Voting and Technology: Who Gets to Count Your Vote?
Paperless voting machines threaten the integrity of democratic process by what they don't do.
Voting and Technology: Who Gets to Count Your Vote?
Inside Risks: The Perils of Port 80
Inside Risks: Cyber Underwriters Lab
Insurance and the Computer Industry
Inside Risks: Semantic Network Attacks
Inside Risks: Risks of PKI: E-Commerce
Inside Risks: Risks of PKI: Secure Email
Inside Risks: Risks of Relying on Cryptography
Inside Risks: the Trojan Horse Race
Inside Risks: The Uses and Abuses of Biometrics
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved