acm-header
Sign In

Communications of the ACM

Recent Articles


Articles Interviews Vardi's Insights Chien's Vantage Opinion Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe Conversation
bg-corner

What Social Media Regulation Could Look Like
From ACM Opinion

What Social Media Regulation Could Look Like

Think of pipelines, not utilities.

How Ukraine Has Defended Itself against Cyber Attacks
From ACM Opinion

How Ukraine Has Defended Itself against Cyber Attacks

As in Ukraine, U.S. organizations should work with U.S. cybersecurity agencies to prepare for and prevent attacks.

Why the Prospect of the IRS Using Facial Recognition Is So Alarming
From ACM Opinion

Why the Prospect of the IRS Using Facial Recognition Is So Alarming

The U.S. government should put more care and due diligence into its use and advocacy of facial recognition technology

Cars Are Regulated for Safety, Why Not Information Technology?
From ACM Opinion

Cars Are Regulated for Safety, Why Not Information Technology?

As the computing industry grapples with its role in society, many people, both in the field and outside it, are talking about a crisis of ethics.

China Is Catching ­p to the ­S on Artificial Intelligence Research
From ACM News

China Is Catching ­p to the ­S on Artificial Intelligence Research

Researchers, companies and countries around the world are racing to explore—and exploit—the possibilities of artificial intelligence technology.

Don't Be Fooled by Fake Images and Videos Online
From ACM Opinion

Don't Be Fooled by Fake Images and Videos Online

One month before the 2016 U.S. presidential election, an "Access Hollywood" recording of Donald Trump was released in which he was heard lewdly talking about women...

People Don't Trust Blockchain Systems. Is Regulation a Way to Help?
From ACM Opinion

People Don't Trust Blockchain Systems. Is Regulation a Way to Help?

Blockchain technology isn't as widely used as it could be, largely because blockchain users don't trust each other, as research shows.

The Quiet Threat Inside 'Internet of Things' Devices
From ACM Opinion

The Quiet Threat Inside 'Internet of Things' Devices

As Americans increasingly buy and install smart devices in their homes, all those cheap interconnected devices create new security problems for individuals and...

Countering Russian Disinformation the Baltic Nations' Way
From ACM News

Countering Russian Disinformation the Baltic Nations' Way

As the new Congress begins, it will soon discuss the comprehensive reports to the U.S. Senate on the disinformation campaign of half-truths, outright fabrications...

Is Quantum Computing a Cybersecurity Threat?
From ACM Opinion

Is Quantum Computing a Cybersecurity Threat?

Cybersecurity researchers and analysts are rightly worried that a new type of computer, based on quantum physics rather than more standard electronics, could ...

Even a Few Bots Can Shift Public Opinion in Big Ways
From ACM Opinion

Even a Few Bots Can Shift Public Opinion in Big Ways

Nearly two-thirds of the social media bots with political activity on Twitter before the 2016 U.S. presidential election supported Donald Trump.

My Thoughts Are My Password, Because My Brain Reactions Are ­nique
From ACM Opinion

My Thoughts Are My Password, Because My Brain Reactions Are ­nique

Your brain is an inexhaustible source of secure passwords—but you might not have to remember anything. Passwords and PINs with letters and numbers are relatively...

50 Years Old, '2001: A Space Odyssey' Still Offers Insight about the Future
From ACM Opinion

50 Years Old, '2001: A Space Odyssey' Still Offers Insight about the Future

Watching a 50th anniversary screening of "2001: A Space Odyssey," I found myself, a mathematician and computer scientist whose research includes work related to...

Why the Russians Might Hack the Boy Scouts Next
From ACM Opinion

Why the Russians Might Hack the Boy Scouts Next

In the two years since Russia made headlines for targeting an American political organization–the Democratic National Committee–and undermining Hillary Clinton's...

Detecting 'DeepFake' Videos in the Blink of an Eye
From ACM Opinion

Detecting 'DeepFake' Videos in the Blink of an Eye

A new form of misinformation is poised to spread through online communities as the 2018 midterm election campaigns heat up. Called "deepfakes" after the pseudonymous...

Weaponized Information Seeks a New Target in Cyberspace: Users' Minds
From ACM Opinion

Weaponized Information Seeks a New Target in Cyberspace: Users' Minds

The Russian attacks on the 2016 U.S. presidential election and the country's continuing election-related hacking have happened across all three dimensions of cyberspace—physical...

Supreme Court Struggles to Define 'Searches' as Technology Changes
From ACM Opinion

Supreme Court Struggles to Define 'Searches' as Technology Changes

What the Fourth Amendment to the U.S. Constitution means when it protects citizens against an unreasonable search by government agents isn't entirely clear.

Microprocessor Designers Realize Security Must Be a Primary Concern
From ACM Opinion

Microprocessor Designers Realize Security Must Be a Primary Concern

Computers' amazing abilities to entertain people, help them work, and even respond to voice commands are, at their heart, the results of decades of technological...

Disrupting Pro-ISIS Online 'Ecosystems' Could Help Thwart Real-World Terrorism
From ACM Opinion

Disrupting Pro-ISIS Online 'Ecosystems' Could Help Thwart Real-World Terrorism

Supporters of the Islamic State, or ISIS, around the world gather online, becoming members of virtual communities in much the same way any of us might join online...

Connected Cars Can Lie, Posing a New Threat to Smart Cities
From ACM Opinion

Connected Cars Can Lie, Posing a New Threat to Smart Cities

The day when cars can talk to each other—and to traffic lights, stop signs, guardrails and even pavement markings—is rapidly approaching.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account