<node id="144981">
  <nid>144981</nid>
  <type>news</type>
  <uid>
    <user id="27694"><![CDATA[27694]]></user>
  </uid>
  <created>1344427018</created>
  <changed>1475896360</changed>
  <title><![CDATA["Multilateral Cyber Solutions: Contemporary Realities" Article Published]]></title>
  <body><![CDATA[CISTP Distinguished Senior Research Fellow Tony Rutkowski, CISTP Senior Research Associate William Foster,&nbsp;and Professor and CISTP Co-Director Sy Goodman published an article this summer in the Federation&nbsp;of American Scientists. &nbsp;&nbsp;The article explores what kind of trust based relationships can best support "continuous monitoring", &nbsp;the new strategy of sharing cybersecurity threats so that they can be addressed. &nbsp; The InternationalTelecommunications Union is not an appropriate place to develop these trust based relationships.&nbsp;<p class="p1">A. M. Rutkowski, W. A. Foster, S. E. Goodman, “Multilateral Cyber Security Solutions: Contemporary Realities,” Public Interest Report,&nbsp;Federation of American Scientists, Vol. 65(1), Summer 2012, 7 pages.</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2012-09-19T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[CISTP Distinguished Senior Research Fellow Tony Rutkowski, CISTP Senior Research Associate William Foster,&nbsp;and Professor and CISTP Co-Director Sy Goodman published an article this summer in the Federation&nbsp;of American Scientists.]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="155531">
            <nid>155531</nid>
            <type>image</type>
            <title><![CDATA[Foster & Goodman PIR Publication Summer 2012]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>195281</fid>
                  <filename><![CDATA[pir-summer2012home.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/pir-summer2012home_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/pir-summer2012home_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Foster & Goodman PIR Publication Summer 2012]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[william.foster@inta.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>William Abbott Foster, PhD<br />Senior Research Associate<br />Center for International Strategy, Technology, and Policy (CISTP)<br />Sam Nunn School of International Affairs<br />Georgia Institute of Technology<br />cell: 520-440-0807</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1281</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>http://www.fas.org/pubs/pir/2012summer/vol65no1.html</url>
      <title></title>
      </link>
          <link>
      <url>http://www.fas.org/pubs/pir/_docs/2012Spring_Multilateral_Cybersecurity_Solutions.pdf</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1281</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Ivan Allen College of Liberal Arts]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>795</tid>
        <value><![CDATA[CISTP]]></value>
      </item>
          <item>
        <tid>344</tid>
        <value><![CDATA[cyber]]></value>
      </item>
          <item>
        <tid>39961</tid>
        <value><![CDATA[FAS]]></value>
      </item>
          <item>
        <tid>39971</tid>
        <value><![CDATA[Foster]]></value>
      </item>
          <item>
        <tid>343</tid>
        <value><![CDATA[goodman]]></value>
      </item>
          <item>
        <tid>39951</tid>
        <value><![CDATA[Multilateral]]></value>
      </item>
          <item>
        <tid>10764</tid>
        <value><![CDATA[Rutkowski]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
