acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Can Generative AI Bots Be Trusted?
From Communications of the ACM

Can Generative AI Bots Be Trusted?

It will be a long road to learning how to use generative AI wisely.

Do the Right Thing
From Communications of the ACM

Do the Right Thing

Exploring the intersection of legal compliance and ethical judgment.

Faculty Can Save Lives of the Elderly
From Communications of the ACM

Faculty Can Save Lives of the Elderly

A unique viewpoint on risks to senior citizens from academia.

Improving Section 230, Preserving Democracy, and Protecting Free Speech
From Communications of the ACM

Improving Section 230, Preserving Democracy, and Protecting Free Speech

Proposing a framework for a decentralized market where no one party controls the flow of information.

A Turning Point for Cyber Insurance
From Communications of the ACM

A Turning Point for Cyber Insurance

Technologists who understand and measure cyber risk can motivate policyholders to improve security.

A Legal Challenge to Algorithmic Recommendations
From Communications of the ACM

A Legal Challenge to Algorithmic Recommendations

Reconsidering liability shield considerations.

Getting a Handle on Handles
From Communications of the ACM

Getting a Handle on Handles

Navigating moniker management.

An Emergent Legal Right to Repair Electronic Devices
From Communications of the ACM

An Emergent Legal Right to Repair Electronic Devices

Parsing the fine print on repair tolerances.

Is This the Beginning of the End of the Internet?
From ACM Opinion

Is This the Beginning of the End of the Internet?

How a single Texas ruling could change the Web forever.

These Are Not the Apes You Are Looking For
From Communications of the ACM

These Are Not the Apes You Are Looking For

Considering copyright licensing issues involving non-fungible tokens to manage creative works.

Apple's Challenge to Virtualization Software
From Communications of the ACM

Apple's Challenge to Virtualization Software

Is it okay for security researchers to virtualize software to look for vulnerabilities?

Why Robots Need to See
From ACM Opinion

Why Robots Need to See

Cameras and vision-based perception will increasingly serve as the technological underpinning for mobile robots going forward.

Two Paths for Digital Disability Law
From Communications of the ACM

Two Paths for Digital Disability Law

Understanding the legal drivers of efforts to make technology accessible.

<i>Communications'</i> Digital Initiative and Its First Digital Event
From Communications of the ACM

Communications' Digital Initiative and Its First Digital Event

How AI and science are shaping each other.

 Russia Is Risking the Creation of an Irreversible 'Splinternet'
From ACM Opinion

Russia Is Risking the Creation of an Irreversible 'Splinternet'

If Russia disconnects—or is booted—from the Internet's governing bodies, the Internet may never be the same.

The Ecological Impacts of Computation and the Cloud
From ACM Opinion

The Ecological Impacts of Computation and the Cloud

The cloud is not only material but also an ecological force

Futures of Digital Governance
From Communications of the ACM

Futures of Digital Governance

Seeking to increase the interoperability among the technical and social sciences toward new forms of governance associated with digital technology.

Copyright Implications of Emulation Programs
From Communications of the ACM

Copyright Implications of Emulation Programs

How emulation programs might be affected by new claims of copyright infringement.

China's 5G Soars over America's
From ACM Opinion

China's 5G Soars over America's

In some U.S. cities, 5G is slower than the old 4G system; Washington must make it a priority

Is LiDAR on Its Way Out?
From ACM Opinion

Is LiDAR on Its Way Out?

As automation proliferates, sensing is increasingly moving toward software and away from LiDAR
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account