acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

George Orwell Never Dreamed of Advertising as Invasive as Yahoo's Proposal
From ACM Opinion

George Orwell Never Dreamed of Advertising as Invasive as Yahoo's Proposal

Yahoo wants to take advertising to the next level—that is, the Orwellian level—bombarding people in public places with targeted advertising served up by the surveillance...

Russian Hacking Crisis Tests Obama's Nerve
From ACM Opinion

Russian Hacking Crisis Tests Obama's Nerve

President Barack Obama came under immediate pressure Friday night to punish Russia for hacking into US political institutions—with calls to rally European allies...

Surveillance in the Post-Obama Era
From ACM Opinion

Surveillance in the Post-Obama Era

During his 2008 campaign, President Obama vowed to assert greater oversight of the massive surveillance apparatus built in the wake of the Sept. 11 attacks, arguing...

Google Is Listening
From ACM Opinion

Google Is Listening

You know the cliché that if you're not paying for the product, you are the product?

Would It Be Ethical to Implant False Memories in Therapy?
From ACM Opinion

Would It Be Ethical to Implant False Memories in Therapy?

Take a moment to remember an event that you experienced as a child.

Why Data Is the New Coal
From ACM Opinion

Why Data Is the New Coal

"Is data the new oil?" asked proponents of big data back in 2012 in Forbes magazine. By 2016, and the rise of big data's turbo-powered cousin deep learning, westated Fortune...

The Internet Is No Place For Public Elections
From ACM Opinion

The Internet Is No Place For Public Elections

Despite what your local election officials may tell you, you can’t trust the Internet with your vote.

Ted Cruz Is Wrong About How Free Speech Is Censored on the Internet
From ACM Opinion

Ted Cruz Is Wrong About How Free Speech Is Censored on the Internet

Sen. Ted Cruz wants to engineer a United States takeover of a key Internet organization, ICANN, in the name of protecting freedom of expression.

Universities and Computer Science in the European Crisis of Refugees
From Communications of the ACM

Universities and Computer Science in the European Crisis of Refugees

Considering the role of universities in promoting tolerance as well as education.

Risks of Automation
From Communications of the ACM

Risks of Automation: A Cautionary Total-System Perspective of Our Cyberfuture

Where automation is inevitable, let's do it right.

Mobile Computing and Political Transformation
From Communications of the ACM

Mobile Computing and Political Transformation

Connecting increased mobile phone usage with political and market liberalization.

The Puzzle of Japanese Innovation and Entrepreneurship
From Communications of the ACM

The Puzzle of Japanese Innovation and Entrepreneurship

Exploring how Japan's unique mixture of social, educational, and corporate practices influence entrepreneurial activity.

The Cold War Is Over. The Cyber War Has Begun.
From ACM Opinion

The Cold War Is Over. The Cyber War Has Begun.

Contemplating Russian nuclear threats during the Cold War, the strategist Herman Kahn calibrated a macabre ladder of escalation, with 44 rungs ranging from "Ostensible...

Big Step For Quantum Teleportation Won't Bring ­S Any Closer to Star Trek. Here's Why
From ACM Opinion

Big Step For Quantum Teleportation Won't Bring ­S Any Closer to Star Trek. Here's Why

Two teams have set new distance records for quantum teleportation: using the weirdness of quantum mechanics to instantly transfer the condition or "state" of one...

The Leaky Myths of Snowden
From ACM Opinion

The Leaky Myths of Snowden

Oliver Stone's Snowden is a bad movie, stuffed with myth, short on drama.

Neither Hillary Clinton Nor Donald Trump Is Tech Savvy
From ACM Opinion

Neither Hillary Clinton Nor Donald Trump Is Tech Savvy

Rachel Law, the 20-something co-founder of a New York startup called Kip, is sitting next to me at a café, tapping her phone screen to show how the company’s service...

The Feds Will Soon Be Able to Legally Hack Almost Anyone
From ACM Opinion

The Feds Will Soon Be Able to Legally Hack Almost Anyone

Digital devices and software programs are complicated. Behind the pointing and clicking on screen are thousands of processes and routines that make everything work...

How Long ­ntil Hackers Start Faking Leaked Documents?
From ACM Opinion

How Long ­ntil Hackers Start Faking Leaked Documents?

In the past few years, the devastating effects of hackers breaking into an organization's network, stealing confidential data, and publishing everything have been...

Paperless Voting Could Fuel 'rigged' Election Claims
From ACM Opinion

Paperless Voting Could Fuel 'rigged' Election Claims

Voters in four competitive states will cast ballots in November on electronic machines that leave no paper trail—a lapse that threatens to sow distrust about a...

The Do-Not-Call List Has a Gaping Hole
From ACM Opinion

The Do-Not-Call List Has a Gaping Hole

Sure, legitimate telemarketers will refrain from calling you if you've put your phone number on it. But criminal telephone spammers will call you anyway because...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account