acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Privacy By Design: Moving From Art to Practice
From Communications of the ACM

Privacy By Design: Moving From Art to Practice

Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...

Myths and Fallacies of 'Personally Identifiable Information'
From Communications of the ACM

Myths and Fallacies of 'Personally Identifiable Information'

Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...

Sociologists Invade World of Warcraft, See Humanity's Future
From ACM Opinion

Sociologists Invade World of Warcraft, See Humanity's Future

In their continued quest to plumb the mysterious depths of human interactions, some sociologists have stopped watching people—and started watching their avatars...

Great Computing Museums of the World, Part Two
From Communications of the ACM

Great Computing Museums of the World, Part Two

The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.

Is Mobile Email Addiction Overlooked?
From Communications of the ACM

Is Mobile Email Addiction Overlooked?

Studying the prevalence of mobile email addiction and the associated possible implications for organizations.

Can IT Lean Against the Wind?
From Communications of the ACM

Can IT Lean Against the Wind?

Lessons from the global financial crisis.

How to Make Progress in Computing Education
From Communications of the ACM

How to Make Progress in Computing Education

Improving the research base for computing education requires securing competitive funding commitments.

Cloud Computing and Electricity: Beyond the Utility Model
From Communications of the ACM

Cloud Computing and Electricity: Beyond the Utility Model

Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.

You Don't Need an Ipad
From ACM Opinion

You Don't Need an Ipad

But once you try one, you won't be able to resist. I picked up my iPad at a San Francisco Apple Store early on Saturday morning, and I spent the rest of the weekend...

When Network Neutrality Met Privacy
From Communications of the ACM

When Network Neutrality Met Privacy

Incorporating the consideration of privacy into the ongoing debate concerning network neutrality.

Cloud Computing and SaaS as New Computing Platforms
From Communications of the ACM

Cloud Computing and SaaS as New Computing Platforms

To become an industry platform, vendors must open their infrastructure technology to other product companies.

Be Careful What You Wish For
From Communications of the ACM

Be Careful What You Wish For

Reflections on the decline of mathematical tables.

Development 2.0: The IT-Enabled Transformation of International Development
From Communications of the ACM

Development 2.0: The IT-Enabled Transformation of International Development

The fundamental assumptions of international development are changing, increasingly putting the tools for a digital economy into the hands of the world's poor. ...

Privacy on the Data Web
From Communications of the ACM

Privacy on the Data Web

Considering the nebulous question of ownership in the virtual realm.

Making the Case For Computing
From Communications of the ACM

Making the Case For Computing

Seeking funding for current and future computing initiatives requires both a strong argument and a broad community of supporters.

Hiring and Developing Minority Faculty at Research Universities
From Communications of the ACM

Hiring and Developing Minority Faculty at Research Universities

Emphasizing the importance of creating more programs and investing more funding toward the goal of developing minority faculty at research universities.

Orchestrating Coordination in Pluralistic Networks
From Communications of the ACM

Orchestrating Coordination in Pluralistic Networks

Learning to build virtual teams of people of diverse backgrounds is an urgent challenge.

The Ethics Beat
From Communications of the ACM

The Ethics Beat

Surveying the increasing variety and nature of ethical challenges encountered by computing researchers and practitioners.

Only Technological Processes Are Patentable
From Communications of the ACM

Only Technological Processes Are Patentable

The U.S. Supreme Court will narrow the universe of process innovations that can be patented to those that are "technological," but what will that mean for software...

Gaming Will Save Us All
From Communications of the ACM

Gaming Will Save Us All

How gaming, as the first media market to successfully transition toward media-as-a-service, is an exemplar for a similar evolutionary transition of content and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account