{"595140":{"#nid":"595140","#data":{"type":"event","title":"Cybersecurity Lecture Series with Milton Mueller","body":[{"value":"\u003Ch5\u003E\u003Cstrong\u003E\u003Cem\u003E\u0026ldquo;What Can Social Science Contribute to Cybersecurity Attribution Research?\u0026rdquo;\u003C\/em\u003E\u003C\/strong\u003E\u003C\/h5\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cp\u003EHow can we develop an institutional framework that can facilitate the provision of authoritative public attributions on a global scale?\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\nIn cybersecurity cases, we want to know not only who did it (i.e., which individuals were responsible for an intrusion, exploit or attack), but also who is responsible or who they were working for. Ideally, the attribution should satisfy not only ourselves, but many others. That is, we want the forms and methods of attribution to produce inter-subjective legitimacy and validity, even among parties who might be antagonistic or have radically different interests and perspectives.\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\nIn our view, the achievement of inter-subjectivity in cyber attributions would be an institutional accomplishment, not just a forensic or technological accomplishment. This presentation explores some of the issues and problems raised by authoritative public attribution in the international arena.\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/attend.com\/cyberlecture-Mueller\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003ERegister to attend\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EMilton Mueller\u003C\/strong\u003E is a professor at the Georgia Tech School of Public Policy and an internationally prominent scholar, specializing in the political economy of information and communication. The author of seven books and scores of journal articles, his work informs not only public policy but also science and technology studies, law, economics, communications, and international studies. His books\u0026nbsp;\u003Ca href=\u0022http:\/\/www.amazon.com\/Networks-States-Governance-Information-Revolution\/dp\/0262014599\/ref=sr_1_1?s=books\u0026amp;ie=UTF8\u0026amp;qid=1289236245\u0026amp;sr=1-1\u0022 target=\u0022_blank\u0022\u003ENetworks and States: The global politics of Internet governance\u003C\/a\u003E\u0026nbsp;(MIT Press, 2010) and\u0026nbsp;\u003Ca href=\u0022https:\/\/mitpress.mit.edu\/books\/ruling-root\u0022 target=\u0022_blank\u0022\u003ERuling the Root: Internet Governance and the Taming of Cyberspace\u003C\/a\u003E\u0026nbsp;(MIT Press, 2002) are acclaimed scholarly accounts of the global governance regime emerging around the Internet. Mueller\u0026rsquo;s research employs the theoretical tools of institutional economics, STS and political economy, as well as historical, qualitative and quantitative methods.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EOrganized by the\u0026nbsp;\u003Ca href=\u0022https:\/\/protect-us.mimecast.com\/s\/1dr5BkcYL59Mh8\u0022 rel=\u0022noopener\u0022 target=\u0022_blank\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E, the free and open-to-the-public Cybersecurity Lecture Series \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003Emeets throughout the fall\u003C\/a\u003E each Friday at Noon on the Georgia Tech campus, August \u0026ndash; December. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/sign-cybersecurity-lecture-updates\u0022\u003EReceive future schedule updates\u003C\/a\u003E\u003C\/strong\u003E\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech\u0026rsquo;s free and open-to-the-public Cybersecurity Lecture Series features Milton Mueller, professor, School of Public Policy.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech\u2019s Cybersecurity Lecture Series with Milton Mueller"}],"uid":"34554","created_gmt":"2017-08-28 17:58:38","changed_gmt":"2017-08-28 19:04:34","author":"ralu3","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-09-15T13:00:00-04:00","event_time_end":"2017-09-15T14:00:00-04:00","event_time_end_last":"2017-09-15T14:00:00-04:00","gmt_time_start":"2017-09-15 17:00:00","gmt_time_end":"2017-09-15 18:00:00","gmt_time_end_last":"2017-09-15 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=8s4XWw-w"}},"446071":{"id":"446071","type":"image","title":"Dr. Milton Mueller","body":null,"created":"1449256217","gmt_created":"2015-12-04 19:10:17","changed":"1610725036","gmt_changed":"2021-01-15 15:37:16","alt":"","file":{"fid":"203200","name":"miltoncrop.jpg","image_path":"\/sites\/default\/files\/images\/miltoncrop_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/miltoncrop_0.jpg","mime":"image\/jpeg","size":33324,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/miltoncrop_0.jpg?itok=cYymCksC"}}},"media_ids":["593723","446071"],"groups":[{"id":"1281","name":"Ivan Allen College of Liberal Arts"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ELindsey Panetta, \u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}