Allan A. Friedman, PhD



Similar documents
Working Papers Abraham, M. Abraham, M. Abraham, M. Abraham, M. Abraham, M., Refereed Presentations Abraham, M. Abraham, M. Abraham, M. Abraham, M.

TITLE HERE Subtitle here. Cloud Standards Customer Council Cloud Industry Symposium June 18, 2014 Boston, MA

J. MICHAEL CUMMINS 735 Orchard Point Dunwoody, Georgia GEORGIA INSTITUTE OF TECHNOLOGY Dupree College of Management Atlanta, GA

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

LAWRENCE MORLEY HANSER

Curriculum Vitae. March 2012

Yampolskiy, Analysis of Cyber Infrastructure Authentication Failure Vulnerabilities to Inform Security Decisions

Thank you for your very kind introduction.

Assistant Professor of Marketing, Present McDonough School of Business, Georgetown University, Washington, DC

Committee: Michael G. Pratt (Chair), Spencer Harrison, Scott Sonenshein

Douglas M. DePeppe Cyberlaw Attorney

August Emory University, Atlanta, GA Double major: Sociology and Political Science December 2005

KIRA R. FABRIZIO Boston University School of Management 595 Commonwealth Ave Boston, MA

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

CURRICULUM VITA. Richard E. Biehl, Ph.D Whitfield Lane Orlando, Florida, USA

MARTHA FINNEMORE. CURRENT POSITION University Professor of Political Science and International Affairs George Washington University

Community Cyber Security. Center for Infrastructure Assurance and Security

RYAN EDWARD SMEREK Cell: (617) Lyons St. Evanston, IL 60203

Rosalind M. Chow. Assistant Professor of Organizational Behavior and Theory, Tepper School of Business, Carnegie Mellon University (2008 to July 2014)

William E. Ayen, Ph.D. Department of Information Systems College of Business and Administration University of Colorado at Colorado Springs

REFEREED CONFERENCE PROCEEDINGS

CURRICULUM VITAE. Erte Xiao. Office: (412) (319E Porter Hall) 208 Porter Hall Pittsburgh, PA, 15213

EDUCATION Ph.D. in Health Policy and Medical Sociology Harvard University, Cambridge MA

Anna Jacob Egalite B.Ed. in Elementary Education, St. Patrick's College, Dublin, Ireland

Privacy and Security in Healthcare

Matthew C. Matusiak Department of Criminal Justice, College of Health and Public Affairs, University of Central Florida

R. Joseph Waddington Curriculum Vitae

UNIVERSITY OF MIAMI Curriculum Vitae

DEBORAH JORDAN BROOKS Dartmouth College Department of Government 6108 Silsby Hall, Hanover, NH

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Nicholas Beauchamp. Assistant Professor Department of Political Science Northeastern University 301 Meserve Hall Boston, MA 02115, USA

9700 South Cass Avenue, Lemont, IL URL: fulin

Cyber Security: Exploring the Human Element

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity

ZADIA M. FELICIANO. FIELDS OF International Economics, Labor Economics and Economic History

Curriculum Vitae Jennifer Merluzzi

METIN SENGUL. Boston College Carroll School of Management Fulton Hall 430, 140 Commonwealth Avenue Chestnut Hill, MA 02467

Microsoft s cybersecurity commitment

JOHN DAVIDSON WOODWARD, JR.

Christopher M. Oldenburg, Ph.D.

know school PubliC affairs

Department of Political Science Phone: (805) University of California, Santa Barbara Fax: (805)

Online Word of Mouth; Economics of Information Systems; Information Systems and Marketing; Pricing and Competitive Strategies

EDUCATION CONTINUING EDUCATION, PROFESSIONAL DEVELOPMENT SEMINARS & WORKSHOPS EMPLOYMENT RESEARCH INTERESTS

Yung-Yu Ma, Ph.D.

