Stan Adams and I released a paper describing qualitative interview research of world-class hackers to "take the pulse" of potential chilling effects they may face (work performed at the Center for Democracy & Technology): "Taking the Pulse of Hacking: A Risk Basis for Security Research" (2018) |
Apratim Vidyarthi, Benjamin C. Dean, and I published a paper outlining four important case studies in security research at the Center for Democracy & Technology: "The Importance of Security Research: Four case studies" (2017) |
The report for the 2017 DEFCON 25 Voting Machine Hacking Village is out: Matt Blaze, Jake Braun, Harri Hursti, Joseph Lorenzo Hall, Margaret MacAlpine, and Jeff Moss, DEFCON 25 Voting Machine Hacking Village: Report on Cyber Vulnerabilities in U.S. Election Equipment, Databases, and Infrastructure; (2017) |
The journal article, "Negotiating stigma in health care: disclosure and the role of electronic health records" -- joint work with Timothy Stablein, Chauna Pervis and Denise Anthony -- is now out (2015), |
The BITAG report,"Interconnection and Traffic Exchange on the Internet" that I co-edited with Jason Livingood has been published (2014) |
Our journal article in Health Affiars, "For Telehealth To Succeed, Privacy And Security Risks Must Be Identified And Addressed" has been published (2014) |
Our short paper, "Gay Males and Electronic Health Records: Privacy Perceptions, Age, and Negotiating Stigma" has been accepted to the American Sociological Association annual meeting (2012) |
Our paper, "Probing the Front Lines: Pollworker Perceptions of Security & Privacy" has been accepted to the 2012 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE'12) jhall-evtwote12.pdf (PDF) |
Our paper, "Accountings of Relationships" has been accepted to the 3rd USENIX Workshop on Health Security and Privacy (HealthSec'12) jhall-healthsec12.pdf |
We have submitted a letter to HHS CPO Joy Pritts entitled, "Analysis and Recommendations Concerning HHS Notice of Proposed Rulemaking Covering Changes to Accountings of Disclosure"sharps-pritts-letter.pdf (PDF) (9 Dec 2011) |
We've published "Applying a Reusable Election Threat Model at the County Level" at EVT/WOTE'11: dill-evtwote11.pdf (PDF) (9 Aug 2011) |
ACCURATE has submitted comments on the EAC's proposed Voluntary Voting System Guidelines v1.1 (VVSG v1.1): accurate_vvsgv11_comment.pdf (PDF) (28 Sep 2009) |
Our paper, "Implementing Risk-Limiting Post-Election Audits in California" has been accepted to the USENIX/ACCURATE Electronic Voting Technology (EVT'09) Workshop. Read the paper: arXiv,SSRN, PDF. |
My PhD Dissertation, "Policy Mechanisms for Increasing Transparency in Electronic Voting" is now available: PDF. |