acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

The Virus Analogy and Validation
From BLOG@CACM

The Virus Analogy and Validation

The comparison between organic viruses and computer viruses is compelling.  But why?

Voting as Tallying in Public
From BLOG@CACM

Voting as Tallying in Public

Voting requires common acknowledgement.  Can that be achieved in automation?

The Vote as a Declared Datum
From BLOG@CACM

The Vote as a Declared Datum

A vote is a datum that sheds its original identity but persists.

Voting, Coding, and the Code
From BLOG@CACM

Voting, Coding, and the Code

Voting is more than counting.

Vice Epistemology of the Internet
From BLOG@CACM

Vice Epistemology of the Internet

How can we apply virtue epistemology to the problem of fake news?

Lessons from a First-Year Seminar
From BLOG@CACM

Lessons from a First-Year Seminar

Teaching a first-year seminar to a mixed group musters the basics of computer science.

Variable Vagaries
From BLOG@CACM

Variable Vagaries

The variable, construed as an L-value, makes some offbeat appearances.

The Artificialistic Fallacy
From BLOG@CACM

The Artificialistic Fallacy

Ethics discussions of artificial intelligence reveal a fallacy of omission.

What Is a Variable?
From BLOG@CACM

What Is a Variable?

A stab at a definition, for outsiders, of what we in computing mean by the term "variable" raises more questions than it answers.

FictionStein
From BLOG@CACM

FictionStein

Science fiction like Frankenstein nudges readers to confer humanity but nudges them away from moral fortitude.

Tech U­ser Responsibility
From BLOG@CACM

Tech U­ser Responsibility

User support presents serious challenges that are aggravated by indeterminate client responsibility.

First-Class Philosophical Failure
From BLOG@CACM

First-Class Philosophical Failure

Interrogation of "first-class object" as an analog to human life goes nowhere.

Articulation of Decision Responsibility
From BLOG@CACM

Articulation of Decision Responsibility

Can we establish a locution for the results of a program that does not ascribe decision-making power?

Examples of Phenomenology in Computing
From BLOG@CACM

Examples of Phenomenology in Computing

The branch of philosophy known as phenomenology can broaden our understanding of what is really going on in the tasks we address with computing.

Tech Ethics at Work
From BLOG@CACM

Tech Ethics at Work

Ethics for Tech must address how professional issues play out in the workplace, in real life.

Human Acts and Computer Apps
From BLOG@CACM

Human Acts and Computer Apps

Our behaviors often seem to mimic the procedures that we induce in computers. What questions does that raise?

It's Not the 'Why' Chromosome, It's the 'How'
From BLOG@CACM

It's Not the 'Why' Chromosome, It's the 'How'

Women do like the raw technical aspects of computer science.

On the Ethics of Cyberwar
From BLOG@CACM

On the Ethics of Cyberwar

Keith Abney of the Ethics + Emerging Sciences group of California Polytechnic State University surveys the moral landscape of cyberwar.

Deep Dictionary
From BLOG@CACM

Deep Dictionary

The abstraction from big data on English words of distributed vector representations computing simple semantic aspects has drawn interest from the computing community...

The Ethical Problem of Software Neglect
From BLOG@CACM

The Ethical Problem of Software Neglect

We call the problem of mediocre sofware "neglect," and we pitch it in ethical terms by noting that it illustrates a failure of the ethics of care.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account