Hal Berghel

According to our database1, Hal Berghel authored at least 161 papers between 1982 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Awards

ACM Fellow

ACM Fellow 1998, "For wide-ranging contributions to the arts, sciences and practices of information processing and distinguished service to ACM.".

IEEE Fellow

IEEE Fellow 2001, "For contributions to experimental computer science and engineering in the area of electronic information management.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices.
Computer, 2021

The Online Disinformation Opera.
Computer, 2021

A Collapsing Academy, Part II: How Cancel Culture Works on the Academy.
Computer, 2021

2020
It's On: COVID-19, Risk Ecology, and Preparedness Tips.
Computer, 2020

A Collapsing Academy, Part 1.
Computer, 2020

The Equifax Hack Revisited and Repurposed.
Computer, 2020

New Perspectives on (Anti)Social Media.
Computer, 2020

The Sokol Hoax: A 25-Year Retrospective.
Computer, 2020

A Critical Look at the 2019 College Admissions Scandal?
Computer, 2020

2019
Huawei, BIS, and the IEEE: It's Déjà Vu All Over Again.
Computer, 2019

Codes of Ethics in a Post-Truth World.
Computer, 2019

Vehicle Telematics: The Good, Bad and Ugly.
Computer, 2019

2018
The Online Trolling Ecosystem.
Computer, 2018

The Genesis of Postmodern Disinformatics [Out of Band].
Computer, 2018

Newton's Great Insight.
Computer, 2018

Malice Domestic: The Cambridge Analytica Dystopia.
Computer, 2018

Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media.
Computer, 2018

Trolling Pathologies.
Computer, 2018

Bruce Schneier on Future Digital Threats.
Computer, 2018

Disinformatics: The Discipline behind Grand Deceptions.
Computer, 2018

Election Integrity 2018: Are We Better Off Than We Were in 2016? [Aftershock].
Computer, 2018

2017
Equifax and the Latest Round of Identity Theft Roulette.
Computer, 2017

The New Science Wars.
Computer, 2017

Net Neutrality Reloaded.
Computer, 2017

Oh, What a Tangled Web: Russian Hacking, Fake News, and the 2016 US Presidential Election.
Computer, 2017

Which Is More Dangerous-the Dark Web or the Deep State?
Computer, 2017

A Quick Take on Windows Security Evolution.
Computer, 2017

Alt-News and Post-Truths in the "Fake News" Era.
Computer, 2017

On the Problem of (Cyber) Attribution.
Computer, 2017

Lies, Damn Lies, and Fake News.
Computer, 2017

Software Sophistry and Political Sleight of Hand.
Computer, 2017

2016
Chasing Elbridge's Ghost: The Digital Gerrymander.
Computer, 2016

Douglas Jones on Today's Voting Machines.
Computer, 2016

Coda in the Key of F2654hD4.
Computer, 2016

The Pollyanna Delusion.
Computer, 2016

The Dictator's (False) Dilemma.
Computer, 2016

Attenuated FAQs.
Computer, 2016

The Bogus Science Theorem (and the Junk Science Wager).
Computer, 2016

Net Neutrality vs. Net Neutering.
Computer, 2016

Secretocracy.
Computer, 2016

Digital Politics 2016.
Computer, 2016

2015
What Price Gonzo Ethics?
Computer, 2015

The Dystory of Ahmed's Clock.
Computer, 2015

Legislating Technology (Badly).
Computer, 2015

STEM Crazy.
Computer, 2015

TSA: Mission Creep Meets Waste.
Computer, 2015

A Farewell to Air Gaps, Part 2.
Computer, 2015

A Farewell to Air Gaps, Part 1.
Computer, 2015

What Makes a Good Column.
Computer, 2015

Borderline Executive Disorder.
Computer, 2015

Noirware.
Computer, 2015

Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole.
Computer, 2015

A Paperless Gamble.
Computer, 2015

2014
Judson Rosebush on Computer Graphics and Animation.
Computer, 2014

Why Clouds Give Me a Case of the Vapors.
Computer, 2014

Defending against Big Dada: Defensive Tactics for Weapons of Mass Deception.
Computer, 2014

