Sign In

Communications of the ACM



Changing Search Behavior on the World Wild Web
From [email protected]

Changing Search Behavior on the World Wild Web

Are we at a turning point in search is the real $100M question of the month.  It's more about adaptation then features as most regular Internet Users head toward...

The Future of Applications?
From [email protected]

The Future of Applications?

With the Web delivering richer content to our desktops, why don't today's applications let us seamlessly create that content?

Building a Smarter Web
From [email protected]

Building a Smarter Web

As more information moves to the Web, we need better tools to manage it. Today's tools focus on static Web pages. However, I claim that the Web is becoming a platform...

Helping Younger People Protect Themselves from Security Attacks
From [email protected]

Helping Younger People Protect Themselves from Security Attacks

One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...

Media Computation: For Creativity and Surprises
From [email protected]

Media Computation: For Creativity and Surprises

The Media Computation approach to introductory computing is mostly used for creative expression, but it can also lead to some surprises.

Designing Effective Security Warnings
From [email protected]

Designing Effective Security Warnings

How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.

Security Education Can Really Work (but Only If It's Done Right)
From [email protected]

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

Hello, Computer
From [email protected]

Hello, Computer

Reflections on the present and future of speech-based interfaces.

What Is a Good Recommendation Algorithm?
From [email protected]

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

Social Wavicles and Personalized Flows
From [email protected]

Social Wavicles and Personalized Flows

The wavicle nature of our social existence provides a lens for understanding social filtering and its successes.  Still, this doesn't quite get us to truly effective...

Privacy As... Sharing More Information?
From [email protected]

Privacy As... Sharing More Information?

When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...

Google Android Authentication
From [email protected]

Google Android Authentication

I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...

Three Misconceptions About Human-Computer Interaction
From [email protected]

Three Misconceptions About Human-Computer Interaction

Three misconceptions about the field of human-computer interaction, as observed by an AI researcher turned HCI researcher in a large corporate research lab

­Usable Privacy and Security
From [email protected]

­Usable Privacy and Security

We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account