acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Privacy By Design: Moving From Art to Practice
From Communications of the ACM

Privacy By Design: Moving From Art to Practice

Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...

Myths and Fallacies of 'Personally Identifiable Information'
From Communications of the ACM

Myths and Fallacies of 'Personally Identifiable Information'

Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...

From Facebook, Answering Privacy Concerns with New Settings
From ACM Opinion

From Facebook, Answering Privacy Concerns with New Settings

Six years ago, we built Facebook around a few simple ideas. People want to share and stay connected with their friends and the people around them. If we give people...

From ACM Opinion

Immigration and Ids: A Modest Proposal

All Americans--whether brown, white, or black--should be required to carry a passport showing they are red, white, and blue.

Just How Fragile Is the Internet?
From ACM Opinion

Just How Fragile Is the Internet?

In 1998, a hacker told Congress that he could bring down the Internet in 30 minutes by exploiting a certain flaw that sometimes caused online outages. In 2003...

From ACM Opinion

Facebook's 'evil Interfaces'

Social networking companies don't have it easy. Advertisers covet their users' data, and in a niche that often seems to lack a clear business model, selling (or...

Great Computing Museums of the World, Part Two
From Communications of the ACM

Great Computing Museums of the World, Part Two

The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.

Is Mobile Email Addiction Overlooked?
From Communications of the ACM

Is Mobile Email Addiction Overlooked?

Studying the prevalence of mobile email addiction and the associated possible implications for organizations.

Can IT Lean Against the Wind?
From Communications of the ACM

Can IT Lean Against the Wind?

Lessons from the global financial crisis.

How to Make Progress in Computing Education
From Communications of the ACM

How to Make Progress in Computing Education

Improving the research base for computing education requires securing competitive funding commitments.

Cloud Computing and Electricity: Beyond the Utility Model
From Communications of the ACM

Cloud Computing and Electricity: Beyond the Utility Model

Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.

A Less Personal Computer
From ACM Opinion

A Less Personal Computer

In Web parlance, "chrome" is the part of the browser that surrounds the page: the address bar, the "Back" button, and those all-important bookmarks. Chrome is also...

From ACM Opinion

Eff Backs Yahoo! to Protect ­ser from Warrantless Email Search

The Electronic Frontier Foundation (EFF) along with Google and numerous other public interest organizations and Internet industry associations joined with Yahoo...

Marc Maiffret: The Quick Rise of a Teen Hacker
From ACM Opinion

Marc Maiffret: The Quick Rise of a Teen Hacker

For Marc Maiffret, the turning point in his life came when—at the age of 17—he woke up to an FBI agent pointing a gun at his head. A runaway and high school dropout...

I Was Hacked in Beijing
From ACM Opinion

I Was Hacked in Beijing

The reality--and my fears--dawned only slowly. For weeks, friends and colleagues complained I had not answered their e-mail messages. I swore I had not received...

From ACM Opinion

Not Creating Content. Just Protecting It.

Should we be surprised that the biggest fight over freedom of expression in years involves Google, a company that produces algorithms rather than articles? Probably...

The Data-Structure Canon
From Communications of the ACM

The Data-Structure Canon

Data structures are part of the foundation of computer science. It pays to revisit them from time to time.

When Network Neutrality Met Privacy
From Communications of the ACM

When Network Neutrality Met Privacy

Incorporating the consideration of privacy into the ongoing debate concerning network neutrality.

Cloud Computing and SaaS as New Computing Platforms
From Communications of the ACM

Cloud Computing and SaaS as New Computing Platforms

To become an industry platform, vendors must open their infrastructure technology to other product companies.

Be Careful What You Wish For
From Communications of the ACM

Be Careful What You Wish For

Reflections on the decline of mathematical tables.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account