Sign In

Communications of the ACM



Is the Trolley Problem ­Useful for Studying Autonomous Vehicles?
From [email protected]

Is the Trolley Problem ­Useful for Studying Autonomous Vehicles?

Does the trolley problem offer any useful insights for autonomous vehicles, in terms of design of or public policy around these systems? Here are several reasons...

In (Virtual) Defense of Democracy
From [email protected]

In (Virtual) Defense of Democracy

There are two ways to proceed with political discourse in cyberspace, if the trolls are to be tamed.

Why is Privacy So Hard?
From [email protected]

Why is Privacy So Hard?

Why is privacy so hard? Why is it, after so much negative press about it, are we still being constantly tracked on the web and on our smartphones? Why is it, after...

The Ethical Responsibilities of the Student or End-­User Programmer
From [email protected]

The Ethical Responsibilities of the Student or End-­User Programmer

If a student's program goes awry, who is responsible? How do we protect society and encourage people to learn about code? 

From 007 to 'Agent 111'
From [email protected]

From 007 to 'Agent 111'

James Bond-like spies have been eclipsed by a new generation of operatives who don't travel the world (not physically, anyway) or drink martinis, shaken or stirred...

Articulation of Decision Responsibility
From [email protected]

Articulation of Decision Responsibility

Can we establish a locution for the results of a program that does not ascribe decision-making power?

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica
From [email protected]

What Went Wrong? Facebook and 'Sharing' Data with Cambridge Analytica

The road to the Cambridge Analytica/Facebook scandal is strewn with failures.

Securing Threats to Election Systems
From [email protected]

Securing Threats to Election Systems

Election systems are supposed to be disconnected from the Internet, for obvious and sensible reasons. Most elections today, however, use computers.

Massive Retaliation 2.0
From [email protected]

Massive Retaliation 2.0

Reacting to the U.S. Nuclear Posture Review, which now tries to extend nuclear deterrence to cyberspace.

The Rise of Strategic Cyberwar?
From [email protected]

The Rise of Strategic Cyberwar?

Cyberwar is not simply a lineal descendant of strategic air power; rather, it is the next face of battle.

Toward Oversight, and More Debate, of Cyber Weaponry
From [email protected]

Toward Oversight, and More Debate, of Cyber Weaponry

Policies and strategies that may lead to or initiate acts of cyberwar should be subject to scrutiny. 

Ethical Theories Spotted in Silicon Valley
From [email protected]

Ethical Theories Spotted in Silicon Valley

Some of the prevailing theories of ethics surface in modern high tech.  We take a quick and rather superficial look at their tracks on the ground, noting especially...

Just Press Reboot
From [email protected]

Just Press Reboot

Why does the press continue to talk about "computer problems"?

Fact Versus Frivolity in Facebook
From [email protected]

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.

ACM's Open-Conference Principle and Political Reality
From [email protected]

ACM's Open-Conference Principle and Political Reality

The Open-Conference Principle is aimed at benefiting society.

The Real Lesson of the Alleged Russian Hack
From [email protected]

The Real Lesson of the Alleged Russian Hack

Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...

What Happened?
From [email protected]

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.

Is Academia Guilty of Intellectual Colonization of Practice?
From [email protected]

Is Academia Guilty of Intellectual Colonization of Practice?

Researchers should not treat practitioners as mere objects of their studies or simple sources of data, but work towards creating research partnerships with practitioners...

Stop Trying to Deter Cyberattacks
From [email protected]

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account