-  A Collapsing Academy IV: How Did Memory and Gag Laws Gain Admission? (September, 2022) 
-  Prosperity Theology Goes Online: Will This Be a Fifth Great Awakening?(July, 2022) 
-  The QAnon Phenomenon: The Storm Has Always Been Among Us (May, 2022) 
-  A Collapsing Academy, Part III: Scientometrics and Metric Mania (March, 2022) 
-  The State of the Art in Voting Machine Technology: Just How Reliable Are They? (January, 2022) 
-   The Online Disinformation Opera (October, 2021) 
-   A Collapsing Academy: Part II: How Cancel Culture Works on the Academy (October, 2021) 
-   A Collapsing Academy: Part I (July, 2020) 
-   The Equifax Hack Revisited and Repurposed (May, 2020) 
-   The Sokol Hoax: A 25-Year Retrospective (March, 2020)
-   New Perspectives on (Anti) Social Media (March, 2020) 
-   A Critical Look at the 2019 College Admissions Scandal (January, 2020) 
-   Moral Hazards in teh Cyber Vulnerability Markets - with Alex Hoffman (December, 2019)
-   Huawei, BIS, and the IEEE: It’s Déjà Vu All Over Again (October, 2019) 
-   Codes of Ethics in a Post-Truth World (March, 2019) 
-   Vehicle Telematics: The Good, Bad, and Ugly (January, 2019) 
-   Election Integrity 2018: Are We Better Off Than We Were in 2016? - with Douglas Jones (November, 2018)
-   The Genesis of Postmodern Disinformatics (November, 2018) 
-   The Online Trolling Ecosystem - with Dan Berleant (August 2018) 
-   Newton's Great Insight(July, 2018) 
-   Malice Domestic: The Cambridge Analytica Dystopia (May, 2018) 
-   Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media (April, 2018) 
-   Trolling Pathologies (March, 2018) 
-   Bruce Schneier on Future Digital Threats (February, 2018) 
-   Disinformatics: The Discipline behind Grand Deceptions (January, 2018) 
-   Equifax and the Latest Round of Identity Theft Roulette (December, 2017) 
-   The New Science Wars  (November, 2017) 
-   Net Neutrality Reloaded  (October, 2017) 
-   Oh, What a Tangled Web: Russian Hacking, Fake News,and the 2016 US Presidential Election  (September, 2017) 
-   Which Is More Dangerous—the Dark Web or the Deep State?  (July, 2017) 
-   A Quick Take on Windows Security Evolution  (May, 2017) 
-   Alt-News and Post-Truths in the “Fake News” Era  (April, 2017) 
-   On the Problem of (Cyber) Attribution (March, 2017) 
-   Lies, Damn Lies, and Fake News (February, 2017) 
-   Software Sophistry and Political Sleight of Hand (January, 2017) 
-   Chasing Elbridges Ghost: Digital Gerrymandering (November, 2016) 
-   Douglas Jones on Today's Voting Machines (October, 2016) 
-   Coda in the Key of F2654hD4  (September, 2016) 
-   The Polyanna Delusion (August, 2016) 
-   The Dictator's Dilemma (July, 2016) 
-   Attenuated FAQs (May, 2016) 
-   The Bogus Science Theorem (and the Junk Science Wager) (April, 2016) 
-   Net Neutrality or Net Neutering (March, 2016) 
-   Secretocracy (February, 2016) 
-   Digital Politics 2016 (January, 2016) 
-   What Price Gonzo Ethics? (December, 2015) 
-   The Dystory of Ahmed's Clock (November, 2015) 
-   Legislating Technology (Badly) (October, 2015) 
-   STEM Crazy (September, 2015) 
-   TSA: Mission Creep Meets Waste (August, 2015) 
-   A Farewell to Air Gaps - Part II (July, 2015) 
-   A Farewell to Air Gaps - Part I (June, 2015) 
-   What Makes a Good Column (May, 2015) 
-   Borderline Executive Disorder (April, 2015) 
-   Noirware (March, 2015) 
-   Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole (February, 2015) 
-   A Paperless Gamble (January, 2015) 
-   Judson Rosebush on Graphics and Animation (December, 2014) 
-   Why Clouds Give Me a Case of the Vapors (November, 2014) 
-   Defending Against Big Dada (October, 2014) 
-   Sticky Wikis (September, 2014)
-   The Future of Digital Money Laundering (August, 2014) 
-   Robert David Steele on OSINT (July, 2014) 
-   Leadership Failures in the National Security Complex (June, 2014) 
-   PII, the FTC, Car Dealers, and You (May, 2014) 
-   Scapegoat Politics and Mr. Snowden’s Legacy (April, 2014) 
-   Reflections on STEM (March, 2014) 
-   Moral Hazards, Negative Externalities, and the Surveillance Economy (February, 2014) 
-   Privacy Informatics (January, 2014) 
-   The Intimidation Factor (December, 2013) 
-   Toxic Cookies (September, 2013) 
-   Through the PRISM Darkly (July, 2013) 
-   Computing Technology and Survivable Journalism (May, 2013) 
-   The SCDOR Hack: Great Security Theater in Five Stages (March, 2013) 
-   RFIDiocy: It’s déjà vu all over again (January, 2013) 
-   Stratfor or Stratagainst (November, 2012) 
-   The Dumbing Down of SportPhishing (September, 2012) 
-   The OuijAmazon Desktop Metaphor (July, 2012) 
-   Breaking the Fourth Wall of Electronic Crime:  Blame it on the Thespians (May, 2012) 
-   WikiLeaks and the Matter of Private Manning (March, 2012) 
-   Identity Theft and Financial Fraud: Some Strangeness in the Proportions (January, 2012)