Latest work in Cybersecurities
- | Regulation Regulation
- | Research Papers Research Papers
Navigating Data Security Challenges: Policy Innovations and Reform Options
- | Expert Commentary Expert Commentary
Ransomware Attacks Will End, But Not Anytime Soon
- | Radio Appearance Radio Appearance
Weifeng on The John Batchelor Show - TikTok
- | Radio Appearance Radio Appearance
Weifeng on The Lars Larson Show - TikTok
- | Expert Commentary Expert Commentary
COVID-19 Illuminates the Blessings and Vulnerabilities of the Internet
COVID-19 reveals cracks in data security that must be addressed
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
The FBI Wants Access to a Mass Shooter's iPhone. Will They Demand a Back Door?
A deadly shooting on a Naval base in Florida may lead to a new battle against encryption.
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Tech Policy, Unintended Consequences & the Failure of Good Intentions
- | Healthcare Healthcare
- | State Testimonies State Testimonies
Testimony to the Massachusetts House of Representatives on Telemedicine and Cybersecurity
Testimony before the Massachusetts House of Representatives Committee on Technology and Intergovernmental Affairs
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Section 230 Isn’t an Aberration, It’s a Distillation of Common Law Trends
- | Antitrust and Competition Antitrust and Competition
- | Expert Commentary Expert Commentary
Facebook and Antitrust, Part 3: Will Structural Remedies Solve Alleged Problems?
- | Antitrust and Competition Antitrust and Competition
- | Public Interest Comments Public Interest Comments
The Importance of Balancing Privacy with Innovation, Consumer Benefits, and Other Rights in the FTC’s Approach to Consumer Data Privacy
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
What GDPR's First Year Says about Data Privacy Regulation
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
What Schumpeter Would Say about Techlash
- | Technology and Innovation Technology and Innovation
- | Policy Briefs Policy Briefs
How the United States Should Respond to China’s Intellectual Property Practices
- | Federal Testimonies Federal Testimonies
The Importance of Avoiding Unintended Consequences When Defining Harm for Data Security and Data Privacy
Testimony before the U.S. House Oversight and Reform Committee
- | Academic & Student Programs Academic & Student Programs
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Using Networks to Govern Network Problems
- | Monetary Policy Monetary Policy
- | Expert Commentary Expert Commentary
Data Surveillance Shows Why We Need Cash, Cryptocurrencies
A cashless society is a monitored (and potentially controlled) society.
- | Regulation Regulation
- | Expert Commentary Expert Commentary
Should the Government Require Companies to Meet Cybersecurity Standards for Critical Infrastructure?
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Facebook Hack Another Warning Sign against Online Centralization
- | Academic & Student Programs Academic & Student Programs
- | Expert Commentary Expert Commentary
Learning to Improve Resiliency against Cyberattacks
Latest work in Cybersecurities
- | Regulation Regulation
- | Research Papers Research Papers
Navigating Data Security Challenges: Policy Innovations and Reform Options
- | Expert Commentary Expert Commentary
Ransomware Attacks Will End, But Not Anytime Soon
- | Radio Appearance Radio Appearance
Weifeng on The John Batchelor Show - TikTok
- | Radio Appearance Radio Appearance
Weifeng on The Lars Larson Show - TikTok
- | Expert Commentary Expert Commentary
COVID-19 Illuminates the Blessings and Vulnerabilities of the Internet
COVID-19 reveals cracks in data security that must be addressed
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
The FBI Wants Access to a Mass Shooter's iPhone. Will They Demand a Back Door?
A deadly shooting on a Naval base in Florida may lead to a new battle against encryption.
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Tech Policy, Unintended Consequences & the Failure of Good Intentions
- | Healthcare Healthcare
- | State Testimonies State Testimonies
Testimony to the Massachusetts House of Representatives on Telemedicine and Cybersecurity
Testimony before the Massachusetts House of Representatives Committee on Technology and Intergovernmental Affairs
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Section 230 Isn’t an Aberration, It’s a Distillation of Common Law Trends
- | Antitrust and Competition Antitrust and Competition
- | Expert Commentary Expert Commentary
Facebook and Antitrust, Part 3: Will Structural Remedies Solve Alleged Problems?
- | Antitrust and Competition Antitrust and Competition
- | Public Interest Comments Public Interest Comments
The Importance of Balancing Privacy with Innovation, Consumer Benefits, and Other Rights in the FTC’s Approach to Consumer Data Privacy
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
What GDPR's First Year Says about Data Privacy Regulation
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
What Schumpeter Would Say about Techlash
- | Technology and Innovation Technology and Innovation
- | Policy Briefs Policy Briefs
How the United States Should Respond to China’s Intellectual Property Practices
- | Federal Testimonies Federal Testimonies
The Importance of Avoiding Unintended Consequences When Defining Harm for Data Security and Data Privacy
Testimony before the U.S. House Oversight and Reform Committee
- | Academic & Student Programs Academic & Student Programs
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Using Networks to Govern Network Problems
- | Monetary Policy Monetary Policy
- | Expert Commentary Expert Commentary
Data Surveillance Shows Why We Need Cash, Cryptocurrencies
A cashless society is a monitored (and potentially controlled) society.
- | Regulation Regulation
- | Expert Commentary Expert Commentary
Should the Government Require Companies to Meet Cybersecurity Standards for Critical Infrastructure?
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Facebook Hack Another Warning Sign against Online Centralization
- | Academic & Student Programs Academic & Student Programs
- | Expert Commentary Expert Commentary
Learning to Improve Resiliency against Cyberattacks
Latest work in Cybersecurities
- | Regulation Regulation
- | Research Papers Research Papers
Navigating Data Security Challenges: Policy Innovations and Reform Options
- | Technology and Innovation Technology and Innovation
- | Policy Briefs Policy Briefs
How the United States Should Respond to China’s Intellectual Property Practices
- | Academic & Student Programs Academic & Student Programs
- | Technology and Innovation Technology and Innovation
- | Data Visualizations Data Visualizations
More Than “Just One iPhone”: Law Enforcement Cites All Writs Act to Access Many Devices
- | Technology and Innovation Technology and Innovation
- | Data Visualizations Data Visualizations
Going Dark? Federal Wiretap Data Show Scant Encryption Problems
- | Technology and Innovation Technology and Innovation
- | Policy Briefs Policy Briefs
Economic Perspectives: Cybersecurity Policy Reforms for the 21st Century
- | Technology and Innovation Technology and Innovation
- | Working Papers Working Papers
Active Defense: An Overview of the Debate and a Way Forward
- | Technology and Innovation Technology and Innovation
- | Data Visualizations Data Visualizations
After the “Cybersecurity Sprint,” Material Weaknesses Persist Among Federal Agencies
- | Technology and Innovation Technology and Innovation
- | Policy Briefs Policy Briefs
Poor Federal Cybersecurity Reveals Weakness of Technocratic Approach
- | Technology and Innovation Technology and Innovation
- | Policy Briefs Policy Briefs
“Information Sharing”: No Panacea for American Cybersecurity Challenges
- | Technology and Innovation Technology and Innovation
- | Data Visualizations Data Visualizations
Agencies Fail 2014 Cyber Report Card and Report Record Number of IT Breaches
- | Technology and Innovation Technology and Innovation
- | Data Visualizations Data Visualizations
Dozens of Federal Cybersecurity Offices Duplicate Efforts with Poor Coordination
- | Technology and Innovation Technology and Innovation
- | Data Visualizations Data Visualizations
Federal Cybersecurity Breaches Mount Despite Increased Spending
- | Technology and Innovation Technology and Innovation
- | Research Papers Research Papers
Why the Cybersecurity Framework Will Make Us Less Secure
- | Technology and Innovation Technology and Innovation
- | Policy Briefs Policy Briefs
Mercatus Center State Policy Guide
- | Technology and Innovation Technology and Innovation
- | Policy Briefs Policy Briefs
Mercatus Center Policy Guide
- | Technology and Innovation Technology and Innovation
- | Journal Articles Journal Articles
Technopanics, Threat Inflation, and the Danger of an Information Technology Precautionary Principle
- | Technology and Innovation Technology and Innovation
- | Journal Articles Journal Articles
Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats
- | Technology and Innovation Technology and Innovation
- | Books Books
Copyright Unbalanced: From Incentive to Excess
- | Technology and Innovation Technology and Innovation
- | Working Papers Working Papers
Internet Security Without Law: How Service Providers Create Order Online
- | Technology and Innovation Technology and Innovation
- | Journal Articles Journal Articles
Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy
Latest work in Cybersecurities
- | Radio Appearance Radio Appearance
Weifeng on The John Batchelor Show - TikTok
- | Radio Appearance Radio Appearance
Weifeng on The Lars Larson Show - TikTok
Latest work in Cybersecurities
- | Healthcare Healthcare
- | State Testimonies State Testimonies
Testimony to the Massachusetts House of Representatives on Telemedicine and Cybersecurity
Testimony before the Massachusetts House of Representatives Committee on Technology and Intergovernmental Affairs
- | Antitrust and Competition Antitrust and Competition
- | Public Interest Comments Public Interest Comments
The Importance of Balancing Privacy with Innovation, Consumer Benefits, and Other Rights in the FTC’s Approach to Consumer Data Privacy
- | Federal Testimonies Federal Testimonies
The Importance of Avoiding Unintended Consequences When Defining Harm for Data Security and Data Privacy
Testimony before the U.S. House Oversight and Reform Committee
- | Academic & Student Programs Academic & Student Programs
- | Technology and Innovation Technology and Innovation
- | Public Interest Comments Public Interest Comments
Informational Injury in FTC Privacy and Data Security Cases
Latest work in Cybersecurities
- | Expert Commentary Expert Commentary
Ransomware Attacks Will End, But Not Anytime Soon
- | Expert Commentary Expert Commentary
COVID-19 Illuminates the Blessings and Vulnerabilities of the Internet
COVID-19 reveals cracks in data security that must be addressed
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
The FBI Wants Access to a Mass Shooter's iPhone. Will They Demand a Back Door?
A deadly shooting on a Naval base in Florida may lead to a new battle against encryption.
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Tech Policy, Unintended Consequences & the Failure of Good Intentions
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Section 230 Isn’t an Aberration, It’s a Distillation of Common Law Trends
- | Antitrust and Competition Antitrust and Competition
- | Expert Commentary Expert Commentary
Facebook and Antitrust, Part 3: Will Structural Remedies Solve Alleged Problems?
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
What GDPR's First Year Says about Data Privacy Regulation
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
What Schumpeter Would Say about Techlash
- | Academic & Student Programs Academic & Student Programs
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Using Networks to Govern Network Problems
- | Monetary Policy Monetary Policy
- | Expert Commentary Expert Commentary
Data Surveillance Shows Why We Need Cash, Cryptocurrencies
A cashless society is a monitored (and potentially controlled) society.
- | Regulation Regulation
- | Expert Commentary Expert Commentary
Should the Government Require Companies to Meet Cybersecurity Standards for Critical Infrastructure?
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Facebook Hack Another Warning Sign against Online Centralization
- | Academic & Student Programs Academic & Student Programs
- | Expert Commentary Expert Commentary
Learning to Improve Resiliency against Cyberattacks
- | Academic & Student Programs Academic & Student Programs
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Disaster Relief Offers Cybersecurity Lessons
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Would Data Breach Notification Laws Really Improve Cybersecurity?
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Election Lesson: Humanity Needs to Catch up to Technology
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Say 'Hi' to the NSA in Your Next Email
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
How Russia and the UN Are Actually Planning to Take over the Internet
- | Corporate Welfare Corporate Welfare
- | Expert Commentary Expert Commentary
State of the Union: Mercatus Center Experts Share Their Thoughts before Tonight's Event
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary