Sign In

Communications of the ACM

Recent Opinion



Should Researchers Use Data from Security Breaches?
From Communications of the ACM

Should Researchers Use Data from Security Breaches?

Evaluating the arguments for and against using digital data derived from security breaches.

We Shouldn't be Scared by 'Superintelligent A.I.'
From ACM Opinion

We Shouldn't be Scared by 'Superintelligent A.I.'

Bostrom, Russell, and other writers argue that even if the probability is small that superintelligent machines will emerge in the foreseeable future, we should...

50 Years Ago, I Helped Invent the Internet. How Did It Go So Wrong?
From ACM Opinion

50 Years Ago, I Helped Invent the Internet. How Did It Go So Wrong?

We did not anticipate that the dark side of the Internet would emerge with such ferocity. Or that we would feel an urgent need to fix it.

An Interview with Leonard Kleinrock
From Communications of the ACM

An Interview with Leonard Kleinrock

The UCLA professor and networking pioneer reflects on his career in industry and academia.

An Interview with Leonard Kleinrock
From Communications of the ACM

An Interview with Leonard Kleinrock

The UCLA professor and networking pioneer reflects on his career in industry and academia.

Computational Thinking Should Just be Good Thinking
From Communications of the ACM

Computational Thinking Should Just be Good Thinking

Seeking to change computing teaching to improve computer science.

Europe's Controversial Digital Copyright Directive Finalized
From Communications of the ACM

Europe's Controversial Digital Copyright Directive Finalized

Considering the new liability risks for ISPs, search engines, and news aggregators under recent EU-wide mandatory rules.

A Controversial Plan to Encrypt More of the Internet
From ACM Opinion

A Controversial Plan to Encrypt More of the Internet

The road to routing all Domain Name System lookups through HTTPS is pocked with disagreements over just how much it will help.

What Is a Chief Security Officer Good For?
From Communications of the ACM

What Is a Chief Security Officer Good For?

Security requires more than an off-the-shelf solution.

How Might We Increase System Trustworthiness?
From Communications of the ACM

How Might We Increase System Trustworthiness?

Summarizing some of the changes that seem increasingly necessary to address known system and network deficiencies and anticipate currently unknown vulnerabilities...

Computer Scientist David Gelernter Wants To Revolutionize Social Media
From ACM Careers

Computer Scientist David Gelernter Wants To Revolutionize Social Media

David Gelernter, a computer science professor at Yale, is concerned with the amount of power Facebook holds thanks to the data handed over to the social media giant...

How the Firm Behind Many Store Credit Cards Is Using AI to Fight Fraud
From ACM Opinion

How the Firm Behind Many Store Credit Cards Is Using AI to Fight Fraud

Synchrony deploys AI to speed up operations including credit approvals and fraud detection. Chief Information Officer Carol Juel has led the undertaking.

Hackers Needed To Defeat Hackers
From ACM Opinion

Hackers Needed To Defeat Hackers

In an online world infested with hackers, we need more hackers.

Wouldn't It Be Great If People Could Vote on the Blockchain?
From ACM Opinion

Wouldn't It Be Great If People Could Vote on the Blockchain?

Mobile voting could increase voter participation, but it's plagued by security issues in search of a solution.

Inspired by the Home of the Future
From Communications of the ACM

Inspired by the Home of the Future

2018 ACM Prize in Computing recipient Shwetak Patel pushes old tools to new heights.

An Interview with Andrew Odlyzko on Cyber Security
From Communications of the ACM

An Interview with Andrew Odlyzko on Cyber Security

Is a "Cyber Pearl Harbor" any greater a risk than a natural disaster? How shall we prioritize our preparations for a cyber disaster?

An Interview with Andrew Odlyzko on Cyber Security
From Communications of the ACM

An Interview with Andrew Odlyzko on Cyber Security

Is a "Cyber Pearl Harbor" any greater a risk than a natural disaster? How shall we prioritize our preparations for a cyber disaster?

Online Voting
From Communications of the ACM

Online Voting: We Can Do It! (We Have To)

Seeking to make online voting more secure than today's flawed paper systems.

Internet Immunity and the Freedom to Code
From Communications of the ACM

Internet Immunity and the Freedom to Code

A call to preserve the capability of developing the next generation of Internet services.

Why Tech Will Never Be Able to Predict the Next Mass Shooting
From ACM Opinion

Why Tech Will Never Be Able to Predict the Next Mass Shooting

Following the horrific mass shootings in El Paso and Dayton last weekend, President Trump called on social media companies to develop tools that could help identify...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account