesses?<\/em>\u00a0<strong>Forbes (I)<\/strong>, February 6, 2023\u00a0<strong>[<\/strong>Mentioned in\u00a0<strong>MIT Sloan in the News].<\/strong><\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and B. Nag:\u00a0<em>Vedas and Puranas Can Inspire Enterprises to Improve Cyber-Security Posture: A Cultural View of IT Security Governance in the Wake of AIIMS-like Cyber-Attacks.<\/em>\u00a0<strong>The Times of India<\/strong>, January 5, 2023<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and B. Nag:\u00a0<em>Cyber-Politics Meets the Statecraft Game.<\/em>\u00a0<strong>The Times of India<\/strong>, October 30, 2022<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, B. Nag, and C. Light:\u00a0<em>Why Cyber-Security Should Be a Strategy in the Infinite Corporate Game.<\/em>\u00a0<strong>Forbes (I)<\/strong>, October 17, 2022<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and B. Nag:\u00a0<em>Cyber-Threat Information Sharing Cooperative: Need of the Hour.<\/em>\u00a0<strong>Forbes (I)<\/strong>, September 14, 2022<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and B. Nag:\u00a0<em>Seven Challenges Against Securing the Systemic Cyber-Space in the Industrial IoT Age.<\/em>\u00a0<strong>Forbes (I)<\/strong>, July 14, 2022<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, B. Nag, and C-L. Chen:\u00a0<em>Seven Commandments of Privacy Governance in Information Capitalist Societies.<\/em>\u00a0<strong>Forbes (I)<\/strong>, April 5, 2022<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, B. Nag, C. Light, Y. Wang, D. Romero, J. Crowcroft, and K. Psounis: <em>Behavioral Economics: Why Indian Urbanites May Transparently Sell Their Data.<\/em>\u00a0<strong>Forbes (I)<\/strong>, February 22, 2022<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, B. Nag, C. Landwehr, J. Crowcroft, E. Hua, and T. Bandyopadhyay: <em>Will Insurance Improve Cyber-Security Practice for Businesses?.<\/em>\u00a0<strong>Forbes (I)<\/strong>, January 25, 2022,<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, J. Crowcroft, M. Liu, S. De, and B. Nag: <em>In Defense of a Transparent Data Economy for Data Capitalism.<\/em>\u00a0<strong>Forbes (I)<\/strong>, June 22, 2021,<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong> and B. Nag:\u00a0<em>Women Leadership in the Indian Corporate Sector: A Vedic Insight<\/em>,\u00a0<strong>The Economic Times<\/strong>, December 13, 2021<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, B. Nag, J. Crowcroft, M. Liu, P. Ghosh, and S. De: <em>Fixing the Data Economy, and Economic Inequality<\/em>,\u00a0<strong>The Financial Express<\/strong>, October 26, 2021<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, B. Nag, J. Crowcroft, M. Liu, P. Ghosh, and S. De: <em>Few Are Averse to Sharing Personal Data<\/em>,\u00a0<strong>The Financial Express<\/strong>, October 27, 2021<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, B. Nag, and R. Sequeira: <em>It's Time for Cyber-Insurance to Become Personal in the WFH Age.<\/em>\u00a0<strong>Forbes (I)<\/strong>, September 28, 2021<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, S. Biswas, and B. Nag:\u00a0<em>Negative Runs Can Better the Commerce and Bat-Ball Fairness of T20s.<\/em>\u00a0<strong>The Times of India<\/strong>, July 24, 2021<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong> and B. Nag:\u00a0<em>The Feasibility of Cyber-Risk Management to Ensure Social Good.<\/em>\u00a0<strong>Forbes (I)<\/strong>, April 30, 2020<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong> and B. Nag:\u00a0<em>Only Appropriate Data.<\/em>\u00a0<strong>The Economic Times<\/strong>, November 14, 2019<\/li>\n<\/ol>\n<h3 class=\"rtejustify\"><strong>Contributions to World Economic Forum Reports<\/strong><\/h3>\n<p class=\"rtejustify\">As an invited member of the\u00a0<em>Cyber-Resilience Working Group<\/em> of the World Economic Forum, I <strong>co-contributed<\/strong> articles of socio-economic impact with globally leading academics, corporate leaders, and researchers in the domain of cyber-resilience.