Search For:

Displaying 1-50 out of 72 total
The OuijAmazon Desktop Metaphor
Found in: Computer
By Hal Berghel
Issue Date:July 2012
pp. 80-82
Amazon.com is the gold standard of e-commerce, representing the integration of a solid understanding of the virtues of the World Wide Web and a keen online business sense taken to the level of art.
 
Defending against Big Dada: Defensive Tactics for Weapons of Mass Deception
Found in: Computer
By Hal Berghel
Issue Date:October 2014
pp. 94-98
The first casualty of power politics, advocacy journalism, dark propaganda, rumor mills, and media-politico echo chambers is truth. Here's a defensive tactic for your consideration.
 
Sticky Wikis
Found in: Computer
By Hal Berghel
Issue Date:September 2014
pp. 90-93
After observing and developing online reference websites for 20 plus years, it's clear the biggest hurdle to reliability still hasn't been overcome.
 
PII, the FTC, Car Dealers, and You
Found in: Computer
By Hal Berghel
Issue Date:May 2014
pp. 102-106
Personally identifiable information (PII) is among the most digitally delicate data and deserves maximum government protection. So why isn't it better protected? Here are some thoughts on the matter.
 
STEM, Revisited
Found in: Computer
By Hal Berghel
Issue Date:March 2014
pp. 70-73
Are we really facing a STEM crisis? Or is this crisis as bogus as the missile gap that started the space race over 50 years ago? It's time to cut through the hyperbole and take a hard look.
 
Moral Hazards, Negative Externalities, and the Surveillance Economy
Found in: Computer
By Hal Berghel
Issue Date:February 2014
pp. 73-77
Modern economics includes the art of making common sense abstruse. Terms like moral hazard and negative externality both describe states of transactional imbalance. And this imbalance isn't limited to economics. When governments are involved, even digital ...
 
Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege
Found in: Computer
By Hal Berghel
Issue Date:January 2014
pp. 78-82
What the world needs now is a new field of study: privacy informatics. This emerging field will fill the information-awareness gap between a trusting citizenry and the emerging digital dystopia.
 
The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications
Found in: Computer
By Hal Berghel
Issue Date:December 2013
pp. 91-95
As the world watches the continuing fallout from Edward Snowden's leaks, it's useful to reflect on the implications these leaks have on professional publications. This column is a first-hand account.
 
Toxic Cookies
Found in: Computer
By Hal Berghel
Issue Date:September 2013
pp. 104-107
The W3C has shown what can happen when bright, well-intentioned people become policy czars.
 
Through the PRISM Darkly
Found in: Computer
By Hal Berghel
Issue Date:July 2013
pp. 86-90
The Foreign Intelligence Surveillance Court has an approval rate of 99.93 percent of all surveillance requests. While this might not meet the strict definition of a kangaroo court, it seems to fall within the marsupial family.
 
Computing Technology and Survivable Journalism
Found in: Computer
By Hal Berghel
Issue Date:May 2013
pp. 93-97
Ironically, the very technology that the media pundits suggest might get journalism out of the hole might actually be making the hole deeper.
 
The SCDOR Hack: Great Security Theater in Five Stages
Found in: Computer
By Hal Berghel
Issue Date:March 2013
pp. 97-99
The South Carolina governor's response to the SCDOR hack represents a textbook application of Elisabeth Kübler-Ross's "five stages of grief" to cybersecurity.
 
RFIDiocy: It's Déjà Vu All over Again
Found in: Computer
By Hal Berghel
Issue Date:January 2013
pp. 85-88
Not content with pedestrian applications, some manufacturers extended RFID far beyond the level justified by good taste and common sense.
 
Stratfor or Stratagainst
Found in: Computer
By Hal Berghel
Issue Date:November 2012
pp. 82-85
Based on what you know about WikiLeaks and Stratfor, which group seems to be the greater threat to society?
 
The Dumbing Down of SportPhishing
Found in: Computer
By Hal Berghel
Issue Date:September 2012
pp. 92-94
The current crop of phisherpersons can't see the phorest phor the phurze.
 
Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians
Found in: Computer
By Hal Berghel
Issue Date:May 2012
pp. 86-88
Actors and electronic criminals are both in the business of perception management and social engineering, and they have similar motives as well: getting their audiences to suspend disbelief.
 
WikiLeaks and the Matter of Private Manning
Found in: Computer
By Hal Berghel
Issue Date:March 2012
pp. 70-73
The release of significant documents by WikiLeaks, the international online not-for-profit organization, has become front-page news that has significant implications for computing professionals.
 
Identity Theft and Financial Fraud: Some Strangeness in the Proportions
Found in: Computer
By Hal Berghel
Issue Date:January 2012
pp. 86-89
If we can't trust banks, healthcare providers, colleges, and government entities to protect our privacy, who can we trust?
 
