Sign In

Communications of the ACM

Recent Articles



Hackers Needed To Defeat Hackers
From ACM Opinion

Hackers Needed To Defeat Hackers

In an online world infested with hackers, we need more hackers.

Wouldn't It Be Great If People Could Vote on the Blockchain?
From ACM Opinion

Wouldn't It Be Great If People Could Vote on the Blockchain?

Mobile voting could increase voter participation, but it's plagued by security issues in search of a solution.

An Interview with Andrew Odlyzko on Cyber Security
From Communications of the ACM

An Interview with Andrew Odlyzko on Cyber Security

Is a "Cyber Pearl Harbor" any greater a risk than a natural disaster? How shall we prioritize our preparations for a cyber disaster?

Online Voting
From Communications of the ACM

Online Voting: We Can Do It! (We Have To)

Seeking to make online voting more secure than today's flawed paper systems.

Internet Immunity and the Freedom to Code
From Communications of the ACM

Internet Immunity and the Freedom to Code

A call to preserve the capability of developing the next generation of Internet services.

Why Tech Will Never Be Able to Predict the Next Mass Shooting
From ACM Opinion

Why Tech Will Never Be Able to Predict the Next Mass Shooting

Following the horrific mass shootings in El Paso and Dayton last weekend, President Trump called on social media companies to develop tools that could help identify...

Western Academia Helps Build China's Automated Racism
From ACM Opinion

Western Academia Helps Build China's Automated Racism

Researchers in China are developing new and more invasive techniques to surveil the Uyghurs minority. Some of their work is being supported by academia in the West...

The Success of the Web
From Communications of the ACM

The Success of the Web: A Triumph of the Amateurs

Connecting the unique factors that influenced the origination and subsequent development of the World Wide Web.

Block-based Programming in Computer Science Education
From Communications of the ACM

Block-based Programming in Computer Science Education

Considering how block-based programming environments and tools might be used at the introductory level and beyond.

API Copyrights Revisited
From Communications of the ACM

API Copyrights Revisited

Deliberating on the main arguments in recent sets of briefs filed in support of Google's U.S. Supreme Court petition.

Who Benefits?
From Communications of the ACM

Who Benefits?

Considering the case of smart cities.

A New Labor Market for People with 'Coolabilities'
From Communications of the ACM

A New Labor Market for People with 'Coolabilities'

How the unique perspective and enhanced strengths accompanying disabilities can benefit the workforce.

GOTO Rankings Considered Helpful
From Communications of the ACM

GOTO Rankings Considered Helpful

Seeking to improve rankings by utilizing more objective data and meaningful metrics.

­Under Trump, The Fight Against Cybercrime Has Waned
From ACM Opinion

­Under Trump, The Fight Against Cybercrime Has Waned

The U.S. government is not doing enough to combat the burgeoning threat of cybercrime.

Personal Data and the Internet of Things
From Communications of the ACM

Personal Data and the Internet of Things

It is time to care about digital provenance.

An Interview with David Brin on Resiliency
From Communications of the ACM

An Interview with David Brin on Resiliency

Many risks of catastrophic failures of critical infrastructures can be significantly reduced by relatively simple measures to increase resiliency.

Through Computer Architecture, Darkly
From Communications of the ACM

Through Computer Architecture, Darkly

Total-system hardware and microarchitectural issues are becoming increasingly critical.

Global Data Justice
From Communications of the ACM

Global Data Justice

A new research challenge for computer science.

Encryption and Surveillance
From Communications of the ACM

Encryption and Surveillance

Why the law-enforcement access question will not just go away.

Enterprise Wi-Fi
From Communications of the ACM

Enterprise Wi-Fi: We Need Devices That Are Secure by Default

Seeking to increase awareness of WPA2 Enterprise network security technology flaws and reduce risk to users.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account