<\/p>\n<ol>\n<li><a href=\"https:\/\/www.weforum.org\/publications\/response-to-the-white-houses-request-on-harmonizing-cybersecurity-regulations\" target=\"_blank\" rel=\"noopener\">Response to the White House's Request on Harmonizing Cybersecurity Regulations<\/a>, A\u00a0<strong>World Economic Forum\u00a0<\/strong>paper, October 23, 2023 [The response statement from the contributors reached the White House]<\/li>\n<li><a href=\"https:\/\/www3.weforum.org\/docs\/WEF_Facilitating_Global_Interoperability_Cyber_Regulations_2023.pdf\" target=\"_blank\" rel=\"noopener\">Facilitating Global Interoperability of Cyber Regulations in the Electricity Sector<\/a>, A\u00a0<strong>World Economic Forum\u00a0<\/strong>paper, November 18, 2023<\/li>\n<li><a href=\"https:\/\/www3.weforum.org\/docs\/WEF_Facilitating_Global_Interoperability_Cyber_Regulations_2023.pdf\">U<\/a><a href=\"https:\/\/www3.weforum.org\/docs\/WEF_Unlocking_Cyber_Resilience_in_Industrial_Environments_Five_Principles_2023.pdf\" target=\"_blank\" rel=\"noopener\">nlocking Cyber-Resilience in Industrial Environments: Five Principles<\/a>, A\u00a0<strong>World Economic Forum\u00a0<\/strong>paper, November 27, 2023<\/li>\n<li><a href=\"https:\/\/www.weforum.org\/stories\/2025\/04\/three-key-directions-for-the-cyber-resiliency-crisis-in-global-supply-chains\/\">Three Key Ways to Make Supply Chains More Resilient to Cyber Risks.<\/a> <strong>A World Economic Forum<\/strong> paper, April 23, 2025<\/li>\n<\/ol>\n<h3 class=\"rtejustify\"><strong>Peer-Reviewed Conference Proceedings<\/strong><\/h3>\n<ol>\n<li><strong>R. Pal<\/strong>, K. Duan, C. Zhang, and P. Liu: <em>A Strategic Lens for Threat Intelligence Sharing in Networks.<\/em> To Appear in Proceedings of <strong>ACM SIGSIM PADS<\/strong>, 2026, Vienna, Austria.<\/li>\n<li>L. Bluestein, <strong>R. Pal<\/strong>, T. Askerbekov, and M. Siegel: <i>A Formal and Deployable Gaming Operation to Defend IT\/OT Networks.<\/i> In Proceedings of <strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2025 <strong>(IEEE Press)<\/strong>, Seattle, Washington, USA.<\/li>\n<li><strong>R. Pal<\/strong>, K. Duan, S. Zeijlemaker, and M. Siegel: <i>A Theory to Quantitatively Estimate and Bound Systemic Cyber Risk. <\/i>\u00a0In Proceedings of <strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2025 <strong>(IEEE Press)<\/strong>, Seattle, Washington, USA.<\/li>\n<li><strong>R. Pal<\/strong>, B. Nag, S. Zeijlemaker, and M. Siegel: <i>Sustaining Capital-Boosted Cyber Reinsurance Markets using CAT Bonds. <\/i>In Proceedings of <strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2025 <strong>(IEEE Press)<\/strong>, Seattle, Washington, USA.<\/li>\n<li>Y. Lemiesa, <strong>R. Pal<\/strong>, and M. Siegel: <em>AI on Small and Noisy Data is Ineffective for ICS Cyber Risk Management<\/em>. In Proceedings of <strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2025 <strong>(IEEE Press)<\/strong>, Seattle, Washington, USA. <strong>['Best Paper Award Finalist' in the <em>Theory<\/em> track]<\/strong><\/li>\n<li>S. Zeijlemaker, <strong>R. Pal<\/strong>, J. Proudfoot, G. Kim, and M. Siegel: <em>Balancing Risk and Reward in Cybersecurity Investment Decisions.<\/em> In Proceedings of AIS<strong>\u00a0Americas Conference on Information Systems\u00a0<\/strong>(AMCIS), 2025, Montreal, Canada. <strong>[Among the TOP 25% of papers]<\/strong><\/li>\n<li>S. Zeijlemaker, <strong>R. Pal<\/strong>, J. Proudfoot, and M. Siegel: <em>Advancing Cyber-Risk Management by Reducing Strategic Control Gaps.<\/em> In Proceedings of AIS<strong>\u00a0Americas Conference on Information Systems\u00a0<\/strong>(AMCIS), 2025, Montreal, Canada. <strong>[Among the TOP 25% of papers]<\/strong><\/li>\n<li><strong>R. Pal, <\/strong>K. Duan, and R. Sequeira: <em>A Theory to Estimate, Bound, and Manage Systemic Cyber Risk. <\/em>In Proceedings of<strong> ACM SIGSIM PADS, <\/strong>2025, New Mexico, USA.