Sign In

Communications of the ACM

BLOG@CACM



Voting, Coding, and the Code
From BLOG@CACM

Voting, Coding, and the Code

Voting is more than counting.

Is the Trolley Problem ­Useful for Studying Autonomous Vehicles?
From BLOG@CACM

Is the Trolley Problem ­Useful for Studying Autonomous Vehicles?

Does the trolley problem offer any useful insights for autonomous vehicles, in terms of design of or public policy around these systems? Here are several reasons...

In (Virtual) Defense of Democracy
From BLOG@CACM

In (Virtual) Defense of Democracy

There are two ways to proceed with political discourse in cyberspace, if the trolls are to be tamed.

Why is Privacy So Hard?
From BLOG@CACM

Why is Privacy So Hard?

Why is privacy so hard? Why is it, after so much negative press about it, are we still being constantly tracked on the web and on our smartphones? Why is it, after...

The Ethical Responsibilities of the Student or End-­User Programmer
From BLOG@CACM

The Ethical Responsibilities of the Student or End-­User Programmer

If a student's program goes awry, who is responsible? How do we protect society and encourage people to learn about code? 

From 007 to 'Agent 111'
From BLOG@CACM

From 007 to 'Agent 111'

James Bond-like spies have been eclipsed by a new generation of operatives who don't travel the world (not physically, anyway) or drink martinis, shaken or stirred...

Articulation of Decision Responsibility
From BLOG@CACM

Articulation of Decision Responsibility

Can we establish a locution for the results of a program that does not ascribe decision-making power?

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica
From BLOG@CACM

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica

The road to the Cambridge Analytica/Facebook scandal is strewn with failures.

Securing Threats to Election Systems
From BLOG@CACM

Securing Threats to Election Systems

Election systems are supposed to be disconnected from the Internet, for obvious and sensible reasons. Most elections today, however, use computers.

Massive Retaliation 2.0
From BLOG@CACM

Massive Retaliation 2.0

Reacting to the U.S. Nuclear Posture Review, which now tries to extend nuclear deterrence to cyberspace.

The Rise of Strategic Cyberwar?
From BLOG@CACM

The Rise of Strategic Cyberwar?

Cyberwar is not simply a lineal descendant of strategic air power; rather, it is the next face of battle.

Toward Oversight, and More Debate, of Cyber Weaponry
From BLOG@CACM

Toward Oversight, and More Debate, of Cyber Weaponry

Policies and strategies that may lead to or initiate acts of cyberwar should be subject to scrutiny. 

Ethical Theories Spotted in Silicon Valley
From BLOG@CACM

Ethical Theories Spotted in Silicon Valley

Some of the prevailing theories of ethics surface in modern high tech.  We take a quick and rather superficial look at their tracks on the ground, noting especially...

Just Press Reboot
From BLOG@CACM

Just Press Reboot

Why does the press continue to talk about "computer problems"?

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.

ACM's Open-Conference Principle and Political Reality
From BLOG@CACM

ACM's Open-Conference Principle and Political Reality

The Open-Conference Principle is aimed at benefiting society.

The Real Lesson of the Alleged Russian Hack
From BLOG@CACM

The Real Lesson of the Alleged Russian Hack

Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...

What Happened?
From BLOG@CACM

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.

Is Academia Guilty of Intellectual Colonization of Practice?
From BLOG@CACM

Is Academia Guilty of Intellectual Colonization of Practice?

Researchers should not treat practitioners as mere objects of their studies or simple sources of data, but work towards creating research partnerships with practitioners...

Stop Trying to Deter Cyberattacks
From BLOG@CACM

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account