How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.Jason Hong From BLOG@CACM | April 22, 2009 at 01:49 PM
Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...Jason Hong From BLOG@CACM | April 22, 2009 at 10:11 AM
When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...Jason Hong From BLOG@CACM | March 18, 2009 at 10:23 AM
I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...Jason Hong From BLOG@CACM | March 5, 2009 at 02:43 PM