<\/li>\n<li class=\"rtejustify\">C. Zhang, <strong>R. Pal<\/strong>, C. Nicholson, and M. Siegel: <em>(Gen)AI vs (Gen)AI in Industrial Control System Cybersecurity<\/em>. In Proceedings of <strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2024 <strong>(IEEE Press)<\/strong>, Orlando, Florida, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, R. Sequeira, S. Zeijlemaker: <em>How Hard is it to Estimate Systemic Enterprise Cyber-Risk? <\/em>In Proceedings of <strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2024 <strong>(IEEE Press)<\/strong>, Orlando, Florida, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, K. Duan, R. Sequeira, and M. Siegel: <em>Is Systemic Cyber Risk Management for Enterprises Sustainable?<\/em> In Proceedings of <strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2024 <strong>(IEEE Press)<\/strong>, Orlando, Florida, USA. <strong>['Best Paper Award Finalist' in both the <em>Theory<\/em> and <em>Application<\/em> tracks]<\/strong><\/li>\n<li><strong>R. Pal<\/strong>, R. Sequeira, S. Zeijlemaker, and M. Siegel: <em>Optimizing Cyber-Resilience in Critical Infrastructure Networks.<\/em> In Proceedings of <strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2024 <strong>(IEEE Press)<\/strong>, Orlando, Florida, USA.<\/li>\n<li class=\"rtejustify\">S. Zeijlemaker, <strong>R. Pal<\/strong>, and M. Siegel:\u00a0<em>Strengthening Managerial Foresight to Defeat Cyber-Threats.<\/em>\u00a0In Proceedings of\u00a0AIS<strong>\u00a0Americas Conference on Information Systems\u00a0<\/strong>(AMCIS), 2024, Utah, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal <\/strong>and\u00a0B. Nag:\u00a0<em>A Mathematical Theory to Price Cyber-CAT Bonds to Boost IT\/OT Security.<\/em>\u00a0In Proceedings of\u00a0<strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2023 <strong>(IEEE Press)<\/strong>, San Antonio, Texas, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, R. Sequeira, S. Zeijlemaker, and M. Siegel:\u00a0<em>A Network Theory to Quantify and Bound Cyber-Risk<\/em>\u00a0<em>in IT\/OT Systems.\u00a0<\/em>In\u00a0Proceedings of\u00a0<strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2023 <strong>(IEEE Press)<\/strong>, Texas, USA. <strong>['Best Paper Award Finalist' in the <em>Application<\/em> track]<\/strong><\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, R. Sequeira, and M. Siegel:\u00a0<em>A Mathematical Theory to Quantify Cyber-Resilience in IT\/OT Networks.<\/em>\u00a0In Proceedings of\u00a0<strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2023 <strong>(IEEE Press)<\/strong>, San Antonio, Texas, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, S. Madnick, and M. Siegel: <em>Trading in Catastrophe Bonds Can Boost Security Improving Cyber (Re-)Insurance Markets.<\/em>\u00a0In Proceedings of AIS\u00a0<strong>Americas Conference on Information Systems<\/strong> (AMCIS), 2023, Panama.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, R. Sequeira, Y. Zhu, and Y. She: <em>A Dynamic Theory of Security Free-Riding by Firms in the WFH Age<\/em>. In Proceedings of\u00a0<strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2022\u00a0<strong>(IEEE Press)<\/strong>, Singapore.<\/li>\n<li class=\"rtejustify\"><strong>B. Nag<\/strong>\u00a0and R. Pal:\u00a0<em>Simulation Optimization for Supply Chain Decision Making<\/em>. In Proceedings of\u00a0<strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2022\u00a0<strong>(IEEE Press)<\/strong>, Singapore.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, T. Lu, P. Liu, and X. Yin: <em>Optimal Cyber (Re-)Insurance Policy Writing is NP-Hard in IoT Societies<\/em>. In Proceedings of\u00a0<strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2021\u00a0<strong>(IEEE Press)<\/strong>, Phoenix, USA.<\/li>\n<li class=\"rtejustify\">A. Ahuja, <strong>R. Pal<\/strong>, V. Ribiero, and L. Golubchik:\u00a0<em>A Regulatory System for Optimal Legal Transaction Throughput in Cryptocurrency Blockchains<\/em>.\u00a0Appeared in the\u00a0<strong>Conference on Information Systems and Technologies<\/strong>\u00a0(CIST), 2021, Los Angeles, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, Y. Wang, C. Light, Y. Dong, P. Ghosh, M. Liu, H. Nagubandi, L. Golubchik, S. De, and B. Nag: <em>Do People Favor Personal Data Markets in a Surveillance Society?