Broadening the conversation about scholars and scholarship in computing and information research.Batya Friedman From Communications of the ACM | July 1, 2014
Effective teaching practices for broadening participation in computer science.
Jane Margolis, Joanna Goode, Gail Chapman, Jean J. Ryoo From Communications of the ACM | July 1, 2014
Considering the opportunities and challenges for commercial firms involved with government business process outsourcing.Mari Sako From Communications of the ACM | July 1, 2014
Teaching computing ethics in a manner that allows students to address both abstract ethical knowledge and actual ethical practice.Chuck Huff, Almut Furchert From Communications of the ACM | July 1, 2014
The chief of streaming-TV start-up Aereo has said his mission to bring unbundled broadcast TV to the Internet has greater stakes than just the fate of his company—and...CNET From ACM Opinion | June 26, 2014
An Irish judge has rendered a preliminary judgment that may have sweeping consequences for U.S. e-commerce firms.The Washington Post From ACM Opinion | June 25, 2014
China has vastly expanded higher education over the past three decades—in 1982, less than 1 percent of China’s twenty-somethings had attended college; by 2010,...Bloomberg Businessweek From ACM Opinion | June 18, 2014
A year after Edward Snowden shocked citizens with details of how much of their lives are being snapped up by the National Security Agency, tech giants have sounded...Politico From ACM Opinion | June 10, 2014
"Learn to Code!" This imperative to program seems to be everywhere these days. Bill Gates and Mark Zuckerberg recently donated ten million dollars to Code.org,...The New Yorker From ACM Opinion | June 9, 2014
Last month, Attorney General Eric Holder announced that the United States was charging members of the Chinese military with economic espionage.The New Yorker From ACM Opinion | June 5, 2014
As any historian, psychologist, sociologist, or scientist will tell you, the truth of an idea has very little to do with how fast it spreads and how well it's believed...Slate From ACM Opinion | June 2, 2014
At first glance, the Justice Department's 31-count indictment of five Chinese military officers for hacking into the computers of six American corporations, in...Slate From ACM Opinion | June 2, 2014
Computing technology has generated conditions for radical transformations of jobs and professions — including education. How shall we cope?Peter J. Denning From Communications of the ACM | June 1, 2014
Relying on dubious claims can cause researchers to focus on the wrong questions and organizations to misdirect security spending.
Dinei Florêncio, Cormac Herley, Adam Shostack From Communications of the ACM | June 1, 2014