While we have heard from two representatives from the EU on privacy, no one from the US government will join us for the first panel.
Katie Fourmy From BLOG@CACM | June 25, 2013 at 02:28 PM
Why does this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?Jason Hong From BLOG@CACM | February 17, 2012 at 02:23 PM
There's a big mismatch right now between what the data says about computer security vulnerabilities and what kind of research is being done and products offered...Jason Hong From BLOG@CACM | December 15, 2011 at 04:08 PM
At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...Jason Hong From BLOG@CACM | August 23, 2011 at 09:44 AM
The White House this week announced a comprehensive global strategy document bringing multiple agencies together in an effort to emphasize their commitment to a...Sarah Granger From BLOG@CACM | May 20, 2011 at 03:25 PM
That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...Daniel Reed From BLOG@CACM | May 11, 2011 at 12:46 PM
Precision is not required in everything or even most things. Failures are best handled by expecting them all the time, not treating them as exceptions. We should...Greg Linden From BLOG@CACM | April 28, 2011 at 12:43 PM
We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...Jason Hong From BLOG@CACM | April 27, 2011 at 12:50 PM
Ledin's call for teaching malware to all undergraduate students conflicts with my understanding of the purpose of an undergraduate CS degree.
Mark Guzdial From BLOG@CACM | February 24, 2011 at 09:29 AM
I told three stories at PCAST — The Google Story, Model Checking, and Machine Learning — as a way to illustrate the importance of sustained federal funding of basic...Jeannette M. Wing From BLOG@CACM | September 15, 2010 at 04:25 PM
An iconic cartoon by Peter Steiner, which appeared in The New Yorker in 1993, captured the nature of the nascent Internet. It shows a dog seated at a computer,...Daniel Reed From BLOG@CACM | August 8, 2010 at 05:04 PM
One of the goals of this years Computers Freedom and Privacy conference is to ask the question, "Can we be 'smart' and private?" Wednesday's panel onIntellegent...Katy Nelson From BLOG@CACM | June 16, 2010 at 10:11 AM
The opening plenary of this year's Computers Freedom and Privacy Conference (CFP) had a decidedly business orientation. Titled "Privacy and Free Speech: It's Good...Katy Nelson From BLOG@CACM | June 15, 2010 at 04:12 PM
Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...Jason Hong From BLOG@CACM | May 11, 2010 at 10:38 AM
Are people being rational when they ignore the security advice we give them? If so, what advice should we give them that they would not ignore?Greg Linden From BLOG@CACM | April 25, 2010 at 09:14 PM
A decade ago, e-mail spam was a severe problem. Now, e-mail spam is barely noticeable. After years of battles between spam filters and spammers creating new tricks...Greg Linden From BLOG@CACM | March 4, 2010 at 01:43 PM
In many parts of the western world, the frenzy of holiday shopping has reached its crescendo. With apologies to Charles Dickens, it is instructive to consider...Daniel Reed From BLOG@CACM | December 23, 2009 at 03:52 PM
Computer security warnings are something we all see everyday, but many people find them annoying and ignore them. What are better ways of designing warnings?Jason Hong From BLOG@CACM | September 30, 2009 at 02:30 PM