Jeffrey Bigham's research uses Web-based applications and crowdsourcing to help people with disabilities in near real-time. Is it any surprise he won a NSF Career...Karen A. Frenkel From ACM News | April 3, 2012
For the last two months, senior government officials and private-sector experts have paraded before Congress and described in alarming terms a silent threat: cyberattacks...The New York Times From ACM Opinion | April 3, 2012
When you "like" something on Facebook or read an online newspaper, perhaps a dozen or more companies are squirreling away data on your tastes, your habits, whether...Reuters From ACM Opinion | April 3, 2012
Information technology is changing the way nations wage war, with philosophical and ethical perspectives struggling to keep pace with those changes. The Atlantic From ACM TechNews | March 30, 2012
Mr. Cerf, often called the father of the Internet, said that the so-called "right to be forgotten" online was "not possible to achieve."The Telegraph From ACM Opinion | March 30, 2012
From state-sponsored cyberattacks to autonomous robotic weapons, 21st century war is increasingly disembodied.The Atlantic From ACM Opinion | March 30, 2012
A mile or two away from Facebook's headquarters in Silicon Valley, Helen Nissenbaum of New York University was standing in a basement on Stanford's campus explaining...The Atlantic From ACM Opinion | March 30, 2012
One fine night in November 2011 I got an opportunity to get my hands dirty, working on a project for the U.S. Federal Bureau of Investigation.CircleID From ACM Opinion | March 29, 2012
The assault on personal privacy has ramped up significantly in the past few years. From warrantless GPS tracking to ISP packet inspection, it seems that everyone...InfoWorld From ACM Opinion | March 28, 2012
Many people don't realize that most of the censorship and surveillance in China is not being done by the government, but by companies at the behest of the government...Paul Hyman From ACM News | March 27, 2012
In December, the U.S. Department of Justice intervened under the Voting Rights Act to stay a South Carolina voter ID law.CNN From ACM Opinion | March 26, 2012
Combining academic and industry representation, the NCWIT Pacesetters program works to increase the participation of girls and women in computing.Jill Ross, Elizabeth Litzler, J. McGrath Cohoon, Lucy Sanders From Communications of the ACM | April 1, 2012
There is a spate of proposed cybersecurity legislation working its way through the House and Senate. The bills are aimed primarily at facilitating cooperation regarding...Electronic Frontier Foundation From ACM Opinion | March 21, 2012