Stacia Lee

Stacia Lee is an International Policy Institute Cybersecurity Policy Fellow. She is a recent graduate of the Henry M. Jackson School of International Studies with an emphasis in foreign policy...
View Stacia Lee's profile

Jackson School News: Stacia Lee

Cyberattack Attribution

March 19, 2019

Posted by: jdpritch

Cyberattack Attribution

In 2017, the GRG worked on another Microsoft project detailing current best practices for international cyberattack attribution and response. After creating a referenceable data set, the research team drew upon

Presenting to the Pros: Jackson School Students Research Cyberattack Attribution for Microsoft

July 29, 2017

Posted by: jlbeyer

Jackson School Applied Research Project students at Microsoft

During spring quarter, one of the Jackson School’s Applied Research Program student teams was given a daunting task – help Microsoft think about Brad Smith’s call for a Digital Geneva Convention. In addition to weighing in on current Microsoft strategy, the students found out that they were working on the exact same research task that Microsoft had asked RAND to tackle. The project was the fifth product of a Jackson School Applied Research collaboration with Microsoft’s Global Security Strategy & Diplomacy Team.

Bridging the gap in cybersecurity policy

February 13, 2017

Posted by: thormm

Jackson School faculty, alumni and students present their cybersecurity research at the Woodrow Wilson Center in D.C. on Feb. 9 2017

“In developing new cyber infrastructure, how will this play out in developing countries whose basic infrastructure is still struggling?” asked Jackson School M.A. in International Studies student Michael Walstrom  in front

JSIS Cybersecurity Report: How Should the Tech Industry Address Terrorist Use of Its Products?

August 8, 2016

Posted by: jlbeyer

Twitter black and white

Extremist use of information and communication technology (ICT) has resulted in tension between the government, industry actors, and ICT users. In their response to extremist use of ICT, industry actors have faced a serious dilemma over how to respond to bad actors in a way that promotes security but does not infringe upon users’ rights to privacy and freedom of speech.