XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Magazine: Fall 2013 | Volume 20, No. 1

Equip Yourself for Creativity

COLUMN: Letter from the editors

Equip Yourself for Creativity

By Peter Kinnaird, Inbal Talgam-Cohen

HTML | In the Digital Library
Tags: Document types, Social and professional topics

Inbox

DEPARTMENT: Inbox

Inbox

By XRDS Staff

HTML | In the Digital Library
Tags: General and reference, Publishing

Keeping Your Little Back Shop

<i>XRDS</i> Mobilizes

DEPARTMENT: Benefit

XRDS Mobilizes

By Debarka Sengupta

HTML | In the Digital Library
Tags: Document types, Publishing

Managing Your Time

COLUMN: Advice

Managing Your Time

By Vaggelis Giannikas

HTML | In the Digital Library
Tags: Document types

Revitalizing ACM Student Chapters: A look at how to refresh student initiatives

Algorithms Fit for Compilation?

DEPARTMENT: Blogs

Algorithms Fit for Compilation?

Should there be a standard in the way of algorithms languages to improve productivity and remove ambiguity?

By Olivia Simpson

HTML | In the Digital Library
Tags: Design and analysis of algorithms, Symbolic and algebraic algorithms

Habits: Our cognitive shortcut

Habits: Our cognitive shortcut

Accepting the habitual system as an inseparable part of our minds, understanding its limitation and the way it works, may help us to achieve our long-term goals.

By Gidi Nave

HTML | In the Digital Library
Tags: Human computer interaction (HCI), Law, social and behavioral sciences

Coordination When Information is Scarce: How privacy can help

Coordination When Information is Scarce: How privacy can help

There is something to be gained by borrowing the tools of differential privacy and applying them to solve problems in seemingly unrelated fields.

By Aaron Roth

HTML | In the Digital Library
Tags: Data management systems, Program verification

The New Firefox Cookie Policy

The New Firefox Cookie Policy

Stanford grad student Jonathan Mayer discusses cookies, Web tracking, and changes to Mozilla's cookie policy.

By Jonathan Mayer

HTML | In the Digital Library
Tags: Collaborative and social computing systems and tools, Human and societal aspects of security and privacy, Privacy policies, World Wide Web

What is Public and Private Anyway? A Pragmatic Take on Privacy and Democracy

SECTION: Features

What is Public and Private Anyway? A Pragmatic Take on Privacy and Democracy

Revealing private content on the Web can also spark public engagement. To understand this, we need to challenge our common sense notions of privacy and democracy.

By Andreas Birkbak

HTML | In the Digital Library
Tags: Computing in government, Enterprise computing, Human and societal aspects of security and privacy, Law, Privacy policies

Something Bad Might Happen: Lawyers, anonymization and risk

Something Bad Might Happen: Lawyers, anonymization and risk

The line between personal and anonymous information is often unclear. Increasingly it falls to lawyers to understand and manage the risks associated with the sharing of "anonymized" data sets.

By Marion Oswald

HTML | In the Digital Library
Tags: Computational complexity and cryptography, Computing / technology policy, Cryptography, Data encryption, Enterprise computing, Human and societal aspects of security and privacy, Law, Privacy policies

Personal, Pseudonymous, and Anonymous Data: The problem of identification

Talking 'Bout Your Reputation

Talking 'Bout Your Reputation

People think they want anonymity, but actually desire privacy. But how do we reframe the debate surrounding privacy and security? Perhaps technology is the answer.

By David Birch

HTML | In the Digital Library
Tags: Computing / technology policy, Human and societal aspects of security and privacy, Privacy policies, Social and professional topics

Understanding the Data Environment

Understanding the Data Environment

Protecting data privacy and anonymity requires a better understanding of the conditions and mechanisms under which they may be threatened.

By Elaine Mackey, Mark Elliot

HTML | In the Digital Library
Tags: Computer crime, Data management systems, Operating systems security, Security and privacy

What is Bitcoin?

What is Bitcoin?

Strengths and weaknesses of the leader in a new generation of emerging cryptocurrencies.

By Dominic Hobson

HTML | In the Digital Library
Tags: Computing / technology policy, Electronic commerce, Public key (asymmetric) techniques, Public key encryption

The Tor Project: An inside view

The Tor Project: An inside view

A decade since the first version was released, Tor continues to be at the center of the debate around online privacy.

By Kelley Misata

HTML | In the Digital Library
Tags: Computational complexity and cryptography, Computing / technology policy, Cryptography, Data encryption, Network architectures

It's Not About Winning, it's About Sending a Message: Hiding information in games

It's Not About Winning, it's About Sending a Message: Hiding information in games

New information hiding techniques use online games to transmit secrets covertly. The technique is simple, but the problem of detecting these covert channels is far from solved.

By Philip C. Ritchey

HTML | In the Digital Library
Tags: Computational complexity and cryptography, Control methods, Cryptography, Data encryption, Dynamic programming, Operating systems security, Search methodologies

An Illustrated Primer in Differential Privacy

An Illustrated Primer in Differential Privacy

The vast amounts of data that are now available provide new opportunities to social science researchers, but also raise huge privacy concerns for data subjects. Differential privacy offers a way to balance the needs of both parties. But how?

By Christine Task

HTML | In the Digital Library
Tags: Data analytics, Data management systems, Human and societal aspects of security and privacy, Information systems applications, Mathematics and statistics, Privacy policies

Cynthia Dwork on Differential Privacy

Cynthia Dwork on Differential Privacy

Distinguished Scientist at Microsoft Research, Dr. Cynthia Dwork, provides a first-hand look at the basics of differential privacy.

By Michael Zuba

HTML | In the Digital Library
Tags: Data analytics, Human and societal aspects of security and privacy, Information systems applications, Mathematics and statistics, Privacy policies

Profile Jessica Staddon</br >Managing Google's privacy research

Profile Jessica Staddon
Managing Google's privacy research

In this profile, Jessica Staddon discusses managing privacy research for one the world's best-known technology corporations.

By Adrian Scoică

HTML | In the Digital Library
Tags: Computing occupations, Human and societal aspects of security and privacy, Privacy policies

CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)

DEPARTMENT: Labz

CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)

CUPS, a research lab at Carnegie Mellon University, is dedicated to addressing the broad array of challenges collectively called "usable privacy and security."

By Rich Shay

HTML | In the Digital Library
Tags: Computer crime, Computer science education, Computing and business, Human and societal aspects of security and privacy, Information science education, Privacy policies, Security and privacy

WLAN Security

DEPARTMENT: Back

WLAN Security

A look back at wireless technology through the years.

By Finn Kuusisto

HTML | In the Digital Library
Tags: Mobile networks, Wireless access networks

Zero-knowledge Proofs