Sign In

Communications of the ACM

BLOG@CACM



Talking With PCAST
From BLOG@CACM

Talking With PCAST

I told three stories at PCAST — The Google Story, Model Checking, and Machine Learning — as a way to illustrate the importance of sustained federal funding of basic...

A Tale of A Serious Attempt At P≠NP
From BLOG@CACM

A Tale of A Serious Attempt At P≠NP

This is a discussion of the recent claimed proof that P≠NP by Vinay Deolalikar.

Remembering Internet Dogs
From BLOG@CACM

Remembering Internet Dogs

An iconic cartoon by Peter Steiner, which appeared in The New Yorker in 1993, captured the nature of the nascent Internet. It shows a dog seated at a computer,...

CFP: Intelligent Transportation Systems
From BLOG@CACM

CFP: Intelligent Transportation Systems

One of the goals of this years Computers Freedom and Privacy conference is to ask the question, "Can we be 'smart' and private?"  Wednesday's panel onIntellegent...

CFP: Opening Plenary Privacy and Free Speech
From BLOG@CACM

CFP: Opening Plenary Privacy and Free Speech

The opening plenary of this year's Computers Freedom and Privacy Conference (CFP) had a decidedly business orientation.  Titled "Privacy and Free Speech: It's Good...

Malvertisements Growing as Online Security Threat
From BLOG@CACM

Malvertisements Growing as Online Security Threat

Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...

What Security Advice Should We Give?
From BLOG@CACM

What Security Advice Should We Give?

Are people being rational when they ignore the security advice we give them?  If so, what advice should we give them that they would not ignore?

Has the Spam War Been Won?
From BLOG@CACM

Has the Spam War Been Won?

A decade ago, e-mail spam was a severe problem.  Now, e-mail spam is barely noticeable.  After years of battles between spam filters and spammers creating new tricks...

The Ghosts of Holiday Shopping: Past, Present and Future
From BLOG@CACM

The Ghosts of Holiday Shopping: Past, Present and Future

In many parts of the western world, the frenzy of holiday shopping has reached its crescendo.  With apologies to Charles Dickens, it is instructive to consider...

Designing Effective Warnings
From BLOG@CACM

Designing Effective Warnings

Computer security warnings are something we all see everyday, but many people find them annoying and ignore them. What are better ways of designing warnings?

Designing Effective Interfaces For ­Usable Privacy and Security
From BLOG@CACM

Designing Effective Interfaces For ­Usable Privacy and Security

I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...

Helping Younger People Protect Themselves from Security Attacks
From BLOG@CACM

Helping Younger People Protect Themselves from Security Attacks

One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...

Designing Effective Security Warnings
From BLOG@CACM

Designing Effective Security Warnings

How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.

Security Education Can Really Work (but Only If It's Done Right)
From BLOG@CACM

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

What To Do With Those Idle Cores?
From BLOG@CACM

What To Do With Those Idle Cores?

So many processors on our desktops.  Four cores, eight cores, soon we will see hundreds of cores.  Almost all of them are going to be idle most of the time.  If...

Privacy As... Sharing More Information?
From BLOG@CACM

Privacy As... Sharing More Information?

When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...

Google Android Authentication
From BLOG@CACM

Google Android Authentication

I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...

­Usable Privacy and Security
From BLOG@CACM

­Usable Privacy and Security

We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account