


Остановите войну!
for scientists:
Hal Berghel
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j148]Hal Berghel:
The State of the Art in Voting Machine Technology: Just How Reliable Are They? Computer 55(1): 118-126 (2022) - [j147]Hal Berghel:
A Collapsing Academy, Part III: Scientometrics and Metric Mania. Computer 55(3): 117-123 (2022) - [j146]Hal Berghel:
The QAnon Phenomenon: The Storm Has Always Been Among Us. Computer 55(5): 93-100 (2022) - 2021
- [j145]Hal Berghel
:
A Collapsing Academy, Part II: How Cancel Culture Works on the Academy. Computer 54(10): 138-144 (2021) - [j144]Achintya K. Bhowmik, David A. Fabry, Phillip G. Armour, Hal Berghel, Robert N. Charette, John L. King:
Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices. Computer 54(11): 108-120 (2021) - [j143]Hal Berghel:
The Online Disinformation Opera. Computer 54(12): 109-115 (2021) - 2020
- [j142]Hal Berghel
:
A Critical Look at the 2019 College Admissions Scandal? Computer 53(1): 72-77 (2020) - [j141]Hal Berghel
:
The Sokol Hoax: A 25-Year Retrospective. Computer 53(3): 67-72 (2020) - [j140]Hal Berghel
:
New Perspectives on (Anti)Social Media. Computer 53(3): 77-82 (2020) - [j139]Hal Berghel
:
The Equifax Hack Revisited and Repurposed. Computer 53(5): 85-90 (2020) - [j138]Hal Berghel, Robert N. Charette, Edward G. Happ, John Leslie King
:
It's On: COVID-19, Risk Ecology, and Preparedness Tips. Computer 53(7): 80-87 (2020) - [j137]Hal Berghel
:
A Collapsing Academy, Part 1. Computer 53(7): 93-98 (2020)
2010 – 2019
- 2019
- [j136]Hal Berghel
:
Vehicle Telematics: The Good, Bad and Ugly. Computer 52(1): 66-70 (2019) - [j135]Hal Berghel
:
Codes of Ethics in a Post-Truth World. Computer 52(3): 76-80 (2019) - [j134]Hal Berghel
:
Huawei, BIS, and the IEEE: It's Déjà Vu All Over Again. Computer 52(10): 99-104 (2019) - 2018
- [j133]Hal Berghel:
Disinformatics: The Discipline behind Grand Deceptions. Computer 51(1): 89-93 (2018) - [j132]Hal Berghel:
Bruce Schneier on Future Digital Threats. Computer 51(2): 64-67 (2018) - [j131]Hal Berghel:
Trolling Pathologies. Computer 51(3): 66-69 (2018) - [j130]Hal Berghel:
Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media. Computer 51(4): 70-73 (2018) - [j129]Hal Berghel:
Malice Domestic: The Cambridge Analytica Dystopia. Computer 51(5): 84-89 (2018) - [j128]Hal Berghel:
Newton's Great Insight. Computer 51(7): 86-90 (2018) - [j127]Hal Berghel, Daniel Berleant:
The Online Trolling Ecosystem. Computer 51(8): 44-51 (2018) - [j126]Hal Berghel:
Election Integrity 2018: Are We Better Off Than We Were in 2016? [Aftershock]. Computer 51(11): 90-94 (2018) - [j125]Hal Berghel:
The Genesis of Postmodern Disinformatics [Out of Band]. Computer 51(11): 102-105 (2018) - 2017
- [j124]Hal Berghel:
Software Sophistry and Political Sleight of Hand. Computer 50(1): 82-87 (2017) - [j123]Hal Berghel:
Lies, Damn Lies, and Fake News. Computer 50(2): 80-85 (2017) - [j122]Hal Berghel:
On the Problem of (Cyber) Attribution. Computer 50(3): 84-89 (2017) - [j121]Hal Berghel:
Alt-News and Post-Truths in the "Fake News" Era. Computer 50(4): 110-114 (2017) - [j120]Hal Berghel:
A Quick Take on Windows Security Evolution. Computer 50(5): 120-124 (2017) - [j119]Hal Berghel:
Which Is More Dangerous-the Dark Web or the Deep State? Computer 50(7): 86-91 (2017) - [j118]Hal Berghel:
Oh, What a Tangled Web: Russian Hacking, Fake News, and the 2016 US Presidential Election. Computer 50(9): 87-91 (2017) - [j117]Hal Berghel:
Net Neutrality Reloaded. Computer 50(10): 68-72 (2017) - [j116]Hal Berghel:
The New Science Wars. Computer 50(11): 72-76 (2017) - [j115]Hal Berghel:
Equifax and the Latest Round of Identity Theft Roulette. Computer 50(12): 72-76 (2017) - 2016
- [j114]Hal Berghel:
Digital Politics 2016. Computer 49(1): 75-79 (2016) - [j113]Hal Berghel:
Secretocracy. Computer 49(2): 63-67 (2016) - [j112]Hal Berghel:
Net Neutrality vs. Net Neutering. Computer 49(3): 73-77 (2016) - [j111]Hal Berghel:
The Bogus Science Theorem (and the Junk Science Wager). Computer 49(4): 74-78 (2016) - [j110]Hal Berghel:
Attenuated FAQs. Computer 49(5): 73-77 (2016) - [j109]Hal Berghel:
The Dictator's (False) Dilemma. Computer 49(7): 84-87 (2016) - [j108]Hal Berghel:
The Pollyanna Delusion. Computer 49(8): 98-102 (2016) - [j107]Hal Berghel:
Coda in the Key of F2654hD4. Computer 49(9): 104-109 (2016) - [j106]Hal Berghel:
Douglas Jones on Today's Voting Machines. Computer 49(10): 84-89 (2016) - [j105]Hal Berghel:
Chasing Elbridge's Ghost: The Digital Gerrymander. Computer 49(11): 91-95 (2016) - 2015
- [j104]Hal Berghel:
A Paperless Gamble. Computer 48(1): 76-78 (2015) - [j103]Hal Berghel:
Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole. Computer 48(2): 77-80 (2015) - [j102]Hal Berghel:
Noirware. Computer 48(3): 102-107 (2015) - [j101]Hal Berghel:
Borderline Executive Disorder. Computer 48(4): 82-86 (2015) - [j100]Hal Berghel:
What Makes a Good Column. Computer 48(5): 84-87 (2015) - [j99]Hal Berghel:
A Farewell to Air Gaps, Part 1. Computer 48(6): 64-68 (2015) - [j98]Hal Berghel:
A Farewell to Air Gaps, Part 2. Computer 48(7): 59-63 (2015) - [j97]Hal Berghel:
TSA: Mission Creep Meets Waste. Computer 48(8): 90-94 (2015) - [j96]Hal Berghel:
STEM Crazy. Computer 48(9): 75-80 (2015) - [j95]Hal Berghel:
Legislating Technology (Badly). Computer 48(10): 72-78 (2015) - [j94]Hal Berghel:
The Dystory of Ahmed's Clock. Computer 48(11): 82-85 (2015) - [j93]Hal Berghel:
What Price Gonzo Ethics? Computer 48(12): 88-93 (2015) - 2014
- [j92]Hal Berghel:
Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege. Computer 47(1): 78-82 (2014) - [j91]Hal Berghel:
Moral Hazards, Negative Externalities, and the Surveillance Economy. Computer 47(2): 73-77 (2014) - [j90]Hal Berghel:
STEM, Revisited. Computer 47(3): 70-73 (2014) - [j89]Hal Berghel:
Mr. Snowden's Legacy. Computer 47(4): 66-70 (2014) - [j88]Hal Berghel:
PII, the FTC, Car Dealers, and You. Computer 47(5): 102-106 (2014) - [j87]Hal Berghel:
Leadership Failures in the National Security Complex. Computer 47(6): 64-67 (2014) - [j86]Hal Berghel:
Robert David Steele on OSINT. Computer 47(7): 76-81 (2014) - [j85]Hal Berghel:
The Future of Digital Money Laundering. Computer 47(8): 70-75 (2014) - [j84]Hal Berghel:
Sticky Wikis. Computer 47(9): 90-93 (2014) - [j83]Hal Berghel:
Defending against Big Dada: Defensive Tactics for Weapons of Mass Deception. Computer 47(10): 94-98 (2014) - [j82]Hal Berghel:
Why Clouds Give Me a Case of the Vapors. Computer 47(11): 82-85 (2014) - [j81]Hal Berghel:
Judson Rosebush on Computer Graphics and Animation. Computer 47(12): 95-99 (2014) - 2013
- [j80]Hal Berghel:
RFIDiocy: It's Déjà Vu All over Again. Computer 46(1): 85-88 (2013) - [j79]Hal Berghel:
The SCDOR Hack: Great Security Theater in Five Stages. Computer 46(3): 97-99 (2013) - [j78]Hal Berghel:
Computing Technology and Survivable Journalism. Computer 46(5): 93-97 (2013) - [j77]Hal Berghel:
Through the PRISM Darkly. Computer 46(7): 86-90 (2013) - [j76]Hal Berghel:
Toxic Cookies. Computer 46(9): 104-107 (2013) - [j75]Hal Berghel:
The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications. Computer 46(12): 91-95 (2013) - 2012
- [j74]Hal Berghel:
Identity Theft and Financial Fraud: Some Strangeness in the Proportions. Computer 45(1): 86-89 (2012) - [j73]Hal Berghel:
WikiLeaks and the Matter of Private Manning. Computer 45(3): 70-73 (2012) - [j72]Hal Berghel:
Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians. Computer 45(5): 86-88 (2012) - [j71]Hal Berghel:
The OuijAmazon Desktop Metaphor. Computer 45(7): 80-82 (2012) - [j70]Hal Berghel:
The Dumbing Down of SportPhishing. Computer 45(9): 92-94 (2012) - [j69]Hal Berghel:
Stratfor or Stratagainst. Computer 45(11): 82-85 (2012) - 2011
- [j68]Amit Grover, Hal Berghel, Dennis Cobb:
The State of the Art in Identity Theft. Adv. Comput. 83: 1-50 (2011) - [j67]Amit Grover, Hal Berghel:
A Survey of RFID Deployment and Security Issues. J. Inf. Process. Syst. 7(4): 561-580 (2011) - 2010
- [j66]Amit Grover, Paul Braeckel, Kevin Lindgren, Hal Berghel, Dennis Cobb:
Parameters Effecting 2D Barcode Scanning Reliability. Adv. Comput. 80: 209-235 (2010)
2000 – 2009
- 2008
- [j65]Hal Berghel, David Hoelzer, Michael Sthultz:
Data Hiding Tactics for Windows and Unix File Systems. Adv. Comput. 74: 1-17 (2008) - [j64]Hal Berghel:
Faith-based security. Commun. ACM 51(4): 13-17 (2008) - [j63]Hal Berghel:
BRAP forensics. Commun. ACM 51(6): 15-20 (2008) - 2007
- [j62]Hal Berghel, James Carpinter, Ju-Yeon Jo:
Phish Phactors: Offensive and Defensive Strategies. Adv. Comput. 70: 223-268 (2007) - [j61]Hal Berghel:
Hiding data, forensics, and anti-forensics. Commun. ACM 50(4): 15-20 (2007) - [j60]Hal Berghel:
Better-than-nothing security practices. Commun. ACM 50(8): 15-18 (2007) - [j59]Hal Berghel:
Credit Card Forensics. Commun. ACM 50(12): 11-14 (2007) - 2006
- [j58]Michael Sthultz, Jacob Uecker, Hal Berghel:
Wireless Insecurities. Adv. Comput. 67: 226-253 (2006) - [j57]Hal Berghel:
Phishing mongers and posers. Commun. ACM 49(4): 21-25 (2006) - [j56]Hal Berghel, David Hoelzer:
Disk wiping by any other name. Commun. ACM 49(8): 17-21 (2006) - [j55]Hal Berghel:
Fungible credentials and next-generation fraud. Commun. ACM 49(12): 15-19 (2006) - 2005
