Hal Berghel

According to our database1, Hal Berghel authored at least 144 papers between 1983 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Awards

ACM Fellow

ACM Fellow 1998, "For wide-ranging contributions to the arts, sciences and practices of information processing and distinguished service to ACM.".

IEEE Fellow

IEEE Fellow 2001, "For contributions to experimental computer science and engineering in the area of electronic information management.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Codes of Ethics in a Post-Truth World.
IEEE Computer, 2019

Vehicle Telematics: The Good, Bad and Ugly.
IEEE Computer, 2019

2018
The Online Trolling Ecosystem.
IEEE Computer, 2018

The Genesis of Postmodern Disinformatics [Out of Band].
IEEE Computer, 2018

Newton's Great Insight.
IEEE Computer, 2018

Malice Domestic: The Cambridge Analytica Dystopia.
IEEE Computer, 2018

Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media.
IEEE Computer, 2018

Trolling Pathologies.
IEEE Computer, 2018

Bruce Schneier on Future Digital Threats.
IEEE Computer, 2018

Disinformatics: The Discipline behind Grand Deceptions.
IEEE Computer, 2018

2017
Equifax and the Latest Round of Identity Theft Roulette.
IEEE Computer, 2017

The New Science Wars.
IEEE Computer, 2017

Net Neutrality Reloaded.
IEEE Computer, 2017

Oh, What a Tangled Web: Russian Hacking, Fake News, and the 2016 US Presidential Election.
IEEE Computer, 2017

Which Is More Dangerous-the Dark Web or the Deep State?
IEEE Computer, 2017

A Quick Take on Windows Security Evolution.
IEEE Computer, 2017

Alt-News and Post-Truths in the "Fake News" Era.
IEEE Computer, 2017

On the Problem of (Cyber) Attribution.
IEEE Computer, 2017

Lies, Damn Lies, and Fake News.
IEEE Computer, 2017

Software Sophistry and Political Sleight of Hand.
IEEE Computer, 2017

2016
Chasing Elbridge's Ghost: The Digital Gerrymander.
IEEE Computer, 2016

Douglas Jones on Today's Voting Machines.
IEEE Computer, 2016

Coda in the Key of F2654hD4.
IEEE Computer, 2016

The Pollyanna Delusion.
IEEE Computer, 2016

The Dictator's (False) Dilemma.
IEEE Computer, 2016

Attenuated FAQs.
IEEE Computer, 2016

The Bogus Science Theorem (and the Junk Science Wager).
IEEE Computer, 2016

Net Neutrality vs. Net Neutering.
IEEE Computer, 2016

Secretocracy.
IEEE Computer, 2016

Digital Politics 2016.
IEEE Computer, 2016

2015
What Price Gonzo Ethics?
IEEE Computer, 2015

The Dystory of Ahmed's Clock.
IEEE Computer, 2015

Legislating Technology (Badly).
IEEE Computer, 2015

STEM Crazy.
IEEE Computer, 2015

TSA: Mission Creep Meets Waste.
IEEE Computer, 2015

A Farewell to Air Gaps, Part 2.
IEEE Computer, 2015

A Farewell to Air Gaps, Part 1.
IEEE Computer, 2015

What Makes a Good Column.
IEEE Computer, 2015

Borderline Executive Disorder.
IEEE Computer, 2015

Noirware.
IEEE Computer, 2015

Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole.
IEEE Computer, 2015

A Paperless Gamble.
IEEE Computer, 2015

2014
Judson Rosebush on Computer Graphics and Animation.
IEEE Computer, 2014

Why Clouds Give Me a Case of the Vapors.
IEEE Computer, 2014

Defending against Big Dada: Defensive Tactics for Weapons of Mass Deception.
IEEE Computer, 2014

Sticky Wikis.
IEEE Computer, 2014

The Future of Digital Money Laundering.
IEEE Computer, 2014

Robert David Steele on OSINT.
IEEE Computer, 2014

Leadership Failures in the National Security Complex.
IEEE Computer, 2014

PII, the FTC, Car Dealers, and You.
IEEE Computer, 2014

Mr. Snowden's Legacy.
IEEE Computer, 2014

STEM, Revisited.
IEEE Computer, 2014

Moral Hazards, Negative Externalities, and the Surveillance Economy.
IEEE Computer, 2014

Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege.
IEEE Computer, 2014

2013
The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications.
IEEE Computer, 2013

Toxic Cookies.
IEEE Computer, 2013

Through the PRISM Darkly.
IEEE Computer, 2013

Computing Technology and Survivable Journalism.
IEEE Computer, 2013

The SCDOR Hack: Great Security Theater in Five Stages.
IEEE Computer, 2013

RFIDiocy: It's Déjà Vu All over Again.
IEEE Computer, 2013

2012
Stratfor or Stratagainst.
IEEE Computer, 2012

The Dumbing Down of SportPhishing.
IEEE Computer, 2012

The OuijAmazon Desktop Metaphor.
IEEE Computer, 2012

Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians.
IEEE Computer, 2012

WikiLeaks and the Matter of Private Manning.
IEEE Computer, 2012

Identity Theft and Financial Fraud: Some Strangeness in the Proportions.
IEEE Computer, 2012

2011
A Survey of RFID Deployment and Security Issues.
JIPS, 2011

The State of the Art in Identity Theft.
Advances in Computers, 2011

2010
Parameters Effecting 2D Barcode Scanning Reliability.
Advances in Computers, 2010

2008
BRAP forensics.
Commun. ACM, 2008

Faith-based security.
Commun. ACM, 2008

Data Hiding Tactics for Windows and Unix File Systems.
Advances in Computers, 2008

