Lance Hoffman

Alt Text

Lance Hoffman

Distinguished Research Professor

Department: Computer Science


Email: Lance Hoffman
Office Phone: (202) 994-4955
Tompkins 106 | Office hours: By appointment

Professor Lance Hoffman taught the first regular university course in cybersecurity (at the University of California, Berkeley) in 1970, and established the computer security program at GW in 1977. He led GW to national recognition as a Center of Academic Excellence in Information Assurance Education and Research. Distinguished Research Professor of Computer Science, he is the author or editor of numerous articles and five books on computer security and privacy; his teaching innovations include multidisciplinary courses on electronic commerce and network security, the development of a portable educational network for teaching computer security, and the initial blueprint for cyber defense exercises in academia.

He is currently Principal Investigator for the Department of Homeland Security, Defense Department, and National Science Foundation computer security scholarship programs under which full scholarships are given to some full-time students in computer security and information assurance (see for details). A Fellow of the Association for Computing Machinery, Professor Hoffman founded what is now GW's Cyber Security and Privacy Research Institute (CSPRI) and has served on a number of Advisory Committees including those of the Center for Democracy and Technology, IBM, the Federal Trade Commission, and the Department of Homeland Security. He has testified before Congress on security and privacy-related issues.

Professor Hoffman assists the research, education, and service projects of CSPRI, a center for GW and the Washington area to promote technical research and policy analysis of problems that have a significant computer security and information assurance component. CSPRI's mission is to encourage, promote, facilitate, and execute interdisciplinary research in these areas, including the exploration of the norms, governance issues and operating systems of cyberspace. More information on CSPRI is available at

  • Ph.D., Stanford University, 1970
  • M.S., Stanford University, 1967
  • B.S., Carnegie Mellon University, 1964
  • Computer security and information assurance
  • Privacy in computer systems
  • Electronic voting
  • Risk analysis
  • Cooper, S., Nickell, C., Piotrowski, V., Oldfield, B., Abdallah, A., Bishop, M., Caelli, B., Dark, M., Hawthorne, E. K., Hoffman, L., Pérez, L. C., Pfleeger, C., Raines, R., Schou, C., and Brynielsson, J. 2010. An exploration of the current state of information assurance education. /SIGCSE Bull./ 41, 4 (Jan. 2010), 109-125.
  • With Kim Lawson and Jeremy Blum,Trust Beyond Security: an Expanded Trust Model, Communications of the ACM, July 2006, vol. 9, no. 7, pp. 95-101.
  • With Tim Rosenberg, Taking Networks on the Road: Portable Solutions for Security Educators, IEEE Security & Privacy, January-February 2006, pp. 64-67.
  • Ronald Dodge, Timothy Rosenberg, and Dan Ragsdale, Exploring a National Cyber Security Exercise for Universities, IEEE Security & Privacy, vol. 3, no. 5, September/October 2005, pp. 27-33.
  • Blum, J., Eskandarian, A., and Hoffman, L. (2003) Mobility Management of Inter-Vehicle Networks, Columbus, OH: IEEE IV2003 Symposium, pp. 150-155,
  • With Lorrie Cranor, Internet Voting for Public Officials: Introduction, Communications of the ACM, 44, 1 (January 2001), pp. 69-71.
  • With David M. Balenson, Karen A. Metivier-Carreiro, Anya Kim, and Matthew G. Mundy, Growing Development of Foreign Encryption Products in the Face of U. S. Export Regulations, The George Washington University Cyberspace Policy Institute, Report GWU-CPI-1999-02, June 1999.
  • With Rachna Dhamija and Rachelle Heller, Teaching E-Commerce to a Multidisciplinary Class, Communications of the ACM, 42, 9 (September 1999), pp. 50-55.
  • With P. C. Clark, BITS: A Smartcard Protected Operating System, Communications of the ACM 37, 11 (November 1994), 66-70, 94.
  • With F. Ali, S. Heckler, and A. Huybrechts, Cryptography policy, Communications of the ACM 37, 9 (September 1994)
  • Computers and Privacy: A Survey, Computing Surveys, Vol. 1, No. 2 (June 1969), pp. 85 103. Reprinted in P. Freeman, Software Systems Principles A Survey, Science Research Associates, Inc., 1975 Reprinted in IEEE Computer Society, Tutorial Notes on Computer Security and Integrity, 1977.
  • With Diana L. Burley and Costis Toregas, Holistically Building the Cybersecurity Workforce, IEEE Security & Privacy, Vol. 10, No. 2 (March/April 2012), pp. 33-39.
  • Lisa Ugelow and Lance J. Hoffman, "Fighting On a New Battlefield Armed with Old Laws: How to Monitor Terrorism In the Virtual World", Journal of Constitutional Law, Vol. 14, No. 4, March 2012.
  • Building in Big Brother: The Encryption Policy Debate (Editor), Springer-Verlag, New York, N. Y., 1995
  • Proceedings of the Second Conference on Computers, Freedom, and Privacy (Editor), Association for Computing Machinery Conferences Office, New York, N. Y., 1993.
  • Rogue Programs: Viruses, Worms, and Trojan Horses (Editor), Van Nostrand Reinhold, New York, N. Y., 1990.
  • Computers and Privacy in the Next Decade (Editor), Academic Press, New York, N. Y., 1980.
  • Modern Methods for Computer Privacy and Security, Prentice‑Hall, Inc., Englewood Cliffs, N. J., 1977.
    translated into Polish, 1982
  • Systems (Editor), Melville Publishing Co., Los Angeles, California, 1973.