Technology Policy/Social Issues in Computing
 
-   A Generative AI Perspective on the Turing Test: Passed but Not Vindicated (November, 2025) 
[ 
53 ]
 -   An Overview of Generative AI Acceptable Use Policies by Universities with Top 25 Computer Science Programs  (September, 2025) 
[ 
316 ]
 -   Cyberdidacticism: The New Epistemic Paradigm for cognitive minimalism and GenerativeAI (May, 2025) 
[ 
762 ]
 -   A Story Arc from Tron to Sora - Part 2: An Interview with Judson Rosebush (March, 2025) 
[ 
890 ]
 -   A Story Arc from Tron to Sora - Part 1: An Interview with Judson Rosebush (January, 2025) 
[ 
1013 ]
 -   Healthy Skepticism (with John King, Phil Armour and Bob Charette) (November, 2024) 
 -   Bruce Scheier on AI Security (interview) (November, 2024) 
[ 
1286 ]
 -   Election Integrity in the United States: How Will 2024 Compare to 2020? (October, 2024) 
[ 
1285 ]
 -  A Collapsing Academy V: Internal and External Threat Vectors Facing Higher Education (July, 2024) 
[ 
1779 ]
 -   Social Media, Cognitive Dysfunction, and Social Disruption (May, 2024) 
[ 
1862 ]
 -   Generative AI, Semantic Entropy, and the Big Sort (January, 2024) 
[ 
2126 ]
 -   The Thousand Talents Program Prosecutions in Context (November, 2023) 
[ 
2247 ]
 -   Fatal Flaws in ChatAI as a Content Generator (September, 2023) 
[ 
2555 ]
 -   “Free” Online Services and Gonzo Capitalism (July, 2023) [ 
2522 ]
 -   ChatGPT and AIChat Epistemology (May, 2023) [ 
10916 ]
 -   911 Swatting, VoIP and Doxxing (March, 2023) [ 
4674 ]
 -   The Dictator's Dilemma and the "Sovereignty of Cyberspace" Delusion
 (January, 2023) [ 
3473 ]
 -   Social Media and the Banality of (Online) Crowds (November, 2022) [ 
1721 ]
 -   Ukraine Aftershocks (November, 2022) 
 -   A Collapsing Academy IV: How Did Memory and Gag Laws Gain Admission?(September, 2022) [ 
4577 ]
 -   Prosperity Theology Goes Online: Will This Be A Fifth Great Awakening?(July, 2022) [ 
4910 ]
 -  The QAnon Phenomenon: The Storm Has Always Been Among Us  (May, 2022) [ 
5632 ]
 -  The Collapsing Academy - III: Scientometrics and Metric Mania? (March, 2022)  
[
 5712 ] 
 -  The State of The Art in Voting Machine Technology: Just How Reliable Are They? (January, 2022)  
[
 6968 ] 
 -  The Online Disinformation Opera (December, 2021)  
[
 7985 ] 
 -  The Collapsing Academy - II: Cancel Culture Goes to College (October, 2021)  
[
 8202 ] 
 -  It's On: COVID-19, Risk Ecology, and Preparedness Tips (July, 2020) 
 -  The Collapsing Academy - I: Unhinging from Core Principles (July, 2020)  
[
 7773 ] 
 -  The Equifax Hack Revisited and Repurposed (May, 2020)  
[
 12904 ] 
 -  New Perspectives on (Anti) Social Media (March, 2020)  
[
 7394 ] 
 -   A Critical Look at the 2019 College Admissions Scandal (January, 2020)  
[
 9811 ] 
 -  The Sokol Hoax: A 25-Year Retrospective  (March, 2020) 
[
 9286 ] 
 -  Moral Hazards in the Cyber Vulnerability Markets  (December, 2019) 
[
 10785 ] 
 -  Huawei, BIS and the IEEE: it’s Déjà vu all over again (October, 2019)  
[
 9270 ] 
 -  Codes of Ethics in a Post-Truth World (March, 2019)  
[
 8918 ] 
 -  Vehicle Telematics: The Good, Bad, and Ugly (January, 2019) 
[
 11977 ] 
