acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

When Gps Tracking Violates Privacy Rights

For the right to personal privacy to survive in America in this digital age, courts must be meticulous in applying longstanding privacy protections to new technology...

From ACM Opinion

A New Kind of Warfare

Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals, and foreign governments,...

From ACM Opinion

Apple Case Muddies the Future of Innovations

Apple's victory on Friday in a patent lawsuit against Samsung could, if upheld, give its rivals a kick in the pants to create more original products.

Giving In to the Surveillance State
From ACM Opinion

Giving In to the Surveillance State

In March 2002, John M. Poindexter, a former national security adviser to President Ronald Reagan, sat down with Gen. Michael V. Hayden, the director of the National...

Why Apple Might Be Better Off Losing Its Patent Lawsuit
From ACM Opinion

Why Apple Might Be Better Off Losing Its Patent Lawsuit

Could it be in Apple’s self-interest to lose its bitter court battle with Samsung?

Trust: Ill-Advised in a Digital Age
From ACM Opinion

Trust: Ill-Advised in a Digital Age

Bruce Schneieer ordered a Coke, no ice, at the Rio casino on a Saturday afternoon. I ordered Diet Coke, also no ice, and handed the bartender an American Express...

The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

From ACM Opinion

The Public Is Left in the Dark When Courts Allow Electronic Surveillance

A big part of Magistrate Judge Stephen W. Smith's job in Federal District Court in Houston is to consider law enforcement requests for cellphone and email records...

From ACM Opinion

The End of Privacy?

Cellphones, email, and online social networking have come to rule daily life, but Congress has done nothing to update federal privacy laws to better protect digital...

A Weapon We Can't Control
From ACM Opinion

A Weapon We Can't Control

The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush's presidency...

Free Speech For Computers?
From ACM Opinion

Free Speech For Computers?

Do machines speak? If so, do they have a constitutional right to free speech?

Why Attack When We Can't Defend?
From ACM Opinion

Why Attack When We Can't Defend?

In December 2010, after we had reverse engineered the Stuxnet virus, I argued that the attackers must have known they would open Pandora's box. Others suggested...

From ACM Opinion

Facebook's Brilliant Disaster

So I guess you've heard about the recent initial public offering that didn't turn out the way it was supposed to. The company's Wall Street advisers misjudged the...

Following the Breadcrumbs on the Data-Sharing Trail
From ACM Opinion

Following the Breadcrumbs on the Data-Sharing Trail

Would you like to donate to the Obama campaign? Sign up for a college course? Or maybe subscribe to Architectural Digest? 

God and Man in Tennessee
From ACM Opinion

God and Man in Tennessee

Earlier this month state senators in Tennessee approved an update to our sex-education law that would ban teachers from discussing hand-holding, which it categorizes...

Don't Be Evil, but Don't Miss the Train
From ACM Opinion

Don't Be Evil, but Don't Miss the Train

Back in 2004, as Google prepared to go public, Larry Page and Sergey Brin celebrated the maxim that was supposed to define their company: "Don’t be evil."

From ACM Opinion

From the Birthplace of Big Brother

The George W. Bush team must be consumed with envy. Britain's government is preparing sweeping new legislation that would let the country's domestic intelligence...

How China Steals Our Secrets
From ACM Opinion

How China Steals Our Secrets

For the last two months, senior government officials and private-sector experts have paraded before Congress and described in alarming terms a silent threat: cyberattacks...

Tv Makers Ignore Apps at Their Own Peril
From ACM Opinion

Tv Makers Ignore Apps at Their Own Peril

Every night, I get home from work, drop onto the couch and sit there surfing the Web or watching videos on my 3 1/2-inch iPhone screen. My big-screen HDTV sits...

A High-Tech War on Leaks
From ACM Opinion

A High-Tech War on Leaks

Back in 2006, before the Obama administration made leak prosecutions routine, a panel of three federal appeals court judges in New York struggled to decide whether...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account