Millennials’ Attitudes Toward It Consumerization in the Workplace
The Myths and Truths of Wireless Security
Far-Sighted Thinking About Deleterious Computer-Related Events
Understanding the Dynamics of Information Management Costs
Trustworthy Hardware from Untrusted Components
Trusting Technology: Introduction
Investigating Sophisticated Security Breaches
The Value of Seller Trustworthiness in C2c Online Markets
Why File Sharing Networks Are Dangerous?
RFID Enhances Visitors’ Museum Experience at the Exploratorium
Unlocking Data to Improve Public Policy
Risks and Myths of Cloud Computing and Cloud Storage
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More