Cybersecurity at the Nexus of a Hyper- Connected World

Zachary Stein 1. Harvard University Graduate School of Education, Ed.M., Mind, Brain, and Education (June 2006)

Cornell University School of Industrial and Labor Relations 397 Ives Faculty Building, Ithaca, NY (607)

EILEEN O BRIEN 6114 Forestvale Court Columbia, Maryland obrien.el@verizon.net

DALIDA KADYRZHANOVA Curriculum Vitae (Last updated: 12/2014)

Curriculum Vitae Eric C.C. Chang

Cyber Security and Insider Threat: Research and Challenges

University of Maryland Cybersecurity Center (MC 2 )

DANIEL ARAYA PHD PROFESSIONAL EXPERIENCE EDUCATION

Meg Elizabeth Rithmire Morgan Hall 262, Soldiers Field Boston MA

Assistant Professor, Political Science, George Washington University, beginning August 2013.

The Design of an Undergraduate Program In Homeland Security

Yu Tian. Kenneth G. Dixon School of Accounting Office: (407) P.O. Box Fax: (407)

Lauren Hamilton Edwards, Ph.D.

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Northrop Grumman Cybersecurity Research Consortium

JOHN ANGUS D. HILDRETH

CURRICULUM VITAE Jessica M. Walker, Ph.D.

Ayyagari, Meghana; Asli Demirguc-Kunt, and Vojislav Maksimovic, 2014, Who creates jobs in developing countries? Small Business Economics 43,

John Noll, Ph.D. Research Associate, ATRIUM Laboratory, Marshall School of Business, University of Southern California,

EBONY N. BRIDWELL-MITCHELL, PH.D.

Jennifer M. Logg. 425 Student Services Building #1900 Website: Berkeley, CA

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA

The Executive Public Policy Training Programme (EPPTP) 2009

Anita L. Zuberi, Ph.D.

Experience. Refereed Journal Articles/Book Chapters. Economics of Information Security

CURRICULUM VITAE Jason Radford

Exposing the Cybersecurity Cracks: A Global Perspective

Sherrese M. Smith. Washington, D.C. Practice Areas. Admissions. Education. Partner, Corporate Department

DOMAIN EXPERTISE METHODOLOGY SKILLS

Chair, Department of Accounting, University of Massachusetts, and present

Speaker Biographies. Formal chairman, National Defense Reform Commission

YONGSEOK JANG 133J Bryan Hall PO Box Gainesville, FL (352) June 2015

CURRICULUM VITAE. Frank T. Rothaermel

EDUCATION. Sarah Lawrence College B.A., Liberal Arts, 1988 POST-GRADUATE FELLOWSHIPS, GRANTS

Jeffery L. Guyse. L. Robin Keller (Chair), R. Duncan Luce and Imran Currim. Decision Analysis and Decision Support Systems Behavioral Decision Making

Cybersecurity Awareness for Executives

SIBERIAN FEDERAL UNIVERSITY

Emerging models for international higher education and collaborative learning through on-line graduate study.

Michael S. McCampbell 1880 Crestview Way Naples, FL Cell:

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow

Haiyi ZHU Curriculum Vitae

BEIBEI (BACY) DONG EDUCATION EMPLOYMENT EDITORIAL POSITIONS PUBLICATIONS. Updated 05/25/2015 Beibei (Bacy) Dong

Emilie Marie Hafner-Burton

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative (302)

Wei-Kuang Huang. 368 Fairfield Rd. U-41IM Storrs, CT, (Voice) mail:

Young E. (Anna) Lee (cell); foreveryoung3051 (Skype ID) 1590 Anderson Ave. Suite 14C, Fort Lee, NJ 07024

Appendix D. Petersens Guide Listings for PhD in Public Policy

Matthew C. Matusiak Department of Criminal Justice, College of Health and Public Affairs, University of Central Florida

Exploiting the dark triad for national defense capabilities. Dimitris Gritzalis

Casey A. Knifsend Curriculum Vitae

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

DAVID P. MCINTYRE School of Business Providence College 1 Cunningham Square Providence, RI dmcinty2@providence.edu

