acm-header
Sign In

Communications of the ACM

BLOG@CACM


Refine your search:
dateMore Than a Year Ago
subjectHuman Computer Interaction
authorRobin K. Hill
bg-corner

Bigger than a Blackbox
From BLOG@CACM

Bigger than a Blackbox

When we ask how deep learning works, are we asking which node represents the answer to "animal, vegetable, or mineral?"

Pedagogical Paths Through Ethics
From BLOG@CACM

Pedagogical Paths Through Ethics

Concepts of ethics can be integrated into lessons that reflect contemporary concerns and involve student knowledge of modern technology.

Observation of Bias
From BLOG@CACM

Observation of Bias

It may not be that obvious, but it's observable.

Whence Machine Volition?
From BLOG@CACM

Whence Machine Volition?

How could a computer develop or even express volition?

Students Speak to Ethical Issues
From BLOG@CACM

Students Speak to Ethical Issues

What are the concerns of students after study of computer ethics?

Cryptocurs Don't Asportate
From BLOG@CACM

Cryptocurs Don't Asportate

Cryptocurrency on a blockchain cannot be stolen -- it's true.

Experiencing Loops in Time
From BLOG@CACM

Experiencing Loops in Time

We don't experience program loops as blocks, started over, because time is one-way.

Misnomer and Malgorithm
From BLOG@CACM

Misnomer and Malgorithm

The algorithm should be respected; the malgorithm should be rejected.

Deadlines of the Digital Turn
From BLOG@CACM

Deadlines of the Digital Turn

Sometimes the digital turn forces us to designate things that aren't there.

The Virus Analogy and Validation
From BLOG@CACM

The Virus Analogy and Validation

The comparison between organic viruses and computer viruses is compelling.  But why?

Voting as Tallying in Public
From BLOG@CACM

Voting as Tallying in Public

Voting requires common acknowledgement.  Can that be achieved in automation?

The Vote as a Declared Datum
From BLOG@CACM

The Vote as a Declared Datum

A vote is a datum that sheds its original identity but persists.

Variable Vagaries
From BLOG@CACM

Variable Vagaries

The variable, construed as an L-value, makes some offbeat appearances.

The Artificialistic Fallacy
From BLOG@CACM

The Artificialistic Fallacy

Ethics discussions of artificial intelligence reveal a fallacy of omission.

FictionStein
From BLOG@CACM

FictionStein

Science fiction like Frankenstein nudges readers to confer humanity but nudges them away from moral fortitude.

Tech U­ser Responsibility
From BLOG@CACM

Tech U­ser Responsibility

User support presents serious challenges that are aggravated by indeterminate client responsibility.

Articulation of Decision Responsibility
From BLOG@CACM

Articulation of Decision Responsibility

Can we establish a locution for the results of a program that does not ascribe decision-making power?

Tech Ethics at Work
From BLOG@CACM

Tech Ethics at Work

Ethics for Tech must address how professional issues play out in the workplace, in real life.

Human Acts and Computer Apps
From BLOG@CACM

Human Acts and Computer Apps

Our behaviors often seem to mimic the procedures that we induce in computers. What questions does that raise?

It's Not the 'Why' Chromosome, It's the 'How'
From BLOG@CACM

It's Not the 'Why' Chromosome, It's the 'How'

Women do like the raw technical aspects of computer science.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account