Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.John Arquilla From BLOG@CACM | August 2, 2016 at 09:53 AM
The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.David Jefferson and Barbara Simons From BLOG@CACM | February 24, 2016 at 09:29 AM
Efforts to understand how advanced information technologies will affect future conflicts seem to be missing, or are taking place far from the public eye.John Arquilla From BLOG@CACM | January 15, 2016 at 04:00 PM
The potential for a Sino-American cyber arms control agreement is intriguing, despite three very troubling flaws.
John Arquilla From BLOG@CACM | October 2, 2015 at 10:21 AM
Summer reading recommendations for computer scientists, courtesy of the SIGCSE 2015 Using Science Fiction in CS Courses BOF.
Joel C. Adams From BLOG@CACM | July 2, 2015 at 11:43 AM
Considering Russia's alleged involvement in international cyber incidents, and its willingness to stop them.John Arquilla From BLOG@CACM | June 3, 2015 at 12:42 PM
An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being used.Duncan A. Buell From BLOG@CACM | April 2, 2015 at 03:34 PM
Why is our community having such an anemic response to all of these major data breaches? What can we do differently? What should we be doing differently?Jason Hong From BLOG@CACM | December 11, 2014 at 09:57 AM
Often, you will be told programming languages do not matter much. It is a pretty general rule that people arguing language does not matter are simply trying...Bertrand Meyer From BLOG@CACM | April 15, 2014 at 08:58 PM
I have been wearing Google Glass as both a technical assessment of utility and as a social study in human dynamics and expectations.Daniel Reed From BLOG@CACM | March 17, 2014 at 12:48 PM
Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...Jason Hong From BLOG@CACM | August 26, 2013 at 10:28 AM
The overwhelming secrecy surrounding seizures conducted under Operation in Our Sites is inexplicable.
Katie Fourmy From BLOG@CACM | June 25, 2013 at 12:00 PM
There is a growing tension between consumers and content companies when it comes to the manner in which content is purchased and what consumers expect to be able...Andrew Degner From BLOG@CACM | June 25, 2013 at 10:24 AM
While we have heard from two representatives from the EU on privacy, no one from the US government will join us for the first panel.
Katie Fourmy From BLOG@CACM | June 25, 2013 at 02:28 PM