Skip to main content
Technology | Academics | Policy - Home
  • Topics
    • Topics

    • Topics OverviewOverview
    • Artificial Intelligence and Machine Learning
      • Artificial Intelligence and Machine Learning

      • Artificial Intelligence and Machine Learning OverviewOverview
      • Artificial Intelligence Policy
      • Ethics of Artificial Intelligence
      • Generative AI
    • Cybersecurity
      • Cybersecurity

      • Cybersecurity OverviewOverview
      • Cyber Peace / Cyber Warfare
      • Election Security
    • Impact of Tech on Society
      • Impact of Tech on Society

      • Impact of Tech on Society OverviewOverview
      • Future of Work
      • Tech’s Impact on Economic Equity
      • Tech’s Impact on Racial and Gender Equity
    • Innovation and Economic Impact
    • Intellectual Property and Open Source
      • Intellectual Property and Open Source

      • Intellectual Property and Open Source OverviewOverview
      • Copyright and Trademarks
      • Open Source
      • Patents
    • Networks and Infrastructure
      • Networks and Infrastructure

      • Networks and Infrastructure OverviewOverview
      • Broadband and Wireless Technologies
      • Cloud Computing
      • Internet
      • Net Neutrality
    • Platforms and Platform Regulation
      • Platforms and Platform Regulation

      • Platforms and Platform Regulation OverviewOverview
      • Antitrust / Competition
      • Content Moderation/Section 230
      • Disinformation / Misinformation
      • Freedom of Speech
      • Media and Content
    • Privacy
      • Privacy

      • Privacy OverviewOverview
      • Cross-Border Data Transfers
  • Scholars
  • Events
  • For the Media
    • For the Media

    • Media OverviewMedia Overview
    • Fact Sheets
    • Press Releases
  • About TAP
  • Subscribe to our Newsletter

Breadcrumbs

Home is the parent page of Go up a level to All Technology Policy Topics is the parent page of

Cybersecurity

Subtopics

Cyber Peace / Cyber WarfareElection Security

Cybersecurity Scholars

Andrea Matwyshyn

Andrea Matwyshyn

Colleges / Universities: Penn State University

  • Privacy
  • Artificial Intelligence and Machine Learning
  • Cybersecurity

Edward Felten

Edward Felten

Colleges / Universities: Princeton University

  • Intellectual Property and Open Source
  • Antitrust / Competition
  • Networks and Infrastructure
  • Artificial Intelligence and Machine Learning
  • Cybersecurity

Erik Brynjolfsson

Erik Brynjolfsson

Colleges / Universities: Stanford University

  • Networks and Infrastructure
  • Internet
  • Artificial Intelligence and Machine Learning
  • Future of Work
  • Impact of Tech on Society
  • Tech’s Impact on Economic Equity
  • Artificial Intelligence Policy
  • Generative AI
  • Cybersecurity
  • Platforms and Platform Regulation
  • Antitrust / Competition
  • Innovation and Economic Impact

Théodore Christakis

Theodore Christakis

Colleges / Universities: Université Grenoble Alpes

  • Privacy
  • Artificial Intelligence and Machine Learning
  • Artificial Intelligence Policy
  • Cybersecurity
See All Cybersecurity Topic Scholars

Recent Cybersecurity Blog Posts

BLOG POST

Privacy + Security Forum Presents Experts Across a Broad Spectrum of Privacy and Cybersecurity Topics

Publication Date: September 24, 2021
Next week, privacy law experts Professor Daniel Solove, George Washington University, and Professor Paul Schwartz, University of California, Berkeley, gather privacy and security professionals together for a 3-day virtual forum.
Written By
TAP Staff Blogger
Featuring

Anita Allen

Anita AllenTAP Scholar

Daniel Solove

Daniel J. SoloveTAP Scholar

Paul M. Schwartz

Paul M. SchwartzTAP Scholar
  • Privacy
  • Cybersecurity
BLOG POST

Harvard’s Jonathan Zittrain and James Mickens Discuss Cybersecurity

Publication Date: November 6, 2020
Professors Jonathan Zittrain and James Mickens examine many issues associated with the security of our society’s interconnected systems in online discussion.
Written By
TAP Staff Blogger
Featuring

Jonathan Zittrain

Jonathan ZittrainTAP Scholar
  • Privacy
  • Networks and Infrastructure
  • Cybersecurity
BLOG POST

Evan Selinger: Cybersecurity Workers Need to Learn From Those They’re Trying to Protect

Publication Date: January 23, 2020
Professor Evan Selinger, Rochester Institute of Technology, and his colleague devised a semester-long program intended to challenge the biases and presumptions developers bring to their professional projects.
Written By
TAP Staff Blogger
Featuring

Evan Selinger

Evan SelingerTAP Scholar
  • Privacy
  • Networks and Infrastructure
  • Internet
  • Cybersecurity
See All Cybersecurity Topic Blog Posts

Recent Cybersecurity Academic Article Summaries

ACADEMIC ARTICLE SUMMARY

The Effects of Data Localization on Cybersecurity

Article Published Year: 2022
Summary:

Data localization policies prohibit the transfer of data to foreign countries. Data localization affects the ability of organizations to prevent and respond to cyberattacks, increasing cybersecurity risks.

Written By:

Peter Swire

Peter SwireTAP Scholar

 DeBrae  Kennedy-Mayo

DeBrae Kennedy-Mayo
  • Artificial Intelligence and Machine Learning
  • Privacy
  • Networks and Infrastructure
  • Cloud Computing
  • Cybersecurity
ACADEMIC ARTICLE SUMMARY

Data Security, Data Breaches, and Compliance

Article Published Year: 2021
Summary:

Data breaches affect the breached firm’s stock price. Fines for data breaches are low, and firms may underinvest in security. Litigation following a breach is less likely when firms offer free credit monitoring.

Written By:

Daniel Sokol

Daniel SokolTAP Scholar

 Chirantan Chatterjee

Chirantan Chatterjee
  • Cybersecurity
ACADEMIC ARTICLE SUMMARY

Cybersecurity Hiring in Response to Data Breaches

Article Published Year: 2021
Summary:

Data on firm-level hiring shows that firms increase hiring of cybersecurity workers following data breaches, particularly when the press covers the breach.

Written By:

Erik Brynjolfsson

Erik BrynjolfssonTAP Scholar

 Sarah Bana

Sarah Bana

 Sebastian Steffen

Sebastian Steffen

 Wang Jin

Wang Jin

 Xiupeng Wang

Xiupeng Wang
  • Privacy
  • Networks and Infrastructure
  • Internet
  • Media and Content
  • Cybersecurity
See All Cybersecurity Topic Article Summaries

Related Tags

  • Piracy
  • Data Breach
  • Encryption
  • Cybercrime
Technology | Academics | Policy - Home
Follow us on TwitterLink us on LinkedinLike us on FacebookWatch us on youtube
  • Blog Posts
  • Academic Article Summaries
  • Fact Sheets
  • Hot Topic

Subscribe to our Newsletter

Name
  • Privacy & Cookies
  • Terms of Use
  • Feedback
© Copyright 2023