acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Quantum Computing Pioneer Warns of Complacency over Internet Security
From ACM Opinion

Quantum Computing Pioneer Warns of Complacency over Internet Security

Nature talks to Peter Shor 25 years after he showed how to make quantum computations feasible — and how they could endanger our data.

It Is Time for More Critical CS Education
From Communications of the ACM

It Is Time for More Critical CS Education

By which 'critical' means an intellectual stance of skepticism, centering the consequences, limitations, and unjust impacts of computing in society.

Copyright's Online Service Providers Safe Harbors Under Siege
From Communications of the ACM

Copyright's Online Service Providers Safe Harbors Under Siege

Reviewing the most significant changes recommended in the recently released U.S. Copyright Office Section 512 Study.

How Ransomware Puts Your Hospital at Risk
From ACM Opinion

How Ransomware Puts Your Hospital at Risk

In the midst of the Covid-19 pandemic, the potential consequences of cyberattacks are terrifying.

Just What Cyber Security Executives Don’t Want to Hear: The Skills Shortage is Worsening
From ACM Opinion

Just What Cyber Security Executives Don’t Want to Hear: The Skills Shortage is Worsening

The cyber security skills gap continues to get worse, according to the latest research.

We Need to Automate the Declaration of <i>Conflicts of Interest</i>
From Communications of the ACM

We Need to Automate the Declaration of Conflicts of Interest

Leveraging existing data sources to improve the declaration and management of authorship conflicts of interest.

Using Computer Programs and Search Problems for Teaching Theory of Computation
From Communications of the ACM

Using Computer Programs and Search Problems for Teaching Theory of Computation

Recognizing the significance of a cornerstone of computer science.

Autonomous Vehicle Safety
From Communications of the ACM

Autonomous Vehicle Safety: Lessons from Aviation

How more than 25years of experience with aviation safety-critical systems can be applied to autonomous vehicle systems.

A Recent Renaissance in Privacy Law
From Communications of the ACM

A Recent Renaissance in Privacy Law

Considering the recent increased attention to privacy law issues amid the typically slow pace of legal change.

TECHNOLOchicas
From Communications of the ACM

TECHNOLOchicas: A Critical Intersectional Approach Shaping the Color of Our Future

A unique partnership seeks to address the underrepresentation and unique barriers facing Latina women and girls of color in information technology.

Data-Centricity
From Communications of the ACM

Data-Centricity: A Challenge and Opportunity for Computing Education

Rethinking the content of introductory computing around a data-centric approach to better engage and support a diversity of students.

OMSCS
From Communications of the ACM

OMSCS: The Revolution Will Be Digitized

Lessons learned from the first five years of Georgia Tech's Online Master of Science in Computer Science program.

Who&#8217;s Behind Wednesday&#8217;s Epic Twitter Hack?
From ACM Opinion

Who’s Behind Wednesday’s Epic Twitter Hack?

This post is an attempt to lay out some of the timeline of the attack, and point to clues about who may have been behind it.

Formal Methods as a Path to Better Cybersecurity
From ACM Opinion

Formal Methods as a Path to Better Cybersecurity

Any piece of software should be able to provide the desired features, and when errors do occur, the software should handle them gracefully.

AI Authorship?
From Communications of the ACM

AI Authorship?

Considering the role of humans in copyright protection of outputs produced by artificial intelligence.

The Cyberwar Needs More Women on the Front Lines
From ACM Opinion

The Cyberwar Needs More Women on the Front Lines

Educating girls to be the cybersecurity leaders of tomorrow will help combat criminals who prey on women and children.

A Case for Banning Facial Recognition
From ACM Opinion

A Case for Banning Facial Recognition

A Google research scientist explains why she thinks the police shouldn't use facial recognition software.

How to Curtail Oversensing in the Home
From Communications of the ACM

How to Curtail Oversensing in the Home

Limiting sensitive information leakage via smart-home sensor data.

Why Is Facebook So Afraid of Checking Facts?
From ACM Opinion

Why Is Facebook So Afraid of Checking Facts?

The biggest social network in the world has the wrong idea for how to fight Covid-19 conspiracies.

What Role for Antitrust in Regulating Platforms?
From Communications of the ACM

What Role for Antitrust in Regulating Platforms?

Using regulation to protect competition and innovation.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account