Sign In

Communications of the ACM

Recent Opinion



Autonomous Vehicle Safety
From Communications of the ACM

Autonomous Vehicle Safety: Lessons from Aviation

How more than 25years of experience with aviation safety-critical systems can be applied to autonomous vehicle systems.

A Recent Renaissance in Privacy Law
From Communications of the ACM

A Recent Renaissance in Privacy Law

Considering the recent increased attention to privacy law issues amid the typically slow pace of legal change.

TECHNOLOchicas
From Communications of the ACM

TECHNOLOchicas: A Critical Intersectional Approach Shaping the Color of Our Future

A unique partnership seeks to address the underrepresentation and unique barriers facing Latina women and girls of color in information technology.

Data-Centricity
From Communications of the ACM

Data-Centricity: A Challenge and Opportunity for Computing Education

Rethinking the content of introductory computing around a data-centric approach to better engage and support a diversity of students.

OMSCS
From Communications of the ACM

OMSCS: The Revolution Will Be Digitized

Lessons learned from the first five years of Georgia Tech's Online Master of Science in Computer Science program.

Who’s Behind Wednesday’s Epic Twitter Hack?
From ACM Opinion

Who’s Behind Wednesday’s Epic Twitter Hack?

This post is an attempt to lay out some of the timeline of the attack, and point to clues about who may have been behind it.

Formal Methods as a Path to Better Cybersecurity
From ACM Opinion

Formal Methods as a Path to Better Cybersecurity

Any piece of software should be able to provide the desired features, and when errors do occur, the software should handle them gracefully.

AI Authorship?
From Communications of the ACM

AI Authorship?

Considering the role of humans in copyright protection of outputs produced by artificial intelligence.

The Cyberwar Needs More Women on the Front Lines
From ACM Opinion

The Cyberwar Needs More Women on the Front Lines

Educating girls to be the cybersecurity leaders of tomorrow will help combat criminals who prey on women and children.

A Case for Banning Facial Recognition
From ACM Opinion

A Case for Banning Facial Recognition

A Google research scientist explains why she thinks the police shouldn't use facial recognition software.

A Case for Banning Facial Recognition
From ACM Opinion

A Case for Banning Facial Recognition

A Google research scientist explains why she thinks the police shouldn't use facial recognition software.

How to Curtail Oversensing in the Home
From Communications of the ACM

How to Curtail Oversensing in the Home

Limiting sensitive information leakage via smart-home sensor data.

Why Is Facebook So Afraid of Checking Facts?
From ACM Opinion

Why Is Facebook So Afraid of Checking Facts?

The biggest social network in the world has the wrong idea for how to fight Covid-19 conspiracies.

What Role for Antitrust in Regulating Platforms?
From Communications of the ACM

What Role for Antitrust in Regulating Platforms?

Using regulation to protect competition and innovation.

Secure Development Tools and Techniques Need More Research That Will Increase Their Impact and Effectiveness in Practice
From Communications of the ACM

Secure Development Tools and Techniques Need More Research That Will Increase Their Impact and Effectiveness in Practice

Secure development is an important and pressing problem.

A Vision of K-12 Computer Science Education for 2030
From Communications of the ACM

A Vision of K-12 Computer Science Education for 2030

Exploring goals, perspectives, and challenges.

A Taxonomy of Automated Assistants
From Communications of the ACM

A Taxonomy of Automated Assistants

Rating your intelligent (human or automated) assistant.

Organizing Family Support Services at ACM Conferences
From Communications of the ACM

Organizing Family Support Services at ACM Conferences

Seeking to improve access to conferences and provide support for attendees with children.

Why Is Cybersecurity Not a Human-Scale Problem Anymore?
From Communications of the ACM

Why Is Cybersecurity Not a Human-Scale Problem Anymore?

Examining the structure of the enterprise attack surface in view of the relative ease with which cyberdefenses can be subverted.

Master of Tickets
From Communications of the ACM

Master of Tickets

Valuing the quality, not the quantity, of work.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account