acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Coming of Age
From Communications of the ACM

Coming of Age

Stressing the importance of threat models.

Dilemma of the Artificial Intelligence Regulatory Landscape
From Communications of the ACM

Dilemma of the Artificial Intelligence Regulatory Landscape

Navigating the complex and varying AI regulatory landscape.

The Smallness of Large Language Models
From Communications of the ACM

The Smallness of Large Language Models

There is so much more to language and human beings than large language models can possibly master.

The Human Touch
From Communications of the ACM

The Human Touch

There is no substitute for good, direct, honest training.

SI and Binary Prefixes: Clearing the Confusion
From Communications of the ACM

SI and Binary Prefixes: Clearing the Confusion

Considering the emergence of non-standard acceptance of SI prefixes.

For a More Transparent Governance of Open Source
From Communications of the ACM

For a More Transparent Governance of Open Source

Seeking the best governance models for FOSS projects.

Learning to Live with Privacy-Preserving Analytics
From Communications of the ACM

Learning to Live with Privacy-Preserving Analytics

Seeking to close the gap between research and real-world applications of PPAs.

Lost in Afghanistan: Can the World Take ICT4D Seriously?
From Communications of the ACM

Lost in Afghanistan: Can the World Take ICT4D Seriously?

Seeking to maximize the value of information and communication technologies for development research.

The Parchment Path?
From Communications of the ACM

The Parchment Path?

Is there ever a time when learning is not of value—for its own sake?

Conjoined Twins: Artificial Intelligence and the Invention of Computer Science
From Communications of the ACM

Conjoined Twins: Artificial Intelligence and the Invention of Computer Science

How artificial intelligence and computer science grew up together.

Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society
From Communications of the ACM

Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society

Searching for improved algorithmic accountability.

Decentraland: The Alleged Decentralization of Blockchain Applications
From Communications of the ACM

Decentraland: The Alleged Decentralization of Blockchain Applications

Breaking down the blockchain.

Updates, Threats, and Risk Management
From Communications of the ACM

Updates, Threats, and Risk Management

Revisiting a recent column considering security updates.

Ethics as a Participatory and Iterative Process
From Communications of the ACM

Ethics as a Participatory and Iterative Process

Facilitating ethical reflection, inquiry, and deliberation.

Please Report Your Compute
From Communications of the ACM

Please Report Your Compute

Seeking consistent means of measure.

Cyber Efficiency and Cyber Resilience
From Communications of the ACM

Cyber Efficiency and Cyber Resilience

Complementary objectives competing for the same resources.

Where Is the Research on Cryptographic Transition and Agility?
From Communications of the ACM

Where Is the Research on Cryptographic Transition and Agility?

Gaps facing the industry as quantum safe algorithms move closer to standardization.

All Sliders to the Right
From Communications of the ACM

All Sliders to the Right

Hardware overkill.

Contracting for Artificial Intelligence
From Communications of the ACM

Contracting for Artificial Intelligence

Considering the promises and perils of contracting for the use of artificial intelligence tools and data.

Metrics for Success
From Communications of the ACM

Metrics for Success: Why and How to Evaluate Privacy Choice Usability

Assessing the usability of choice and consent mechanisms.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account