Sign In

Communications of the ACM

Table of Contents

A time for celebration

When an advantage is not an advantage

Discussion of the merits and shortcomings of affirmative action (AA) has raged at all levels and in many forums and has been the concern of many policymakers, including President Clinton. Notably absent from the discussion is …

Property and speech: who owns what you say in cyberspace?

Cyberspace across the Sahara: computing in North Africa

Spanning 7.2 million square kilometers from the Atlantic Ocean to the Red Sea, and encompassing the Great Saharan Desert and Nile River Valley, North Africa embraces Mauritania, Western Sahara, Morocco, Algeria, Tunisia, Libya …

Plagiarism in the web

Ethics and computer use

Over the past 50 years, computers have undergone transformation from monolithic number crunchers, to centralized repositories of management information systems, to distributed, networked, cyberspace support systems. During the …

Ethical concepts and information technology

The fundamental aspects of classical and contemporary ethics, particularly as they apply to the use of IT, offer valuable lessons of professional conduct.

Managing user perceptions of email privacy

Email users, expecting privacy, risk embarassment, lawsuits, and worse.

The ethical and legal quandary of email privacy

What should conscientious employees and their ethical employers expect? It's hard to say.

Applying ethics to information technology issues

The articles in this special section express a common theme; the use of information technology in society is creating a rather unique set of ethical issues that requires the making of new moral choices on the part of society  …

Accountability and computer decision systems

Are designers responsible for all of the uses of the systems they create?

Values, personal information privacy, and regulatory approaches

The relationships among nationality, cultural values, personal information privacy concerns, and information privacy regulation are examined in this article.

Computing consequences: a framework for teaching ethical computing

How to prepare tomorrow's professionals for questions that can't always be answered with faster, better, or more technology.

Communications of the ACM 1995 subject index

Communications of the ACM 1995 author index

Reviewing the risks archives

Ok, you expect your shrink-wrapped software to work properly, without annoying reliability bugs and security holes. Or maybe you would like the systems you develop to work properly, without serious risks to their users. But those …