acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Informing California Privacy Regulations with Evidence from Research
From Communications of the ACM

Informing California Privacy Regulations with Evidence from Research

Designing and testing 'Do Not Sell My Personal Information' icons.

The Push for Stricter Rules for Internet Platforms
From Communications of the ACM

The Push for Stricter Rules for Internet Platforms

Considering the origins, interpretations, and possible changes to Communications Decency Act §230 amid an evolving online environment.

Let's Not Dumb Down the History of Computer Science
From Communications of the ACM

Let's Not Dumb Down the History of Computer Science

Donald Knuth on the best way to recognize the history of computer science.

Kabin Fever
From Communications of the ACM

Kabin Fever

KV's guidelines for KFH (koding from home).

When Permissioned Blockchains Deliver More Decentralization Than Permissionless
From Communications of the ACM

When Permissioned Blockchains Deliver More Decentralization Than Permissionless

Considerations for the governance of distributed systems.

Insights for AI from the Human Mind
From Communications of the ACM

Insights for AI from the Human Mind

How the cognitive sciences can inform the quest to build systems with the flexibility of the human mind.

The Immortal Soul of an Old Machine
From Communications of the ACM

The Immortal Soul of an Old Machine

Taking apart a book to figure out how it works.

Content Moderation Modulation
From Communications of the ACM

Content Moderation Modulation

Deliberating on how to regulate—or not regulate—online speech in the era of evolving social media.

Cybersecurity Research for the Future
From Communications of the ACM

Cybersecurity Research for the Future

Considering the wide range of technological and societal trade-offs associated with cybersecurity.

Federated Learning for Privacy-Preserving AI
From Communications of the ACM

Federated Learning for Privacy-Preserving AI

Engineering and algorithmic framework to ensure data privacy and user confidentiality.

Silicon Politics
From Communications of the ACM

Silicon Politics

Tracing the widening path between Silicon Valley and Washington, D.C.

Removing Kode
From Communications of the ACM

Removing Kode

Dead functions and dead features.

Navigating in Real-Time Environments
From Communications of the ACM

Navigating in Real-Time Environments

An interview with Jim Selman.

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education
From Communications of the ACM

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education

Incorporating equity and inclusion in the effort toward access for everyone.

Operationalizing AI Ethics Principles
From Communications of the ACM

Operationalizing AI Ethics Principles

A better ethics analysis guide for developers.

Where Should Your IT Constraint Be?
From Communications of the ACM

Where Should Your IT Constraint Be?: The Case of the Financial Services Industry

Locating the strategic location of the IT junction constraint.

Using Data and Respecting Users
From Communications of the ACM

Using Data and Respecting Users

Three technical and legal approaches that create value from data and foster user trust.

Copyright's Online Service Providers Safe Harbors Under Siege
From Communications of the ACM

Copyright's Online Service Providers Safe Harbors Under Siege

Reviewing the most significant changes recommended in the recently released U.S. Copyright Office Section 512 Study.

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic
From Communications of the ACM

Digital Contact Tracing May Protect Privacy, But It Is Unlikely to Stop the Pandemic

Considering the potential benefits versus the risks of privacy-enhancing technologies.

How Ransomware Puts Your Hospital at Risk
From ACM Opinion

How Ransomware Puts Your Hospital at Risk

In the midst of the Covid-19 pandemic, the potential consequences of cyberattacks are terrifying.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account