Sign In

Communications of the ACM

Recent Articles


Articles Interviews Vardi's Insights Opinion Archive Refine your search:
subjectPersonal Computing
authorThe Conversation

Don't Be Fooled by Fake Images and Videos Online
From ACM Opinion

Don't Be Fooled by Fake Images and Videos Online

One month before the 2016 U.S. presidential election, an "Access Hollywood" recording of Donald Trump was released in which he was heard lewdly talking about women...

People Don't Trust Blockchain Systems. Is Regulation a Way to Help?
From ACM Opinion

People Don't Trust Blockchain Systems. Is Regulation a Way to Help?

Blockchain technology isn't as widely used as it could be, largely because blockchain users don't trust each other, as research shows.

The Quiet Threat Inside 'Internet of Things' Devices
From ACM Opinion

The Quiet Threat Inside 'Internet of Things' Devices

As Americans increasingly buy and install smart devices in their homes, all those cheap interconnected devices create new security problems for individuals and...

Countering Russian Disinformation the Baltic Nations' Way
From ACM News

Countering Russian Disinformation the Baltic Nations' Way

As the new Congress begins, it will soon discuss the comprehensive reports to the U.S. Senate on the disinformation campaign of half-truths, outright fabrications...

Even a Few Bots Can Shift Public Opinion in Big Ways
From ACM Opinion

Even a Few Bots Can Shift Public Opinion in Big Ways

Nearly two-thirds of the social media bots with political activity on Twitter before the 2016 U.S. presidential election supported Donald Trump.

In 1968, Computers Got Personal: How the 'Mother of All Demos' Changed the World
From ACM Opinion

In 1968, Computers Got Personal: How the 'Mother of All Demos' Changed the World

On a crisp California afternoon in early December 1968, a square-jawed, mild-mannered Stanford researcher named Douglas Engelbart took the stage at San Francisco's...

Why the Russians Might Hack the Boy Scouts Next
From ACM Opinion

Why the Russians Might Hack the Boy Scouts Next

In the two years since Russia made headlines for targeting an American political organization–the Democratic National Committee–and undermining Hillary Clinton's...

How Will Google's Innovation Continue Beyond Its 20th Year?
From ACM Opinion

How Will Google's Innovation Continue Beyond Its 20th Year?

As millions of people came online in the late 1990s they needed help figuring out what each webpage was about, and how to find what they were looking for.

Weaponized Information Seeks a New Target in Cyberspace: Users' Minds
From ACM Opinion

Weaponized Information Seeks a New Target in Cyberspace: Users' Minds

The Russian attacks on the 2016 U.S. presidential election and the country's continuing election-related hacking have happened across all three dimensions of cyberspace—physical...

Supreme Court Struggles to Define 'Searches' as Technology Changes
From ACM Opinion

Supreme Court Struggles to Define 'Searches' as Technology Changes

What the Fourth Amendment to the U.S. Constitution means when it protects citizens against an unreasonable search by government agents isn't entirely clear.

Disrupting Pro-ISIS Online 'Ecosystems' Could Help Thwart Real-World Terrorism
From ACM Opinion

Disrupting Pro-ISIS Online 'Ecosystems' Could Help Thwart Real-World Terrorism

Supporters of the Islamic State, or ISIS, around the world gather online, becoming members of virtual communities in much the same way any of us might join online...

Misinformation and Biases Infect Social Media, Both Intentionally and Accidentally
From ACM Opinion

Misinformation and Biases Infect Social Media, Both Intentionally and Accidentally

Social media are among the primary sources of news in the U.S. and across the world.

How Cambridge Analytica's Facebook Targeting Model Really Worked, According to the Person Who Built It
From ACM Opinion

How Cambridge Analytica's Facebook Targeting Model Really Worked, According to the Person Who Built It

The researcher whose work is at the center of the Facebook-Cambridge Analytica data analysis and political advertising uproar has revealed that his method worked...

Cambridge Analytica Scandal: Legitimate Researchers ­sing Facebook Data Could Be Collateral Damage
From ACM Opinion

Cambridge Analytica Scandal: Legitimate Researchers ­sing Facebook Data Could Be Collateral Damage

The scandal that has erupted around Cambridge Analytica's alleged harvesting of 50m Facebook profiles assembled from data provided by a UK-based academic and his...

Your Mobile Phone Can Give Away Your Location, Even If You Tell It Not to
From ACM Opinion

Your Mobile Phone Can Give Away Your Location, Even If You Tell It Not to

U.S. military officials were recently caught off guard by revelations that servicemembers' digital fitness trackers were storing the locations of their workouts—including...

Trust in Digital Technology Will Be the Internet's Next Frontier, For 2018 and Beyond
From ACM Opinion

Trust in Digital Technology Will Be the Internet's Next Frontier, For 2018 and Beyond

After decades of unbridled enthusiasm—bordering on addiction—about all things digital, the public may be losing trust in technology.

Real Security Requires Strong Encryption–even If Investigators Get Blocked
From ACM Opinion

Real Security Requires Strong Encryption–even If Investigators Get Blocked

The FBI and the U.S. Department of Justice have been fighting against easy, widespread public access to encryption technologies for 25 years.

The Only Safe Email Is text-Only email
From ACM Opinion

The Only Safe Email Is text-Only email

It's troubling to think that at any moment you might open an email that looks like it comes from your employer, a relative or your bank, only to fall for a ...

Tracing the Sources of Today's Russian cyberthreat
From ACM Opinion

Tracing the Sources of Today's Russian cyberthreat

Beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military...

End-to-End Encryption Isn't Enough Security For 'real people'
From ACM Opinion

End-to-End Encryption Isn't Enough Security For 'real people'

Government officials continue to seek technology companies' help fighting terrorism and crime. But the most commonly proposed solution would severely limit regular...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account