acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Data Mining and Kids: Thank Goodness She Didn't Pay Cash!
From ACM Opinion

Data Mining and Kids: Thank Goodness She Didn't Pay Cash!

Remember the movie The Minority Report? It is based upon a Philip K. Dick novel of the same name. Well, the movie is supposed to portray an implausible dystopian...

Rebecca Mackinnon Discusses Threats to Internet Freedom: Part 1
From ACM News

Rebecca Mackinnon Discusses Threats to Internet Freedom: Part 1

Rebecca MacKinnon shares insights about Internet freedom, including the roles and responsibilities of citizens, corporations, and governments.  

The Personalized Web Is Just an Interest Graph Away
From ACM Opinion

The Personalized Web Is Just an Interest Graph Away

You know how our social graphs are creeping into every aspect of our Web lives, from search results to coupons? Well, get ready for something a lot more personal...

Google Adds (even More) Links to the Pentagon
From ACM Opinion

Google Adds (even More) Links to the Pentagon

On Monday, the Defense Department’s best-known geek announced that she was leaving the Pentagon for a job at Google. It was an unexpected move: Washington and Mountain...

From ACM Opinion

Reading Over Your Shoulder: Social Readers and Privacy Law

My friends, who are generally well educated and intelligent, read a lot of garbage.

Cyberwar Is Already ­pon ­S
From ACM Opinion

Cyberwar Is Already ­pon ­S

In the nearly 20 years since David Ronfeldt and I introduced our concept of cyberwar, this new mode of conflict has become a reality.

Your Kinect Is Watching You
From ACM News

Your Kinect Is Watching You

There is a wave of concern—completely justified, to my mind—over the privacy implications of our increasing reliance on Facebook and Google. What most people don’t...

International Reactions to Google's New Privacy Policy
From ACM Opinion

International Reactions to Google's New Privacy Policy

Google's new privacy policy took effect last Thursday, following several weeks campaigning to educate users on the changes. The policy will allow them to consolidate...

­.s. Senators: No Time to Lose on Strengthening Cybersecurity
From ACM Opinion

­.s. Senators: No Time to Lose on Strengthening Cybersecurity

Four U.S. senators sound a warning on cybersecurity, comparing the present to the days prior to September 11, 2001. The system is blinking red, and we are failing...

From ACM Opinion

Https and Tor: Working Together to Protect Your Privacy and Security Online

This week EFF released a new version its HTTPS Everywhere extension for the Firefox browser and debuted a beta version of the extension for Chrome. EFF frequently...

The Artificiality of Natural User Interfaces
From Communications of the ACM

The Artificiality of Natural User Interfaces

Toward user-defined gestural interfaces.

Training Users vs. Training Soldiers
From Communications of the ACM

Training Users vs. Training Soldiers: Experiences from the Battlefield

How military training methods can be applied to more effectively teach computer users.

The Idea Idea
From Communications of the ACM

The Idea Idea

What if practices rather than ideas are the main source of innovation?

Do Software Copyrights Protect What Programs Do?
From Communications of the ACM

Do Software Copyrights Protect What Programs Do?

A case before the European Court of Justice has significant implications for innovation and competition in the software industry.

War 2.0: Cyberweapons and Ethics
From Communications of the ACM

War 2.0: Cyberweapons and Ethics

Considering the basic ethical questions that must be resolved in the new realm of cyberwarfare.

From ACM Opinion

The Internet Is Broken; We Need to Start Over

Last year, the level and ferocity of cyberattacks on the Internet reached such a horrendous level that some are now thinking the unthinkable: let the Internet wither...

A High-Tech War on Leaks
From ACM Opinion

A High-Tech War on Leaks

Back in 2006, before the Obama administration made leak prosecutions routine, a panel of three federal appeals court judges in New York struggled to decide whether...

From ACM Opinion

Researchers Detail Flaw in Online Cryptography, but Don't Panic

First, the bad news: A small number of active RSA public encryption keys, a popular type of encryption protocol that secures billions of online transactions, offer...

Cyberwar Is the New Yellowcake, Fueling a Cybersecurity-Industrial Complex
From ACM Opinion

Cyberwar Is the New Yellowcake, Fueling a Cybersecurity-Industrial Complex

In last month's State of the Union address, President Obama called on Congress to pass "legislation that will secure our country from the growing dangers of cyber...

From ACM Opinion

A Cyber Risk to the ­.s.

In a recent briefing to Congress about worldwide threats, FBI Director Robert S. Mueller III said that the danger of cyberattacks will equal or surpass the danger...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account