Latest work in Cybersecurities
- | Regulation Regulation
- | Research Papers Research Papers
Navigating Data Security Challenges: Policy Innovations and Reform Options
- | Expert Commentary Expert Commentary
Ransomware Attacks Will End, But Not Anytime Soon
- | Radio Appearance Radio Appearance
Weifeng on The John Batchelor Show - TikTok
- | Radio Appearance Radio Appearance
Weifeng on The Lars Larson Show - TikTok
- | Expert Commentary Expert Commentary
COVID-19 Illuminates the Blessings and Vulnerabilities of the Internet
COVID-19 reveals cracks in data security that must be addressed

- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
The FBI Wants Access to a Mass Shooter's iPhone. Will They Demand a Back Door?
A deadly shooting on a Naval base in Florida may lead to a new battle against encryption.
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Tech Policy, Unintended Consequences & the Failure of Good Intentions

- | Healthcare Healthcare
- | State Testimonies State Testimonies
Testimony to the Massachusetts House of Representatives on Telemedicine and Cybersecurity
Testimony before the Massachusetts House of Representatives Committee on Technology and Intergovernmental Affairs
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Section 230 Isn’t an Aberration, It’s a Distillation of Common Law Trends

- | Antitrust and Competition Antitrust and Competition
- | Expert Commentary Expert Commentary
Facebook and Antitrust, Part 3: Will Structural Remedies Solve Alleged Problems?

- | Antitrust and Competition Antitrust and Competition
- | Public Interest Comments Public Interest Comments
The Importance of Balancing Privacy with Innovation, Consumer Benefits, and Other Rights in the FTC’s Approach to Consumer Data Privacy
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
What GDPR's First Year Says about Data Privacy Regulation

- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
What Schumpeter Would Say about Techlash

- | Technology and Innovation Technology and Innovation
- | Policy Briefs Policy Briefs
How the United States Should Respond to China’s Intellectual Property Practices
- | Federal Testimonies Federal Testimonies
The Importance of Avoiding Unintended Consequences When Defining Harm for Data Security and Data Privacy
Testimony before the U.S. House Oversight and Reform Committee
- | Academic & Student Programs Academic & Student Programs
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Using Networks to Govern Network Problems
- | Monetary Policy Monetary Policy
- | Expert Commentary Expert Commentary
Data Surveillance Shows Why We Need Cash, Cryptocurrencies
A cashless society is a monitored (and potentially controlled) society.
- | Regulation Regulation
- | Expert Commentary Expert Commentary
Should the Government Require Companies to Meet Cybersecurity Standards for Critical Infrastructure?
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Facebook Hack Another Warning Sign against Online Centralization
- | Academic & Student Programs Academic & Student Programs
- | Expert Commentary Expert Commentary
Learning to Improve Resiliency against Cyberattacks
Latest work in Cybersecurities
- | Regulation Regulation
- | Research Papers Research Papers
Navigating Data Security Challenges: Policy Innovations and Reform Options
- | Expert Commentary Expert Commentary
Ransomware Attacks Will End, But Not Anytime Soon
- | Radio Appearance Radio Appearance
Weifeng on The John Batchelor Show - TikTok
- | Radio Appearance Radio Appearance
Weifeng on The Lars Larson Show - TikTok
- | Expert Commentary Expert Commentary
COVID-19 Illuminates the Blessings and Vulnerabilities of the Internet
COVID-19 reveals cracks in data security that must be addressed

- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
The FBI Wants Access to a Mass Shooter's iPhone. Will They Demand a Back Door?
A deadly shooting on a Naval base in Florida may lead to a new battle against encryption.
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Tech Policy, Unintended Consequences & the Failure of Good Intentions

- | Healthcare Healthcare
- | State Testimonies State Testimonies
Testimony to the Massachusetts House of Representatives on Telemedicine and Cybersecurity
Testimony before the Massachusetts House of Representatives Committee on Technology and Intergovernmental Affairs
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Section 230 Isn’t an Aberration, It’s a Distillation of Common Law Trends

- | Antitrust and Competition Antitrust and Competition
- | Expert Commentary Expert Commentary
Facebook and Antitrust, Part 3: Will Structural Remedies Solve Alleged Problems?

- | Antitrust and Competition Antitrust and Competition
- | Public Interest Comments Public Interest Comments
The Importance of Balancing Privacy with Innovation, Consumer Benefits, and Other Rights in the FTC’s Approach to Consumer Data Privacy
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
What GDPR's First Year Says about Data Privacy Regulation

- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
What Schumpeter Would Say about Techlash

- | Technology and Innovation Technology and Innovation
- | Policy Briefs Policy Briefs
How the United States Should Respond to China’s Intellectual Property Practices
- | Federal Testimonies Federal Testimonies
The Importance of Avoiding Unintended Consequences When Defining Harm for Data Security and Data Privacy
Testimony before the U.S. House Oversight and Reform Committee
- | Academic & Student Programs Academic & Student Programs
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Using Networks to Govern Network Problems
- | Monetary Policy Monetary Policy
- | Expert Commentary Expert Commentary
Data Surveillance Shows Why We Need Cash, Cryptocurrencies
A cashless society is a monitored (and potentially controlled) society.
- | Regulation Regulation
- | Expert Commentary Expert Commentary
Should the Government Require Companies to Meet Cybersecurity Standards for Critical Infrastructure?
- | Technology and Innovation Technology and Innovation
- | Expert Commentary Expert Commentary
Facebook Hack Another Warning Sign against Online Centralization
- | Academic & Student Programs Academic & Student Programs
- | Expert Commentary Expert Commentary