Considering the origins, interpretations, and possible changes to Communications Decency Act §230 amid an evolving online environment.
Pamela Samuelson From Communications of the ACM | March 1, 2021
Deliberating on how to regulate—or not regulate—online speech in the era of evolving social media.
Kate Klonick From Communications of the ACM | January 1, 2021
Reviewing the most significant changes recommended in the recently released U.S. Copyright Office Section 512 Study.
Pamela Samuelson From Communications of the ACM | November 1, 2020
How more than 25years of experience with aviation safety-critical systems can be applied to autonomous vehicle systems.
Jaynarayan H. Lala, Carl E. Landwehr, John F. Meyer From Communications of the ACM | September 1, 2020
Considering the recent increased attention to privacy law issues amid the typically slow pace of legal change.
Margot Kaminski From Communications of the ACM | September 1, 2020
Increased automation—with its ability to significantly boost societal productivity—is needed to help modern nations address seemingly intractable challenges such...Robotics Business Review From ACM Opinion | July 28, 2020
Considering the role of humans in copyright protection of outputs produced by artificial intelligence.
Pamela Samuelson From Communications of the ACM | July 1, 2020
Limiting sensitive information leakage via smart-home sensor data.
Connor Bolton, Kevin Fu, Josiah Hester, Jun Han From Communications of the ACM | June 1, 2020
A U.K. research project uses evolutionary principles to design robots to help dismantle decommissioned nuclear power plants.
Bennie Mols From ACM News | March 19, 2020
Jenny Xu, a junior at Stony Brook University, has developed and introduced Hacker Matcher, an app for team building at hackathons.
Stony Brook University From ACM Opinion | December 3, 2019
California's new law forcing ride-sharing companies to treat their drivers as employees could harm or kill an important new business model.
Scientific American From ACM Opinion | October 25, 2019
Summarizing some of the changes that seem increasingly necessary to address known system and network deficiencies and anticipate currently unknown vulnerabilities...Peter G. Neumann From Communications of the ACM | October 1, 2019