 -  Election Integrity 2018: Are We Better Off Than We Were in 2016 (November, 2018) 
[
 10684 ] 
 -  The Genesis of Postmodern Disinformatics (November, 2018) 
[
 9932 ] 
 -  The Online Trolling Ecosystem (August, 2018) 
[
 9813 ] 
 -  Newton's Great Insight (July, 2018) 
[
 10024 ] 
 -  Malice Domestic: The Cambridge Analytica Dystopia (May, 2018) 
[
 10754 ] 
 -  Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media (April, 2018) 
[
 9694 ] 
 -   Trolling Pathologies (March, 2018) 
[
 9724 ] 
 -   Bruce Schneier on Future Digital Threats (February, 2018) 
[
 9442 ] 
 -   Disinformatics: The Discipline behind Grand Deceptions (January, 2018) 
[
 10252 ] 
 -   Equifax and the Latest Round of Identity Theft Roulette (December, 2017) 
[
 1999 ] 
 -   The New Science Wars (November, 2017) 
[
 10209 ] 
 -   Net Neutrality Reloaded (October, 2017) 
[
 10279 ] 
 -   Oh, What a Tangled
  Web: Russian
  Hacking, Fake News, 
  and the 2016 US 
  Presidential Election (September, 2017) 
[
 10347 ] 
 -   Which Is More Dangerous—the Dark Web or the Deep State? (July, 2017) 
[
 10685 ] 
 -   A Quick Take on Windows Security Evolution (May, 2017) 
[
 10575 ] 
 -   Alt-News and Post-Truths in the “Fake News” Era (April, 2017) 
[
 11256 ] 
 -   On the Problem of Cyber-Attribution(March, 2017) 
[
 10329 ] 
 -  Lies, Damn Lies, and Fake News (February, 2017) 
[
 13264 ] 
 -   Software Sophistry and Political Sleight of Hand (January, 2017) 
[
 10297 ] 
 -   Chasing Elbridges Ghost: Digital Gerrymandering (November, 2016) 
[
 11975 ] 
 -   Douglas Jones on Today's Voting Machines  (October, 2016) 
[
 10181 ] 
 -   Coda in the Key of F2654hD4  (September, 2016) 
[
 13704 ] 
 -   The Polyanna Delusion (August, 2016) 
[
 10365 ] 
 -   The Dictator's Dilemma (July, 2016) 
[
 12690 ] 
 -   Attenuated FAQs (May, 2016) 
[
 9953 ] 
 -   The Bogus Science Theorem (and the Junk Science Wager) (April, 2016) 
[
 10388 ] 
 -   Net Neutrality vs. Net Neutering (March, 2016) 
[
 12459 ] 
 -   Secretocracy (February, 2016) 
[
 11461 ] 
 -   Digital Politics 2016 (January 2016) 
[
 2734 ] 
 -   What Price Gonzo Ethics? (December, 2015) 
[
 13309 ] 
 -   The Dystory of Ahmed's Clock (November, 2015) 
[
 10428 ] 
 -   Legislating Technology (Badly) (October, 2015) 
[
 17135 ] 
 -   STEM Crazy (September, 2015) 
[
 10755 ] 
 -   TSA: Mission Creep Meets Waste (August, 2015) 
[
 20587 ] 
 -   A Farewell to Air Gaps - II (July, 2015) 
[
 11898 ] 
 -   A Farewell to Air Gaps - I (June, 2015) 
[
 11706 ] 
 -   What Makes A Good Column (May, 2015) 
[
 13367 ] 
 -   Borderline Executive Disorder (April, 2015) 
[
 11320 ] 
 -   Noirware (March, 2015) 
[
 2514 ] 
 -   Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole (February, 2015) 
[
 12771 ] 
 -   The $149 Gamble (January, 2015) 
[
 10839 ] 
 -   Judson Rosebush on Graphics and Animation (December, 2014) 
[
 12212 ] 
 -   Why Clouds Give Me a Case of the Vapors (November, 2014) 
[
 16481 ] 
 -   Defending Against Big Dada (October, 2014) 
[
 15435 ] 
 -   Sticky Wikis (September, 2014) 
[
 11748 ] 
 -   The Future of Digital Money Laundering (August, 2014) 
[
 12805 ] 
 -   Robert David Steele on OSINT (July, 2014) 
[
 15106 ] 
 
