Recommended reading

A contrarian's view on security; a beginner's guide to Gov 2.0; how to navigate airport security

A Contrarian's View on Security
Source: Boston Globe

Ever wonder if all those annoying security measures computer users are urged to take, such as resetting your password every month, are worth it? Not really, says Cormac Herley, a principal researcher at Microsoft Research.

Herley recently studied the issue and concluded that the problem is not so much the quality of the advice but the quantity. “Most security advice simply offers a poor cost/benefit trade-off to users,” he wrote in the study.

Using an admittedly crude economic analysis, Herley estimated the approximate value of a user’s time, compared it to quantifiable damages resulting from security breaches, and found that making users spend a lot of time on security chores doesn't pay off. In addition, those loss numbers are hard to come by, so to users, it sounds like the security experts are crying wolf.

Herley doesn’t argue that all security orders are worthless — just that they need to be doled out judiciously and according to the odds that a particular security breach will take place.

Related story

Bestsellers in government technology

A Beginner’s Guide to Gov 2.0
Source: Social Media Strategery

The best way to get started in Government 2.0 is to “get your hands dirty and actually use these tools to interact with the people you’re trying to reach,” writes Steve Radick, an associate at Booz Allen Hamilton and a social media blogger.

Radick offers a beginner’s guide to Gov 2.0 that includes basic explanations and definitions, recommended reading and a bevy of advice. As a starting point, he advises newbies to forget what they know about mass media marketing. “Good fundamentals in interpersonal communication will serve you well,” he writes. “There are no audiences or eyeballs any more — you’re going to be dealing with real people here.”

Radick’s extensive resource guide includes links to 10 government policy and guidance documents. Contrary to what many people expect, some of the best examples in professional social media can be found in government, he writes. “The government — federal, state and local — isn’t some late adopter in social media. In many cases, they are leading the way."

How to Navigate Airport Security
Source: Bnet

Frequent travelers know they are always at risk of finding delays because of airport security. But they also know that there are ways to reduce the risks and make the experience less painful.

For example, avoid the security line right next to the one used by airline crews, writes Brett Snyder, who runs an air travel assistance business named the Cranky Concierge. The problem is that crew members have the option of jumping out of their line and right to the front of yours.

Also, be prepared to remove your laptop PC from its carrying case. In most instances, screening equipment works just fine with zipped computer bags, but not always, so be prepared to pull the laptop out at a moment’s notice. The same goes for liquids and nail clippers.

If you get stuck in a long line, stay calm. Many airports have behavior detection officers, who keep an eye out for anyone who looks agitated, Snyder writes. Furthermore, if you are rude to agents, “you might find yourself pleading for that dump-the-bag-and-empty-your-pockets search instead of the more thorough inspection.”

About the Author

Connect with the FCW staff on Twitter @FCWnow.

The Fed 100

Read the profiles of all this year's winners.


  • Shutterstock image (by wk1003mike): cloud system fracture.

    Does the IRS have a cloud strategy?

    Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

  • Shutterstock image: illuminated connections between devices.

    Who won what in EIS

    The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

  • Wikimedia Image: U.S. Cyber Command logo.

    Trump elevates CyberCom to combatant command status

    The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

  • Photo credit: John Roman Images /

    Verizon plans FirstNet rival

    Verizon says it will carve a dedicated network out of its extensive national 4G LTE network for first responders, in competition with FirstNet.

  • AI concept art

    Can AI tools replace feds?

    The Heritage Foundation is recommending that hundreds of thousands of federal jobs be replaced by automation as part of a larger government reorganization strategy.

  • DOD Common Access Cards

    DOD pushes toward CAC replacement

    Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group