<\/em>\u00a0In Proceedings of\u00a0<strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2021<strong>\u00a0(IEEE Press)<\/strong>, Phoenix, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, Z. Huang, X. Yin, S. Lototsky, J. Crowcroft, and M. Liu: <em>Sustainable Catastrophic Cyber-Risk Management in IoT Societies<\/em>. In Proceedings of\u00a0<strong>Winter Simulation Conference\u00a0<\/strong>[an INFORMS event], 2020\u00a0<strong>(IEEE Press)<\/strong>, Orlando, USA.\u00a0<em>[<strong>Attention<\/strong>\u00a0- The numerical evaluation section of this paper is incorrect. Initially an incorrect version appeared in the extended\u00a0<strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9264245\">journal publication<\/a><\/strong>, but was then corrected. The reader should refer the\u00a0<strong><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9475589\">corrected version<\/a><\/strong> of the journal paper for insights on the numerical evaluation. Due to lack of space in the conference version, the mention of relevant works by Ibragimov et.al., that tutor the audience on stable distributions is omitted (but considered in the extended journal version); instead, the works by Zolotarev et.al., on stable distributions are included that pre-date the papers by Ibragimov et.al., and is also cited by Ibragimov. et.al.]<\/em><\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, M. Paolieri, and L. Golubchik:\u00a0<em>Performance Driven Resource Sharing Markets for the Small Cloud<\/em>. In Proceedings of\u00a0<strong>IEEE ICDCS<\/strong> 2017, Atlanta, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, L. Golubchik, K. Psounis, and P. Hui:\u00a0<em>Will Cyber-Insurance Improve Network Security? A Market Analysis.<\/em>\u00a0In Proceedings of\u00a0<strong>IEEE INFOCOM<\/strong>, 2014, Toronto, Canada.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and L.Golubchik:\u00a0<em>Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage.<\/em>\u00a0In Proceedings of\u00a0<strong>IEEE ICDCS<\/strong> 2010, Genoa, Italy.<\/li>\n<li class=\"rtejustify\">S-H. Lin, <strong>R. Pal<\/strong>, B. Wang, and L. Golubchik:\u00a0<em>Sustaining Ad-Driven P2P Streaming Ecosystems - A Market-Based Approach.<\/em> In Proceedings of\u00a0<strong>IEEE\/ACM IWQoS<\/strong>, 2015, Portland, USA, with ACM FCRC 2015.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, C. Chelmis, C. Tadepalli, M. Frincu, S. Aman, and V. Prasanna: <em>On Online Time Series Clustering For Demand Response: A Theory to Break the \"Curse of Dimensionality\"<\/em>. In Proceedings of\u00a0<strong>ACM E-Energy<\/strong>, 2015, Bangalore, India.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, L. Golubchik, and K. Psounis:\u00a0<em>Aegis - A Novel Cyber-Insurance Model<\/em>. In Proceedings of\u00a0<strong>ACM\/GTS GameSec<\/strong>, 2011, Maryland, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and P. Hui:\u00a0<em>Modeling Investments in Internet Security - Tackling Topological Information Uncertainty<\/em>.\u00a0In Proceedings of\u00a0<strong>ACM\/GTS GameSec<\/strong>, 2011, Maryland, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, L. Golubchik, K. Psounis, and P. Hui:\u00a0<em>On A Way to Improve Cyber-Insurer Profits - When A Security Vendor Becomes the Cyber-Insurer.<\/em>\u00a0In Proceedings of\u00a0<strong>IFIP Networking<\/strong>, 2013, New York, USA.<\/li>\n<li class=\"rtejustify\">C. Leberknight, <strong>R. Pal<\/strong>, M. Chiang, and H. V. Poor:\u00a0<em>The Sharing-Mart System - Online Digital Content Trading, Online Auctions,and Incentives.<\/em>\u00a0In Proceedings of\u00a0<strong>GameNets,<\/strong>\u00a02011, Shanghai, China.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and C-N.Chuah:\u00a0<em>Characterizing Link Importance in Multi-Channel, Multi-Radio, Multi-Rate Wireless Mesh Networks.<\/em>\u00a0In Proceedings of\u00a0<strong>IEEE WCNC<\/strong>, 2008, Las Vegas, USA.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>:\u00a0<em>On the Reliability of Multi-Hop Dynamic Spectrum Access Networks Supporting QoS-Driven Applications.<\/em>\u00a0In Proceedings of\u00a0<strong>IEEE ICC<\/strong>, 2007, Glasgow, Scotland.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>:\u00a0<em>On Wireless Social Community Network Routers - The Design and Cost-Sharing Problem for Better Deployment<\/em>.