Designing privacy into systems at the beginning of the development process necessitates the effective translation of privacy principles, models, and mechanisms...Stuart S. Shapiro From Communications of the ACM | June 1, 2010
Developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about...Arvind Narayanan, Vitaly Shmatikov From Communications of the ACM | June 1, 2010
Six years ago, we built Facebook around a few simple ideas. People want to share and stay connected with their friends and the people around them. If we give people...The Washington Post From ACM Opinion | May 26, 2010
All Americans--whether brown, white, or black--should be required to carry a passport showing they are red, white, and blue.Newsweek From ACM Opinion | May 14, 2010
In 1998, a hacker told Congress that he could bring down the Internet in 30 minutes by exploiting a certain flaw that sometimes caused online outages. In 2003...The Associated Press From ACM Opinion | May 10, 2010
Social networking companies don't have it easy. Advertisers covet their users' data, and in a niche that often seems to lack a clear business model, selling (or...The Electronic Frontier Foundation From ACM Opinion | May 3, 2010
The second of a two-part series highlighting several of the world's museums dedicated to preserving, exhibiting, and elucidating computing history.William Aspray From Communications of the ACM | May 1, 2010
Studying the prevalence of mobile email addiction and the associated possible implications for organizations.Ofir Turel, Alexander Serenko From Communications of the ACM | May 1, 2010
Improving the research base for computing education requires securing competitive funding commitments.Cameron Wilson, Mark Guzdial From Communications of the ACM | May 1, 2010
Assessing the strengths, weaknesses, and general applicability of the computing-as-utility business model.
Erik Brynjolfsson, Paul Hofmann, John Jordan From Communications of the ACM | May 1, 2010
In Web parlance, "chrome" is the part of the browser that surrounds the page: the address bar, the "Back" button, and those all-important bookmarks. Chrome is also...Technology Review From ACM Opinion | April 21, 2010
The Electronic Frontier Foundation (EFF) along with Google and numerous other public interest organizations and Internet industry associations joined with Yahoo...Electronic Frontier Foundation From ACM Opinion | April 16, 2010
For Marc Maiffret, the turning point in his life came when—at the age of 17—he woke up to an FBI agent pointing a gun at his head. A runaway and high school dropout...CNet From ACM Opinion | April 15, 2010
The reality--and my fears--dawned only slowly.
For weeks, friends and colleagues complained I had not answered their e-mail messages. I swore I had not received...The New York Times From ACM Opinion | April 13, 2010
Should we be surprised that the biggest fight over freedom of expression in years involves Google, a company that produces algorithms rather than articles?
Probably...The New York Times From ACM Opinion | March 29, 2010
Data structures are part of the foundation of computer science. It pays to revisit them from time to time.George V. Neville-Neil From Communications of the ACM | April 1, 2010
Incorporating the consideration of privacy into the ongoing debate concerning network neutrality.Paul Ohm From Communications of the ACM | April 1, 2010
To become an industry platform, vendors must open their infrastructure technology to other product companies.
Michael Cusumano From Communications of the ACM | April 1, 2010