Follow
Josephine Wolff
Josephine Wolff
Tufts University, Rochester Institute of Technology, Massachusetts Institute of Technology
Verified email at Tufts.edu
Title
Cited by
Cited by
Year
Early GDPR Penalties: Analysis of Implementation and Fines through May 2020
J Wolff, N Atallah
Journal of Information Policy 11 (1), 63-103, 2021
492021
Perverse effects in defense of computer systems: When more is less
J Wolff
Journal of Management Information Systems 33 (2), 597-620, 2016
422016
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches
J Wolff
MIT Press, 2018
28*2018
How Is Technology Changing the World, and How Should the World Change Technology?
J Wolff
Global Perspectives 2 (1), 27353, 2021
232021
Degrees of ignorance about the costs of data breaches: What policymakers can and can't do about the lack of good empirical data
J Wolff, W Lehr
Available at SSRN 2943867, 2017
182017
What we talk about when we talk about cybersecurity: security in internet governance debates
J Wolff
Internet Policy Review 5 (3), 2016
172016
Natural Language Insights from Code Reviews that Missed a Vulnerability: A Large Scale Study of Chromium
N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ...
Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017
162017
When cyber threats loom, what can state and local governments do?
J Wolff, W Lehr
Geo. J. Int'l Aff. 19, 67, 2018
152018
Scandal in a digital age
H Mandell, GM Chen
Springer, 2016
152016
Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks
J Wolff
MIT Press, 2022
13*2022
Cybersecurity as metaphor: policy and defense implications of computer security metaphors
J Wolff
2014 TPRC Conference Paper, 2014
132014
Lessons lost: Incident response in the age of cyber insurance and breach attorneys
DW Woods, R Böhme, J Wolff, D Schwarcz
Proceedings of the 32nd USENIX Security Symposium, Anaheim, California, 2023
112023
Roles for policy-makers in emerging cyber insurance industry partnerships
J Wolff, W Lehr
TPRC, 2018
112018
How privilege undermines cybersecurity
D Schwarcz, J Wolff, DW Woods
Harvard Journal of Law & Technology 36 (2), 421-486, 2023
10*2023
Trends in cybercrime during the COVID-19 pandemic
J Wolff
Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications …, 2023
9*2023
How a 2011 hack you’ve never heard of changed the internet’s infrastructure
J Wolff
Slate Magazine, 2016
92016
A dataset for identifying actionable feedback in collaborative software development
BS Meyers, N Munaiah, E Prud’hommeaux, A Meneely, J Wolff, CO Alm, ...
Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018
82018
Application-layer design patterns for accountable–anonymous online identities
J Wolff
Telecommunications Policy 37 (9), 748-756, 2013
72013
"Cyberwar By Almost Any Definition”: NotPetya, the Evolution of Insurance War Exclusions, and Their Application to Cyberattacks
J Wolff
CONN. INS. LJ 28, 85, 2021
62021
How to improve cybersecurity for artificial intelligence
J Wolff
Brookings Institution, 2020
62020
The system can't perform the operation now. Try again later.
Articles 1–20