acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Forest For the Trees
From Communications of the ACM

Forest For the Trees

With the amount of disk space available to the modern programmer, and the lack of parental supervision in most...

The Growing Harm of Not Teaching Malware
From Communications of the ACM

The Growing Harm of Not Teaching Malware

Revisiting the need to educate professionals to defend against malware in its various guises.

Household Demand For Broadband Internet Service
From Communications of the ACM

Household Demand For Broadband Internet Service

How much are consumers willing to pay for broadband service? Our research estimates consumer willingness-to-pay...

Against Cyberterrorism
From Communications of the ACM

Against Cyberterrorism

Cyberterrorism is a concept that appears recurrently in contemporary media. This coverage is particularly interesting...

Dealing With Assange and the Secrets He Spilled
From ACM News

Dealing With Assange and the Secrets He Spilled

This past June, Alan Rusbridger, the editor of The Guardian, phoned me and asked, mysteriously, whether I had any idea how to arrange a secure communication....

Why Buying Coffee with Your Iphone Matters
From ACM Opinion

Why Buying Coffee with Your Iphone Matters

Starbucks app Cash, credit, or gadget?

From ACM Opinion

Stuxnet Authors Made Several Basic Errors

There is a growing sentiment among security researchers that the programmers behind the Stuxnet attack may not have been the super-elite cadre of developers that...

From ACM News

Hackers Find New Way to Cheat on Wall Street

High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts...

From ACM Opinion

10 Things Web ­sers Should Fear in 2011

As in the real world, cyberspace has bad neighborhoods. But unlike the real world, risks in cyberspace are not easy to spot—and the location of those digital...

From Communications of the ACM

The Ephemeral Legion: Producing an Expert Cyber-Security Work Force from Thin Air

Seeking to improve the educational mechanisms for efficiently training large numbers of information security workers.

Cloud Computing Privacy Concerns on Our Doorstep
From Communications of the ACM

Cloud Computing Privacy Concerns on Our Doorstep

Privacy and confidentiality issues in cloud-based conference management systems reflect more universal themes.

Reflections on the Toyota Debacle
From Communications of the ACM

Reflections on the Toyota Debacle

A look in the rearview mirror reveals system and process blind spots.

Google AdWords and European Trademark Law
From Communications of the ACM

Google AdWords and European Trademark Law

Is Google violating trademark law by operating its AdWords system?

Don't Bring Me a Good Idea
From Communications of the ACM

Don't Bring Me a Good Idea

You want to know how to get my attention?" Jason Kalich asked the audience rhetorically. "First off, don't bring me a good...

Web Giants Get Bigger, Location Takes Off
From ACM News

Web Giants Get Bigger, Location Takes Off

The easiest way to sum up the Web in 2010 is that it was a year of growth. The big got bigger and smaller companies came out of the woodwork with new plays on...

From ACM Opinion

Careful When Shooting the Messenger

In May 2009, The Daily Telegraph set off a political storm in Britain when it detailed widespread expense-account abuse by members of Parliament. Among the claims...

From ACM Opinion

Stuxnet's Finnish-Chinese Connection

I recently wrote a white paper entitled “Dragons, Tigers, Pearls, and Yellowcake” in which I proposed four alternative scenarios for the Stuxnet worm other than...

From ACM News

Don't Prosecute Wikileaks

As faculty members and officers of the Columbia University Graduate School of Journalism, we are concerned by recent reports that the Department of Justice is...

Prosecute Assange ­nder the Espionage Act
From ACM Opinion

Prosecute Assange ­nder the Espionage Act

Just as the First Amendment is not a license to yell 'Fire!' in a crowded theater, it is also not a license to jeopardize national security.

The 24-Hour Athenian Democracy
From ACM Opinion

The 24-Hour Athenian Democracy

"I'm aware of your need to stay anonymous, but I have to be able to describe the scope of this movement. Can any of you tell me where you're typing from?"
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account