Sticky Wikis.
Computer, 2014

The Future of Digital Money Laundering.
Computer, 2014

Robert David Steele on OSINT.
Computer, 2014

Leadership Failures in the National Security Complex.
Computer, 2014

PII, the FTC, Car Dealers, and You.
Computer, 2014

Mr. Snowden's Legacy.
Computer, 2014

STEM, Revisited.
Computer, 2014

Moral Hazards, Negative Externalities, and the Surveillance Economy.
Computer, 2014

Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege.
Computer, 2014

2013
The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications.
Computer, 2013

Toxic Cookies.
Computer, 2013

Through the PRISM Darkly.
Computer, 2013

Computing Technology and Survivable Journalism.
Computer, 2013

The SCDOR Hack: Great Security Theater in Five Stages.
Computer, 2013

RFIDiocy: It's Déjà Vu All over Again.
Computer, 2013

2012
Stratfor or Stratagainst.
Computer, 2012

The Dumbing Down of SportPhishing.
Computer, 2012

The OuijAmazon Desktop Metaphor.
Computer, 2012

Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians.
Computer, 2012

WikiLeaks and the Matter of Private Manning.
Computer, 2012

Identity Theft and Financial Fraud: Some Strangeness in the Proportions.
Computer, 2012

2011
A Survey of RFID Deployment and Security Issues.
J. Inf. Process. Syst., 2011

The State of the Art in Identity Theft.
Adv. Comput., 2011

2010
Parameters Effecting 2D Barcode Scanning Reliability.
Adv. Comput., 2010

2008
BRAP forensics.
Commun. ACM, 2008

Faith-based security.
Commun. ACM, 2008

Data Hiding Tactics for Windows and Unix File Systems.
Adv. Comput., 2008

2007
Credit Card Forensics.
Commun. ACM, 2007

Better-than-nothing security practices.
Commun. ACM, 2007

Hiding data, forensics, and anti-forensics.
Commun. ACM, 2007

Phish Phactors: Offensive and Defensive Strategies.
Adv. Comput., 2007

2006
Disk wiping by any other name.
Commun. ACM, 2006

Fungible credentials and next-generation fraud.
Commun. ACM, 2006

Phishing mongers and posers.
Commun. ACM, 2006

Wireless Insecurities.
Adv. Comput., 2006

2005
WiFi attack vectors.
Commun. ACM, 2005

Pernicious ports.
Commun. ACM, 2005

The two sides of ROI: return on investment vs. risk of incarceration.
Commun. ACM, 2005

A Protocol Layer Survey of Network Security.
Adv. Comput., 2005

2004
Wireless infidelity II: airjacking.
Commun. ACM, 2004

A paradigm shift in computing and IT education.
Commun. ACM, 2004

Wading into alternate data streams.
Commun. ACM, 2004

Wireless infidelity I: war driving.
Commun. ACM, 2004

2003
Anonymizing the net.
Commun. ACM, 2003

Malware month.
Commun. ACM, 2003

The discipline of Internet forensics.
Commun. ACM, 2003

2002
Responsible web caching.
Commun. ACM, 2002

Hijacking the web.
Commun. ACM, 2002

2001
Cyberprivacy in the New Millennium.
Computer, 2001

The Code Red Worm.
Commun. ACM, 2001

The Y2K e-commerce tumble.
Commun. ACM, 2001

Caustic Cookies.
Commun. ACM, 2001

A cyberpublishing manifesto.
Commun. ACM, 2001

A decade of applied computing.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

