acm-header
Sign In

Communications of the ACM

Recent Opinion


Articles Interviews Vardi's Insights Chien's Vantage Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectLegal Aspects
authorThe New York Times
bg-corner

Smartphone Patent Wars Show the System Works, Patent Chief Says
From ACM Opinion

Smartphone Patent Wars Show the System Works, Patent Chief Says

David J. Kappos, director of the United States Patent and Trademark Office, is thoughtful, patient, even genial in interviews. But he was showing some pique in...

Long Day For a Professor Who Puts Elections ­nder a Microscope
From ACM Opinion

Long Day For a Professor Who Puts Elections ­nder a Microscope

Monday afternoon, just half a day before the polls opened, Prof. Mark Crispin Miller was feeling pessimistic about the electoral process.

How to Devise Passwords That Drive Hackers Away
From ACM Opinion

How to Devise Passwords That Drive Hackers Away

Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self.

Is Failure to Predict a Crime?
From ACM Opinion

Is Failure to Predict a Crime?

I learned with disbelief last Monday about the decision of an Italian judge to convict seven scientific experts of manslaughter and to sentence them to six years...

Few Winners in Heated Cellphone Wars
From ACM Opinion

Few Winners in Heated Cellphone Wars

If you are wondering who will be your cellphone provider next year, so are the cellphone companies.

And the Firewalls Came Tumbling Down
From ACM Opinion

And the Firewalls Came Tumbling Down

There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...

Where's the Discussion of Trojan Horses?
From ACM Opinion

Where's the Discussion of Trojan Horses?

The Mykonos Vase, discovered in 1961 in the Cyclades, is one of the earliest accounts of the Trojan Horse, used as a subterfuge by the Greeks to enter the city...

The Internet? We Built That
From ACM Opinion

The Internet? We Built That

Who created the Internet and why should we care? These questions, so often raised during the Bush-Gore election in 2000, have found their way back into the political...

From ACM Opinion

When Gps Tracking Violates Privacy Rights

For the right to personal privacy to survive in America in this digital age, courts must be meticulous in applying longstanding privacy protections to new technology...

From ACM Opinion

A New Kind of Warfare

Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals, and foreign governments,...

From ACM Opinion

Apple Case Muddies the Future of Innovations

Apple's victory on Friday in a patent lawsuit against Samsung could, if upheld, give its rivals a kick in the pants to create more original products.

Giving In to the Surveillance State
From ACM Opinion

Giving In to the Surveillance State

In March 2002, John M. Poindexter, a former national security adviser to President Ronald Reagan, sat down with Gen. Michael V. Hayden, the director of the National...

Why Apple Might Be Better Off Losing Its Patent Lawsuit
From ACM Opinion

Why Apple Might Be Better Off Losing Its Patent Lawsuit

Could it be in Apple’s self-interest to lose its bitter court battle with Samsung?

Trust: Ill-Advised in a Digital Age
From ACM Opinion

Trust: Ill-Advised in a Digital Age

Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...

The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

From ACM Opinion

The Public Is Left in the Dark When Courts Allow Electronic Surveillance

A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...

From ACM Opinion

The End of Privacy?

Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...

A Weapon We Can't Control
From ACM Opinion

A Weapon We Can't Control

The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...

Free Speech For Computers?
From ACM Opinion

Free Speech For Computers?

Do machines speak? If so, do they have a constitutional right to free speech?

Why Attack When We Can't Defend?
From ACM Opinion

Why Attack When We Can't Defend?

In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account