Some of the prevailing theories of ethics surface in modern high tech. We take a quick and rather superficial look at their tracks on the ground, noting especially...Robin K. Hill From BLOG@CACM | March 16, 2017 at 10:28 AM
Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.
...Robin K. Hill From BLOG@CACM | February 26, 2017 at 10:27 PM
Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...John Arquilla From BLOG@CACM | December 19, 2016 at 02:24 PM
As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.
Sheldon H. Jacobson, Jason J. Sauppe, and Steven E. Rigdon From BLOG@CACM | December 2, 2016 at 01:21 PM
Researchers should not treat practitioners as mere objects of their studies or simple sources of data, but work towards creating research partnerships with practitioners...Zeljko Obrenovic From BLOG@CACM | November 1, 2016 at 10:56 AM
Wendy Powley and Gloria Childress Townsend report on the National Center for Women & IT Annual Summit, themed "making the world fair and just." Wendy Powley and Gloria Childress Townsend From BLOG@CACM | May 24, 2016 at 09:46 AM
The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.David Jefferson and Barbara Simons From BLOG@CACM | February 24, 2016 at 09:29 AM
Efforts to understand how advanced information technologies will affect future conflicts seem to be missing, or are taking place far from the public eye.John Arquilla From BLOG@CACM | January 15, 2016 at 04:00 PM
In the 70 years since the end of World War II, AI has advanced enormously, and the military has continued to show a steady appetite for acquiring lethal robots.John Arquilla From BLOG@CACM | May 1, 2015 at 03:22 PM