acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Privacy in the Age of AI
From Communications of the ACM

Privacy in the Age of AI

What has changed and what should we do about it?

New Threats to Society from Free-Speech Social Media Platforms
From Communications of the ACM

New Threats to Society from Free-Speech Social Media Platforms

Understanding emerging threats from social media platforms.

Stone Knives and Bear Skins
From Communications of the ACM

Stone Knives and Bear Skins

There is no money in tools.

Certification of Safety-Critical Systems
From Communications of the ACM

Certification of Safety-Critical Systems

Seeking new approaches toward ensuring the safety of software-intensive systems.

Coming of Age
From Communications of the ACM

Coming of Age

Stressing the importance of threat models.

The Smallness of Large Language Models
From Communications of the ACM

The Smallness of Large Language Models

There is so much more to language and human beings than large language models can possibly master.

Francis Enyi on Bridging the Healthcare Deficit in Africa
From ACM Opinion

Francis Enyi on Bridging the Healthcare Deficit in Africa

Francis Enyi, a senior program analyst with Delta State University Teaching Hospital in Nigeri, discusses how his team of software developers, medical personnel...

The Human Touch
From Communications of the ACM

The Human Touch

There is no substitute for good, direct, honest training.

SI and Binary Prefixes: Clearing the Confusion
From Communications of the ACM

SI and Binary Prefixes: Clearing the Confusion

Considering the emergence of non-standard acceptance of SI prefixes.

For a More Transparent Governance of Open Source
From Communications of the ACM

For a More Transparent Governance of Open Source

Seeking the best governance models for FOSS projects.

Learning to Live with Privacy-Preserving Analytics
From Communications of the ACM

Learning to Live with Privacy-Preserving Analytics

Seeking to close the gap between research and real-world applications of PPAs.

Lost in Afghanistan: Can the World Take ICT4D Seriously?
From Communications of the ACM

Lost in Afghanistan: Can the World Take ICT4D Seriously?

Seeking to maximize the value of information and communication technologies for development research.

Can Generative AI Bots Be Trusted?
From Communications of the ACM

Can Generative AI Bots Be Trusted?

It will be a long road to learning how to use generative AI wisely.

The Parchment Path?
From Communications of the ACM

The Parchment Path?

Is there ever a time when learning is not of value—for its own sake?

Conjoined Twins: Artificial Intelligence and the Invention of Computer Science
From Communications of the ACM

Conjoined Twins: Artificial Intelligence and the Invention of Computer Science

How artificial intelligence and computer science grew up together.

Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society
From Communications of the ACM

Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society

Searching for improved algorithmic accountability.

Decentraland: The Alleged Decentralization of Blockchain Applications
From Communications of the ACM

Decentraland: The Alleged Decentralization of Blockchain Applications

Breaking down the blockchain.

When AI Thinks You Are Dead
From ACM Opinion

When AI Thinks You Are Dead

AI hallucinations can be amusing, but the consequences for society could be dangerous.

Why Conscious AI Is a Bad Idea
From ACM Opinion

Why Conscious AI Is a Bad Idea

Our minds have not evolved to deal with machines we believe have consciousness.

You Can't Regulate What You Don't Understand
From ACM Opinion

You Can't Regulate What You Don't Understand

Why AI regulations should begin with mandated disclosures.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account