According to our database
1,
Hal Berghel
authored at least 179 papers
between 1982 and 2024.
Collaborative distances:
ACM Fellow 1998, "For wide-ranging contributions to the arts, sciences and practices of information processing and distinguished service to ACM.".
IEEE Fellow 2001, "For contributions to experimental computer science and engineering in the area of electronic information management.".
2024
Bruce Schneier on AI Security (Interview).
Computer, November, 2024
Election Integrity in the United States: How Will 2024 Compare to 2020?
Computer, October, 2024
Social Media, Cognitive Dysfunction, and Social Disruption.
Computer, May, 2024
Generative Artificial Intelligence, Semantic Entropy, and the Big Sort.
Computer, January, 2024
2023
The Thousand Talents Program Prosecutions in Context.
Computer, November, 2023
Fatal Flaws in ChatAI as a Content Generator.
Computer, September, 2023
ChatGPT and AIChat Epistemology.
Computer, May, 2023
911 Swatting, VoIP, and Doxxing.
Computer, March, 2023
"Free" Online Services and Gonzo Capitalism.
Computer, 2023
The Dictator's Dilemma and the "Sovereignty of Cyberspace" Delusion.
Computer, 2023
2022
Social Media and the Banality of (Online) Crowds.
Computer, 2022
A Collapsing Academy IV: How Did Memory and Gag Laws Gain Admission?
Computer, 2022
Prosperity Theology Goes Online: Will This Be a Fifth Great Awakening?
Computer, 2022
The QAnon Phenomenon: The Storm Has Always Been Among Us.
Computer, 2022
A Collapsing Academy, Part III: Scientometrics and Metric Mania.
Computer, 2022
The State of the Art in Voting Machine Technology: Just How Reliable Are They?
Computer, 2022
2021
Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices.
Computer, 2021
The Online Disinformation Opera.
Computer, 2021
A Collapsing Academy, Part II: How Cancel Culture Works on the Academy.
Computer, 2021
2020
It's On: COVID-19, Risk Ecology, and Preparedness Tips.
Computer, 2020
A Collapsing Academy, Part 1.
Computer, 2020
The Equifax Hack Revisited and Repurposed.
Computer, 2020
New Perspectives on (Anti)Social Media.
Computer, 2020
The Sokol Hoax: A 25-Year Retrospective.
Computer, 2020
A Critical Look at the 2019 College Admissions Scandal?
Computer, 2020
2019
Huawei, BIS, and the IEEE: It's Déjà Vu All Over Again.
Computer, 2019
Codes of Ethics in a Post-Truth World.
Computer, 2019
Vehicle Telematics: The Good, Bad and Ugly.
Computer, 2019
2018
The Online Trolling Ecosystem.
Computer, 2018
The Genesis of Postmodern Disinformatics [Out of Band].
Computer, 2018
Malice Domestic: The Cambridge Analytica Dystopia.
Computer, 2018
Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media.
Computer, 2018
Bruce Schneier on Future Digital Threats.
Computer, 2018
Disinformatics: The Discipline behind Grand Deceptions.
Computer, 2018
Election Integrity 2018: Are We Better Off Than We Were in 2016? [Aftershock].
Computer, 2018
2017
Equifax and the Latest Round of Identity Theft Roulette.
Computer, 2017
Oh, What a Tangled Web: Russian Hacking, Fake News, and the 2016 US Presidential Election.
Computer, 2017
Which Is More Dangerous-the Dark Web or the Deep State?
Computer, 2017
A Quick Take on Windows Security Evolution.
Computer, 2017
Alt-News and Post-Truths in the "Fake News" Era.
Computer, 2017
On the Problem of (Cyber) Attribution.
Computer, 2017
Lies, Damn Lies, and Fake News.
Computer, 2017
Software Sophistry and Political Sleight of Hand.
Computer, 2017
2016
Chasing Elbridge's Ghost: The Digital Gerrymander.
Computer, 2016
Douglas Jones on Today's Voting Machines.
