Sign In

Communications of the ACM



­Using 'Averages' While Thinking About Social Behavior? That's Probably Wrong!
From [email protected]

­Using 'Averages' While Thinking About Social Behavior? That's Probably Wrong!

Using "averages" as a metric while thinking about Social Systems is probably wrong.

Avoiding the Rabbit Hole of Bad Science
From [email protected]

Avoiding the Rabbit Hole of Bad Science

The scandal surrounding the recently published so-called empirical evidence for precognition has caused psychologists to reconsider the way they analyze their data...

Most Smartphone Apps Are Spyware
From [email protected]

Most Smartphone Apps Are Spyware

Why does  this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?

We Needn't Be Malevolent Grumps in 2012
From [email protected]

We Needn't Be Malevolent Grumps in 2012

I propose that 2012 is the year to solve the nastiness problem in Computer Science. Zero tolerance for rude reviewers starts from midnight tonight.

Is the Computer Security Community Barking ­Up the Wrong Trees?
From [email protected]

Is the Computer Security Community Barking ­Up the Wrong Trees?

There's a big mismatch right now between what the data says about computer security vulnerabilities and what kind of research is being done and products offered...

A Futuristic Health IT Scenario
From [email protected]

A Futuristic Health IT Scenario

Our technology is the change agent for healthcare in the future.

High School CS Teachers as the New Computing Professionals
From [email protected]

High School CS Teachers as the New Computing Professionals

If you were a human-centered computing research in 1960's, you'd study, "Who are software engineers?" Today, the new computing professionals to study are high school...

Why We Compute
From [email protected]

Why We Compute

Why do we, as researchers and practitioners, have this deep and abiding love of computing? Why do we compute? I suspect it is a deeper, more primal yearning, one...

Password Policies Are Getting Out of Control
From [email protected]

Password Policies Are Getting Out of Control

 At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...

Interspecies Interaction Design at CHI
From [email protected]

Interspecies Interaction Design at CHI

A description of new frontiers in animal/human interaction design emerging at CHI. No cats or chickens were harmed in the writing of this article.

On the Importance of Replication in HCI and Social Computing Research
From [email protected]

On the Importance of Replication in HCI and Social Computing Research

How does replication of experiments and systems move HCI research forward?  Wouldn't replication simply waste valuable researcher energy that might be better spent...

Information Privacy: Changing Norms and Expectations
From [email protected]

Information Privacy: Changing Norms and Expectations

That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...

When Everything Is Embarrassing: Designing With Teenage Girls
From [email protected]

When Everything Is Embarrassing: Designing With Teenage Girls

A discussion of the difficulties of conducting user-centered design with teenage girls.

Why Have There Been So Many Security Breaches Recently?
From [email protected]

Why Have There Been So Many Security Breaches Recently?

We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...

Stats: We're Doing It Wrong
From [email protected]

Stats: We're Doing It Wrong

A summary of the mistakes researchers make when analysing likert type data and what the correct methods should be.

Who Needs a Tablet?
From [email protected]

Who Needs a Tablet?

Tablets do not solve a mainstream problem, they only serve a niche.

The Wonderful World of Cooking Interfaces
From [email protected]

The Wonderful World of Cooking Interfaces

This is an article describing some recent (and bizarre) interfaces to support cooking. The intersection of computer science and culinary art is not as small as...

Intellectual Amplification via Computing
From [email protected]

Intellectual Amplification via Computing

As the recent performance of IBM's Watson system on the game show Jeopardy! illustrated, the combination of large-scale data, rich algorithm suites and powerful...

Who Needs a Netbook?
From [email protected]

Who Needs a Netbook?

In only a couple years, improved smartphones and laptops have closed the niche that netbooks lived in. Rather than mourn the loss of netbooks, let's celebrate their...

Design, Functionality, and Diffusion of Innovations
From [email protected]

Design, Functionality, and Diffusion of Innovations

What's the relationship between functionality and design? What kinds of factors influence whether people do or don't adopt a technology?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account