- [j54]John V. Harrison, Hal Berghel:
A Protocol Layer Survey of Network Security. Adv. Comput. 64: 110-159 (2005) - [j53]Hal Berghel:
The two sides of ROI: return on investment vs. risk of incarceration. Commun. ACM 48(4): 15-20 (2005) - [j52]Hal Berghel, Jacob Uecker:
WiFi attack vectors. Commun. ACM 48(8): 21-28 (2005) - [j51]Hal Berghel, David Hoelzer:
Pernicious ports. Commun. ACM 48(12): 23-30 (2005) - 2004
- [j50]Hal Berghel, Natasa Brajkovska:
Wading into alternate data streams. Commun. ACM 47(4): 21-27 (2004) - [j49]Hal Berghel, David L. Sallach:
A paradigm shift in computing and IT education. Commun. ACM 47(6): 83-88 (2004) - [j48]Hal Berghel:
Wireless infidelity I: war driving. Commun. ACM 47(9): 21-26 (2004) - [j47]Hal Berghel, Jacob Uecker:
Wireless infidelity II: airjacking. Commun. ACM 47(12): 15-20 (2004) - 2003
- [j46]Hal Berghel, Kim Womack:
Anonymizing the net. Commun. ACM 46(4): 15-20 (2003) - [j45]Hal Berghel:
The discipline of Internet forensics. Commun. ACM 46(8): 15-20 (2003) - [j44]Hal Berghel:
Malware month. Commun. ACM 46(12): 15-19 (2003) - 2002
- [j43]Hal Berghel:
Hijacking the web. Commun. ACM 45(4): 23-27 (2002) - [j42]Hal Berghel:
Responsible web caching. Commun. ACM 45(9): 15-20 (2002) - 2001
- [j41]Hal Berghel:
A cyberpublishing manifesto. Commun. ACM 44(3): 17-20 (2001) - [j40]Hal Berghel:
Caustic Cookies. Commun. ACM 44(5): 19-22 (2001) - [j39]Hal Berghel:
The Y2K e-commerce tumble. Commun. ACM 44(8): 15-17 (2001) - [j38]Hal Berghel:
The Code Red Worm. Commun. ACM 44(12): 15-19 (2001) - [j37]Hal Berghel:
Cyberprivacy in the New Millennium. Computer 34(1): 132-134 (2001) - [c16]Hal Berghel:
A decade of applied computing. SAC 2001: 1-5 - 2000
- [j36]Hal Berghel:
Identity Theft, Social Security Numbers, and the Web. Commun. ACM 43(2): 17-21 (2000) - [j35]Hal Berghel:
Predatory Disintermediation. Commun. ACM 43(5): 23-29 (2000) - [j34]Hal Berghel:
Digital Politics 2000. Commun. ACM 43(11): 17-22 (2000) - [j33]Hal Berghel:
A day in the life of... XRDS 7(2): 30-31 (2000)
1990 – 1999
- 1999
- [j32]Hal Berghel, Douglas Blank:
The World Wide Web. Adv. Comput. 48: 179-218 (1999) - [j31]Hal Berghel:
Value-Added Publishing. Commun. ACM 42(1): 19-23 (1999) - [j30]Hal Berghel:
How Xday Figures in the Y2K Countdown. Commun. ACM 42(5): 11-15 (1999) - [j29]Hal Berghel:
The Cost of Having Analog Executives in a Digital World. Commun. ACM 42(11): 11-15 (1999) - [j28]Hal Berghel, Daniel Berleant, Thomas Foy, Marcus McGuire:
Cyberbrowsing: Information Customization on the Web. J. Am. Soc. Inf. Sci. 50(6): 505-511 (1999) - 1998
- [j27]Hal Berghel:
The Year-2000 Problem and the New Riddle of Induction. Commun. ACM 41(3): 13-17 (1998) - [j26]Hal Berghel:
Who Won the Mosaic War? Commun. ACM 41(10): 13-16 (1998) - 1997
- [j25]Hal Berghel:
Cyberspace 2000: Dealing with Information Overload. Commun. ACM 40(2): 19-24 (1997) - [j24]Hal Berghel:
Email - The Good, The Bad, and the Ugly. Commun. ACM 40(4): 11-15 (1997) - [j23]Hal Berghel:
Informal Logic on Both Sides of the CDA Debate. Commun. ACM 40(7): 11-15 (1997) - [j22]