From BLOG@CACM
Using Bayes' Theorem, the correct answer to both the medical diagnosis problem and to the lion classification question, can be…
Orit Hazzan and Koby Mike| July 5, 2022
Why is our community having such an anemic response to all of these major data breaches? What can we do differently? What should we be doing differently?Jason Hong From BLOG@CACM | December 11, 2014 at 09:57 AM
Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...Jason Hong From BLOG@CACM | August 26, 2013 at 10:28 AM
Why does this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?Jason Hong From BLOG@CACM | February 17, 2012 at 02:23 PM
There's a big mismatch right now between what the data says about computer security vulnerabilities and what kind of research is being done and products offered...Jason Hong From BLOG@CACM | December 15, 2011 at 04:08 PM
At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...Jason Hong From BLOG@CACM | August 23, 2011 at 09:44 AM
We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...Jason Hong From BLOG@CACM | April 27, 2011 at 12:50 PM
Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...Jason Hong From BLOG@CACM | May 11, 2010 at 10:38 AM
Computer security warnings are something we all see everyday, but many people find them annoying and ignore them. What are better ways of designing warnings?Jason Hong From BLOG@CACM | September 30, 2009 at 02:30 PM
I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...Jason Hong From BLOG@CACM | June 22, 2009 at 04:07 PM
One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...Jason Hong From BLOG@CACM | May 18, 2009 at 09:10 AM
How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.Jason Hong From BLOG@CACM | April 22, 2009 at 01:49 PM
Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...Jason Hong From BLOG@CACM | April 22, 2009 at 10:11 AM
When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...Jason Hong From BLOG@CACM | March 18, 2009 at 10:23 AM
I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...Jason Hong From BLOG@CACM | March 5, 2009 at 02:43 PM