acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

No Limits to Watching?
From Communications of the ACM

No Limits to Watching?

Considering the ethical questions raised by technologies that are moving from knowing what we are doing (and where) to knowing who we are.

Is Software Patentable?
From Communications of the ACM

Is Software Patentable?

Assessing the shifting perspectives on patentability standards for software.

What Regulators Can Do to Advance Privacy Through Design
From Communications of the ACM

What Regulators Can Do to Advance Privacy Through Design

Seeking to address the challenges of privacy by design through regulatory process and formal law.

How to Design—and Defend Against—the Perfect Security Backdoor
From ACM Opinion

How to Design—and Defend Against—the Perfect Security Backdoor

We already know the NSA wants to eavesdrop on the Internet. 

A Court Order Is an Insider Attack
From ACM Opinion

A Court Order Is an Insider Attack

Commentators on the Lavabit case, including the judge himself, have criticized Lavabit for designing its system in a way that resisted court-ordered access to user...

Think You Can Live Offline Without Being Tracked? Here's What It Takes
From ACM Opinion

Think You Can Live Offline Without Being Tracked? Here's What It Takes

Nico Sell, the cofounder of a secure communication app called Wickr, has appeared on television twice.

Here's Everything You Should Know About Nsa Address Book Spying in One Faq
From ACM News

Here's Everything You Should Know About Nsa Address Book Spying in One Faq

A new report from The Washington Post, based on documents provided by whistleblower Edward Snowden, reveals that the National Security Agency is collecting hundreds...

Breaking the Internet
From ACM Opinion

Breaking the Internet

Brazilian President Dilma Rouseff's recent indictment of the United States' cyber-spying practices has profound global repercussions for the U.S vision of a borderless...

The Double Danger of the Nsa's 'collect It All' Policy on Surveillance
From ACM Opinion

The Double Danger of the Nsa's 'collect It All' Policy on Surveillance

By now, most people are aware that the NSA collects massive amounts of information on ordinary Americans.

Here's Why Cops Should Be Required to Wear a Lapel Camera While on Duty
From ACM Opinion

Here's Why Cops Should Be Required to Wear a Lapel Camera While on Duty

Police officers in Rialto, Calif., carry cameras to record their every action while on duty.

The Many Meanings of Open
From ACM Opinion

The Many Meanings of Open

I was recently asked to talk about the idea of "open," and I realized the term is used in at least eight different ways.

Want to Evade Nsa Spying? Don't Connect to the Internet
From ACM Opinion

Want to Evade Nsa Spying? Don't Connect to the Internet

Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.

The Lessons of Aaron Swartz
From ACM Opinion

The Lessons of Aaron Swartz

On the day after Aaron Swartz's death in January, President Reif and I spoke about how MIT might respond to the breaking news of his suicide.

How to Manage Your Digital Afterlife
From ACM Opinion

How to Manage Your Digital Afterlife

After their son's suicide, one Wisconsin couple was desperate for answers.

Students Are 'hacking' Their School-Issued Ipads: Good For Them
From ACM Careers

Students Are 'hacking' Their School-Issued Ipads: Good For Them

Almost immediately after receiving their new school-issued iPads this fall, students in Indiana and in California (and probably elsewhere) managed to bypass the...

Scientists Must Spearhead Ethical ­se of Big Data
From ACM Opinion

Scientists Must Spearhead Ethical ­se of Big Data

The recent revelation that the National Security Agency collects the personal data of United States citizens, allies and enemies alike has broken the traditional...

Your Digital Trail, And How It Can Be ­sed Against You
From ACM News

Your Digital Trail, And How It Can Be ­sed Against You

While the collection of private information by the National Security Agency is under scrutiny worldwide, a remarkable amount of your digital trail is also available...

At 15, Google's Ambitions Remain ­nbridled
From ACM Opinion

At 15, Google's Ambitions Remain ­nbridled

Google turned 15 on Friday, smack in the middle of its adolescence.

Controlling For Cybersecurity Risks of Medical Device Software
From Communications of the ACM

Controlling For Cybersecurity Risks of Medical Device Software

Medical device hacking is a red herring. But the flaws are real.

Why We're Shutting Off Our Comments
From ACM Opinion

Why We're Shutting Off Our Comments

Comments can be bad for science. That's why, here at PopularScience.com, we're shutting them off.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account