Cyberprivacy in the New Millennium
Found in: Computer
By Hal Berghel
Issue Date:January 2001
pp. 132-134
<p>E-mail is indispensable for most of us, but one penalty of its convenience is its negative impact on individual privacy.</p>
 
Using the WWW Test Pattern to check HTML client compliance
Found in: Computer
By Hal Berghel
Issue Date:September 1995
pp. 63-65
No summary available.
 
Computer contributions legislation and the public interest
Found in: Managing Requirements Knowledge, International Workshop on
By Hal Berghel
Issue Date:July 1985
pp. 351
No summary available.
   
Microcomputing word processing software: A functional perspective
Found in: Managing Requirements Knowledge, International Workshop on
By Hal Berghel
Issue Date:June 1987
pp. 329
No summary available.
   
Robert David Steele on OSINT
Found in: Computer
By Hal Berghel
Issue Date:July 2014
pp. 76-81
Open source intelligence (OSINT) represents a new, public, transparent, and constitutionally friendly approach to intelligence gathering. As such it should be of considerable interest to technologists, journalists, and civil libertarians.
 
Leadership Failures in the National Security Complex
Found in: Computer
By Hal Berghel
Issue Date:June 2014
pp. 64-67
Current NSA forecast: continued Snowden flurries with no end in sight. No one blames the hardworking NSA employees for the latest series of gaffes; it's the feckless leadership and the politics that got them there that are responsible for our current diffi...
 
Protecting ownership rights through digital watermarking
Found in: Computer
By Hal Berghel, Lawrence O'Gorman
Issue Date:July 1996
pp. 101-103
No summary available.
 
BRAP forensics
Found in: Communications of the ACM
By Hal Berghel
Issue Date:June 2008
pp. 113-117
Boutique computer activity mining vs. personal privacy management.
     
Faith-based security
Found in: Communications of the ACM
By Hal Berghel
Issue Date:April 2008
pp. 103-108
A tongue-in-cheek look at serious security issues.
     
Hiding data, forensics, and anti-forensics
Found in: Communications of the ACM
By Hal Berghel
Issue Date:April 2007
pp. 15-20
Delving into the digital warrens for concealing data.
     
Fungible credentials and next-generation fraud
Found in: Communications of the ACM
By Hal Berghel
Issue Date:December 2006
pp. 15-19
Digital technology is easing access and lowering barriers for a new generation of criminal.
     
Pernicious ports
Found in: Communications of the ACM
By David Hoelzer, Hal Berghel
Issue Date:December 2005
pp. 23-30
Identifying and defending against port-related vulnerabilities.
     
The two sides of ROI: return on investment vs. risk of incarceration
Found in: Communications of the ACM
By Hal Berghel
Issue Date:April 2005
pp. 15-20
Legislative mandates potentially replace CIO's primary concerns of technology risk management with the possibility of serving jail time.
     
Wireless infidelity II: airjacking
Found in: Communications of the ACM
By Hal Berghel, Jacob Uecker
Issue Date:December 2004
pp. 15-20
Assessing the extent of the security risks involved in wireless networking technology by considering three possible scenarios demonstrating vulnerabilities.
     
Wireless infidelity I: war driving
Found in: Communications of the ACM
By Hal Berghel
Issue Date:September 2004
pp. 21-26
Although WiFi technology security vulnerabilities are well known, the extent of these vulnerabilities may be surprising: War driving experiences identify many potential points of entry.
     
Anonymizing the net
Found in: Communications of the ACM
By Hal Berghel, Kim Womack
Issue Date:April 2003
pp. 15-20
Sanitizing packets for fun and profit.
     
A decade of applied computing
Found in: Proceedings of the 2001 ACM symposium on Applied computing (SAC '01)
By Hal Berghel
Issue Date:March 2001
pp. 1-5
This paper describes the effects of program restructuring in a dataflow environment. Previous studies showed that dataflow programs can exhibit locality and that a memory hierarchy is feasible in a dataflow environment. This study shows that the order in w...
     
You learned all you need to design educational software design in kindergarten (panel)
Found in: Proceedings of the 2nd conference on Integrating technology into computer science education (ITiCSE '97)
By Cathleen Norris, Elliot Soloway, Hal Berghel, Harriet Taylor, Joe Turner
Issue Date:June 1997
pp. 153
In this paper, the content of the television distance education course Management of software projects is presented. The course is linked with the undergraduate program of computer science from University Laval. The first part of this paper comments on the...
     
Digital watermarking makes its mark
Found in: netWorker
By Hal Berghel
Issue Date:March 1997
pp. 30-39
Constant propagation is an optimization that substitutes values for names. Interprocedural constant propagation performs this substitution throughout an entire program, propagating constant values across procedure boundaries. CONVEX Computer Corporation ha...
     
Mixed media: the new push for push technology
Found in: netWorker
By Hal Berghel
Issue Date:March 1997
pp. 28-36
Constant propagation is an optimization that substitutes values for names. Interprocedural constant propagation performs this substitution throughout an entire program, propagating constant values across procedure boundaries. CONVEX Computer Corporation ha...
     
CYBER-SURFING: the state-of-the-art in client server browsing and navigation
Found in: Proceedings of the 1995 ACM symposium on Applied computing (SAC '95)
By Hal Berghel
Issue Date:February 1995
pp. 1-4
This paper describes the effects of program restructuring in a dataflow environment. Previous studies showed that dataflow programs can exhibit locality and that a memory hierarchy is feasible in a dataflow environment. This study shows that the order in w...
     
A day in the life of…
Found in: Crossroads
By Hal Berghel
Issue Date:September 1994
pp. 30-31
Its potential sounds so appealing, but there are several challenges to overcome before true ubiquitous computing will garner global acceptance.
     
St. Cloud State University ACM chapter wins 2nd annual Webbie prize
Found in: Crossroads
By Hal Berghel
Issue Date:September 1994
pp. 25
Its potential sounds so appealing, but there are several challenges to overcome before true ubiquitous computing will garner global acceptance.
     
New wave prototyping: use and abuse of vacuous prototypes
Found in: interactions
By Hal Berghel
Issue Date:January 1994
pp. 49-54
If you are interested in reviewing books for intelligence, please contact book review editor Karen Sutherland at intelligence_book-reviews@acm.org.
     
“Dynamic” inferencing with generalized resolution
Found in: Proceedings of the 1993 ACM/SIGAPP symposium on Applied computing: states of the art and practice (SAC '93)
By Gordon Beavers, Hal Berghel
Issue Date:February 1993
pp. 614-621
This paper describes the effects of program restructuring in a dataflow environment. Previous studies showed that dataflow programs can exhibit locality and that a memory hierarchy is feasible in a dataflow environment. This study shows that the order in w...
     
An alternative to constraint logic programming for managing domain arithmetics in Prolog expert systems
Found in: Proceedings of the 1992 ACM/SIGAPP Symposium on Applied computing: technological challenges of the 1990's (SAC '92)
By David Roach, Hal Berghel
Issue Date:April 1992
pp. 328-332
This paper describes the effects of program restructuring in a dataflow environment. Previous studies showed that dataflow programs can exhibit locality and that a memory hierarchy is feasible in a dataflow environment. This study shows that the order in w...
     
“Tuning” an ASM metric: a case study in metric ASM optimization
Found in: Proceedings of the 1992 ACM/SIGAPP Symposium on Applied computing: technological challenges of the 1990's (SAC '92)
By Carroll Hyatt, David Roach, George Balogh, Hal Berghel
Issue Date:April 1992
pp. 131-136
This paper describes the effects of program restructuring in a dataflow environment. Previous studies showed that dataflow programs can exhibit locality and that a memory hierarchy is feasible in a dataflow environment. This study shows that the order in w...
     
An extension of Ukkonen's enhanced dynamic programming ASM algorithm
Found in: ACM Transactions on Information Systems (TOIS)
By David Roach, Hal Berghel
Issue Date:January 1992
pp. 94-106
We describe an improvement on Ukkonen's Enhanced Dynamic Programming (EHD) approximate string-matching algorithm for unit-penalty four-edit comparisons. The new algorithm has an asymptotic complexity similar to that of Ukkonen's but is significantly faster...
     
TALISMAN: a prototype expert system for spelling correction
Found in: Proceedings of the 1988 ACM SIGSMALL/PC symposium on ACTES (SIGSMALL '88)
By Cecily Andreu, Hal Berghel
Issue Date:May 1988
pp. 107-113
This paper reports on the status of TALISMAN, a logic-based spelling assistance package for MS-DOS microcomputers which is currently being refined and tested in our laboratory. The essence of the package is described, and is contrasted with current product...
     
Responsible web caching
Found in: Communications of the ACM
By Hal Berghel
Issue Date:January 1988
pp. 15-20
Putting the distribution control of the Web's intellectual content in the hands of those who created it.
     
Hijacking the web
Found in: Communications of the ACM
By Hal Berghel
Issue Date:January 1988
pp. 23-27
Cookies revisited: Continuing the dialogue on personal security and underlying privacy issues.
     
The Code Red Worm
Found in: Communications of the ACM
By Hal Berghel
Issue Date:January 1988
pp. 15-19
Malicious software knows no bounds.
     
 1  2 Next >>