 -   Leadership Failures in the National Security Complex (June, 2014) 
[
 13026 ] 
 
 -   PII, the FTC, Car Dealers, and You (May, 2014) 
[
 14790 ] 
 
 -   Scapegoat Politics and Mr. Snowden's Legacy (April, 2014) 
[
 14618 ] 
  
 -   Reflections on STEM (March, 2014) 
[
 12700 ] 
  
 -   Moral Hazards, Negative Externalities, and the Surveillance Economy (February, 2014) 
[
 16678 ] 
 -   Privacy Informatics (January, 2014) 
[
 16183 ] 
 -   The Intimidation Factor (December, 2013) 
[
 29933 ] 
 
-   Toxic Cookies (September, 2013) 
[
 16471 ] 
 
-   Through the PRISM Darkly (July, 2013) 
[
 15899 ] 
 
-   Computing Technology and Survivable Journalism (May, 2013) 
[
 15493 ] 
 
-   The SCDOR Hack: Great Security Theater in Five Stages (March, 2013) 
[
 18004 ] 
 
-   RFIDiocy: It's déjà vu all over again (January, 2013) 
[
 16893 ] 
 
-   Stratfor or Stratagainst (November, 2012) 
[
 15483 ] 
 
-   The Dumbing Down of SportPhishing (September, 2012) 
[
 16417 ] 
 
-   The OuijAmazon Desktop Metaphor (July, 2012) 
[
 14178 ] 
 
-   Breaking the Fourth Wall of Electronic Crime:  Blame it on the Thespians (May, 2012) 
[
 15850 ] 
 
-   WikiLeaks and the Matter of Private Manning (March, 2012) 
[
 20112 ] 
 
-   Identity Theft and Financial Fraud: Some Strangeness in the Proportions (January, 2012) 
[
 19908 ] 
 
-   BRAP Forensics: Boutique Computer Activity Mining vs. Personal Privacy Management (June, 2008) 
[
 184678 ] 
 
-   Faith-Based Security (April, 2008)  
[
 24515 ] 
 
-   Credit Card Forensics (December, 2007) 
[
 133721 ] 
 
-   Better-than-Nothing Security Practices
 (August, 2007) 
[
 22392 ] 
 
-   Hiding Data, Forensics and Anti-Forensics
 (April, 2007) 
[
 250000 ] 
 
-   Fungible Credentials and 'Next Generation Fraud'
 (December, 2006) 
[
 49779 ] 
 
-   Disk Wiping by any Other Name
 (August, 2006) 
[
 147656 ] 
 
-   Phishing Mongers and Posers (April, 2006) 
[
 32814 ] 
 
-   Pernicious Ports (December, 2005) 
[
 137980 ] 
 
-   WiFi Attack Vectors (August, 2005) 
[
 181756 ] 
 
-   The Two Sides of ROI: Return-on-Investment vs. Risk-of-Incarceration (April, 2005) 
[
 1242 ] 
 
-   Wireless InFidelity II: Airjacking (December, 2004) 
[
 152083 ] 
 
-   Wireless InFidelity I: War Driving (July, 2004) 
[
 188370 ] 
 
  -   Wading into Alternate Data Streams (April, 2004) 
[
 36358 ] 
 
  -   SoBig, W32/Blaster and the Malware Month of the Millenium (December, 2003) 
[
 31479 ] 
 
  -   The Discipline of Internet Forensics (August, 2003) 
[
 57220 ] 
 
  -   Anonymizing the Net (April, 2003)
[
 39555 ]  
 
 -   Responsible Web Caching (September, 2002) 
[
 28221 ] 
 
 -   Hijacking the Web (April, 2002) 
 [
33259 ] 
 
 -   The Code Red Worm (November, 2001) 
[
50471 
] 
 
  -   E_Commerce: Business at the Speed of Sleet (August, 2001) 
[
29055 
] 
 
  -   Caustic Cookies (April, 2001) 
[
34591 
] 
 
	-   Digital Politics 2000 (Nov, 2000) 
 [
 25677 
] 
 
	-   Predatory Disintermediation (May, 2000) 
[
 32708 
] 
 
	-   Social Security Numbers, Theft Identity, and the Web (November, 1999) 
 [
 31133 
] 
 
    -   The Cost of Having 
Analog Executives in a Digital World (August, 1999) 
[
 18797 
] 
 
    -    Y2k and Xday (May, 1999) 
 [
 25648 
 ] 
 
    -    Value-Added Publishing (January, 1999) 
[
 24317 
] 
 
