Cybersecurity in a Post Data Environment

My new working paper is available [Link].

This paper outlines the threats which are posed by the hacking of Smart Devices, and provides a rudimentary methodology to apportion liability to either the manufacturer or the user, where appropriate, following a hack. This is done in a robust manner, from a technologically agnostic perspective, to ensure a persistent relevance in the face of unrelenting technological advancement.