Perverse effects in defense of computer systems: When more is less J Wolff Journal of Management Information Systems 33 (2), 597-620, 2016 | 42 | 2016 |
Early GDPR Penalties: Analysis of Implementation and Fines through May 2020 J Wolff, N Atallah Journal of Information Policy 11 (1), 63-103, 2021 | 38 | 2021 |
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches J Wolff MIT Press, 2018 | 24* | 2018 |
What we talk about when we talk about cybersecurity: security in internet governance debates J Wolff Internet Policy Review 5 (3), 2016 | 16 | 2016 |
Degrees of ignorance about the costs of data breaches: What policymakers can and can't do about the lack of good empirical data J Wolff, W Lehr Available at SSRN 2943867, 2017 | 15 | 2017 |
Natural Language Insights from Code Reviews that Missed a Vulnerability: A Large Scale Study of Chromium N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ... Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017 | 15 | 2017 |
When cyber threats loom, what can state and local governments do? J Wolff, W Lehr Geo. J. Int'l Aff. 19, 67, 2018 | 14 | 2018 |
Scandal in a digital age H Mandell, GM Chen Springer, 2016 | 14 | 2016 |
How Is Technology Changing the World, and How Should the World Change Technology? J Wolff Global Perspectives 2 (1), 27353, 2021 | 13 | 2021 |
Cybersecurity as metaphor: policy and defense implications of computer security metaphors J Wolff 2014 TPRC Conference Paper, 2014 | 13 | 2014 |
Roles for policy-makers in emerging cyber insurance industry partnerships J Wolff, W Lehr TPRC, 2018 | 9 | 2018 |
How privilege undermines cybersecurity D Schwarcz, J Wolff, DW Woods Harvard Journal of Law & Technology 36 (2), 23-18, 2023 | 8 | 2023 |
Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks J Wolff MIT Press, 2022 | 7* | 2022 |
A dataset for identifying actionable feedback in collaborative software development BS Meyers, N Munaiah, E Prud’hommeaux, A Meneely, J Wolff, CO Alm, ... Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018 | 7 | 2018 |
How a 2011 hack you’ve never heard of changed the internet’s infrastructure J Wolff Slate Magazine, 2016 | 7 | 2016 |
Application-layer design patterns for accountable–anonymous online identities J Wolff Telecommunications Policy 37 (9), 748-756, 2013 | 7 | 2013 |
Trends in cybercrime during the COVID-19 pandemic J Wolff Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications …, 2023 | 6* | 2023 |
How to improve cybersecurity for artificial intelligence J Wolff Brookings Institution, 2020 | 6 | 2020 |
Lessons lost: Incident response in the age of cyber insurance and breach attorneys DW Woods, R Böhme, J Wolff, D Schwarcz Proceedings of the 32nd USENIX Security Symposium, Anaheim, California, 2023 | 5 | 2023 |
How is the GDPR doing? J Wolff Slate 7, 2020, 2019 | 5 | 2019 |