Transcription:

Allan A. Friedman, PhD Contact Information Research & Expertise Education 1426 Rhode Island Ave NW Voice: (617) 943-2190 Unit A E-mail: allanfriedman@gwu.edu Washington DC 20005 USA WWW: http://www.allan.friedmans.org Twitter: @allanfriedman Cybersecurity; Information Technology Policy; Telecommunications Policy and IT Industrial Organization; Privacy and Data Policy; Trade Policy and the Economics of Information Security; National Security Technology Harvard University, Cambridge, MA USA PhD, Public Policy, Kennedy School of Government (2009) Thesis title: Privacy, Security, and the Dynamics of Networked Information Sharing Committee: David Lazer (Chair), L. Jean Camp, Jan W. Rivkin, Michael D. Smith Swarthmore College, Swarthmore, PA USA B.A., Computer Science (2002) Research Positions The George Washington University, Washington, DC USA Research Scientist, School of Engineering and Applied Sciences 2014-Present Implementing an engineering-inspired multidisciplinary cybersecurity research agenda Serving as a policy advisor to policy makers and practitioners Active media presence on domestic and foreign print and TV journalism Brookings Institution, Washington, DC USA Research Director and Fellow, Center for Technology Innovation 2010-2013 Drafted series of working papers addressing key technology policy questions at the intersection of technology, governance, and economics. Coordinated engagement between policy and technology communities, including chairing an cybersecurity policy meeting on the economics of information security Frequent public presentations on IT policy to national and international audiences Co-authored an internationally recognized book Cybersecurity and Cyberwar: What Everyone Needs to Know Harvard University, Cambridge, MA USA Postdoctoral Fellow, Center for Research in Computation 2009-2010 and Society Developed and executed an interdisciplinary research agenda on IT policy and cybersecurity Joint appointment to the Berkman Center for Internet and Society Research Fellow, Belfer Center for Science and 2009-2010 International Affairs 1 of 6

Conducted theoretical and empirical research on cybersecurity and international relations on a Harvard-MIT Defense Department grant Liason between technical and policy research groups. Served as a technical advisor to former senior administrator officials Instructor, Computer Science Department 2007-2009 Designed and co-taught new interdisciplinary course on Privacy and Technology Fellow, Program on Networked Governance 2005-2009 Published Books P. W. Singer and Allan Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. 2014. Book Chapters Allan Friedman. Universal National Identifier, in The Economics of Identity Theft ed. and Monographs L. Jean Camp. Springer, 2007. Allan Friedman and L. Jean Camp. Security in Peer to Peer Systems. in The Handbook of Information Security ed. Hossein Bidgoli. John Wiley & Sons, 2005. Luc Wathieu and Allan Friedman. Intelliseek Harvard Business School Case N9-505- 061, 2005 Peer-Reviewed Journal Articles Tyler Moore, Allan Friedman, and Ariel Procaccia. Would a Cyber Warrior Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems. New Security Paradigms Workshop. (2010) Luc Wathieu and Allan Friedman. An Empirical Approach to Understanding Privacy Concerns. Journal of Interactive Marketing. Under Revision. David Lazer, Ines Mergel and Allan Friedman. Co-citation of prominent social network articles in sociology journals: The evolving canon. Connections. 29:1 (2009). David Lazer and Allan Friedman. Parallel Problem Solving: The Social Structure of Exploration and Exploitation. Administrative Science Quarterly. 52:4 (2007) Allan Friedman. Good Neighbors Make Good Fences: A Peer-to-peer User Security System. IEEE Technology and Society. 26:1 (2007) Allan Friedman, Roshan Baliga, Deb Dasgupta, Anna Dreyer. Understanding the broadcast flag: a threat analysis model. Telecommunications Policy 28 (2004) Research Reports Allan Friedman, Austen Mack-Crane, and Ross Hammond. Cyber-enabled Competitive Data Theft: A Framework for Modeling Long-Run Cybersecurity Consequences, 2013 Allan Friedman. Cyber Theft of Competitive Data: Asking the Right Questions, 2013 Allan Friedman. Cybersecurity and Trade: National Policies, Global and Local Consequences, 2013. 2 of 6

Darrell West, Allan Friedman and Walter Valdivia. Building an Innovation Economy, 2012. Allan Friedman and Darrell West. 2012. Health Information Exchanges and Megachange, Allan Friedman Cybersecurity in the Balance: Weighing the Risks of the PROTECT IP Act and the Stop Online Piracy Act, 2011 Allan Friedman. Economic and Policy Frameworks for Cybersecurity Risks. Issues in Technology Innovation, 2011. Allan Friedman, Patrick Crowley and Darrell West. Online Identity and Consumer Trust: Assessing Online Risk. Brookings Report, 2011. Allan Friedman and Darrell West. Privacy and Security in Cloud Computing. Issues in Technology Innovation Vol. 3, 2010. Peer Reviewed Conference Papers Allan Friedman and Lance Hoffman. The Internet of (Whose) Things?. Privacy Law Scholars Conference. George Washington University, June 2014. Timothy Peacock and Allan Friedman. Automation and Disruption in Stolen Payment Card Markets. Workshop on the Economics of Information Security. Pennsylvania State University. June 2014. Allan Friedman, Ethan Bernstein and David Lazer. Organizational Structure, Exploration, and Exploitation on the ELICIT Experimental Platform. 15th International Command and Control Research Conference, Santa Monica CA, June 2010. Alessandro Acquisti, Allan Friedman and Rahul Telang. Is There a Cost to Privacy Breaches? International Conference on Information Systems, Milwaukee WI, November 2006 Alessandro Acquisti, Allan Friedman and Rahul Telang Is There a Cost to Privacy Breaches? An Event Study Workshop on the Economics of Information Security, Cambridge UK. June 2006 David Lazer and Allan Friedman. Exploration and Exploitation in Networks. Poster Presentation at the National Conference on Digital Government Research, Atlanta, May 2005 David Lazer and Allan Friedman. The parable of the hare and the tortoise: Network structure of exploration and exploitation. American Sociological Association Annual Conference, Philadelphia PA, August 2005 Luc Wathieu and Allan Friedman. An empirical approach to understanding privacy valuation. Workshop on the Economics of Information Security, Cambridge MA, June 2005 Allan Friedman and L. Jean Camp. Making Security Manifest. Second Workshop on Economics and Information Security College Park, MA. May 2003. 3 of 6

Abstract Reviewed Conference Presentations Alessandro Acquisti and Allan Friedman. Understanding the Impact of Privacy Breaches. Telecommunications Policy Research Conference, Washington DC, September 2006. Allan Friedman. The Tragedy of the Network. International Sunbelt Social Network Conference, Vancouver, April 2006 Jean Camp, Allan Friedman, and Alla Genkina. Net Trust: Designing for Human Trust Perception. Trustworthy Interfaces for Passwords and Personal Information. Palo Alto CA, June 2005. Jean Camp, Allan Friedman, and Warigia Bowman. Voting, Vote Capture & Vote Counting Symposium. Proceedings of the 6th Annual National Conference ondigital Government Research, Atlanta GA, May 2005 Jean Camp and Allan Friedman. Peer Patching. 24th Army Science Conference, Orlando FL, December 2004 Allan Friedman, Roshan Baliga, Deb Dasgupta, and Anna Dreyer. Underlying Motivations in thebroadcast Flag Debate Telecommunications Policy Research Conference, Washington DC, September 2003. Jean Camp and Allan Friedman. Peer to Peer Security. Telecommunications Policy Research Conference, Washington DC,September 2003. Invited Presentations and Panels A Critical View of Cybercrime Policy. Interpol Information Security Confernce. Hong Kong, China, September 2010. Empirical research: obstacles and solutions. Panel Chair and Participant. Workshop on the Economics of Securing Information Infrastructure. Washington DC, October 2006. Incentives, Markets and Information Security. Panel Chair and Participant. Financial Cryptography and Data Security, Dominica, February 2005 Privacy and Rights Management. Invited Panel Participant. International Conference on Electronic Commerce, Pittsburgh PA, October 2003. (Inter)national IDs. Panel Chair and Participant, Privacy Enhancing Technologies Workshop: Dresden, Germany, March 2003 Online Banking Privacy: A Slow, Confusing Start to Giving Customers Control over Their Information. Primary Researcher. Center for Democracy and Technology Report, 2001. Professional Experience National Academy of Science, Washington, DC Consultant 2014-present Supporting a National Academy of Science expert study on surveillance technology as a subject matter expert 4 of 6

