Keith Abney of the Ethics + Emerging Sciences group of California Polytechnic State University surveys the moral landscape of cyberwar.Robin K. Hill From BLOG@CACM | July 26, 2017 at 06:13 PM
Policies and strategies that may lead to or initiate acts of cyberwar should be subject to scrutiny.
John Arquilla From BLOG@CACM | June 13, 2017 at 10:28 AM
Here we are, 70 years into the computer age and we still do not seem to know how to build secure information systems. And yet, our community marches forward with...Moshe Y. Vardi From BLOG@CACM | April 14, 2017 at 09:07 AM
Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.Robin K. Hill From BLOG@CACM | February 26, 2017 at 10:27 PM
Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...John Arquilla From BLOG@CACM | December 19, 2016 at 02:24 PM
Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.John Arquilla From BLOG@CACM | August 2, 2016 at 09:53 AM
The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.David Jefferson and Barbara Simons From BLOG@CACM | February 24, 2016 at 09:29 AM
Efforts to understand how advanced information technologies will affect future conflicts seem to be missing, or are taking place far from the public eye.John Arquilla From BLOG@CACM | January 15, 2016 at 04:00 PM
The potential for a Sino-American cyber arms control agreement is intriguing, despite three very troubling flaws.
John Arquilla From BLOG@CACM | October 2, 2015 at 10:21 AM
Summer reading recommendations for computer scientists, courtesy of the SIGCSE 2015 Using Science Fiction in CS Courses BOF.
Joel C. Adams From BLOG@CACM | July 2, 2015 at 11:43 AM
Considering Russia's alleged involvement in international cyber incidents, and its willingness to stop them.John Arquilla From BLOG@CACM | June 3, 2015 at 12:42 PM
An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being used.Duncan A. Buell From BLOG@CACM | April 2, 2015 at 03:34 PM
Why is our community having such an anemic response to all of these major data breaches? What can we do differently? What should we be doing differently?Jason Hong From BLOG@CACM | December 11, 2014 at 09:57 AM