acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Designing Effective Interfaces For ­Usable Privacy and Security
From BLOG@CACM

Designing Effective Interfaces For ­Usable Privacy and Security

I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...

Changing Search Behavior on the World Wild Web
From BLOG@CACM

Changing Search Behavior on the World Wild Web

Are we at a turning point in search is the real $100M question of the month.  It's more about adaptation then features as most regular Internet Users head toward...

The Future of Applications?
From BLOG@CACM

The Future of Applications?

With the Web delivering richer content to our desktops, why don't today's applications let us seamlessly create that content?

Building a Smarter Web
From BLOG@CACM

Building a Smarter Web

As more information moves to the Web, we need better tools to manage it. Today's tools focus on static Web pages. However, I claim that the Web is becoming a platform...

Helping Younger People Protect Themselves from Security Attacks
From BLOG@CACM

Helping Younger People Protect Themselves from Security Attacks

One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...

Media Computation: For Creativity and Surprises
From BLOG@CACM

Media Computation: For Creativity and Surprises

The Media Computation approach to introductory computing is mostly used for creative expression, but it can also lead to some surprises.

Designing Effective Security Warnings
From BLOG@CACM

Designing Effective Security Warnings

How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.

Security Education Can Really Work (but Only If It's Done Right)
From BLOG@CACM

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

Hello, Computer
From BLOG@CACM

Hello, Computer

Reflections on the present and future of speech-based interfaces.

What Is a Good Recommendation Algorithm?
From BLOG@CACM

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

Social Wavicles and Personalized Flows
From BLOG@CACM

Social Wavicles and Personalized Flows

The wavicle nature of our social existence provides a lens for understanding social filtering and its successes.  Still, this doesn't quite get us to truly effective...

Privacy As... Sharing More Information?
From BLOG@CACM

Privacy As... Sharing More Information?

When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...

Google Android Authentication
From BLOG@CACM

Google Android Authentication

I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...

Three Misconceptions About Human-Computer Interaction
From BLOG@CACM

Three Misconceptions About Human-Computer Interaction

Three misconceptions about the field of human-computer interaction, as observed by an AI researcher turned HCI researcher in a large corporate research lab

­Usable Privacy and Security
From BLOG@CACM

­Usable Privacy and Security

We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account