Perverse effects in defense of computer systems: When more is less J Wolff Journal of Management Information Systems 33 (2), 597-620, 2016 | 25 | 2016 |
Scandal in a digital age H Mandell, GM Chen Springer, 2016 | 10 | 2016 |
You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches J Wolff MIT Press, 2018 | 9* | 2018 |
Cybersecurity as metaphor: policy and defense implications of computer security metaphors J Wolff 2014 TPRC Conference Paper, 2014 | 8 | 2014 |
When cyber threats loom, what can state and local governments do J Wolff, W Lehr Geo. J. Int'l Aff. 19, 67, 2018 | 7 | 2018 |
Natural language insights from code reviews that missed a vulnerability N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ... International Symposium on Engineering Secure Software and Systems, 70-86, 2017 | 7 | 2017 |
What we talk about when we talk about cybersecurity: security in internet governance debates J Wolff Internet Policy Review 5 (3), 2016 | 7 | 2016 |
How is the GDPR doing? J Wolff Future Tense, 2019 | 5 | 2019 |
Degrees of Ignorance about the Costs of Data Breaches: What Policymakers Can and Can't Do about the Lack of Good Empirical Data J Wolff, W Lehr Available at SSRN 2943867, 2017 | 5 | 2017 |
Models for Cybersecurity Incident Information Sharing and Reporting Policies J Wolff The 43rd Research Conference on Communications, Information and Internet …, 2015 | 4 | 2015 |
Application-layer design patterns for accountable–anonymous online identities J Wolff Telecommunications Policy 37 (9), 748-756, 2013 | 4 | 2013 |
Classes of defense for computer systems JCP Wolff Massachusetts Institute of Technology, 2015 | 3 | 2015 |
NATO’s Empty Cybersecurity Gesture J Wolff Slate Magazine, 2014 | 3 | 2014 |
A dataset for identifying actionable feedback in collaborative software development BS Meyers, N Munaiah, E Prud’hommeaux, A Meneely, J Wolff, CO Alm, ... Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018 | 2 | 2018 |
Opinion| Trump’s reckless cybersecurity strategy J Wolff The New York Times, 2018 | 2 | 2018 |
Why We Need to Be Much More Careful About How We Use the Word Cyberattack J Wolff Slate Magazine, Slate Magazine 30, 2017 | 2 | 2017 |
When companies get hacked, should they be allowed to hack back J Wolff The Atlantic, July 14, 2017, 2017 | 2 | 2017 |
Ex-Post Mitigation Strategies for Breaches of Non-Financial Data J Wolff, W Lehr TPRC, 2016 | 2 | 2016 |
Cyber is Not a Noun J Wolff Slate, 2016 | 2 | 2016 |
Cybersecurity Legislation Is Too Short-Sighted J Wolff Slate, 2015 | 2 | 2015 |