Follow
Josephine Wolff
Josephine Wolff
Tufts University, Rochester Institute of Technology, Massachusetts Institute of Technology
Verified email at Tufts.edu
Title
Cited by
Cited by
Year
Perverse effects in defense of computer systems: When more is less
J Wolff
Journal of Management Information Systems 33 (2), 597-620, 2016
422016
Early GDPR Penalties: Analysis of Implementation and Fines through May 2020
J Wolff, N Atallah
Journal of Information Policy 11 (1), 63-103, 2021
382021
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches
J Wolff
MIT Press, 2018
24*2018
What we talk about when we talk about cybersecurity: security in internet governance debates
J Wolff
Internet Policy Review 5 (3), 2016
162016
Degrees of ignorance about the costs of data breaches: What policymakers can and can't do about the lack of good empirical data
J Wolff, W Lehr
Available at SSRN 2943867, 2017
152017
Natural Language Insights from Code Reviews that Missed a Vulnerability: A Large Scale Study of Chromium
N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ...
Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017
152017
When cyber threats loom, what can state and local governments do?
J Wolff, W Lehr
Geo. J. Int'l Aff. 19, 67, 2018
142018
Scandal in a digital age
H Mandell, GM Chen
Springer, 2016
142016
How Is Technology Changing the World, and How Should the World Change Technology?
J Wolff
Global Perspectives 2 (1), 27353, 2021
132021
Cybersecurity as metaphor: policy and defense implications of computer security metaphors
J Wolff
2014 TPRC Conference Paper, 2014
132014
Roles for policy-makers in emerging cyber insurance industry partnerships
J Wolff, W Lehr
TPRC, 2018
92018
How privilege undermines cybersecurity
D Schwarcz, J Wolff, DW Woods
Harvard Journal of Law & Technology 36 (2), 23-18, 2023
82023
Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks
J Wolff
MIT Press, 2022
7*2022
A dataset for identifying actionable feedback in collaborative software development
BS Meyers, N Munaiah, E Prud’hommeaux, A Meneely, J Wolff, CO Alm, ...
Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018
72018
How a 2011 hack you’ve never heard of changed the internet’s infrastructure
J Wolff
Slate Magazine, 2016
72016
Application-layer design patterns for accountable–anonymous online identities
J Wolff
Telecommunications Policy 37 (9), 748-756, 2013
72013
Trends in cybercrime during the COVID-19 pandemic
J Wolff
Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications …, 2023
6*2023
How to improve cybersecurity for artificial intelligence
J Wolff
Brookings Institution, 2020
62020
Lessons lost: Incident response in the age of cyber insurance and breach attorneys
DW Woods, R Böhme, J Wolff, D Schwarcz
Proceedings of the 32nd USENIX Security Symposium, Anaheim, California, 2023
52023
How is the GDPR doing?
J Wolff
Slate 7, 2020, 2019
52019
The system can't perform the operation now. Try again later.
Articles 1–20