A new organization is being proposed that is solely intended to promote and recognize the ethical and moral behavior in graduates of computing-related degree programs...John K. Estell, Ken Christensen From Communications of the ACM | February 1, 2011
In January 1986, Basit and Amjad Alvi, sibling programmers living near the main train station in Lahore, Pakistan, wrote a piece of code to safeguard the latest...The New York Times From ACM Opinion | January 28, 2011
A series of recent reports claim the U.S. education system is in a very severe crisis; others suggest the crisis is...Mark Guzdial From Communications of the ACM | February 1, 2011
Revisiting the need to educate professionals to defend against malware in its various guises.George Ledin From Communications of the ACM | February 1, 2011
How much are consumers willing to pay for broadband service? Our research estimates consumer willingness-to-pay...Gregory Rosston, Scott Savage, Donald Waldman From Communications of the ACM | February 1, 2011
Cyberterrorism is a concept that appears recurrently in contemporary media. This coverage is particularly interesting...Maura Conway From Communications of the ACM | February 1, 2011
This past June, Alan Rusbridger, the editor of The Guardian, phoned me and asked, mysteriously, whether I had any idea how to arrange a secure communication....The New York Times From ACM News | January 27, 2011
This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes ofreported...Electronic Frontier Foundation From ACM News | January 24, 2011
There is a growing sentiment among security researchers that the programmers behind the Stuxnet attack may not have been the super-elite cadre of developers that...Threat Post From ACM Opinion | January 19, 2011
Through the gates of Fort George Meade pass the most powerful technical minds that the government employs. But Fort Meade's website contains pixelized, faux-shaded...Wired From ACM News | January 12, 2011
Professor P.K. Kannan at the University of Maryland, says the success of the iPhone 4 released by Verizon boils down to one word: "performance. That is, the performance...niversity of Maryland, College Park From ACM Opinion | January 12, 2011
A year ago, Steve Ballmer took the stage of the Consumer Electronics Show to tout a technology that he promised would change the world: the Windows operating...Slate From ACM Opinion | January 10, 2011
High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts...InfoWorld From ACM News | January 7, 2011
As in the real world, cyberspace has bad neighborhoods. But unlike the real world, risks in cyberspace are not easy to spot—and the location of those digital...MSNBC From ACM Opinion | December 29, 2010
Seeking to improve the educational mechanisms for efficiently training large numbers of information security workers.Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou From Communications of the ACM | January 1, 2011
Privacy and confidentiality issues in cloud-based conference management systems reflect more universal themes.Mark D. Ryan From Communications of the ACM | January 1, 2011