ACM
Sign In
Go
ACM.org
Join ACM
About Communications
ACM Resources
Alerts & Feeds
Communications of the ACM
Home
Current Issue
Current Issue: April 2023
Protecting Autonomous Cars from Phantom Attacks
Mechanical Mathematicians
Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity
VIEW TABLE OF CONTENTS
News
Latest News
News Archive
Blogs
About the Blogs
BLOG@CACM
Blogroll
Blogs Archive
Opinion
Articles
Interviews
Opinion Archive
Research
Latest Research
Research Archive
Practice
Latest Practice
Practice Archive
Careers
Search for Jobs
Post a Resume
Post A Job
Advertise with Us
Contact Us
Archive
The magazine archive includes every article published in
Communications of the ACM
for over the past 50 years.
April 2023 (Vol. 66, No. 4)
March 2023 (Vol. 66, No. 3)
February 2023 (Vol. 66, No. 2)
VIEW MORE ISSUES
Videos
BLOG@CACM
About the Blogs
Blogroll
Blogs Archive
Refine your search:
date
More Than a Year Ago
subject
Computer Applications
author
Robin K. Hill
Teaching Data Science Research Methods to Human Resources Practitioners: Part Three
From BLOG@CACM
How we took advantage of students' expertise in the application domain component of data science.
Orit Hazzan and Dafna Gelbgiser
|
March 24, 2023
From BLOG@CACM
Cryptocurs Don't Asportate
Cryptocurrency on a blockchain cannot be stolen -- it's true.
Robin K. Hill
From BLOG@CACM
|
January 28, 2022 at 10:53 AM
From BLOG@CACM
Human Acts and Computer Apps
Our behaviors often seem to mimic the procedures that we induce in computers. What questions does that raise?
Robin K. Hill
From BLOG@CACM
|
November 28, 2017 at 12:23 PM
Sign In
for Full Access
User Name
Password
» Forgot Password?
» Create an ACM Web Account
Sign In