Josephine Wolff
Josephine Wolff
Tufts University, Rochester Institute of Technology, Massachusetts Institute of Technology
Verified email at Tufts.edu
Title
Cited by
Cited by
Year
Perverse effects in defense of computer systems: When more is less
J Wolff
Journal of Management Information Systems 33 (2), 597-620, 2016
252016
Scandal in a digital age
H Mandell, GM Chen
Springer, 2016
102016
You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches
J Wolff
MIT Press, 2018
9*2018
Cybersecurity as metaphor: policy and defense implications of computer security metaphors
J Wolff
2014 TPRC Conference Paper, 2014
82014
When cyber threats loom, what can state and local governments do
J Wolff, W Lehr
Geo. J. Int'l Aff. 19, 67, 2018
72018
Natural language insights from code reviews that missed a vulnerability
N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ...
International Symposium on Engineering Secure Software and Systems, 70-86, 2017
72017
What we talk about when we talk about cybersecurity: security in internet governance debates
J Wolff
Internet Policy Review 5 (3), 2016
72016
How is the GDPR doing?
J Wolff
Future Tense, 2019
52019
Degrees of Ignorance about the Costs of Data Breaches: What Policymakers Can and Can't Do about the Lack of Good Empirical Data
J Wolff, W Lehr
Available at SSRN 2943867, 2017
52017
Models for Cybersecurity Incident Information Sharing and Reporting Policies
J Wolff
The 43rd Research Conference on Communications, Information and Internet …, 2015
42015
Application-layer design patterns for accountable–anonymous online identities
J Wolff
Telecommunications Policy 37 (9), 748-756, 2013
42013
Classes of defense for computer systems
JCP Wolff
Massachusetts Institute of Technology, 2015
32015
NATO’s Empty Cybersecurity Gesture
J Wolff
Slate Magazine, 2014
32014
A dataset for identifying actionable feedback in collaborative software development
BS Meyers, N Munaiah, E Prud’hommeaux, A Meneely, J Wolff, CO Alm, ...
Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018
22018
Opinion| Trump’s reckless cybersecurity strategy
J Wolff
The New York Times, 2018
22018
Why We Need to Be Much More Careful About How We Use the Word Cyberattack
J Wolff
Slate Magazine, Slate Magazine 30, 2017
22017
When companies get hacked, should they be allowed to hack back
J Wolff
The Atlantic, July 14, 2017, 2017
22017
Ex-Post Mitigation Strategies for Breaches of Non-Financial Data
J Wolff, W Lehr
TPRC, 2016
22016
Cyber is Not a Noun
J Wolff
Slate, 2016
22016
Cybersecurity Legislation Is Too Short-Sighted
J Wolff
Slate, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20