acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Information: 'I' vs. 'We' vs. 'They'
From Communications of the ACM

Information: 'I' vs. 'We' vs. 'They'

Seeking a balance between protecting and using personal data.

Toward Justice in Computer Science through Community, Criticality, and Citizenship
From Communications of the ACM

Toward Justice in Computer Science through Community, Criticality, and Citizenship

Proposing a justice-centered CS education.

Cybersecurity as Illuminator for the Future of Computing Research
From Communications of the ACM

Cybersecurity as Illuminator for the Future of Computing Research

Considering the shifting fundamentals of cybersecurity research.

Two Paths for Digital Disability Law
From Communications of the ACM

Two Paths for Digital Disability Law

Understanding the legal drivers of efforts to make technology accessible.

AI Is Creating a New Colonial World Order
From ACM Opinion

AI Is Creating a New Colonial World Order

Artificial intelligence is enriching a powerful few by dispossessing communities that have been dispossessed before.

Can AI Improve Road Safety Now?
From ACM Opinion

Can AI Improve Road Safety Now?

Well before self-driving cars become a reality, there are simpler approaches that can make roads much safer.

Why It Is So Hard to Make AI Fair and Unbiased
From ACM Opinion

Why It Is So Hard to Make AI Fair and Unbiased

Competing notions of fairness exist, and sometimes they are totally incompatible with each other.

Can Open Source Sustain Itself without Losing Its Soul?
From ACM Opinion

Can Open Source Sustain Itself without Losing Its Soul?

What it means to be an open source contributor or maintainer has changed in recent years.

The AI in a Jar
From ACM Opinion

The AI in a Jar

Exploring a metaphysical argument against artificial intelligence.

How Ukraine Has Defended Itself against Cyber Attacks
From ACM Opinion

How Ukraine Has Defended Itself against Cyber Attacks

As in Ukraine, U.S. organizations should work with U.S. cybersecurity agencies to prepare for and prevent attacks.

The Missing Voices in Natural Language Processing
From ACM Opinion

The Missing Voices in Natural Language Processing

Who and what is being represented in the data and development of NLP models?

The AI Illusion
From ACM Opinion

The AI Illusion

State-of-the-art chatbots are not what they seem.

Unions Have a Long Way to Go after Amazon Victory
From ACM Opinion

Unions Have a Long Way to Go after Amazon Victory

Without greater momentum on their side, the New York stunner looks more like chance than pattern.

Hugs to Boring Tech
From ACM Opinion

Hugs to Boring Tech

Don't underestimate the tech that makes your eyes glaze over—it holds us all up.

We Need a 911 for the Metaverse
From ACM Opinion

We Need a 911 for the Metaverse

Citizens of the metaverse deserve an industrywide standard for reporting abuse and harassment.

Quantum Computing Has a Hype Problem
From ACM Opinion

Quantum Computing Has a Hype Problem

Quantum computing startups are all the rage, but it is unclear if they will be able to produce anything of use in the near future.

How Compute and the Climate Go Hand-in-Hand
From ACM Opinion

How Compute and the Climate Go Hand-in-Hand

Data is critical to the success of all climate tech projects, whether to drive development or improve efficiency.

Fixing AI's Bias Issues Requires More Than a 'Human in the Loop'
From ACM Opinion

Fixing AI's Bias Issues Requires More Than a 'Human in the Loop'

Organizations must account for the biases of their own workers to be able to combat AI blunders.

Recognize Science's Unsung Global Pioneers to Alter Its Future
From ACM Opinion

Recognize Science's Unsung Global Pioneers to Alter Its Future

Modern science wasn't invented in Europe but came about as part of a global exchange.

Congress's Antitrust Bills Have a Problem: The Happy Customer
From ACM Opinion

Congress's Antitrust Bills Have a Problem: The Happy Customer

Politicians must walk a fine line as they try to rein in Big Tech's self-preferencing tactics.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account