acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

New Threats to Society from Free-Speech Social Media Platforms
From Communications of the ACM

New Threats to Society from Free-Speech Social Media Platforms

Understanding emerging threats from social media platforms.

How Software Stifles Competition and Innovation
From Communications of the ACM

How Software Stifles Competition and Innovation

Factoring the slowing up of startups.

Barbershop Computing
From Communications of the ACM

Barbershop Computing

Moving education beyond computer science pipelines.

Certification of Safety-Critical Systems
From Communications of the ACM

Certification of Safety-Critical Systems

Seeking new approaches toward ensuring the safety of software-intensive systems.

Coming of Age
From Communications of the ACM

Coming of Age

Stressing the importance of threat models.

Closing Our Digital Divides
From Communications of the ACM

Closing Our Digital Divides

Seeking a more efficient path to improved broadband Internet access.

Can Crowdsourcing Rescue the Social Marketplace of Ideas?
From Communications of the ACM

Can Crowdsourcing Rescue the Social Marketplace of Ideas?

How collaborative designs and community-based moderation could improve social media.

Rebutting Rebuttals
From Communications of the ACM

Rebutting Rebuttals

Evaluating the impact of the conference review rebuttal process.

We Need to Focus on How Our Data Is Used, Not Just How It Is Shared
From Communications of the ACM

We Need to Focus on How Our Data Is Used, Not Just How It Is Shared

Toward better understanding of the different ways data circulates between users and platforms.

Voice in the Machine: Ethical Considerations for Language-Capable Robots
From Communications of the ACM

Voice in the Machine: Ethical Considerations for Language-Capable Robots

Parsing the promise of language-capable robots.

Improving Computing Education Research through Valuing Design
From Communications of the ACM

Improving Computing Education Research through Valuing Design

Exploring alternatives to existing research systems and methods.

Why You Should Be Able to Make Your Own Individualized, Digital Nano-Currency
From Communications of the ACM

Why You Should Be Able to Make Your Own Individualized, Digital Nano-Currency

Increasing opportunities for access to traditional financial systems.

AI and Society: Ethics, Trust, and Cooperation
From Communications of the ACM

AI and Society: Ethics, Trust, and Cooperation

Trust and trustworthiness are central to how ethics helps society survive and thrive.

Learning to Live with Privacy-Preserving Analytics
From Communications of the ACM

Learning to Live with Privacy-Preserving Analytics

Seeking to close the gap between research and real-world applications of PPAs.

Fragility in AIs Using Artificial Neural Networks
From Communications of the ACM

Fragility in AIs Using Artificial Neural Networks

Suggesting ways to reduce fragility in AI systems that include artificial neural networks.

There Is Little Evidence for Today's AI Alarmism
From ACM Opinion

There Is Little Evidence for Today's AI Alarmism

Over time, we will have a much better sense of which AI areas require significant regulatory intervention and which do not.

Computer-Related Risks and Remediation Challenges
From Communications of the ACM

Computer-Related Risks and Remediation Challenges

Surveying the nontechnical issues interwoven with computer-related technologies.

Breaking Up a Digital Monopoly
From Communications of the ACM

Breaking Up a Digital Monopoly

How to decompose a vertically integrated digital monopoly to enable competitive services based on a shared data structure.

Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society
From Communications of the ACM

Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society

Searching for improved algorithmic accountability.

The Indigo Cyberattack Is a Warning of Things to Come
From ACM Opinion

The Indigo Cyberattack Is a Warning of Things to Come

Those handling state secrets or critical infrastructure seem to fare no better than a bookstore chain.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account