acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Is Academia Guilty of Intellectual Colonization of Practice?
From BLOG@CACM

Is Academia Guilty of Intellectual Colonization of Practice?

Researchers should not treat practitioners as mere objects of their studies or simple sources of data, but work towards creating research partnerships with practitioners...

Stop Trying to Deter Cyberattacks
From BLOG@CACM

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.

A Presidential Policy Directive With Little Direction
From BLOG@CACM

A Presidential Policy Directive With Little Direction

Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.

Making the World Fair and Just
From BLOG@CACM

Making the World Fair and Just

Wendy Powley and Gloria Childress Townsend report on the National Center for Women & IT Annual Summit, themed "making the world fair and just."  

California's Internet Voting Initiatives
From BLOG@CACM

California's Internet Voting Initiatives

The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.

State of the States: Progress Toward CS For All
From BLOG@CACM

State of the States: Progress Toward CS For All

Achieving the President's goal of CS for All requires change at the local level. Here's the current state of the states.

Toward a Discourse on Cyber Strategy
From BLOG@CACM

Toward a Discourse on Cyber Strategy

Efforts to understand how advanced information technologies will affect future conflicts seem to be missing, or are taking place far from the public eye.

A Farewell to (Virtual) Arms?
From BLOG@CACM

A Farewell to (Virtual) Arms?

The potential for a Sino-American cyber arms control agreement is intriguing, despite three very troubling flaws.

The Ethics of Cyberwar
From BLOG@CACM

The Ethics of Cyberwar

Under what conditions should one engage in cyberwar? How should such a conflict be waged?

Meet A.I. Joe
From BLOG@CACM

Meet A.I. Joe

In the 70 years since the end of World War II, AI has advanced enormously, and the military has continued to show a steady appetite for acquiring lethal robots....

Computer Security and the Risks of Online Voting
From BLOG@CACM

Computer Security and the Risks of Online Voting

An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being used.

The Three Faces of Cyberwar
From BLOG@CACM

The Three Faces of Cyberwar

The different aspects of cyberwar, and what can be done about them.

Battling Bias
From ACM News

Battling Bias

A regional Grace Hopper Celebration event this week focused on "advancing a gender diverse technology workforce in New York."

Human Subjects Research For the Twenty-First Century, Or, What Can We Learn from the Facebook Mood Study?
From BLOG@CACM

Human Subjects Research For the Twenty-First Century, Or, What Can We Learn from the Facebook Mood Study?

There is tremendous value to society in doing large-scale A/B studies, and the current framework we have for human subjects research is a poor match for the 21st...

The Danger of Requiring Computer Science in K-12 Schools
From BLOG@CACM

The Danger of Requiring Computer Science in K-12 Schools

We are not ready to make CS a requirement for all children in the U.S., even if that's where we want to be one day.

A Summit on Computing Education in South Carolina
From BLOG@CACM

A Summit on Computing Education in South Carolina

A summit of legislators, business leaders, officials from the Department of Education, and teachers convenes in South Carolina to advance computing education in...

Computing Does Not Support Its Infrastructure
From BLOG@CACM

Computing Does Not Support Its Infrastructure

All large, multinational companies that depend on their intellectual prowess are able to avoid most taxation. Two factors enable the trend: first intellectual property...

Privacy and Google Glass
From BLOG@CACM

Privacy and Google Glass

Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...

Most Smartphone Apps Are Spyware
From BLOG@CACM

Most Smartphone Apps Are Spyware

Why does  this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?

All Grown ­Up Now: Service and Serial Reciprocity
From BLOG@CACM

All Grown ­Up Now: Service and Serial Reciprocity

Computing is central to the debate about so many aspects of our present and future that we have a duty and responsibility to be active and enthusiastic participants...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account