Sign In

Communications of the ACM

Table of Contents

DEPARTMENT: From the president

How ACM Is Adapting in This Period of Global Uncertainties

The global impact of computing and information technology has never been clearer than it is now as the world continues its efforts to slow the COVID-19 pandemic.
DEPARTMENT: Departments

Partnerships Can Help Drive Gender Equality

Myriad organizations work to increase the number of women in the technology sector. Are we possibly reducing our collective impact because we are sometimes competing rather than cooperating for funding and volunteer effort?

Efficiency vs. Resilience: What COVID-19 Teaches Computing

Computer science has yet to internalize the idea that resilience, which to me includes fault tolerance, security, and more, must be pushed down to the algorithmic level.
DEPARTMENT: ACM's election

ACM's 2020 General Election

Meet the candidates who introduce their plans—and stands—for the Association. Please take this opportunity to vote.
DEPARTMENT: Departments

Launching a New Feature in Communications

Communications is launching a new series of articles that broaden our presentation of the computing profession, with a particular focus on a young professional audience and a breadth of career paths.

Automating Automation: CS at the Heart of the Manufacturing Economy

Using machine learning, I'm able to reduce the time required for designing products from months to mere hours as well as free up time for engineers to focus on design in terms of functions, behaviors, and structures.

Teaching CS Humbly, and Watching the AI Revolution

Mark Guzdial on a book that changed his thinking about teaching computer science, and Jiajie Zhang on the AI Revolution.

A Proof from 'The Book'

A decades-old conjecture about computational complexity is confirmed in just a few pages.

Will RISC-V Revolutionize Computing?

The open instruction set for microprocessors promises to reshape computing and introduce new, more powerful capabilities.

Deceiving the Masses on Social Media

The social media platforms like their freedom, but information gerrymandering may require legislation to fix.
COLUMN: Law and technology

What Role for Antitrust in Regulating Platforms?

Using regulation to protect competition and innovation.
COLUMN: Privacy and security

Secure Development Tools and Techniques Need More Research That Will Increase Their Impact and Effectiveness in Practice

Secure development is an important and pressing problem.
COLUMN: Education

A Vision of K-12 Computer Science Education for 2030

Exploring goals, perspectives, and challenges.
COLUMN: Viewpoint

Computers Do Not Make Art, People Do

The continually evolving relationship between artistic technologies and artists.

When Technology Goes Awry

On engineers' obligation to tame their creations.
DEPARTMENT: Departments

ACM Publications Finances

A detailed picture of financial information relating to ACM's publications revenues and expenses.
SECTION: Practice

Beyond the 'Fix-It' Treadmill

The use of post-incident artifacts in high-performing organizations.

Revealing the Critical Role of Human Performance in Software

It's time to appreciate the human side of Internet-facing software systems.
SECTION: Contributed articles

Reading in the Panopticon: Your Kindle May Be Spying on You, But You Can't Be Sure

eBooks may have surveillance technologies embedded in them. Should we care?

A Bibliometric Approach for Detecting the Gender Gap in Computer Science

Identifying female CS scientists by combining a robust bibliographic database and name filtering tools.
SECTION: Review articles

A Snapshot of the Frontiers of Fairness in Machine Learning

A group of industry, academic, and government experts convene in Philadelphia to explore the roots of algorithmic bias.


Diverse examples depict how indistinguishability plays a central role in computer science.
SECTION: Research highlights

Technical Perspective: Fake 'Likes' and Targeting Collusion Networks

"Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks," by Shehroze Farooqi et al., explores a social-networking reputation manipulation ecosystem.

Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks

We carried out a comprehensive measurement study to understand how collusion networks exploited popular third-party Facebook applications with weak security settings to retrieve OAuth access tokens.
COLUMN: Last byte

Optimal Chimes

The importance of the space between the notes.