2007
Credit Card Forensics.
Commun. ACM, 2007

Better-than-nothing security practices.
Commun. ACM, 2007

Hiding data, forensics, and anti-forensics.
Commun. ACM, 2007

Phish Phactors: Offensive and Defensive Strategies.
Advances in Computers, 2007

2006
Disk wiping by any other name.
Commun. ACM, 2006

Fungible credentials and next-generation fraud.
Commun. ACM, 2006

Phishing mongers and posers.
Commun. ACM, 2006

Wireless Insecurities.
Advances in Computers, 2006

2005
WiFi attack vectors.
Commun. ACM, 2005

Pernicious ports.
Commun. ACM, 2005

The two sides of ROI: return on investment vs. risk of incarceration.
Commun. ACM, 2005

A Protocol Layer Survey of Network Security.
Advances in Computers, 2005

2004
Wireless infidelity II: airjacking.
Commun. ACM, 2004

A paradigm shift in computing and IT education.
Commun. ACM, 2004

Wading into alternate data streams.
Commun. ACM, 2004

Wireless infidelity I: war driving.
Commun. ACM, 2004

2003
Anonymizing the net.
Commun. ACM, 2003

Malware month.
Commun. ACM, 2003

The discipline of Internet forensics.
Commun. ACM, 2003

2002
Responsible web caching.
Commun. ACM, 2002

Hijacking the web.
Commun. ACM, 2002

2001
Cyberprivacy in the New Millennium.
IEEE Computer, 2001

The Code Red Worm.
Commun. ACM, 2001

The Y2K e-commerce tumble.
Commun. ACM, 2001

Caustic Cookies.
Commun. ACM, 2001

A cyberpublishing manifesto.
Commun. ACM, 2001

A decade of applied computing.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

2000
Digital Politics 2000.
Commun. ACM, 2000

Predatory Disintermediation.
Commun. ACM, 2000

Identity Theft, Social Security Numbers, and the Web.
Commun. ACM, 2000

1999
Cyberbrowsing: Information Customization on the Web.
JASIS, 1999

The Cost of Having Analog Executives in a Digital World.
Commun. ACM, 1999

How Xday Figures in the Y2K Countdown.
Commun. ACM, 1999

Value-Added Publishing.
Commun. ACM, 1999

The World Wide Web.
Advances in Computers, 1999

1998
The Year-2000 Problem and the New Riddle of Induction.
Commun. ACM, 1998

Who Won the Mosaic War?
Commun. ACM, 1998

1997
A post mortem for the Communications Decency Act.
SIGCAS Computers and Society, 1997

Watermarking Cyberspace.
Commun. ACM, 1997

Informal Logic on Both Sides of the CDA Debate.
Commun. ACM, 1997

Email - The Good, The Bad, and the Ugly.
Commun. ACM, 1997

Cyberspace 2000: Dealing with Information Overload.
Commun. ACM, 1997

You learned all you need to design educational software design in kindergarten (panel).
Proceedings of the 2nd Annual Conference on Integrating Technology into Computer Science Education, 1997

1996
An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm.
ACM Trans. Inf. Syst., 1996

U.S. Technology Policy in the Information Age.
Commun. ACM, 1996

HTML Compliance and the Return of the Test Pattern.
Commun. ACM, 1996

Digital Politics.
Commun. ACM, 1996

The Client's Side of the World-Wide Web.
Commun. ACM, 1996

1995
Using the WWW Test Pattern to check HTML Client Compliance.
IEEE Computer, 1995

Maiden Voyage.
Commun. ACM, 1995

CYBER-SURFING: the state-of-the-art in client server browsing and navigation.
Proceedings of the 1995 ACM symposium on applied computing, 1995

1994
New wave prototyping: use and abuse of vacuous prototypes.
Interactions, 1994

1993
"Dynamic" Inferencing with Generalized Resolution.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993

1992
A proposed benchmark for testing implementations of crossword puzzle algorithms.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

An alternative to constraint logic programming for managing domain arithmetics in Prolog expert systems.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

Dynamic crossword slot table implementation.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

"Tuning" an ASM metric: a case study in metric ASM optimization.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

1990
A Proposed Standard for Measuring Crossword Compilation Efficiency.
Comput. J., 1990

The Physiology of PROLOG Expert System Inference Engine.
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, 1990

Efficient Generation of Lexically Proper Palindromes.
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, 1990

An Approach to Tableau Inferencing with "Hardwired" Heuristics.
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, 1990

An interactive source commenter for Prolog programs.
Proceedings of the 8th Annual International Conference on Systems Documentation, 1990

Documentation design based upon intuitive feature taxonomy and use logging.
Proceedings of the 8th Annual International Conference on Systems Documentation, 1990

1989
Crossword Compiler-Compilation.
Comput. J., 1989

1988
MS-DOS Prolog implementations revisited.
SIGPLAN Notices, 1988

TALISMAN: A Prototype Expert System for Spelling Correction.
Proceedings of the 1988 ACM SIGSMALL/PC Symposium on ACTES, May 4-6, 1988, Cannes, France, 1988

1987
A logical framework for the correction of spelling errors in electronic documents.
Inf. Process. Manage., 1987

Crossword Compilation with Horn Clauses.
Comput. J., 1987

1985
Simplified Integration of Prolog with RDBMS.
DATA BASE, 1985

1984
Measurements of program similarity in identical task environments.
SIGPLAN Notices, 1984

Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools?
Commun. ACM, 1984

1983
Computers and democracy: a critique of Parslow.
SIGCAS Computers and Society, 1983


  Loading...