Sign In

Communications of the ACM

BLOG@CACM



The Ethics of Cyberwar
From BLOG@CACM

The Ethics of Cyberwar

Under what conditions should one engage in cyberwar? How should such a conflict be waged?

From Russia, Without Love
From BLOG@CACM

From Russia, Without Love

Considering Russia's alleged involvement in international cyber incidents, and its willingness to stop them.

Computer Security and the Risks of Online Voting
From BLOG@CACM

Computer Security and the Risks of Online Voting

An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being used.

The Three Faces of Cyberwar
From BLOG@CACM

The Three Faces of Cyberwar

The different aspects of cyberwar, and what can be done about them.

Yet Another Major Data Breach, But Will This Time Be Any Different?
From BLOG@CACM

Yet Another Major Data Breach, But Will This Time Be Any Different?

Why is our community having such an anemic response to all of these major data breaches? What can we do differently? What should we be doing differently?

Run-Time Assertions: What Are You Waiting For?
From BLOG@CACM

Run-Time Assertions: What Are You Waiting For?

Would Design by Contract have avoided Heartbleed?

Those Who Say Code Does Not Matter
From BLOG@CACM

Those Who Say Code Does Not Matter

Often, you will be told programming languages do not matter much. It is a pretty general rule that people arguing language does not matter are simply trying...

Through A Google Glass, Darkly
From BLOG@CACM

Through A Google Glass, Darkly

I have been wearing Google Glass as both a technical assessment of utility and as a social study in human dynamics and expectations.

Privacy and Google Glass
From BLOG@CACM

Privacy and Google Glass

Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...

CFP: Domain Seizures and Online Free Expression
From BLOG@CACM

CFP: Domain Seizures and Online Free Expression

The overwhelming secrecy surrounding seizures conducted under Operation in Our Sites is inexplicable.

CFP: Intellectual Property v. Personal Property: Owning Digital Media and the First Sale Doctrine
From BLOG@CACM

CFP: Intellectual Property v. Personal Property: Owning Digital Media and the First Sale Doctrine

There is a growing tension between consumers and content companies when it comes to the manner in which content is purchased and what consumers expect to be able...

CFP: Bridging the Divide: U­.S. and E.U. Perspectives on Privacy
From BLOG@CACM

CFP: Bridging the Divide: U­.S. and E.U. Perspectives on Privacy

While we have heard from two representatives from the EU on privacy, no one from the US government will join us for the first panel.

Athena Award Nominations Closing Soon!
From BLOG@CACM

Athena Award Nominations Closing Soon!

Don't miss out on the chance to nominate someone for an Athena Award from ACM-W.

Most Smartphone Apps Are Spyware
From BLOG@CACM

Most Smartphone Apps Are Spyware

Why does  this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?

Is the Computer Security Community Barking ­Up the Wrong Trees?
From BLOG@CACM

Is the Computer Security Community Barking ­Up the Wrong Trees?

There's a big mismatch right now between what the data says about computer security vulnerabilities and what kind of research is being done and products offered...

Password Policies Are Getting Out of Control
From BLOG@CACM

Password Policies Are Getting Out of Control

 At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...

Obama Administration Announces Landmark Global Internet Strategy
From BLOG@CACM

Obama Administration Announces Landmark Global Internet Strategy

The White House this week announced a comprehensive global strategy document bringing multiple agencies together in an effort to emphasize their commitment to a...

Information Privacy: Changing Norms and Expectations
From BLOG@CACM

Information Privacy: Changing Norms and Expectations

That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...

Embracing Noise or Why Computer Scientists Should Stop Worrying and Learn to Love the Errors
From BLOG@CACM

Embracing Noise or Why Computer Scientists Should Stop Worrying and Learn to Love the Errors

Precision is not required in everything or even most things.  Failures are best handled by expecting them all the time, not treating them as exceptions.  We should...

Why Have There Been So Many Security Breaches Recently?
From BLOG@CACM

Why Have There Been So Many Security Breaches Recently?

We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account