The Internet of Things We Don’t Own?
Security and Privacy
The Moral Imperative of Artificial Intelligence
ACM’s 2016 General Election: Please Take This Opportunity to Vote
Sampling Bias in CS Education, and Where’s the Cyber Strategy?
A Decade of ACM Efforts Contribute to Computer Science For All
Existing Technologies Can Assist the Disabled
The Need For Corporate Diplomacy
More Encryption Means Less Privacy
Multimodal Biometrics For Enhanced Mobile Device Security
Technical Perspective: The State (and Security) of the Bitcoin Economy
Technical Perspective: Fairness and the Coin Flip
Secure Multiparty Computations on Bitcoin
Are We Headed Toward Another Global Tech Bust?
Enrollments Explode! But Diversity Students Are Leaving . . .
Security Experts Weigh in on Apple vs. the Fbi, Public Policy and the Law at Nyu Event
A Differential Approach to Undefined Behavior Detection
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More