Last month, Attorney General Eric Holder announced that the United States was charging members of the Chinese military with economic espionage.The New Yorker From ACM Opinion | June 5, 2014
Robots may be poised to enter a new frontier in the workplace—but that doesn't mean the public is ready for it.The Wall Street Journal From ACM Opinion | June 3, 2014
As any historian, psychologist, sociologist, or scientist will tell you, the truth of an idea has very little to do with how fast it spreads and how well it's believed...Slate From ACM Opinion | June 2, 2014
At first glance, the Justice Department's 31-count indictment of five Chinese military officers for hacking into the computers of six American corporations, in...Slate From ACM Opinion | June 2, 2014
The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...The Washington Post From ACM Opinion | May 30, 2014
We've all seen those movies where someone goes back in time and tries to change something (the classic "Grandfather Paradox": what happens if you go back in time...Scientific American From ACM Opinion | May 28, 2014
For this summer's reading list, we bring you seven very different types of books that have been published since the start of the year, each of them exploring the...The Washington Post From ACM Opinion | May 27, 2014
Computing technology has generated conditions for radical transformations of jobs and professions — including education. How shall we cope?Peter J. Denning From Communications of the ACM | June 1, 2014
Relying on dubious claims can cause researchers to focus on the wrong questions and organizations to misdirect security spending.
Dinei Florêncio, Cormac Herley, Adam Shostack From Communications of the ACM | June 1, 2014
What lessons might we learn from the chip cards used for payments in Europe, now that the U.S. is adopting them too?
Ross Anderson, Steven J. Murdoch From Communications of the ACM | June 1, 2014
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation...The Guardian From ACM Opinion | May 22, 2014
There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...The Atlantic From ACM Opinion | May 21, 2014
This spring, the Federal Communications Commission is deciding how to regulate the "Open Internet"—a term it uses to refer to the movement for net neutrality.Slate From ACM Opinion | May 21, 2014