    -    Who Won the Mosaic War? (October, 1998) 
[
 26999 
] 
 
  -    The Year 2000 Problem 
and the New Riddle of Induction (March, 1998) 
[
 24612 
] 
 
  -    Watermarking Cyberspace (November, 1997) 
[
 25154 
] 
 
  -    The Communications 
Decency Act, Informal Logic and the Wapnerization of Cyberspace (July, 1997) 
[
 20351 
] 
 
  -    Email: the good, the bad and the ugly (April, 1997) 
[
 14621 
] 
 
  -    Cyberspace 2000: Dealing with Information Overload (February, 1997) 
 [
  21064 
] 
 
  -    Digital Politics (October, 1996) 
[
  28866 
] 
 
  -    Technology Policy in the Information Age (June, 1996) 
[
  55860 
] 
 
  -   HTML Compliance and the Return of the Test Pattern (February, 1996) 
[
  27758 
] 
 
  -   Maiden Voyage: Digital Villages and Cyberspace (November, 1995)
  [
   24277  
] 
  
- The 2012 Anti-Money Laundering and Financial Crime Conference  (Winter, 2013)  
[
   12865  
]
 
- Bandwidth Bandits Old and New (Fall, 2012)  
[
   15521  
]
 
- Online Gaming in the Jurassic Period
(Summer, 2012)  
[
   12934  
]
 
- Digital Watermarking for Fun and Profit
(Spring, 2012)  
[
   14394  
]
 
- Some Thoughts on the Art and Practice of Avoiding  Identity Theft and Financial Fraud
(Winter, 2012)  
[
   14305  
]
 
- Identity Theft and Financial Fraud - 2010 in Review
(Fall, 2011)  
[
   13681  
]
 
- Cyberwarfare 2011: Let the Stuxnet Games Begin
(Summer, 2011)  
[
   17394  
]
 
- Cablegate - Security Theater in Three Acts (give or take)
(Spring, 2011)  
[
   14993  
]
 
- The Afghanistan War Diary Wikileak
(Winter, 2011)  
[
   14610  
]
 
- Stuck on Stupid :  Dumb Decisions in IT
(Fall, 2010)  
[
   14723  
]
 
- PCI Insecurity and Life in a Shadow Economy
(Spring, 2010)  
[
   15106  
]
 
- Are Your Web Bugs No-See-Ums?
(Winter, 2010)  
[
   16717  
]
 
- Ways We Invite Identity Theft
(Fall, 2009)  
[
   14640  
]
 
- RFID and Nuance
(Spring, 2009)  
[
   15332  
]
 
- Defcon 16 Revisited
(Winter, 2009)  
[
   15205  
]
 
- Digital Vaults, Crypts and Ossuaries 
(Fall, 2008)  
[
   15349  
]
 
- Security-Through-Obscurity: there's less to this than meets the eye  
(Spring, 2008)  
[
   22253  
]
 
- Oga get no Dolla Chop. Magha get last laugh.- 
The Nigerian 419 Scam Gets Gypped in the Marsh
(Winter 2008)  
[
   16097  
]
 
- Why Can't We Get Rid of Spam? (Fall 2007)  
[
   17220  
]
 
- Phish Phactors(Spring 2007)  
[
   17992  
]
 
- How Vendor-Specific Websites and Bogus Error Messages Can Destroy a Web Presence(Winter 2007)  
[
   17336  
]
 
- What Really Happens When Your SYSAD Sanitizes Your Disk Drives? (August 2006)  
[
   20056  
]
 
- Mag Stripe Mania: Credit Card Fraud and the Right Hand Rule of Physics (Spring 2006)  
[
   28297  
]
 
- Malware's Second Coming (Winter 2006)  
[
   16362  
]
 
- Mutual Authentication, Plastic, and Phishing  (Fall 2005)  
[
   16348  
]
 
- ROI vs. OSA: Return-on-Investment vs. Orange Suit Avoidance  (Spring 2005)  
[
   3852  
]
 
-  Why Wireless Networks are Insecure?   (Winter 2005)  
[
   5060  
]
 
-  Defense-in-Depth: Hardening the BIOS   (Fall, 2004)  
[
   15921  
]
 
-  Practical Hints for Password 
Protection  (Spring, 2004)
[
   20723  
]