There are many similarities between FATE (Fairness, Accountability, Transparency, Ethics) and privacy, and I believe that there are a lot of lessons that the FATE...Jason Hong From BLOG@CACM | April 13, 2023 at 12:04 PM
With the advent of Large Language Models (LLMs) and tools like GitHub CoPilot, I think we’re a step closer towards a world where software can be created by anyone...Jason Hong From BLOG@CACM | February 17, 2023 at 03:11 PM
In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...Jason Hong From BLOG@CACM | January 24, 2022 at 09:12 AM
The recent release of the Facebook papers by a whistleblower has confirmed that leaders at the company have long known about problems facilitated by their social...Jason Hong From BLOG@CACM | November 12, 2021 at 12:35 PM
Why is privacy so hard? Why is it, after so much negative press about it, are we still being constantly tracked on the web and on our smartphones? Why is it, after...Jason Hong From BLOG@CACM | March 13, 2019 at 02:52 PM
Observations about the emerging technology landscape in China, looking at mobile social networking, mobile payments, taxi hailing, and same or next day delivery...Jason Hong From BLOG@CACM | May 25, 2016 at 09:31 AM
Why is our community having such an anemic response to all of these major data breaches? What can we do differently? What should we be doing differently?Jason Hong From BLOG@CACM | December 11, 2014 at 09:57 AM
There is tremendous value to society in doing large-scale A/B studies, and the current framework we have for human subjects research is a poor match for the 21st...Jason Hong From BLOG@CACM | July 20, 2014 at 08:47 AM
Why does this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?Jason Hong From BLOG@CACM | February 17, 2012 at 02:23 PM
There's a big mismatch right now between what the data says about computer security vulnerabilities and what kind of research is being done and products offered...Jason Hong From BLOG@CACM | December 15, 2011 at 04:08 PM
At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...Jason Hong From BLOG@CACM | August 23, 2011 at 09:44 AM
On March 23-24 2011, the National Science Foundation held a workshop looking at how to build more effective collaborations between computer science researchers...Jason Hong From BLOG@CACM | May 27, 2011 at 03:21 PM
We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...Jason Hong From BLOG@CACM | April 27, 2011 at 12:50 PM
Previously, I asked the question of why great design is so hard to integrate in organizations. In this article, I take a look at how Apple does design, and what...Jason Hong From BLOG@CACM | August 23, 2010 at 11:28 AM
Why is good design so hard to accomplish for organizations? People are coming to the realization that design really matters, but it's not that they don't want to...Jason Hong From BLOG@CACM | July 21, 2010 at 09:50 AM
I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...Jason Hong From BLOG@CACM | June 22, 2009 at 04:07 PM
Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...Jason Hong From BLOG@CACM | April 22, 2009 at 10:11 AM
When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...Jason Hong From BLOG@CACM | March 18, 2009 at 10:23 AM