Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.Peter J. Denning, Dorothy E. Denning From Communications of the ACM | September 1, 2010
An overview of a new set of legal principles for software contracts developed by the American Law Institute.Robert A. Hillman, Maureen A. O'Rourke From Communications of the ACM | September 1, 2010
There's been quite a bit of head-scratching over Intel's decision to purchase McAfee, but, despite all the breathless talk about mobile security and ARM and virus...Ars Technica From ACM Opinion | August 23, 2010
Who has the right to decide what information should be kept secret? That's the vexatious question raised by WikiLeaks and its founder Julian Assange, who masterminded...New Scientist From ACM Opinion | August 16, 2010
Efforts to protect net neutrality that involve government regulation have always faced one fundamental obstacle: the substantial danger that the regulators will...Electronic Frontier Foundation From ACM Opinion | August 12, 2010
The world's largest technology company by revenue and the outfit that birthed Silicon Valley has very suddenly and unexpectedly put out a figurative "help wanted"...CNET From ACM Opinion | August 12, 2010
There's already debate about whether Wikileaks's release of 92,000 classified documents on the war in Afghanistan was more of a milestone in the annals of national...Technology Review From ACM Opinion | August 5, 2010
Should Pvt. Bradley Manning, the Army intelligence analyst charged with leaking troves of classified documents to WikiLeaks, be tried for treason? And what about...Slate From ACM Opinion | August 5, 2010
The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.Samir Chopra From Communications of the ACM | August 1, 2010
An assessment of the relative achievements in IT infrastructure, firms, and innovation in China.
Ping Gao, Jiang Yu From Communications of the ACM | August 1, 2010
Two concerns dominate the current debates over U.S. Internet policy: the relatively low level of U.S. broadband...Christopher S. Yoo From Communications of the ACM | August 1, 2010
Software is an integral component of a range of devices that perform critical, lifesaving functions and basic daily tasks. As patients grow more reliant on computerized...The Software Freedom Law Center From ACM Opinion | July 23, 2010
Let's assume for a moment that Google's collection of Wi-Fi "payload" data really was unintentional. And that Google never used the data, didn't even know it...Computerworld From ACM Opinion | July 22, 2010