From BLOG@CACM
Generative AI may turn out to be disruptive technologies for computer science education, but generative AI can also be conceived…
Ority Hazzan and Yael Erez| September 18, 2023
Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...Alex Vakulov From BLOG@CACM | August 29, 2022 at 11:09 AM
A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.
Alex Vakulov From BLOG@CACM | August 10, 2022 at 01:24 PM
The purpose of this blog post is to present an anonymization method that can be applied to the digital attributes of personal data.
Alina Alemaskina and Andrei Sukhov From BLOG@CACM | February 16, 2022 at 12:29 PM
In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...Jason Hong From BLOG@CACM | January 24, 2022 at 09:12 AM
What are key ideas and intuitions foundational to AI that AI education in secondary schools should target? This blog post describes our approach to teaching AI...Shuchi Grover and Brian Broll From BLOG@CACM | November 23, 2021 at 04:16 PM
Artificial intelligence is coming to your learners and will raise challenging issues that need experts like you. Learn how you can get involved in AI and Educational...Leah Friedman, Nancye Blair Black, Erin Walker, and Jeremy Roschelle From BLOG@CACM | November 8, 2021 at 09:51 AM
How do we build trust? How can we systematically assure trust in our systems? How would auditing AI and autonomous systems contribute to this goal?
Explaining...Ryan Carrier From BLOG@CACM | February 1, 2021 at 04:55 PM
The hack of critical departments of the U.S. government—and of many leading corporations—should come as no surprise.
John Arquilla From BLOG@CACM | December 21, 2020 at 02:13 PM
There are two ways to proceed with political discourse in cyberspace, if the trolls are to be tamed.
John Arquilla From BLOG@CACM | March 19, 2019 at 09:30 AM
Independent Audit of AI Systems is the next evolution of governance for artificial intelligence and automation.
Ryan Carrier From BLOG@CACM | February 12, 2019 at 03:03 PM
James Bond-like spies have been eclipsed by a new generation of operatives who don't travel the world (not physically, anyway) or drink martinis, shaken or stirred...John Arquilla From BLOG@CACM | June 18, 2018 at 09:54 AM
Election systems are supposed to be disconnected from the Internet, for obvious and sensible reasons. Most elections today, however, use computers.
Duncan Buell From BLOG@CACM | March 27, 2018 at 09:22 AM
Keith Abney of the Ethics + Emerging Sciences group of California Polytechnic State University surveys the moral landscape of cyberwar.Robin K. Hill From BLOG@CACM | July 26, 2017 at 06:13 PM
Policies and strategies that may lead to or initiate acts of cyberwar should be subject to scrutiny.
John Arquilla From BLOG@CACM | June 13, 2017 at 10:28 AM