Legal troubles represent another collection of potential pitfalls where developers often find themselves unprepared.
Doug Meil From BLOG@CACM | January 3, 2022 at 12:56 PM
Artificial intelligence is coming to your learners and will raise challenging issues that need experts like you. Learn how you can get involved in AI and Educational...Leah Friedman, Nancye Blair Black, Erin Walker, and Jeremy Roschelle From BLOG@CACM | November 8, 2021 at 09:51 AM
The recent release of the Facebook papers by a whistleblower has confirmed that leaders at the company have long known about problems facilitated by their social...Jason Hong From BLOG@CACM | November 12, 2021 at 12:35 PM
Up to the second half of the 19th century —with the exception of the industrial power Great Britain—the protection of inventions was inadequate and strongly disputed...Herbert Bruderer From BLOG@CACM | November 8, 2021 at 09:54 AM
How do we build trust? How can we systematically assure trust in our systems? How would auditing AI and autonomous systems contribute to this goal?
Explaining...Ryan Carrier From BLOG@CACM | February 1, 2021 at 04:55 PM
The hack of critical departments of the U.S. government—and of many leading corporations—should come as no surprise.
John Arquilla From BLOG@CACM | December 21, 2020 at 02:13 PM
One of the key drivers for the decision to lockdown the U.K. in late March 2020 was a computational epidemiological model developed at Imperial College, London....Michael Wooldridge From BLOG@CACM | July 31, 2020 at 09:34 AM
Does the trolley problem offer any useful insights for autonomous vehicles, in terms of design of or public policy around these systems? Here are several reasons...Jason Hong From BLOG@CACM | May 2, 2019 at 02:20 PM
There are two ways to proceed with political discourse in cyberspace, if the trolls are to be tamed.
John Arquilla From BLOG@CACM | March 19, 2019 at 09:30 AM
Why is privacy so hard? Why is it, after so much negative press about it, are we still being constantly tracked on the web and on our smartphones? Why is it, after...Jason Hong From BLOG@CACM | March 13, 2019 at 02:52 PM
If a student's program goes awry, who is responsible? How do we protect society and encourage people to learn about code?
Mark Guzdial From BLOG@CACM | January 6, 2019 at 01:08 PM
James Bond-like spies have been eclipsed by a new generation of operatives who don't travel the world (not physically, anyway) or drink martinis, shaken or stirred...John Arquilla From BLOG@CACM | June 18, 2018 at 09:54 AM
Can we establish a locution for the results of a program that does not ascribe decision-making power?
Robin K. Hill From BLOG@CACM | May 21, 2018 at 11:12 AM
Election systems are supposed to be disconnected from the Internet, for obvious and sensible reasons. Most elections today, however, use computers.
Duncan Buell From BLOG@CACM | March 27, 2018 at 09:22 AM
Reacting to the U.S. Nuclear Posture Review, which now tries to extend nuclear deterrence to cyberspace.
John Arquilla From BLOG@CACM | February 23, 2018 at 03:24 PM
Cyberwar is not simply a lineal descendant of strategic air power; rather, it is the next face of battle.
John Arquilla From BLOG@CACM | September 25, 2017 at 11:43 AM