How do we build trust? How can we systematically assure trust in our systems? How would auditing AI and autonomous systems contribute to this goal?
Explaining...Ryan Carrier From BLOG@CACM | February 1, 2021 at 04:55 PM
James Bond-like spies have been eclipsed by a new generation of operatives who don't travel the world (not physically, anyway) or drink martinis, shaken or stirred...John Arquilla From BLOG@CACM | June 18, 2018 at 09:54 AM
Election systems are supposed to be disconnected from the Internet, for obvious and sensible reasons. Most elections today, however, use computers.
Duncan Buell From BLOG@CACM | March 27, 2018 at 09:22 AM
Here we are, 70 years into the computer age and we still do not seem to know how to build secure information systems. And yet, our community marches forward with...Moshe Y. Vardi From BLOG@CACM | April 14, 2017 at 09:07 AM
Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.Robin K. Hill From BLOG@CACM | February 26, 2017 at 10:27 PM
Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...John Arquilla From BLOG@CACM | December 19, 2016 at 02:24 PM
The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.David Jefferson and Barbara Simons From BLOG@CACM | February 24, 2016 at 09:29 AM