Sign In

Communications of the ACM

BLOG@CACM



Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology
From BLOG@CACM

Closing the 'Trust Gap' in Contact Tracing/Exposure Notification Technology

The digitization of contact tracing presents an array of challenges.

Voting, Coding, and the Code
From BLOG@CACM

Voting, Coding, and the Code

Voting is more than counting.

In (Virtual) Defense of Democracy
From BLOG@CACM

In (Virtual) Defense of Democracy

There are two ways to proceed with political discourse in cyberspace, if the trolls are to be tamed.

Governance and Oversight Coming to AI and Automation: Independent Audit of AI Systems
From BLOG@CACM

Governance and Oversight Coming to AI and Automation: Independent Audit of AI Systems

Independent Audit of AI Systems is the next evolution of governance for artificial intelligence and automation.

From 007 to 'Agent 111'
From BLOG@CACM

From 007 to 'Agent 111'

James Bond-like spies have been eclipsed by a new generation of operatives who don't travel the world (not physically, anyway) or drink martinis, shaken or stirred...

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica
From BLOG@CACM

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica

The road to the Cambridge Analytica/Facebook scandal is strewn with failures.

Securing Threats to Election Systems
From BLOG@CACM

Securing Threats to Election Systems

Election systems are supposed to be disconnected from the Internet, for obvious and sensible reasons. Most elections today, however, use computers.

On the Ethics of Cyberwar
From BLOG@CACM

On the Ethics of Cyberwar

Keith Abney of the Ethics + Emerging Sciences group of California Polytechnic State University surveys the moral landscape of cyberwar.

Toward Oversight, and More Debate, of Cyber Weaponry
From BLOG@CACM

Toward Oversight, and More Debate, of Cyber Weaponry

Policies and strategies that may lead to or initiate acts of cyberwar should be subject to scrutiny. 

Cyber Insecurity and Cyber Libertarianism
From BLOG@CACM

Cyber Insecurity and Cyber Libertarianism

Here we are, 70 years into the computer age and we still do not seem to know how to build secure information systems. And yet, our community marches forward with...

Cybersecurity in the Trump Era
From BLOG@CACM

Cybersecurity in the Trump Era

Deterrence is simply the wrong way to think about cybersecurity.

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.

The Real Lesson of the Alleged Russian Hack
From BLOG@CACM

The Real Lesson of the Alleged Russian Hack

Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...

Stop Trying to Deter Cyberattacks
From BLOG@CACM

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.

A Presidential Policy Directive With Little Direction
From BLOG@CACM

A Presidential Policy Directive With Little Direction

Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.

California's Internet Voting Initiatives
From BLOG@CACM

California's Internet Voting Initiatives

The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.

Toward a Discourse on Cyber Strategy
From BLOG@CACM

Toward a Discourse on Cyber Strategy

Efforts to understand how advanced information technologies will affect future conflicts seem to be missing, or are taking place far from the public eye.

A Farewell to (Virtual) Arms?
From BLOG@CACM

A Farewell to (Virtual) Arms?

The potential for a Sino-American cyber arms control agreement is intriguing, despite three very troubling flaws.

Deterrence After Stuxnet
From BLOG@CACM

Deterrence After Stuxnet

In the cyber context, "Mutual Assured Destruction" becomes "Mutual Assured Disruption." 

The Robots Are Taking Over! (Perhaps Not Quite Yet)
From BLOG@CACM

The Robots Are Taking Over! (Perhaps Not Quite Yet)

Programs fix themselves! Today! It's scary!
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account