acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Massive Retaliation 2.0
From BLOG@CACM

Massive Retaliation 2.0

Reacting to the U.S. Nuclear Posture Review, which now tries to extend nuclear deterrence to cyberspace.

The Rise of Strategic Cyberwar?
From BLOG@CACM

The Rise of Strategic Cyberwar?

Cyberwar is not simply a lineal descendant of strategic air power; rather, it is the next face of battle.

Toward Oversight, and More Debate, of Cyber Weaponry
From BLOG@CACM

Toward Oversight, and More Debate, of Cyber Weaponry

Policies and strategies that may lead to or initiate acts of cyberwar should be subject to scrutiny. 

Ethical Theories Spotted in Silicon Valley
From BLOG@CACM

Ethical Theories Spotted in Silicon Valley

Some of the prevailing theories of ethics surface in modern high tech.  We take a quick and rather superficial look at their tracks on the ground, noting especially...

Just Press Reboot
From BLOG@CACM

Just Press Reboot

Why does the press continue to talk about "computer problems"?

Fact Versus Frivolity in Facebook
From BLOG@CACM

Fact Versus Frivolity in Facebook

Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.

ACM's Open-Conference Principle and Political Reality
From BLOG@CACM

ACM's Open-Conference Principle and Political Reality

The Open-Conference Principle is aimed at benefiting society.

The Real Lesson of the Alleged Russian Hack
From BLOG@CACM

The Real Lesson of the Alleged Russian Hack

Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...

What Happened?
From BLOG@CACM

What Happened?

As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.

Is Academia Guilty of Intellectual Colonization of Practice?
From BLOG@CACM

Is Academia Guilty of Intellectual Colonization of Practice?

Researchers should not treat practitioners as mere objects of their studies or simple sources of data, but work towards creating research partnerships with practitioners...

Stop Trying to Deter Cyberattacks
From BLOG@CACM

Stop Trying to Deter Cyberattacks

Whither cyber deterrence? In my view, let it wither.

A Presidential Policy Directive With Little Direction
From BLOG@CACM

A Presidential Policy Directive With Little Direction

Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.

Making the World Fair and Just
From BLOG@CACM

Making the World Fair and Just

Wendy Powley and Gloria Childress Townsend report on the National Center for Women & IT Annual Summit, themed "making the world fair and just."  

California's Internet Voting Initiatives
From BLOG@CACM

California's Internet Voting Initiatives

The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.

State of the States: Progress Toward CS For All
From BLOG@CACM

State of the States: Progress Toward CS For All

Achieving the President's goal of CS for All requires change at the local level. Here's the current state of the states.

Toward a Discourse on Cyber Strategy
From BLOG@CACM

Toward a Discourse on Cyber Strategy

Efforts to understand how advanced information technologies will affect future conflicts seem to be missing, or are taking place far from the public eye.

A Farewell to (Virtual) Arms?
From BLOG@CACM

A Farewell to (Virtual) Arms?

The potential for a Sino-American cyber arms control agreement is intriguing, despite three very troubling flaws.

The Ethics of Cyberwar
From BLOG@CACM

The Ethics of Cyberwar

Under what conditions should one engage in cyberwar? How should such a conflict be waged?

Meet A.I. Joe
From BLOG@CACM

Meet A.I. Joe

In the 70 years since the end of World War II, AI has advanced enormously, and the military has continued to show a steady appetite for acquiring lethal robots....

Computer Security and the Risks of Online Voting
From BLOG@CACM

Computer Security and the Risks of Online Voting

An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being used.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account