In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...Jason Hong From BLOG@CACM | January 24, 2022 at 09:12 AM
The recent release of the Facebook papers by a whistleblower has confirmed that leaders at the company have long known about problems facilitated by their social...Jason Hong From BLOG@CACM | November 12, 2021 at 12:35 PM
Does the trolley problem offer any useful insights for autonomous vehicles, in terms of design of or public policy around these systems? Here are several reasons...Jason Hong From BLOG@CACM | May 2, 2019 at 02:20 PM
Why is privacy so hard? Why is it, after so much negative press about it, are we still being constantly tracked on the web and on our smartphones? Why is it, after...Jason Hong From BLOG@CACM | March 13, 2019 at 02:52 PM
There is tremendous value to society in doing large-scale A/B studies, and the current framework we have for human subjects research is a poor match for the 21st...Jason Hong From BLOG@CACM | July 20, 2014 at 08:47 AM
Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...Jason Hong From BLOG@CACM | August 26, 2013 at 10:28 AM
Why does this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?Jason Hong From BLOG@CACM | February 17, 2012 at 02:23 PM
We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...Jason Hong From BLOG@CACM | April 27, 2011 at 12:50 PM