\u00a0In Proceedings of\u00a0<strong>IEEE GLOBECOM<\/strong>, 2010, Miami, USA. [A Version appeared in\u00a0<strong>WWW SIMPLEX<\/strong>\u00a02012, Lyon, France]<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>:\u00a0<em>A Lexicographic Load-Balanced Routing Scheme for Wireless Mesh Networks.<\/em>\u00a0In Proceedings of\u00a0<strong>IEEE ICC<\/strong>, 2008, Beijing, China.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>:\u00a0<em>Efficient Routing Algorithms for Multi-Channel Dynamic Spectrum Access Networks.<\/em>\u00a0In Proceedings of\u00a0<strong>IEEE Dyspan<\/strong>, 2007, Dublin, Ireland.<\/li>\n<li class=\"rtejustify\">S. Bandyopadhyay, M. N. Pal, D. Saha, T. Ueda, K. Hasuike, <strong>R. Pal<\/strong>:\u00a0<em>Improving System Performance of Ad Hoc Wireless Network with Directional Antenna.<\/em>\u00a0In Proceedings of\u00a0<strong>IEEE ICC<\/strong>, 2003, Anchorage, USA.<\/li>\n<\/ol>\n<h3 class=\"rtejustify\"><strong>Publications in Academic Journals<\/strong><\/h3>\n<ol>\n<li class=\"rtejustify\"><strong>R. Pal, <\/strong>P. Liu, T. Lu, and E. Hua:\u00a0<em>How Hard is Cyber-Risk Management in IT\/OT Systems? A Theory to Classify and Conquer the Hardness of Insuring ICSs.\u00a0<\/em>In<strong>\u00a0ACM Transactions on Cyber-Physical Systems,\u00a0<\/strong>2023, Vol. 6(4).<\/li>\n<li class=\"rtejustify\"><strong>R. Pal, <\/strong>X. Yin, R. Sequeira, S. Zeijlemaker, and V. Kotala:\u00a0<em>How Can Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk in their Industrial IoT Network?<\/em>\u00a0Accepted to Appear in\u00a0<strong>ACM Transactions on Management Information Systems<\/strong>, 2023\u00a0[Abstract in SIAM Conference in Financial Engineering 2021].<\/li>\n<li class=\"rtejustify\"><strong>R. Pal, <\/strong>R. Sequeira, Y. Zhu, A. Marotta, M. Siegel, and E. Hua:\u00a0<em>How Suboptimal is Work-From-Home Security in IT\/OT Enterprises? A Strategic Organizational Theory for Managers.<\/em>\u00a0Accepted to Appear in<strong>\u00a0ACM Transactions on Management Information Systems<\/strong>.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, K. Psounis, J. Crowcroft, P. Hui, J. Kelly, A. Chatterjee, A. Kumar, L. Golubchik, S. Tarkoma, N. Sastry, and B. Nag: <em>When<\/em>\u00a0<em>Are Cyber Blackouts in IT-Driven Service Networks Likely?: A Network Oblivious Theory of Cyber R(e)Insurance Feasibility.<\/em>\u00a0In<strong>\u00a0ACM Transactions on Management Information Systems<\/strong>, 2020, Vol. 11(4) [Abstract in the INFORMS Security Conference, 2020].<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, Z. Huang, S. Lototsky, X. Yin, J. Crowcroft, M. Liu, S. De, N. Sastry, and S. Tarkoma: <em>Aggregate Cyber-Risk Management in the IoT Age: Cautionary Statistics for (Re)Insurers and Likes.<\/em>\u00a0<strong>In IEEE Internet of Things Journal<\/strong>, 2021, Vol. 8(9).<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, Z. Huang*, S. Lototsky, X. Yin, J. Crowcroft, M. Liu, S. De, N. Sastry, and B. Nag:\u00a0<em>Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age?: A Cautionary Economics Tale for (Re)Insurers and Likes<\/em><em>.<\/em>\u00a0In<strong>\u00a0ACM Transactions on Management Information Systems<\/strong>, 2021, Vol. 12(2)<\/li>\n<li class=\"rtejustify\">\u00a0<strong>R. Pal<\/strong>, L. Golubchik, K. Psounis, and P. Hui:\u00a0<em>Differentiated Security Pricing as an Enabler of Cyber-Insurance - A First Look at a Markets Approach.<\/em>\u00a0In\u00a0<strong>IEEE Transactions of Dependable and Secure Computing<\/strong>, 2019, Vol. 16(2).<\/li>\n<li><strong>R. Pal<\/strong>\u00a0and J. Crowcroft:\u00a0<em>Privacy Trading in the Surveillance Capitalism Age: Viewpoints on `Privacy-Preserving' Societal Value Creation.<\/em> \u00a0In <strong>ACM SIGCOMM Computer Communication Review<\/strong>, Vol. 49(3), 2019.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and V. Prasanna:\u00a0<em>The STREAM Mechanism for CPS Security - The Case of the Smart Grid.<\/em>\u00a0In\u00a0<strong>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems<\/strong>, 2017, Vol. 36(4)<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, L. Golubchik, K. Psounis, and T. Bandyopadhyay:\u00a0<em>On Robust Estimates of Correlated Cyber-Insured IT Risk: A First Take of Optimal AI-Based Estimates under 'Small' Data.