acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From ACM Opinion

Administration Internet-Wiretap Proposals Forget History

Any headline that uses the phrase "wiretap the Internet" is likely to make people on the Internet cranky. When this wiretapping scheme comes from an administration...

From ACM Opinion

The Anthropology of Hackers

A "hacker" is a technologist with a love for computing and a "hack" is a clever technical solution arrived through a non-obvious means. It doesn't mean to compromise...

From ACM Opinion

The Snoop In Your Browser

Everyone and his Big Brother wants to log your browsing habits, the better to build a profile of who you are and how you live your life—online and off. Search...

Is Wikileaks Too Full of Itself?
From ACM Opinion

Is Wikileaks Too Full of Itself?

Have the activists behind WikiLeaks—and in particular the Web site's founder, Julian Assange—become intoxicated by their own myth? Two recent events involving...

From ACM Opinion

The Government Can ­se Gps to Track Your Moves

Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This...

From ACM Opinion

Defending a New Domain: The Pentagon

Right now, more than 100 foreign intelligence organizations are trying to hack into the digital networks that undergird U.S. military operations. The Pentagon...

Future Internet Architecture: Clean-Slate Versus Evolutionary Research
From Communications of the ACM

Future Internet Architecture: Clean-Slate Versus Evolutionary Research

Should researchers focus on designing new network architectures or improving the current Internet?

Objects Never? Well, Hardly Ever!
From Communications of the ACM

Objects Never? Well, Hardly Ever!

Revisiting the Great Objects Debate.

Discussing Cyber Attack
From Communications of the ACM

Discussing Cyber Attack

Cyber attack—the other side of cyber defense—deserves a more open discussion than it has been getting.

Principles of the Law of Software Contracts
From Communications of the ACM

Principles of the Law of Software Contracts

An overview of a new set of legal principles for software contracts developed by the American Law Institute.

Return at Risk
From Communications of the ACM

Return at Risk

Calculating the likely true cost of projects.

From ACM Opinion

Why Intel Bought Mcafee

There's been quite a bit of head-scratching over Intel's decision to purchase McAfee, but, despite all the breathless talk about mobile security and ARM and virus...

Facebook Knows Where You Are
From ACM Opinion

Facebook Knows Where You Are

The social network's new Places feature will make it more difficult to lie to your friends.

From ACM Opinion

Will Someone Leak the Leaker's Secrets?

Who has the right to decide what information should be kept secret? That's the vexatious question raised by WikiLeaks and its founder Julian Assange, who masterminded...

Charging the Wikileaks Leaker with Treason Would Be Absurd
From ACM Opinion

Charging the Wikileaks Leaker with Treason Would Be Absurd

Should Pvt. Bradley Manning, the Army intelligence analyst charged with leaking troves of classified documents to WikiLeaks, be tried for treason? And what about...

From ACM Opinion

Protecting Privacy

On the internet, nobody knows you’re a dog but advertisers may infer that you own one. The flow of information from users of the internet both to social networks...

From ACM Opinion

The Wikileaks Paradox

Is radical transparency compatible with total anonymity?

From ACM Opinion

Cyberwar Is Hell

While we obsessed over Russian spies, top diplomats were working to stop a greater espionage problem: the threat of cyberwarfare.

Rights For Autonomous Artificial Agents?
From Communications of the ACM

Rights For Autonomous Artificial Agents?

The growing role of artificial agents necessitates modifying legal frameworks to better address human interests.

Remembrances of Things Pest
From Communications of the ACM

Remembrances of Things Pest

Recalling malware milestones.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account