acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

These Are 3 Breakthrough Science Ideas You'll Be Talking About in 2015
From ACM Opinion

These Are 3 Breakthrough Science Ideas You'll Be Talking About in 2015

For anyone who has ever said that all the STEM professions need is something to make them "cool" in order to attract more young people, look no further than ...

North Korea: Surfing the Net in the World's Most Isolated Nation
From ACM Opinion

North Korea: Surfing the Net in the World's Most Isolated Nation

What's the point of a computer in a hermit country sealed off from the internet?

Artificial Intelligence as a Threat
From ACM Opinion

Artificial Intelligence as a Threat

Ebola sounds like the stuff of nightmares. Bird flu and SARS also send shivers down my spine.

Invasion of the Data Snatchers
From ACM Opinion

Invasion of the Data Snatchers

New technologies are making it easier for private companies and the government to learn about everything we do—in our homes, in our cars, in stores, and within...

The Web Is a Terrorist's Command-and-Control Network of Choice
From ACM Opinion

The Web Is a Terrorist's Command-and-Control Network of Choice

The Islamic State of Iraq and the Levant (Isis) is the first terrorist group whose members have grown up on the internet.

Designing User Incentives For Cybersecurity
From Communications of the ACM

Designing User Incentives For Cybersecurity

How to encourage better user security practices and behavior

An Embarrassment of Riches
From Communications of the ACM

An Embarrassment of Riches

A critical review of open innovation systems.

Summing Up
From Communications of the ACM

Summing Up

Considering recent privacy- and security-related events through this column.

A Future For Computing Education Research
From Communications of the ACM

A Future For Computing Education Research

Seeking to address the most important issues facing the computer education research community.

Big Data's End Run Around Procedural Privacy Protections
From Communications of the ACM

Big Data's End Run Around Procedural Privacy Protections

Recognizing the inherent limitations of consent and anonymity.

Updates on the Intellectual Property Front
From Communications of the ACM

Updates on the Intellectual Property Front

Recapping influential U.S. Supreme Court decisions rendered earlier this year.

The Dark Side of the Sharing Economy . . . and How to Lighten It
From Communications of the ACM

The Dark Side of the Sharing Economy . . . and How to Lighten It

Improving the sharing economy will require addressing myriad problems.

Could Robots Become Too Cute For Comfort?
From ACM Opinion

Could Robots Become Too Cute For Comfort?

Would you share your innermost secret with a robot?

Okcupid's Xoxo For Big Surveillance
From ACM Opinion

Okcupid's Xoxo For Big Surveillance

Christian Rudder is a good writer—so good, in fact, it's easy for readers of Dataclysm: Who We Are (When We Think No One’s Looking) to be smitten by his engaging...

How Big Data Algorithms See ­s—while They Eat ­S ­p
From ACM Opinion

How Big Data Algorithms See ­s—while They Eat ­S ­p

Four years ago I interviewed Sam Yagan, then CEO of OKCupid, about the mathematics underlying his free matchmaking site.

The Adultery Arms Race
From ACM Opinion

The Adultery Arms Race

Jay's wife, Ann, was supposed to be out of town on business.

The August Smart Lock Shows Why You Should Stick With Dumb Keys
From ACM Opinion

The August Smart Lock Shows Why You Should Stick With Dumb Keys

You almost certainly don't need a digital smart lock for your front door.

Why Germans Are Afraid of Google
From ACM Opinion

Why Germans Are Afraid of Google

These days Germany is known for being many things: a leader in clean technology, a manufacturing powerhouse, Europe's foreign policy center.

The Nsa and Me
From ACM Opinion

The Nsa and Me

The tone of the answering machine message was routine, like a reminder for a dental appointment. But there was also an undercurrent of urgency.

Every Computer System Can Be Compromised
From ACM Opinion

Every Computer System Can Be Compromised

Unfortunately, there are many risks inherent in online banking and debit cards.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account