<\/em>\u00a0In\u00a0<strong>ACM Transactions on Management Information Systems<\/strong>, 2019, Vol. 10(3).<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, L. Golubchik, K. Psounis, and P. Hui:\u00a0<em>Improving Cyber-Security via Profitable Insurance Markets<\/em>. In\u00a0<strong>ACM SIGMETRICS Performance Evaluation Review<\/strong>, 2018, Vol. 45(4).<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, J. Li, J. Crowcroft, M. Liu, Y. Li, and N. Sastry: <em>Privacy Risk is a Function of Information Type: Learnings for the Surveillance Capitalism Age<\/em>. In\u00a0<strong>IEEE Transactions on Network and Service Management<\/strong>, 2021, Vol. 18(3).<\/li>\n<li class=\"rtejustify\">C-L. Chen, <strong>R. Pal<\/strong>, and L. Golubchik:\u00a0<em>Achieving Transparency Report Privacy in Linear Time.<\/em>\u00a0In\u00a0<strong>ACM Journal of Data and Information Quality<\/strong>, 2022, Vol. 14(2).<\/li>\n<li class=\"rtejustify\"><strong>R.Pal<\/strong>, P. Hui, and V. Prasanna -\u00a0<em>On Privacy Engineering in the Smart Micro-Grid.<\/em>\u00a0In\u00a0<strong>IEEE Transactions on Knowledge and Data Engineering<\/strong>, 2018, Vol. 31(5)<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, Y. Wang, J. Crowcroft, M. Liu, S. De, S. Tarkoma, Y. Li, A. Kumar, P. Hui, and B. Nag: <em>Preference-Based Privacy Markets<\/em>. In\u00a0<strong>IEEE Access<\/strong>, 2020, Vol. 8.\u00a0[A 'position' version appeared in ACM SIGCOMM Computer Communication Review, 2019, Vol. 49(3)]<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and P. Hui:\u00a0<em>Economic Models for Cloud Service Markets: Pricing and Capacity Planning<\/em>. In\u00a0<strong>Theoretical Computer Science<\/strong>\u00a0(TCS), 2013, Vol. 96 [Received an honor citation from TCS for being one of their top FIVE accessed papers from 2010-2014]<\/li>\n<li class=\"rtejustify\">A. Ahuja, V. Ribeiro, and <strong>R. Pal<\/strong>:\u00a0<em>How Should We Regulate Cryptocurrencies by Consensus?: A Strategic Framework for Optimal Legal Transaction Throughput<\/em><em>.<\/em>\u00a0In\u00a0<strong>ACM Journal on Distributed Ledger and Technologies<\/strong>, 2022, Vol. 2(1).<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, N. Sastry, E. Obiodu, S. Prabhu, and K. Psounis: <em>EdgeMart - A Networked OTT Economy on the Wireless Edge for Saving Multimedia IP Bandwidth.<\/em> In <strong>ACM Transactions on Autonomous and Adaptive Systems<\/strong>, 2023, Vol. 18(2) [Abstract in INFORMS Annual Meeting 2021].<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, S-H. Lin, A. Ahuja, N. Jagadeesan, A. Kumar, and L. Golubchik:\u00a0<em>Are Federated Cloud Sharing Systems Sustainable? On Dynamic Sharing Markets and their Stability<\/em>. In\u00a0<strong>IEEE Transactions on Sustainable Computing<\/strong>, 2020, Vol. 5(4).<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, S-H. Lin, A. Ahuja, N. Jagadeesan, A. Kumar, and L. Golubchik: On the Economic Sustainability of Cloud Sharing Systems: Are Dynamic Single Resource Sharing Markets Stable? In <strong>ACM SIGMETRICS Performance Evaluation Review<\/strong>, 2019, Vol. 46(4).<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, X. Yin, and L. Golubchik:\u00a0<em>Graphical Federated Cloud Sharing Markets.<\/em>\u00a0In\u00a0<strong>IEEE Transactions on Sustainable Computing<\/strong>, 2020, Vol. 6(4).<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, C. Chelmis, M. Frincu, and V. Prasanna:\u00a0<em>MATCH for the Prosumer Smart Grid: The Algorithmics of Real-Time Power Balance.<\/em>\u00a0In\u00a0<strong>IEEE Transactions on Parallel and Distributed Systems<\/strong>, 2016, Vol. 27(12).<\/li>\n<li class=\"rtejustify\">S-H. Lin, <strong>R. Pal<\/strong>, B. Wang, and L. Golubchik:\u00a0<em>On a Market-Driven Hybrid P2P Video Streaming Approach.<\/em>\u00a0In\u00a0<strong>IEEE Transactions on Multimedia<\/strong>, 2016, Vol. 19(5).<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, C. Chelmis, M. Frincu, and V. Prasanna:\u00a0<em>Towards Dynamic Demand Response - On Efficient Consumer Grouping Algorithmics.