How is technology changing the world, and how should the world change technology? J Wolff Global Perspectives 2 (1), 27353, 2021 | 74 | 2021 |
Early GDPR Penalties: Analysis of Implementation and Fines through May 2020 J Wolff, N Atallah Journal of Information Policy 11 (1), 63-103, 2021 | 72 | 2021 |
Perverse effects in defense of computer systems: When more is less J Wolff Journal of Management Information Systems 33 (2), 597-620, 2016 | 45 | 2016 |
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches J Wolff MIT Press, 2018 | 38* | 2018 |
Cyberinsurance policy: Rethinking risk in an Age of ransomware, computer fraud, data breaches, and cyberattacks J Wolff MIT Press, 2022 | 22* | 2022 |
Lessons lost: Incident response in the age of cyber insurance and breach attorneys DW Woods, R Böhme, J Wolff, D Schwarcz 32nd USENIX Security Symposium (USENIX Security 23), 2259-2273, 2023 | 21 | 2023 |
Degrees of ignorance about the costs of data breaches: What policymakers can and can't do about the lack of good empirical data J Wolff, W Lehr Available at SSRN 2943867, 2017 | 19 | 2017 |
What we talk about when we talk about cybersecurity: security in internet governance debates J Wolff Internet Policy Review 5 (3), 2016 | 19 | 2016 |
Scandal in a digital age H Mandell, GM Chen Springer, 2016 | 18 | 2016 |
When cyber threats loom, what can state and local governments do? J Wolff, W Lehr Georgetown Journal of International Affairs 19, 67-75, 2018 | 17 | 2018 |
How privilege undermines cybersecurity D Schwarcz, J Wolff, DW Woods Harv. JL & Tech. 36, 421, 2022 | 16* | 2022 |
Natural Language Insights from Code Reviews that Missed a Vulnerability: A Large Scale Study of Chromium N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ... Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017 | 16 | 2017 |
How a 2011 hack you’ve never heard of changed the internet’s infrastructure J Wolff Slate Magazine, 2016 | 15 | 2016 |
Cybersecurity as metaphor: policy and defense implications of computer security metaphors J Wolff 2014 TPRC Conference Paper, 2014 | 14 | 2014 |
Trends in cybercrime during the COVID-19 pandemic J Wolff Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications …, 2023 | 12* | 2023 |
Lessons from GDPR for AI Policymaking J Wolff, W Lehr, C Yoo U of Penn Law School Public Law Research Paper, 2023 | 12* | 2023 |
Roles for policy-makers in emerging cyber insurance industry partnerships J Wolff, W Lehr TPRC, 2018 | 12 | 2018 |
A dataset for identifying actionable feedback in collaborative software development BS Meyers, N Munaiah, E Prud’Hommeaux, A Meneely, J Wolff, CO Alm, ... Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018 | 10 | 2018 |
How to improve cybersecurity for artificial intelligence J Wolff Brookings Institution, 2020 | 9 | 2020 |
The role of insurers in shaping international cyber-security norms about cyber-war J Wolff Contemporary Security Policy 45 (1), 141-170, 2024 | 7 | 2024 |