Computer, 2016
Coda in the Key of F2654hD4.
Computer, 2016
The Dictator's (False) Dilemma.
Computer, 2016
The Bogus Science Theorem (and the Junk Science Wager).
Computer, 2016
Net Neutrality vs. Net Neutering.
Computer, 2016
2015
The Dystory of Ahmed's Clock.
Computer, 2015
Legislating Technology (Badly).
Computer, 2015
TSA: Mission Creep Meets Waste.
Computer, 2015
A Farewell to Air Gaps, Part 2.
Computer, 2015
A Farewell to Air Gaps, Part 1.
Computer, 2015
What Makes a Good Column.
Computer, 2015
Borderline Executive Disorder.
Computer, 2015
Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole.
Computer, 2015
2014
Judson Rosebush on Computer Graphics and Animation.
Computer, 2014
Why Clouds Give Me a Case of the Vapors.
Computer, 2014
Defending against Big Dada: Defensive Tactics for Weapons of Mass Deception.
Computer, 2014
The Future of Digital Money Laundering.
Computer, 2014
Robert David Steele on OSINT.
Computer, 2014
Leadership Failures in the National Security Complex.
Computer, 2014
PII, the FTC, Car Dealers, and You.
Computer, 2014
Moral Hazards, Negative Externalities, and the Surveillance Economy.
Computer, 2014
Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege.
Computer, 2014
2013
The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications.
Computer, 2013
Through the PRISM Darkly.
Computer, 2013
Computing Technology and Survivable Journalism.
Computer, 2013
The SCDOR Hack: Great Security Theater in Five Stages.
Computer, 2013
RFIDiocy: It's Déjà Vu All over Again.
Computer, 2013
2012
Stratfor or Stratagainst.
Computer, 2012
The Dumbing Down of SportPhishing.
Computer, 2012
The OuijAmazon Desktop Metaphor.
Computer, 2012
Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians.
Computer, 2012
WikiLeaks and the Matter of Private Manning.
Computer, 2012
Identity Theft and Financial Fraud: Some Strangeness in the Proportions.
Computer, 2012
2011
A Survey of RFID Deployment and Security Issues.
J. Inf. Process. Syst., 2011
The State of the Art in Identity Theft.
Adv. Comput., 2011
2010
Parameters Effecting 2D Barcode Scanning Reliability.
Adv. Comput., 2010
2008
Data Hiding Tactics for Windows and Unix File Systems.
Adv. Comput., 2008
2007
Better-than-nothing security practices.
Commun. ACM, 2007
Hiding data, forensics, and anti-forensics.
Commun. ACM, 2007
Phish Phactors: Offensive and Defensive Strategies.
Adv. Comput., 2007
2006
Disk wiping by any other name.
Commun. ACM, 2006
Fungible credentials and next-generation fraud.
Commun. ACM, 2006
Phishing mongers and posers.
Commun. ACM, 2006
2005
The two sides of ROI: return on investment vs. risk of incarceration.
Commun. ACM, 2005
A Protocol Layer Survey of Network Security.
Adv. Comput., 2005
2004
Wireless infidelity II: airjacking.
Commun. ACM, 2004
A paradigm shift in computing and IT education.
Commun. ACM, 2004
Wading into alternate data streams.
Commun. ACM, 2004
Wireless infidelity I: war driving.
Commun. ACM, 2004
2003
The discipline of Internet forensics.
Commun. ACM, 2003
2002
2001
Cyberprivacy in the New Millennium.
Computer, 2001
The Y2K e-commerce tumble.
Commun. ACM, 2001
A cyberpublishing manifesto.
Commun. ACM, 2001
A decade of applied computing.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001
2000
Predatory Disintermediation.
Commun. ACM, 2000
Identity Theft, Social Security Numbers, and the Web.
Commun. ACM, 2000
1999
Cyberbrowsing: Information Customization on the Web.
J. Am. Soc. Inf. Sci., 1999
The Cost of Having Analog Executives in a Digital World.
Commun. ACM, 1999
How Xday Figures in the Y2K Countdown.
Commun. ACM, 1999
1998
The Year-2000 Problem and the New Riddle of Induction.
Commun. ACM, 1998
1997
A post mortem for the Communications Decency Act.
SIGCAS Comput. Soc., 1997
St. Cloud State University ACM chapter wins 2nd annual Webbie prize.
XRDS, 1997
Informal Logic on Both Sides of the CDA Debate.
Commun. ACM, 1997
Email - The Good, The Bad, and the Ugly.
Commun. ACM, 1997
Cyberspace 2000: Dealing with Information Overload.
Commun. ACM, 1997
You learned all you need to design educational software design in kindergarten (panel).
Proceedings of the 2nd Annual Conference on Integrating Technology into Computer Science Education, 1997
1996
An Extension of Ukkonen's Enhanced Dynamic Programming ASM Algorithm.
ACM Trans. Inf. Syst., 1996
U.S. Technology Policy in the Information Age.
Commun. ACM, 1996
HTML Compliance and the Return of the Test Pattern.
Commun. ACM, 1996
The Client's Side of the World-Wide Web.
Commun. ACM, 1996
1995
Using the WWW Test Pattern to check HTML Client Compliance.
Computer, 1995
CYBER-SURFING: the state-of-the-art in client server browsing and navigation.
Proceedings of the 1995 ACM symposium on applied computing, 1995
1994
New wave prototyping: use and abuse of vacuous prototypes.
Interactions, 1994
1993
"Dynamic" Inferencing with Generalized Resolution.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993
1992
A proposed benchmark for testing implementations of crossword puzzle algorithms.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992
An alternative to constraint logic programming for managing domain arithmetics in Prolog expert systems.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992
Dynamic crossword slot table implementation.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992
"Tuning" an ASM metric: a case study in metric ASM optimization.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992
1990
A Proposed Standard for Measuring Crossword Compilation Efficiency.
Comput. J., 1990
The Physiology of PROLOG Expert System Inference Engine.
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, 1990
Efficient Generation of Lexically Proper Palindromes.
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, 1990
An Approach to Tableau Inferencing with "Hardwired" Heuristics.
Proceedings of the 1990 ACM SIGSMALL/PC Symposium on Small Systems, 1990
An interactive source commenter for Prolog programs.
Proceedings of the 8th Annual International Conference on Systems Documentation, 1990
Documentation design based upon intuitive feature taxonomy and use logging.
Proceedings of the 8th Annual International Conference on Systems Documentation, 1990
1989
Crossword Compiler-Compilation.
Comput. J., 1989
1988
MS-DOS Prolog implementations revisited.
ACM SIGPLAN Notices, 1988
TALISMAN: A Prototype Expert System for Spelling Correction.
Proceedings of the 1988 ACM SIGSMALL/PC Symposium on ACTES, May 4-6, 1988, Cannes, France, 1988
1987
A logical framework for the correction of spelling errors in electronic documents.
Inf. Process. Manag., 1987
Crossword Compilation with Horn Clauses.
Comput. J., 1987
1986
A comparative feature-analysis of microcomputer prolog implementations.
ACM SIGPLAN Notices, 1986
Spelling verification in prolog.
ACM SIGPLAN Notices, 1986
Performance characteristics of microcomputer Prolog implementations.
Proceedings of the 1986 ACM SIGSMALL/PC symposium on Small systems, 1986
1985
Simplified Integration of Prolog with RDBMS.
Data Base, 1985
1984
Measurements of program similarity in identical task environments.
ACM SIGPLAN Notices, 1984
Should Congress Provide Special Tax Incentives for Firms Donating Computers to Schools?
Commun. ACM, 1984
1983
Computers and democracy: a critique of Parslow.
SIGCAS Comput. Soc., 1983
1982
CMOS new product development for the health care industry: Procedures and pitfalls.
Proceedings of the 5th ACM SIGSMALL symposium on Small systems, 1982