Skip to search results
Displaying 401-412 of 412 results for inside risks.
The U.S. Public Policy committee of ACM (USACM) is concerned the proposed Total Information Awareness (TIA) Program, sponsored by the Defense Advanced Research Projects Agency, will fail to achieve its stated goal of "countering terrorism through prevention." Further, we believe the vast amount of information and misinformation collected by any system resulting from this program […]
And how did some prominent journalists utterly miss this initially?
The Dark Side of the Sharing Economy . . . and How to Lighten It
Improving the sharing economy will require addressing myriad problems.
Hybrid systems enhance the capabilities of electronics with biologics.
Programmable Trap Can Kill Viruses
Computational genetic engineering has enabled a method of "trapping" and killing viruses.
Cloud computing offers many advantages, but also involves security risks. Fortunately, researchers are devising some ingenious solutions.
U.S. Does Not Control the Internet
In his editor's letter "The End of The American Network" (Nov. 2013), Moshe Y. Vardi made a startling statement that is untrue on several levels.
Cybersecurity in Industrial IoT: Protecting Critical Infrastructure
Today's IIoT environments demand sophisticated, multi-layered security strategies.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More