. . . And the Computer Plays Along
HCI
Contracting for Artificial Intelligence
Cyber Efficiency and Cyber Resilience
Where Is the Research on Cryptographic Transition and Agility?
Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity
Boosting Photodiode Efficiency to 220%
Teaching Data Science Research Methods to Human Resources Practitioners: Part Two
Cybersecurity Mistakes to Avoid at All Costs
Twiddler: Configurability for Me, but Not for Thee
The Urgency of the Technological, Geopolitical, and Sustainability Races
Virtual Influencers in the Real World
Metrics for Success: Why and How to Evaluate Privacy Choice Usability
Toward Practices for Human-Centered Machine Learning
AI and Neurotechnology: Learning from AI Ethics to Address an Expanded Ethics Landscape
Fending off Cyberattacks on Collaborative Robots
Using GitHub CoPilot is Like Having a Superpower
Ambient IoT Gets Down to Business
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More