<\/em>\u00a0In\u00a0<strong>IEEE Transactions on Sustainable Computing<\/strong>, 2016, Vol 1(1).<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, J. Mitra, and M. N. Pal: Evaluation of Relative Performance of Product Designs: A Fuzzy DEA Approach to Quality Function Deployment, In\u00a0<strong>Opsearch (Springer)<\/strong>, Vol. 44, 2007<strong>\u00a0(Undergraduate Thesis)<\/strong>\u00a0[Abstract in the INFORMS Annual Meeting, 2001].<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>\u00a0and P. Hui:\u00a0<em>Cyber-Insurance for Cyber-Security: A Topological Take on Modulating Insurance Premiums.<\/em> In <strong>ACM SIGMETRICS Performance Evaluation Review<\/strong>, Vol. 40(3), 2012. [Short Journal Paper]<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>, S. Kosta, and P. Hui:\u00a0<em>Settling for Less - A QoS Compromise Mechanism for Mobile Social Networks.<\/em> In\u00a0<strong>ACM SIGMETRICS Performance Evaluation Review<\/strong>, Vol. 39(3), 2011. [Short Journal Paper]<\/li>\n<li><strong>R. Pal<\/strong>\u00a0and L. Golubchik:\u00a0<em>On the Economics of Information Security: The Problem of Designing<\/em>\u00a0<em>Optimal Cyber-Insurance Contracts.\u00a0<\/em>In <strong>ACM SIGMETRICS Performance Evaluation Review<\/strong>, Vol. 38(2), 2010. [Short Journal Paper]<\/li>\n<\/ol>\n<h3 class=\"rtejustify\"><strong>Book Chapters<\/strong><\/h3>\n<ol>\n<li>B. Nag<b> <\/b>and <strong>R. Pal<\/strong>: <em>A Practitioners Guide to Simulation Modeling.<\/em> In <strong>Advanced System Modeling and Simulation<\/strong>, Eds. A. Awasthi, (To Appear) <strong>Elsevier Press<\/strong>, 2027.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal<\/strong>:\u00a0<em>Cyber-Insurance Market.\u00a0<\/em>In<strong>\u00a0Encyclopedia of Cryptography, Security, and Privacy,\u00a0<\/strong>Eds. S. Jajodia, P. Samarati, and M. Yung. <strong>Springer<\/strong>, 2025.<\/li>\n<li>B. Nag<strong>,<\/strong> M. Devnani, and <strong>R. Pal<\/strong>: <em>Navigating the Ethereal: Ethical Frameworks in AI<\/em> <em>for Healthcare.<\/em> In <strong>Advances in Artificial Intelligence for Healthcare Applications<\/strong>, Eds. R. Ghosh and C. Neogi,\u00a0<strong>CRC Press (Taylor and Francis Group)<\/strong>, 2025.<\/li>\n<li class=\"rtejustify\"><strong>R. Pal, <\/strong>J. Mitra, and M. N. Pal:\u00a0<em>A Fuzzy-DEA Approach on Quality Function Deployment for Evaluation of Relative Efficiency of Product Designs.<\/em>\u00a0In\u00a0<strong>Theory and Applications of Productivity and Efficiency: Econometric and DEA Approach<\/strong>, Eds. R. Ghosh and C. Neogi,\u00a0<strong>Macmillan Publishers<\/strong>, 2005. <strong>[Undergraduate Research]<\/strong><\/li>\n<\/ol>\n<h3 class=\"rtejustify\"><strong>Hobby (Vedic Astrology)<\/strong><\/h3>\n<p class=\"rtejustify\">My books on Vedic astrology (On <strong>Amazon<\/strong> and <strong>Barnes and Noble<\/strong> worldwide).<\/p>\n<ol>\n<li><strong>R. Pal<\/strong>:\u00a0<a href=\"https:\/\/amzn.in\/d\/fFnsdvB\"><em>Navamsa: A Practical Treatise on Prediction<\/em>.<\/a>\u00a0<strong>Motilal Banarsidass International Publishers<\/strong>, 2025 <strong>(Book) [An Amazon Bestseller]<\/strong><\/li>\n<li><strong>R. Pal<\/strong>:\u00a0<a href=\"https:\/\/amzn.in\/d\/gvWxmkA\"><em>Will Rahu Give Spiritual Ethos? An Argumentative Analysis in Jyotish<\/em><\/a>.\u00a0<strong>Motilal Banarsidass International Publishers<\/strong>, 2025 <strong>(Book) [An Amazon Bestseller]<\/strong><\/li>\n<li>R. Shukla, <strong>R. Pal<\/strong>, and E. Jain: <a href=\"https:\/\/www.amazon.in\/dp\/9348911988\/ref=mp_s_a_1_1?crid=12XB8TUJKJC0M&amp;dib=eyJ2IjoiMSJ9.kYsWchsYOUYcJJi3PYHS1nEe9msA6iefNxq43NqhdkJCXqTYJ_jhEjMdmwUvwu3O5sXZrV5r_SZ-0FxHrQW8QA_3vXSLUjlqqLjaYNUe8Xzlks8MEO2wj8_7pQAdEWe5sDzNDiXu6GFV1dj5qA_mh8jsioB8APpCDBnqztOaxH8rlkJghBj1AuJucnbfvazDJxfz0zQVPtJdUl6YENK6aA.K_r_NeWIzkKyEd4fJ8c9Saf_SrhxHd_9Gik6vyCqoS4&amp;dib_tag=se&amp;keywords=rahu+and+spirituality&amp;qid=1766683856&amp;sprefix=rahu+and+s%2Caps%2C378&amp;sr=8-1\">Rahu and Spirituality - A <em>Triveni<\/em> of <em>Parashari, Nakshatra<\/em>, and <em>Nadi