When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...Jason Hong From BLOG@CACM | March 18, 2009 at 10:23 AM
I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...Jason Hong From BLOG@CACM | March 5, 2009 at 02:43 PM
Three misconceptions about the field of human-computer interaction, as observed by an AI researcher turned HCI researcher in a large corporate research labTessa Lau From BLOG@CACM | March 4, 2009 at 12:00 AM
We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...Jason I. Hong From BLOG@CACM | February 13, 2009 at 02:43 PM