acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective
From Communications of the ACM

Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective

Why disinformation is a cyber threat.

Dear Diary
From Communications of the ACM

Dear Diary

On keeping a laboratory notebook.

Toward a Solid Acceptance of the Decentralized Web of Personal Data: Societal and Technological Convergence
From Communications of the ACM

Toward a Solid Acceptance of the Decentralized Web of Personal Data: Societal and Technological Convergence

Giving individuals more control of their personal data.

The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers
From Communications of the ACM

The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers

Seeking more secure and effective digital representations.

Halfway Around the World
From Communications of the ACM

Halfway Around the World

Learn the language, meet the people, eat the food.

A Strategy for Scaling Advanced Analytics
From Communications of the ACM

A Strategy for Scaling Advanced Analytics

Key elements for scaling advanced analytics.

Privacy in the Age of AI
From Communications of the ACM

Privacy in the Age of AI

What has changed and what should we do about it?

New Threats to Society from Free-Speech Social Media Platforms
From Communications of the ACM

New Threats to Society from Free-Speech Social Media Platforms

Understanding emerging threats from social media platforms.

Stone Knives and Bear Skins
From Communications of the ACM

Stone Knives and Bear Skins

There is no money in tools.

Certification of Safety-Critical Systems
From Communications of the ACM

Certification of Safety-Critical Systems

Seeking new approaches toward ensuring the safety of software-intensive systems.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account