Follow
Josephine Wolff
Josephine Wolff
Tufts University, Rochester Institute of Technology, Massachusetts Institute of Technology
Verified email at Tufts.edu
Title
Cited by
Cited by
Year
How is technology changing the world, and how should the world change technology?
J Wolff
Global Perspectives 2 (1), 2021
982021
Early GDPR Penalties: Analysis of Implementation and Fines through May 2020
J Wolff, N Atallah
Journal of Information Policy 11 (1), 63-103, 2021
812021
Perverse effects in defense of computer systems: When more is less
J Wolff
Journal of Management Information Systems 33 (2), 597-620, 2016
462016
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches
J Wolff
MIT Press, 2018
38*2018
Cyberinsurance policy: rethinking risk in an age of ransomware, computer fraud, data breaches, and cyberattacks
J Wolff
MIT Press, 2022
26*2022
Lessons lost: Incident response in the age of cyber insurance and breach attorneys
DW Woods, R Böhme, J Wolff, D Schwarcz
32nd USENIX Security Symposium (USENIX Security 23), 2259-2273, 2023
232023
When cyber threats loom, what can state and local governments do?
J Wolff, W Lehr
Georgetown Journal of International Affairs 19, 67-75, 2018
202018
Degrees of ignorance about the costs of data breaches: What policymakers can and can't do about the lack of good empirical data
J Wolff, W Lehr
Available at SSRN 2943867, 2017
202017
What we talk about when we talk about cybersecurity: security in internet governance debates
J Wolff
Internet Policy Review 5 (3), 1-13, 2016
202016
Trends in cybercrime during the COVID-19 pandemic
J Wolff
Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications …, 2023
18*2023
Scandal in a digital age
H Mandell, GM Chen
Springer, 2016
182016
Lessons from GDPR for AI Policymaking
J Wolff, W Lehr, C Yoo
U of Penn Law School Public Law Research Paper, 2023
17*2023
How privilege undermines cybersecurity
D Schwarcz, J Wolff, DW Woods
Harv. JL & Tech. 36, 421, 2022
17*2022
Natural Language Insights from Code Reviews that Missed a Vulnerability: A Large Scale Study of Chromium
N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ...
Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017
172017
How a 2011 hack you’ve never heard of changed the internet’s infrastructure
J Wolff
Slate Magazine, 2016
162016
Cybersecurity as metaphor: policy and defense implications of computer security metaphors
J Wolff
2014 TPRC Conference Paper, 2014
142014
A dataset for identifying actionable feedback in collaborative software development
BS Meyers, N Munaiah, E Prud’Hommeaux, A Meneely, J Wolff, CO Alm, ...
Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018
122018
Roles for policy-makers in emerging cyber insurance industry partnerships
J Wolff, W Lehr
TPRC, 2018
122018
Missing Key: The challenge of cybersecurity and central bank digital currency
G Fanti
Atlantic Council, 2022
92022
How to improve cybersecurity for artificial intelligence
J Wolff
Brookings Institution, 2020
92020
The system can't perform the operation now. Try again later.
Articles 1–20