フォロー
Josephine Wolff
Josephine Wolff
Tufts University, Rochester Institute of Technology, Massachusetts Institute of Technology
確認したメール アドレス: Tufts.edu
タイトル
引用先
引用先
How is technology changing the world, and how should the world change technology?
J Wolff
Global Perspectives 2 (1), 2021
1042021
Early GDPR Penalties: Analysis of Implementation and Fines through May 2020
J Wolff, N Atallah
Journal of Information Policy 11 (1), 63-103, 2021
822021
Perverse effects in defense of computer systems: When more is less
J Wolff
Journal of Management Information Systems 33 (2), 597-620, 2016
462016
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches
J Wolff
MIT Press, 2018
38*2018
Cyberinsurance policy: rethinking risk in an age of ransomware, computer fraud, data breaches, and cyberattacks
J Wolff
MIT Press, 2022
27*2022
Lessons lost: Incident response in the age of cyber insurance and breach attorneys
DW Woods, R Böhme, J Wolff, D Schwarcz
32nd USENIX Security Symposium (USENIX Security 23), 2259-2273, 2023
232023
When cyber threats loom, what can state and local governments do?
J Wolff, W Lehr
Georgetown Journal of International Affairs 19, 67-75, 2018
202018
Degrees of ignorance about the costs of data breaches: What policymakers can and can't do about the lack of good empirical data
J Wolff, W Lehr
Available at SSRN 2943867, 2017
202017
What we talk about when we talk about cybersecurity: security in internet governance debates
J Wolff
Internet Policy Review 5 (3), 1-13, 2016
202016
Trends in cybercrime during the COVID-19 pandemic
J Wolff
Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications …, 2023
18*2023
How privilege undermines cybersecurity
D Schwarcz, J Wolff, DW Woods
Harv. JL & Tech. 36, 421, 2022
18*2022
Scandal in a digital age
H Mandell, GM Chen
Springer, 2016
182016
Lessons from GDPR for AI Policymaking
J Wolff, W Lehr, C Yoo
U of Penn Law School Public Law Research Paper, 2023
17*2023
Natural Language Insights from Code Reviews that Missed a Vulnerability: A Large Scale Study of Chromium
N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ...
Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017
172017
How a 2011 hack you’ve never heard of changed the internet’s infrastructure
J Wolff
Slate Magazine, 2016
162016
Cybersecurity as metaphor: policy and defense implications of computer security metaphors
J Wolff
2014 TPRC Conference Paper, 2014
142014
A dataset for identifying actionable feedback in collaborative software development
BS Meyers, N Munaiah, E Prud’Hommeaux, A Meneely, J Wolff, CO Alm, ...
Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018
122018
Roles for policy-makers in emerging cyber insurance industry partnerships
J Wolff, W Lehr
TPRC, 2018
122018
The role of insurers in shaping international cyber-security norms about cyber-war
J Wolff
Contemporary Security Policy 45 (1), 141-170, 2024
92024
Missing Key: The challenge of cybersecurity and central bank digital currency
G Fanti
Atlantic Council, 2022
92022
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20