acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Values in Design
From Communications of the ACM

Values in Design

Focusing on socio-technical design with values as a critical component in the design process.

Driving Power in Global Supply Chains
From Communications of the ACM

Driving Power in Global Supply Chains

Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...

Networks Are Not Always Revolutionary
From ACM Opinion

Networks Are Not Always Revolutionary

"For most artists," as the famous Tim O'Reilly aphorism has it "the problem isn't piracy, it's obscurity." To me, this is inarguably true and self-evident—the...

From ACM Opinion

China's Cyberassault on America

In justifying U.S. involvement in Libya, the Obama administration cited the "responsibility to protect" citizens of other countries when their governments engage...

From ACM News

All Your Bitcoins Are Ours

Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...

From ACM News

Who Is Behind the Hacks?

Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...

From ACM Opinion

Weiner's Law

The Web makes it easier than ever to cheat—and easier than ever for cheaters to get caught.

From ACM Opinion

Internet Piracy and How to Stop It

Online piracy is a huge business. A recent study found that Web sites offering pirated digital content or counterfeit goods, like illicit movie downloads or bootleg...

The Danger of E-Books
From ACM Opinion

The Danger of E-Books

In an age where business dominates our governments and writes our laws, every technological advance offers business an opportunity to impose new restrictions...

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear
From ACM Opinion

Feds Versus the Hacker ­nderground: Army of Informers Turned By Fear

When Jeff Moss, popularly known as the Dark Tangent, started holding underground hacker conferences in Las Vegas he knew he had a problem. All previous gatherings...

From ACM Opinion

On the Latest Google Chinese-Hacking News

Thanks to many people who have written in asking whether the recent Google announcement of a new China-based wave of attacks on Gmail accounts is related to the...

Bill Would Keep Big Brother's Mitts Off Your Gps Data
From ACM News

Bill Would Keep Big Brother's Mitts Off Your Gps Data

The reauthorization of the Patriot Act looks like a forgone conclusion. But next month, a bipartisan band of legislators will try to mitigate a different kind...

A Brief Lesson in American History, or Why 'world of Warcraft' Matters
From ACM Opinion

A Brief Lesson in American History, or Why 'world of Warcraft' Matters

Many readers are probably too young too remember Senator William Proxmire. I am sorry to say he served in the U.S. Senate from 1957 to 1989. Despite some good...

What Big Data Needs: A Code of Ethical Practices
From ACM Opinion

What Big Data Needs: A Code of Ethical Practices

In this era of Big Data, there is little that cannot be tracked in our online lives—or even in our offline lives. Consider one new Silicon Valley venture, called...

Computer Science Can Use More Science
From Communications of the ACM

Computer Science Can Use More Science

Software developers should use empirical methods to analyze their designs to predict how working systems will behave.

The Risks of Stopping Too Soon
From Communications of the ACM

The Risks of Stopping Too Soon

Good software design is never easy, but stopping too soon makes the job more difficult.

Practical Application of Theoretical Estimation
From Communications of the ACM

Practical Application of Theoretical Estimation

One of the most popular and successful approaches to estimating software projects is the Putnam model. Developed in the 1970s by...

Who Are We - Now?
From Communications of the ACM

Who Are We - Now?

Considerable progress has been made toward the formation of a computing profession since we started tracking it in this column a decade ago.

Identity Management and Privacy
From Communications of the ACM

Identity Management and Privacy: A Rare Opportunity To Get It Right

The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the...

From ACM Opinion

Why Library Privacy Matters

Without library privacy, individuals might not engage in free and open inquiry for fear that their interactions with the library will be used against them.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account