Person:
Mueller, Milton L.

Associated Organization(s)
ORCID
ArchiveSpace Name Record

Publication Search Results

Now showing 1 - 2 of 2
  • Item
    What Can Social Science Contribute to Cybersecurity Attribution Research?
    (Georgia Institute of Technology, 2017-09-15) Mueller, Milton L.
    How can we develop an institutional framework that can facilitate the provision of authoritative public attributions on a global scale? In cybersecurity cases, we want to know not only who did it (i.e., which individuals were responsible for an intrusion, exploit or attack), but also who is responsible or who they were working for. Ideally, the attribution should satisfy not only ourselves, but many others. That is, we want the forms and methods of attribution to produce inter-subjective legitimacy and validity, even among parties who might be antagonistic or have radically different interests and perspectives. In our view, the achievement of inter-subjectivity in cyber attributions would be an institutional accomplishment, not just a forensic or technological accomplishment. This presentation explores some of the issues and problems raised by authoritative public attribution in the international arena.
  • Item
    Cyber MayDay: Who Is in Command When Your Business is in the Crosshairs and How Do You Respond?
    (Georgia Institute of Technology, 2017-05-01) Cross, Stephen ; Graves, John Thomas ; Lens, John ; Mueller, Milton L. ; Pair, Stephen ; Sinema, Krysten ; Swire, Peter ; Worley, Candace
    Rep. Tom Graves (R-Ga. 14), in cooperation with the Georgia Institute of Technology, hosts a conversation for executives and thought leaders in Atlanta about cybersecurity policy and technical challenges that are stifling industry innovation today and leaving companies vulnerable. Of importance to discuss: Who protects critical business infrastructure from cyberattacks? What forms of retaliation should be permissible? Should companies be allowed to take active-defense measures? What will deter hackers? When governments engage in nation-state cyberattacks, how can businesses avoid becoming a proxy battleground? How can public policy be improved to help industry and governments protect one another?