Considering the ethical questions raised by technologies that are moving from knowing what we are doing (and where) to knowing who we are.Katina Michael, MG Michael From Communications of the ACM | November 1, 2013
Seeking to address the challenges of privacy by design through regulatory process and formal law.Deirdre K. Mulligan, Kenneth A. Bamberger From Communications of the ACM | November 1, 2013
Late last week I posted a short essay on LinkedIn, where I am an Influencer, called "The best case study you'll ever read."Fortune From ACM Opinion | October 22, 2013
In 1984, the personal-computer industry was still small enough to be captured, with reasonable fidelity, in a one-volume publication, the Whole Earth Software Catalog...Technology Review From ACM Opinion | October 17, 2013
Commentators on the Lavabit case, including the judge himself, have criticized Lavabit for designing its system in a way that resisted court-ordered access to user...Free to Tinker From ACM Opinion | October 16, 2013
A new report from The Washington Post, based on documents provided by whistleblower Edward Snowden, reveals that the National Security Agency is collecting hundreds...The Washington Post From ACM News | October 15, 2013
Brazilian President Dilma Rouseff's recent indictment of the United States' cyber-spying practices has profound global repercussions for the U.S vision of a borderless...The Weekly Wonk From ACM Opinion | October 15, 2013
According to popular discourse, video games are either the divine instrument of education’s future or the software of Satan himself, provoking young men to carry...The Atlantic From ACM Opinion | October 11, 2013
Is Apple's A7 chip twice as fast at processing and graphics, as Apple promised when announcing the new iPhone 5S?CNET From ACM Opinion | October 10, 2013
By now, most people are aware that the NSA collects massive amounts of information on ordinary Americans.The Brennan Center for Justice From ACM Opinion | October 10, 2013
I was recently asked to talk about the idea of "open," and I realized the term is used in at least eight different ways.Telefonica Digital Hub From ACM Opinion | October 9, 2013
Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.Wired From ACM Opinion | October 9, 2013