Tyler Moore will join The Salem Center and The Strauss Center for a virtual talk as part of its “Cybersecurity Speaker Series.” Tyler is the Tandy Associate Professor of Cyber Security and Information Assurance in the Tandy School of Computer Science at the University of Tulsa. His research focuses on the economics of information security, the […]
Ken Judd, the Paul H. Bauer Senior Fellow at the Hoover Institution, is an expert in the economics of taxation, imperfect competition, and mathematical economics. His current research focuses on developing computational methods for economic modeling and applying them to tax policy, antitrust issues, macroeconomics, and policies related to climate change. During his virtual visit […]
In May of 2017 the WannaCry attacks infected over 300,000 systems in 150 countries and the approximate estimated cost that these attacks is $4 billion. One month later, the NotPetya attacks, another major global attack that primarily targeted Ukrainian systems, began. The approximated costs of the NotPetya attacks were even larger than the WannaCry attacks […]
As COVID policies either pushed workers toward telework or unemployment, it is important to understand the trade-offs and incentives that are now at play in this new working environment. According to a recent paper by Darja Reuschke and Alan Felstead, people’s preference to work from home is steadily on the rise in the UK. This […]
The Communist government of China is not known as a beacon of free speech or religious freedom or many other human rights, in fact, it has a well known tract record of brutally cracking down on these human rights (e.g. Tiananmen Square, Shanxi church demolition in 2018, etc.). As we have seen with the crackdown […]
Offered in Spring 2021.
Abstract A game between software vendors, heterogeneous software users, and a hacker is introduced in which software vendors attempt to protect software users by releasing updates, i.e. disclosing a vulnerability, and the hacker is attempting to exploit vulnerabilities in the software package to attack the software users. The software users must determine whether the protection […]