2000
A day in the life of...
XRDS, 2000

Digital Politics 2000.
Commun. ACM, 2000

Predatory Disintermediation.
Commun. ACM, 2000

Identity Theft, Social Security Numbers, and the Web.
Commun. ACM, 2000

1999
Cyberbrowsing: Information Customization on the Web.
J. Am. Soc. Inf. Sci., 1999

The Cost of Having Analog Executives in a Digital World.
Commun. ACM, 1999

How Xday Figures in the Y2K Countdown.
Commun. ACM, 1999

Value-Added Publishing.
Commun. ACM, 1999

The World Wide Web.
Adv. Comput., 1999

1998
The Year-2000 Problem and the New Riddle of Induction.
Commun. ACM, 1998

Who Won the Mosaic War?
Commun. ACM, 1998

1997
A post mortem for the Communications Decency Act.
SIGCAS Comput. Soc., 1997

St. Cloud State University ACM chapter wins 2nd annual Webbie prize.
XRDS, 1997

Watermarking Cyberspace.
Commun. ACM, 1997

Informal Logic on Both Sides of the CDA Debate.
Commun. ACM, 1997

Email - The Good, The Bad, and the Ugly.
Commun. ACM, 1997

Cyberspace 2000: Dealing with Information Overload.
Commun. ACM, 1997

You learned all you need to design educational software design in kindergarten (panel).
Proceedings of the 2nd Annual Conference on Integrating Technology into Computer Science Education, 1997

1996
An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm.
ACM Trans. Inf. Syst., 1996

U.S. Technology Policy in the Information Age.
Commun. ACM, 1996

HTML Compliance and the Return of the Test Pattern.
Commun. ACM, 1996

Digital Politics.
Commun. ACM, 1996

The Client's Side of the World-Wide Web.
Commun. ACM, 1996

1995
Using the WWW Test Pattern to check HTML Client Compliance.
Computer, 1995

Maiden Voyage.
Commun. ACM, 1995

CYBER-SURFING: the state-of-the-art in client server browsing and navigation.
Proceedings of the 1995 ACM symposium on applied computing, 1995

1994
New wave prototyping: use and abuse of vacuous prototypes.
Interactions, 1994

1993
"Dynamic" Inferencing with Generalized Resolution.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993

1992
A proposed benchmark for testing implementations of crossword puzzle algorithms.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

An alternative to constraint logic programming for managing domain arithmetics in Prolog expert systems.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

Dynamic crossword slot table implementation.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

"Tuning" an ASM metric: a case study in metric ASM optimization.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

1990
A Proposed Standard for Measuring Crossword Compilation Efficiency.
Comput. J., 1990

The Physiology of PROLOG Expert System Inference Engine.
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, 1990

Efficient Generation of Lexically Proper Palindromes.
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, 1990

An Approach to Tableau Inferencing with "Hardwired" Heuristics.
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, 1990

An interactive source commenter for Prolog programs.
Proceedings of the 8th Annual International Conference on Systems Documentation, 1990

Documentation design based upon intuitive feature taxonomy and use logging.
Proceedings of the 8th Annual International Conference on Systems Documentation, 1990

1989
Crossword Compiler-Compilation.
Comput. J., 1989

1988
MS-DOS Prolog implementations revisited.
ACM SIGPLAN Notices, 1988

TALISMAN: A Prototype Expert System for Spelling Correction.
Proceedings of the 1988 ACM SIGSMALL/PC Symposium on ACTES, May 4-6, 1988, Cannes, France, 1988

1987
A logical framework for the correction of spelling errors in electronic documents.
Inf. Process. Manag., 1987

Crossword Compilation with Horn Clauses.
Comput. J., 1987

1986
A comparative feature-analysis of microcomputer prolog implementations.
ACM SIGPLAN Notices, 1986

Spelling verification in prolog.
ACM SIGPLAN Notices, 1986

Performance characteristics of microcomputer Prolog implementations.
Proceedings of the 1986 ACM SIGSMALL/PC symposium on Small systems, 1986

1985
Simplified Integration of Prolog with RDBMS.
Data Base, 1985

1984
Measurements of program similarity in identical task environments.
ACM SIGPLAN Notices, 1984

Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools?
Commun. ACM, 1984

1983
Computers and democracy: a critique of Parslow.
SIGCAS Comput. Soc., 1983

1982
CMOS new product development for the health care industry: Procedures and pitfalls.
Proceedings of the 5th ACM SIGSMALL symposium on Small systems, 1982


  Loading...