The global impact of computing and information technology has never been clearer than it is now as the world continues its efforts to slow the COVID-19 pandemic.
Cherri M. Pancake Page 5DEPARTMENT: Departments
Myriad organizations work to increase the number of women in the technology sector. Are we possibly reducing our collective impact because we are sometimes competing rather than cooperating for funding and volunteer effort?
Jodi Tims Page 7
Computer science has yet to internalize the idea that resilience, which to me includes fault tolerance, security, and more, must be pushed down to the algorithmic level.
Moshe Y. Vardi Page 9DEPARTMENT: ACM's election
Meet the candidates who introduce their plans—and stands—for the Association. Please take this opportunity to vote.
Gerald Segal Pages 11-21DEPARTMENT: Departments
Communications is launching a new series of articles that broaden our presentation of the computing profession, with a particular focus on a young professional audience and a breadth of career paths.
Andrew A. Chien Page 22
Using machine learning, I'm able to reduce the time required for designing products from months to mere hours as well as free up time for engineers to focus on design in terms of functions, behaviors, and structures.
Arquimedes Canedo Page 23DEPARTMENT: BLOG@CACM
Mark Guzdial on a book that changed his thinking about teaching computer science, and Jiajie Zhang on the AI Revolution.
Mark Guzdial, Jiajie Zhang Pages 24-25COLUMN: News
The social media platforms like their freedom, but information gerrymandering may require legislation to fix.
Keith Kirkpatrick Pages 33-35COLUMN: Law and technology
A detailed picture of financial information relating to ACM's publications revenues and expenses.
Jack W. Davidson, Joseph A. Konstan, Scott E. Delman Pages 53-57SECTION: Practice
Identifying female CS scientists by combining a robust bibliographic database and name filtering tools.
Sandra Mattauch, Katja Lohmann, Frank Hannig, Daniel Lohmann, JÜrgen Teich Pages 74-80SECTION: Review articles
A group of industry, academic, and government experts convene in Philadelphia to explore the roots of algorithmic bias.
Alexandra Chouldechova, Aaron Roth Pages 82-89
Diverse examples depict how indistinguishability plays a central role in computer science.
Hagit Attiya, Sergio Rajsbaum Pages 90-99SECTION: Research highlights
"Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks," by Shehroze Farooqi et al., explores a social-networking reputation manipulation ecosystem.
Geoffrey M. Voelker Page 102
We carried out a comprehensive measurement study to understand how collusion networks exploited popular third-party Facebook applications with weak security settings to retrieve OAuth access tokens.
Shehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq Pages 103-111COLUMN: Last byte