Parity Communications, Inc, Needham, MA Analyst April 2009 - October 2010 Worked as subcontractor to study U.S. Defense Department Command and Control Structure in light of intelligence gathering and social network structure. Designed and implemented laboratory models of information sharing patterns. MITRE Corporation, Washington, DC Consultant June 2006 - October 2006 Identified a modeling strategy for understanding the security of patient information flow and privacy risks in electronic medical record systems. Constructed and executed an empirical research pilot program Hewlett Packard Laboratories, Palo Alto, CA Research Intern June 2005 - August 2005 Applied social science and complex systems tools to IT problems Focused on economics of privacy and market-driven technology distribution systems and gave several internal presentations. Harvard Business School, Cambridge, MA Research Assistant 2004-2007 Worked with Prof. Luc Wathieu to design and test economic theories of consumer privacy. Co-authored HBS case on the use of web information for marketing purposes, and worked on several others. Harvard Kennedy School, Cambridge, MA Research Assistant 2002-2008 With Prof. Jean Camp: Combined technical expertise with policy analysis to draft reports on Identity in Electronic Authentication and Electronic Voting and Vote Counting; co-wrote several articles. With Prof. David Lazer: Designed agent-based models to test theories of organizational dynamics. With Prof. Cary Coglianese: Examined online presence of regulatory agencies and their use of internet technology for greater public participation in new field of E-Rulemaking. Center for Democracy and Technology, Washington, DC Policy Intern June 2001 - August 2001 Primary researcher of a published report on Online Banking Privacy. Chief aid in the launching of CDTs Standards Project examining policy impacts of technical decisions. Swarthmore Center for Social and Policy Studies, Swarthmore, PA Research Assistant 2000-2002 Assisted senior faculty on a variety of research topics, both academic and applied. Individual research project on technology and civic engagement. 5 of 6

Academic & Professional Service Program Committee, Workshop on the Economics of Information Security (2010-2014) Reviewer, International Public Management Journal (2014) External reviewer, RAND corporation (2012-2014) Program Committee, IEEE International Symposium on Technologies for Homeland Security (2013) Chair, Workshop on the Economics of Information Security (2013) Reviewer, IEEE Security and Privacy (2011-2013) External Reviewer, Greek Ministry of Education and Research (2011) General Chair, Workshop on the Economics Information Security (2010) Program Committee, Fourth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (2010) Program Committee, Security and Privacy in Medical and Home-Care Systems (2009-2010) Program Committee, MIT-Sandia Workshop on Cyber Data Gap Analysis (2009) Reviewer, topics: Journal of The Cognitive Science Society (2008) External Reviewer, Financial Cryptography and Data Security (2007) Program Committee, Workshop on the Economics of Securing Information Infrastructure (2006) General Chair, Workshop on the Economics of Information Security (2005) Reviewer, Fifth ACM Workshop on Digital Rights Management (2005) Reviewer, New Media and Society Journal (2005) Member, Association for Computing Machinery (ACM) Member, Culinary Historians of Boston 6 of 6