A regional Grace Hopper Celebration event this week focused on "advancing a gender diverse technology workforce in New York."Lawrence M. Fisher From ACM News | March 20, 2015 at 10:41 AM
There is tremendous value to society in doing large-scale A/B studies, and the current framework we have for human subjects research is a poor match for the 21st...Jason Hong From BLOG@CACM | July 20, 2014 at 08:47 AM
We are not ready to make CS a requirement for all children in the U.S., even if that's where we want to be one day.Mark Guzdial From BLOG@CACM | April 15, 2014 at 12:43 PM
A summit of legislators, business leaders, officials from the Department of Education, and teachers convenes in South Carolina to advance computing education in...Mark Guzdial From BLOG@CACM | November 20, 2013 at 08:50 AM
All large, multinational companies that depend on their intellectual prowess are able to avoid most taxation. Two factors enable the trend: first intellectual property...Gio Wiederhold From BLOG@CACM | November 10, 2013 at 10:12 AM
Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...Jason Hong From BLOG@CACM | August 26, 2013 at 10:28 AM
Why does this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?Jason Hong From BLOG@CACM | February 17, 2012 at 02:23 PM
Computing is central to the debate about so many aspects of our present and future that we have a duty and responsibility to be active and enthusiastic participants...Daniel Reed From BLOG@CACM | February 10, 2012 at 10:56 AM
How do we cross the intellectual divide, providing technical advice to policy experts in ways that they find useful and actionable? Equally importantly, how do...Daniel Reed From BLOG@CACM | June 30, 2011 at 01:02 PM
That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...Daniel Reed From BLOG@CACM | May 11, 2011 at 12:46 PM
We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...Jason Hong From BLOG@CACM | April 27, 2011 at 12:50 PM
An iconic cartoon by Peter Steiner, which appeared in The New Yorker in 1993, captured the nature of the nascent Internet. It shows a dog seated at a computer,...Daniel Reed From BLOG@CACM | August 8, 2010 at 05:04 PM
One of the goals of this years Computers Freedom and Privacy conference is to ask the question, "Can we be 'smart' and private?" Wednesday's panel onIntellegent...Katy Nelson From BLOG@CACM | June 16, 2010 at 10:11 AM
Our panel at CFP will explore how robotics implicates civil liberties today, and in the near term. We will discuss issues from the ethical ramifications of robots...Ryan Calo From BLOG@CACM | June 10, 2010 at 04:51 PM
At Privacy Rights Clearinghouse, we receive phone calls and emails about online information brokers almost daily. The individuals who contact us are often those...Beth Givens From BLOG@CACM | June 1, 2010 at 03:55 PM
As robots become woven into the fabric of daily life, what ethical issues will the world face?Erika S. Poole From BLOG@CACM | April 16, 2010 at 05:33 PM
What does it take for people to collaborate in spite of geographical, disciplinary and cultural differences? This article looks at the work of two researchers...Erika S. Poole From BLOG@CACM | February 11, 2010 at 10:16 AM
Data mining researchers, application builders, and social scientists want to collect and analyze data about your activities online. But when do we cross the line...Michael Bernstein From BLOG@CACM | February 9, 2010 at 11:17 AM