Sign In

Communications of the ACM

Recent Articles



Pentagon Wants AI to Predict Events Before They Occur
From ACM Opinion

Pentagon Wants AI to Predict Events Before They Occur

AI-enabled platforms are expected to offer strategic warning of adversarial actions prior to any irreversible moves having been made

The FDA Should Better Regulate Medical Algorithms
From ACM Opinion

The FDA Should Better Regulate Medical Algorithms

Most do not require the agency's approval, and those that do often don't require clinical trial

Instagram Isn't the Only Social Media That's Hurting Girls
From ACM Opinion

Instagram Isn't the Only Social Media That's Hurting Girls

Researchers and reporters have been documenting social media's harmful effects on kids prior to whistleblower Frances Haugen's testimony

The DOJ Wants Companies to Admit Their Cybersecurity Problems
From ACM Opinion

The DOJ Wants Companies to Admit Their Cybersecurity Problems

Agency plans to use Civil War-era "Lincoln Law" to enforce cybersecurity disclosure

The Challenges of Regulating Cryptocurrency
From ACM Opinion

The Challenges of Regulating Cryptocurrency

The S.E.C. has yet to set clear rules on cryptocurrencies, leaving the industry guessing. Maybe that's how the agency wants it.

Facebook Can't Be Saved
From ACM Opinion

Facebook Can't Be Saved

Whistleblower Frances Haugen told senators that Facebook shouldn't be broken up, but its problems are a direct consequence of its size.

It's Time to Stop Paying for a VPN
From ACM Opinion

It's Time to Stop Paying for a VPN

Many services meant to protect your Web browsing can no longer be trusted

America Is Being Held for Ransom, and It Needs to Fight Back
From ACM Opinion

America Is Being Held for Ransom, and It Needs to Fight Back

A comprehensive anti-ransomware strategy must make it tougher for criminal groups and their sponsors to carry out attacks

A Developer's Guide to Machine-Learning Security
From ACM Opinion

A Developer's Guide to Machine-Learning Security

Countering adversarial attacks means understanding the different types as well as the ML weak spots

AI Futures
From Communications of the ACM

AI Futures: Fact and Fantasy

Three books offer varied perspectives on the ascendancy of artificial intelligence.

Competitive Compatibility
From Communications of the ACM

Competitive Compatibility: Let's Fix the Internet, Not the Tech Giants

Seeking to make Big Tech less central to the Internet.

Apple and Facebook Are Coming for Your Face Next
From ACM Opinion

Apple and Facebook Are Coming for Your Face Next

The face computer is coming—brace yourself

Where Should Information Go to Be Safe?
From ACM Opinion

Where Should Information Go to Be Safe?

Enterprise data is safest in the cloud and in the 'fog', according to one expert

The Third Revolution in Warfare
From ACM Opinion

The Third Revolution in Warfare

First there was gunpowder. Then nuclear weapons. Next: artificially intelligent weapons.

Here's Why Tech Companies Are Suddenly Focused on Child Safety
From ACM Opinion

Here's Why Tech Companies Are Suddenly Focused on Child Safety

Tech colossi are responding to shifting political winds and trying to preempt new, impending regulations

Can We Handle the Truth about Cybersecurity?
From ACM Opinion

Can We Handle the Truth about Cybersecurity?

Standardizing disclosure rules while ensuring transparency can strengthen our total cybersecurity landscape

There's a Better Way to Stop Ransomware Attacks
From ACM Opinion

There's a Better Way to Stop Ransomware Attacks

Adopt and enforce regulations for the cryptocurrency industry that are equivalent to traditional banking

No Perfect Solution in Apple's Privacy vs. Child Safety Debate
From ACM Opinion

No Perfect Solution in Apple's Privacy vs. Child Safety Debate

How do opponents to Apple's child safety features calculate risk, and more importantly, what alternatives do they propose?

Testing Educational Digital Games
From Communications of the ACM

Testing Educational Digital Games

Diversifying usability studies utilizing rapid application development.

Protecting the Global Internet from Technology Cold Wars
From Communications of the ACM

Protecting the Global Internet from Technology Cold Wars

Considering the perceived dangers of the global information flow.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account