acm-header
Sign In

Communications of the ACM

BLOG@CACM


Refine your search:
dateMore Than a Year Ago
subjectHuman Computer Interaction
authorRobin K. Hill
bg-corner

Cook-Levin:  The Ugly Underbelly is Good for Us
From BLOG@CACM

Cook-Levin: The Ugly Underbelly is Good for Us

Don't just tell your students that SAT is NP-Complete; show why.

Chat Generative Pre-trained... Testimony
From BLOG@CACM

Chat Generative Pre-trained... Testimony

Questions about testimony as a means of knowledge acquisition may apply to AI chatbots.

Bigger than a Blackbox
From BLOG@CACM

Bigger than a Blackbox

When we ask how deep learning works, are we asking which node represents the answer to "animal, vegetable, or mineral?"

Pedagogical Paths Through Ethics
From BLOG@CACM

Pedagogical Paths Through Ethics

Concepts of ethics can be integrated into lessons that reflect contemporary concerns and involve student knowledge of modern technology.

Observation of Bias
From BLOG@CACM

Observation of Bias

It may not be that obvious, but it's observable.

Whence Machine Volition?
From BLOG@CACM

Whence Machine Volition?

How could a computer develop or even express volition?

Students Speak to Ethical Issues
From BLOG@CACM

Students Speak to Ethical Issues

What are the concerns of students after study of computer ethics?

Cryptocurs Don't Asportate
From BLOG@CACM

Cryptocurs Don't Asportate

Cryptocurrency on a blockchain cannot be stolen -- it's true.

Experiencing Loops in Time
From BLOG@CACM

Experiencing Loops in Time

We don't experience program loops as blocks, started over, because time is one-way.

Misnomer and Malgorithm
From BLOG@CACM

Misnomer and Malgorithm

The algorithm should be respected; the malgorithm should be rejected.

Deadlines of the Digital Turn
From BLOG@CACM

Deadlines of the Digital Turn

Sometimes the digital turn forces us to designate things that aren't there.

The Virus Analogy and Validation
From BLOG@CACM

The Virus Analogy and Validation

The comparison between organic viruses and computer viruses is compelling.  But why?

Voting as Tallying in Public
From BLOG@CACM

Voting as Tallying in Public

Voting requires common acknowledgement.  Can that be achieved in automation?

The Vote as a Declared Datum
From BLOG@CACM

The Vote as a Declared Datum

A vote is a datum that sheds its original identity but persists.

Variable Vagaries
From BLOG@CACM

Variable Vagaries

The variable, construed as an L-value, makes some offbeat appearances.

The Artificialistic Fallacy
From BLOG@CACM

The Artificialistic Fallacy

Ethics discussions of artificial intelligence reveal a fallacy of omission.

FictionStein
From BLOG@CACM

FictionStein

Science fiction like Frankenstein nudges readers to confer humanity but nudges them away from moral fortitude.

Tech U­ser Responsibility
From BLOG@CACM

Tech U­ser Responsibility

User support presents serious challenges that are aggravated by indeterminate client responsibility.

Articulation of Decision Responsibility
From BLOG@CACM

Articulation of Decision Responsibility

Can we establish a locution for the results of a program that does not ascribe decision-making power?

Tech Ethics at Work
From BLOG@CACM

Tech Ethics at Work

Ethics for Tech must address how professional issues play out in the workplace, in real life.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account