Now showing items 1-5 of 5
Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond?
(Georgia Institute of Technology, 2017-05-01)
Rep. Tom Graves (R-Ga. 14), in cooperation with the Georgia Institute of Technology, hosts a conversation for executives and thought leaders in Atlanta about cybersecurity policy and technical challenges that are stifling ...
What Can Social Science Contribute to Cybersecurity Attribution Research?
(Georgia Institute of Technology, 2017-09-15)
How can we develop an institutional framework that can facilitate the provision of authoritative public attributions on a global scale? In cybersecurity cases, we want to know not only who did it (i.e., which individuals ...
The Non-Code Aspects of Cybersecurity and the Globalization of Criminal Evidence
(Georgia Institute of Technology, 2017-10-13)
In this session, Professor Peter Swire will present two current research topics in cybersecurity. The first addresses the non-code aspects of cybersecurity. Computer scientists are familiar with the seven layers of the ...
The Domestic Benefits of Subversive Foreign Propaganda: The RT (Russia Today) News Network and Geopolitical Muckraking
(Georgia Institute of Technology, 2017-10-20)
2017’s biggest news story has been Russia’s alleged use of social media to try to influence Western elections. Much criticism is directed towards RT.com, the “Russia Today” news network created in 2005 by the Russian ...
What Constitutes an Act of War in Cyberspace?
(Georgia Institute of Technology, 2017-11-17)
Is cyberspace merely another domain for 21st Century kinetic battles to operate in, or does it merit special consideration and unique rules of engagement? In this talk, Holly Dragoo will explore the challenges of why it’s ...