Sign In

Communications of the ACM



The Emerging Technology Landscape in China
From [email protected]

The Emerging Technology Landscape in China

Observations about the emerging technology landscape in China, looking at mobile social networking, mobile payments, taxi hailing, and same or next day delivery...

Yet Another Major Data Breach, But Will This Time Be Any Different?
From [email protected]

Yet Another Major Data Breach, But Will This Time Be Any Different?

Why is our community having such an anemic response to all of these major data breaches? What can we do differently? What should we be doing differently?

Human Subjects Research For the Twenty-First Century, Or, What Can We Learn from the Facebook Mood Study?
From [email protected]

Human Subjects Research For the Twenty-First Century, Or, What Can We Learn from the Facebook Mood Study?

There is tremendous value to society in doing large-scale A/B studies, and the current framework we have for human subjects research is a poor match for the 21st...

Privacy and Google Glass
From [email protected]

Privacy and Google Glass

Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...

Reaching For Engelbart's Vision of the Future
From [email protected]

Reaching For Engelbart's Vision of the Future

 A meditation on Douglas Engelbart's impact on interactive computing.

Phds from the Faculty's Perspective
From [email protected]

Phds from the Faculty's Perspective

One professor's reflections on succeeding in PhD programs.

Most Smartphone Apps Are Spyware
From [email protected]

Most Smartphone Apps Are Spyware

Why does  this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?

Is the Computer Security Community Barking Up the Wrong Trees?
From [email protected]

Is the Computer Security Community Barking Up the Wrong Trees?

There's a big mismatch right now between what the data says about computer security vulnerabilities and what kind of research is being done and products offered...

Password Policies Are Getting Out of Control
From [email protected]

Password Policies Are Getting Out of Control

 At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...

Improving Computer Science Research Collaborations Between U.s. and China
From [email protected]M

Improving Computer Science Research Collaborations Between U.s. and China

On March 23-24 2011, the National Science Foundation held a workshop looking at how to build more effective collaborations between computer science researchers...

Why Have There Been So Many Security Breaches Recently?
From [email protected]

Why Have There Been So Many Security Breaches Recently?

We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...

Design, Functionality, and Diffusion of Innovations
From [email protected]

Design, Functionality, and Diffusion of Innovations

What's the relationship between functionality and design? What kinds of factors influence whether people do or don't adopt a technology?

Why Is Great Design So Hard (part Two)?
From [email protected]

Why Is Great Design So Hard (part Two)?

Previously, I asked the question of why great design is so hard to integrate in organizations. In this article, I take a look at how Apple does design, and what...

Why Is Great Design So Hard?
From [email protected]

Why Is Great Design So Hard?

Why is good design so hard to accomplish for organizations? People are coming to the realization that design really matters, but it's not that they don't want to...

Malvertisements Growing as Online Security Threat
From [email protected]

Malvertisements Growing as Online Security Threat

Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...

Designing Effective Warnings
From [email protected]

Designing Effective Warnings

Computer security warnings are something we all see everyday, but many people find them annoying and ignore them. What are better ways of designing warnings?

Designing Effective Interfaces For Usable Privacy and Security
From [email protected]

Designing Effective Interfaces For Usable Privacy and Security

I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...

Helping Younger People Protect Themselves from Security Attacks
From [email protected]

Helping Younger People Protect Themselves from Security Attacks

One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...

Designing Effective Security Warnings
From [email protected]

Designing Effective Security Warnings

How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.

Security Education Can Really Work (but Only If It's Done Right)
From [email protected]

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account