- A Collapsing Academy IV: How Did Memory and Gag Laws Gain Admission? (September, 2022)
- Prosperity Theology Goes Online: Will This Be a Fifth Great Awakening?(July, 2022)
- The QAnon Phenomenon: The Storm Has Always Been Among Us (May, 2022)
- A Collapsing Academy, Part III: Scientometrics and Metric Mania (March, 2022)
- The State of the Art in Voting Machine Technology: Just How Reliable Are They? (January, 2022)
- The Online Disinformation Opera (October, 2021)
- A Collapsing Academy: Part II: How Cancel Culture Works on the Academy (October, 2021)
- A Collapsing Academy: Part I (July, 2020)
- The Equifax Hack Revisited and Repurposed (May, 2020)
- The Sokol Hoax: A 25-Year Retrospective (March, 2020)
- New Perspectives on (Anti) Social Media (March, 2020)
- A Critical Look at the 2019 College Admissions Scandal (January, 2020)
- Moral Hazards in teh Cyber Vulnerability Markets - with Alex Hoffman (December, 2019)
- Huawei, BIS, and the IEEE: It’s Déjà Vu All Over Again (October, 2019)
- Codes of Ethics in a Post-Truth World (March, 2019)
- Vehicle Telematics: The Good, Bad, and Ugly (January, 2019)
- Election Integrity 2018: Are We Better Off Than We Were in 2016? - with Douglas Jones (November, 2018)
- The Genesis of Postmodern Disinformatics (November, 2018)
- The Online Trolling Ecosystem - with Dan Berleant (August 2018)
- Newton's Great Insight(July, 2018)
- Malice Domestic: The Cambridge Analytica Dystopia (May, 2018)
- Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media (April, 2018)
- Trolling Pathologies (March, 2018)
- Bruce Schneier on Future Digital Threats (February, 2018)
- Disinformatics: The Discipline behind Grand Deceptions (January, 2018)
- Equifax and the Latest Round of Identity Theft Roulette (December, 2017)
- The New Science Wars (November, 2017)
- Net Neutrality Reloaded (October, 2017)
- Oh, What a Tangled Web: Russian Hacking, Fake News,and the 2016 US Presidential Election (September, 2017)
- Which Is More Dangerous—the Dark Web or the Deep State? (July, 2017)
- A Quick Take on Windows Security Evolution (May, 2017)
- Alt-News and Post-Truths in the “Fake News” Era (April, 2017)
- On the Problem of (Cyber) Attribution (March, 2017)
- Lies, Damn Lies, and Fake News (February, 2017)
- Software Sophistry and Political Sleight of Hand (January, 2017)
- Chasing Elbridges Ghost: Digital Gerrymandering (November, 2016)
- Douglas Jones on Today's Voting Machines (October, 2016)
- Coda in the Key of F2654hD4 (September, 2016)
- The Polyanna Delusion (August, 2016)
- The Dictator's Dilemma (July, 2016)
- Attenuated FAQs (May, 2016)
- The Bogus Science Theorem (and the Junk Science Wager) (April, 2016)
- Net Neutrality or Net Neutering (March, 2016)
- Secretocracy (February, 2016)
- Digital Politics 2016 (January, 2016)
- What Price Gonzo Ethics? (December, 2015)
- The Dystory of Ahmed's Clock (November, 2015)
- Legislating Technology (Badly) (October, 2015)
- STEM Crazy (September, 2015)
- TSA: Mission Creep Meets Waste (August, 2015)
- A Farewell to Air Gaps - Part II (July, 2015)
- A Farewell to Air Gaps - Part I (June, 2015)
- What Makes a Good Column (May, 2015)
- Borderline Executive Disorder (April, 2015)
- Noirware (March, 2015)
- Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole (February, 2015)
- A Paperless Gamble (January, 2015)
- Judson Rosebush on Graphics and Animation (December, 2014)
- Why Clouds Give Me a Case of the Vapors (November, 2014)
- Defending Against Big Dada (October, 2014)
- Sticky Wikis (September, 2014)
- The Future of Digital Money Laundering (August, 2014)
- Robert David Steele on OSINT (July, 2014)
- Leadership Failures in the National Security Complex (June, 2014)
- PII, the FTC, Car Dealers, and You (May, 2014)
- Scapegoat Politics and Mr. Snowden’s Legacy (April, 2014)
- Reflections on STEM (March, 2014)
- Moral Hazards, Negative Externalities, and the Surveillance Economy (February, 2014)
- Privacy Informatics (January, 2014)
- The Intimidation Factor (December, 2013)
- Toxic Cookies (September, 2013)
- Through the PRISM Darkly (July, 2013)
- Computing Technology and Survivable Journalism (May, 2013)
- The SCDOR Hack: Great Security Theater in Five Stages (March, 2013)
- RFIDiocy: It’s déjà vu all over again (January, 2013)
- Stratfor or Stratagainst (November, 2012)
- The Dumbing Down of SportPhishing (September, 2012)
- The OuijAmazon Desktop Metaphor (July, 2012)
- Breaking the Fourth Wall of Electronic Crime: Blame it on the Thespians (May, 2012)
- WikiLeaks and the Matter of Private Manning (March, 2012)
- Identity Theft and Financial Fraud: Some Strangeness in the Proportions (January, 2012)