Protecting Against Data Breaches; Living With Mistakes
Jason Hong writes about security breaches and offers a three-pronged approach. Greg Linden discusses the differences between computers and the human brain and their tolerance of errors.
Protecting Against Data Breaches; Living With Mistakes
Most Smartphone Apps Are Spyware
Researchers’ Big Data Crisis; Understanding Design and Functionality
Is the Computer Security Community Barking Up the Wrong Trees?
Password Policies Are Getting Out of Control
Improving Computer Science Research Collaborations Between U.S. and China
Why Have There Been So Many Security Breaches Recently?
Design, Functionality, and Diffusion of Innovations
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved