Search Results For:

cybersecurity

Sort & Filter
Filter By Clear All
Topic
Post Type
Research Type
Event Type
Author

Kenneth Judd Talks About Advancing Computation in Economics

Ken Judd, the Paul H. Bauer Senior Fellow at the Hoover Institution, is an expert in the economics of taxation, imperfect competition, and mathematical economics. His current research focuses on developing computational methods for economic modeling and applying them to tax policy, antitrust issues, macroeconomics, and policies related to climate change. During his virtual visit […]

Should You Update Your Computer?

In May of 2017 the WannaCry attacks infected over 300,000 systems in 150 countries and the approximate estimated cost that these attacks is $4 billion. One month later, the NotPetya attacks, another major global attack that primarily targeted Ukrainian systems, began. The approximated costs of the NotPetya attacks were even larger than the WannaCry attacks […]

The Trade-Offs of Working From Home

As COVID policies either pushed workers toward telework or unemployment, it is important to understand the trade-offs and incentives that are now at play in this new working environment. According to a recent paper by Darja Reuschke and Alan Felstead, people’s preference to work from home is steadily on the rise in the UK. This […]

China’s Cyber Attacks

The Communist government of China is not known as a beacon of free speech or religious freedom or many other human rights, in fact, it has a well known tract record of brutally cracking down on these human rights (e.g. Tiananmen Square, Shanxi church demolition in 2018, etc.). As we have seen with the crackdown […]

Toward a Theory of Vulnerability Disclosure Policy: A Hacker’s Game

Abstract A game between software vendors, heterogeneous software users, and a hacker is introduced in which software vendors attempt to protect software users by releasing updates, i.e. disclosing a vulnerability, and the hacker is attempting to exploit vulnerabilities in the software package to attack the software users. The software users must determine whether the protection […]