From BLOG@CACM
Speaking of the existential threat of AI is science fiction, and bad science fiction for that matter because it is not based
…
Walid S. Saba| May 23, 2023
Researchers should not treat practitioners as mere objects of their studies or simple sources of data, but work towards creating research partnerships with practitioners...Zeljko Obrenovic From BLOG@CACM | November 1, 2016 at 10:56 AM
Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.John Arquilla From BLOG@CACM | August 2, 2016 at 09:53 AM
Wendy Powley and Gloria Childress Townsend report on the National Center for Women & IT Annual Summit, themed "making the world fair and just." Wendy Powley and Gloria Childress Townsend From BLOG@CACM | May 24, 2016 at 09:46 AM
The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.David Jefferson and Barbara Simons From BLOG@CACM | February 24, 2016 at 09:29 AM
Achieving the President's goal of CS for All requires change at the local level. Here's the current state of the states.Mark Guzdial From BLOG@CACM | February 24, 2016 at 03:41 PM
Efforts to understand how advanced information technologies will affect future conflicts seem to be missing, or are taking place far from the public eye.John Arquilla From BLOG@CACM | January 15, 2016 at 04:00 PM
The potential for a Sino-American cyber arms control agreement is intriguing, despite three very troubling flaws.
John Arquilla From BLOG@CACM | October 2, 2015 at 10:21 AM
In the 70 years since the end of World War II, AI has advanced enormously, and the military has continued to show a steady appetite for acquiring lethal robots....John Arquilla From BLOG@CACM | May 1, 2015 at 03:22 PM
An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being used.Duncan A. Buell From BLOG@CACM | April 2, 2015 at 03:34 PM
A regional Grace Hopper Celebration event this week focused on "advancing a gender diverse technology workforce in New York."Lawrence M. Fisher From ACM News | March 20, 2015 at 10:41 AM
There is tremendous value to society in doing large-scale A/B studies, and the current framework we have for human subjects research is a poor match for the 21st...Jason Hong From BLOG@CACM | July 20, 2014 at 08:47 AM
We are not ready to make CS a requirement for all children in the U.S., even if that's where we want to be one day.Mark Guzdial From BLOG@CACM | April 15, 2014 at 12:43 PM
A summit of legislators, business leaders, officials from the Department of Education, and teachers convenes in South Carolina to advance computing education in...Mark Guzdial From BLOG@CACM | November 20, 2013 at 08:50 AM
All large, multinational companies that depend on their intellectual prowess are able to avoid most taxation. Two factors enable the trend: first intellectual property...Gio Wiederhold From BLOG@CACM | November 10, 2013 at 10:12 AM
Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...Jason Hong From BLOG@CACM | August 26, 2013 at 10:28 AM
Why does this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?Jason Hong From BLOG@CACM | February 17, 2012 at 02:23 PM
Computing is central to the debate about so many aspects of our present and future that we have a duty and responsibility to be active and enthusiastic participants...Daniel Reed From BLOG@CACM | February 10, 2012 at 10:56 AM