Jyotish. <\/em><\/a><strong>Motilal Banarsidass International Publishers<\/strong>, 2025 <strong>(Book)<\/strong><\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<footer class=\"add-gutter\" role=\"contentinfo\">\n<div class=\"region region-footer\">\n<div id=\"block-cloudhelper-mit-identity\" class=\"block block-cloudhelper\">\n<div class=\"block-inner clearfix\"><\/div>\n<\/div>\n<\/div>\n<\/footer>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Publications Thought Leadership\/Practitioner (Business Press) I closely study the cyber risk\/resilience management space (through the help of academics, industry\/government relations, surveys, and case studies) and how they relate with my research ideas and results. I am thankful to leading business press and practitioner venues for inviting me to write for them. Some thought leadership articles [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-two-column.php","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"class_list":["post-9","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.0 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ranjan Pal | Resarch Scientist, MIT Sloan<\/title>\n<meta name=\"description\" content=\"Publications from Ranjan Pal, Research Scientist at Cybersecurity at MIT Sloan (CAMS).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Publications\" \/>\n<meta property=\"og:description\" content=\"Publications from Ranjan Pal, Research Scientist at Cybersecurity at MIT Sloan (CAMS).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/\" \/>\n<meta property=\"og:site_name\" content=\"Ranjan Pal\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T17:08:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/\",\"url\":\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/\",\"name\":\"Ranjan Pal | Resarch Scientist, MIT Sloan\",\"isPartOf\":{\"@id\":\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/#website\"},\"datePublished\":\"2024-05-22T21:09:57+00:00\",\"dateModified\":\"2026-03-26T17:08:43+00:00\",\"description\":\"Publications from Ranjan Pal, Research Scientist at Cybersecurity at MIT Sloan (CAMS).\",\"breadcrumb\":{\"@id\":\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/#website\",\"url\":\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/\",\"name\":\"Ranjan Pal\",\"description\":\"MIT Sloan faculty personal website\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ranjan Pal | Resarch Scientist, MIT Sloan","description":"Publications from Ranjan Pal, Research Scientist at Cybersecurity at MIT Sloan (CAMS).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/","og_locale":"en_US","og_type":"article","og_title":"Publications","og_description":"Publications from Ranjan Pal, Research Scientist at Cybersecurity at MIT Sloan (CAMS).","og_url":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/","og_site_name":"Ranjan Pal","article_modified_time":"2026-03-26T17:08:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/","url":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/","name":"Ranjan Pal | Resarch Scientist, MIT Sloan","isPartOf":{"@id":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/#website"},"datePublished":"2024-05-22T21:09:57+00:00","dateModified":"2026-03-26T17:08:43+00:00","description":"Publications from Ranjan Pal, Research Scientist at Cybersecurity at MIT Sloan (CAMS).","breadcrumb":{"@id":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/#website","url":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/","name":"Ranjan Pal","description":"MIT Sloan faculty personal website","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/wp-json\/wp\/v2\/pages\/9","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/wp-json\/wp\/v2\/comments?post=9"}],"version-history":[{"count":30,"href":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/wp-json\/wp\/v2\/pages\/9\/revisions"}],"predecessor-version":[{"id":87,"href":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/wp-json\/wp\/v2\/pages\/9\/revisions\/87"}],"wp:attachment":[{"href":"https:\/\/mitmgmtfaculty.mit.edu\/rpal\/wp-json\/wp\/v2\/media?parent=9"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}