Seeking to improve access to conferences and provide support for attendees with children.
Audrey Girouard, Jon E. Froehlich, Regan L. Mandryk, Mark Hancock From Communications of the ACM | April 1, 2020
Examining the structure of the enterprise attack surface in view of the relative ease with which cyberdefenses can be subverted.
Gaurav Banga From Communications of the ACM | April 1, 2020
Considering the implications of the influence of artificial intelligence given previous industrial revolutions.
Mari Sako From Communications of the ACM | April 1, 2020
Critics say false positives are far higher for some groups of people than for others, but supporters of the technology says the actual numbers involved are tiny...The Wall Street Journal From ACM Opinion | February 25, 2020
Considering the far-reaching and fundamental implications of computing beyond digital computers.
Omer Reingold From Communications of the ACM | March 1, 2020
Culturally responsive computing repurposes computer science education by making it meaningful to not only students, but also to their families and communities.
...Michael Lachney, Aman Yadav From Communications of the ACM | March 1, 2020
Students should interact with one another to practice skills and construct their own understanding, with assistance from a teacher acting as a coach and guide —...Clif Kussmaul From Communications of the ACM | February 1, 2020
Incorporating considerations of reasonable pluralism, individual agency, and legitimate authority.
Johannes Himmelreich From Communications of the ACM | January 1, 2020
Evaluating the arguments for and against using digital data derived from security breaches.
David M. Douglas From Communications of the ACM | December 1, 2019
Seeking to change computing teaching to improve computer science.
Mark Guzdial, Alan Kay, Cathie Norris, Elliot Soloway From Communications of the ACM | November 1, 2019
Considering the new liability risks for ISPs, search engines, and news aggregators under recent EU-wide mandatory rules.
Pamela Samuelson From Communications of the ACM | November 1, 2019
Summarizing some of the changes that seem increasingly necessary to address known system and network deficiencies and anticipate currently unknown vulnerabilities...Peter G. Neumann From Communications of the ACM | October 1, 2019