acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Web3 Threatens to Segregate Our Online Lives
From ACM Opinion

Web3 Threatens to Segregate Our Online Lives

Governance tokens may seem like a way to moderate content, but they only give the appearance of democracy.

Human Autonomy in the Age of AI
From ACM Opinion

Human Autonomy in the Age of AI

Current AI policy recommendations differ on what the risks to human autonomy are

The Troubling Future for Facial Recognition Software
From Communications of the ACM

The Troubling Future for Facial Recognition Software

Considering the myriad perspectives of facial recognition technology.

Bursting a Few Balloons Regarding the Famous DARPA Red Balloon Challenge
From Communications of the ACM

Bursting a Few Balloons Regarding the Famous DARPA Red Balloon Challenge

A balloon's-eyeperspective on a unique distributed, time-critical, geo-location problem.

Futures of Digital Governance
From Communications of the ACM

Futures of Digital Governance

Seeking to increase the interoperability among the technical and social sciences toward new forms of governance associated with digital technology.

A Call to Action
From Communications of the ACM

A Call to Action

Digital dreams have become nightmares: What we must do.

Copyright Implications of Emulation Programs
From Communications of the ACM

Copyright Implications of Emulation Programs

How emulation programs might be affected by new claims of copyright infringement.

The Metaverse Will Require Computing Tech No One Knows How to Build
From ACM Opinion

The Metaverse Will Require Computing Tech No One Knows How to Build

Experts believe building the metaverse will require nearly every kind of chip to be an order of magnitude more powerful than it is today

Why a Safe Metaverse Is a Must
From ACM Opinion

Why a Safe Metaverse Is a Must

Virtual worlds need strong, enforceable rules to avoid the harassment and stalking common on social media platforms

The Inevitability of Trusted Third Parties
From ACM Opinion

The Inevitability of Trusted Third Parties

The search for a crypto use case continues

The Strange Allure of the Blockchain
From ACM Opinion

The Strange Allure of the Blockchain

Are we too aggressively looking to replace the danger of unjust financial systems with wildly risky alternative currencies?

Becoming Universal
From Communications of the ACM

Becoming Universal

A new history of modern computing.

Is Your Autonomous Vehicle as Smart as You Expected?
From Communications of the ACM

Is Your Autonomous Vehicle as Smart as You Expected?

Suggesting a better route to evaluate autonomous vehicles' smartness.

A Brave New World of Mediated Online Discourse
From Communications of the ACM

A Brave New World of Mediated Online Discourse

Is artificial intelligence up to the task of managing online discourse in social networks?

Facebook's Unglamorous Mistakes
From ACM Opinion

Facebook's Unglamorous Mistakes

Facebook's little mistakes have big consequences, too, but only for us

Individual AI, a New Technology that Will Change Our World?
From ACM Opinion

Individual AI, a New Technology that Will Change Our World?

Is the next version of AI a technological symbiosis of the human brain and the computer system?

Save Social Media by Treating It like a City
From ACM Opinion

Save Social Media by Treating It like a City

Make online spaces more similar to offline ones to limit the reach of bad actors and keep people safe

Even If Users Do Not Read Security Directives, Their Behavior Is Not So Catastrophic
From Communications of the ACM

Even If Users Do Not Read Security Directives, Their Behavior Is Not So Catastrophic

Turning believers into nonbelievers.

Artificial Intelligence Across Company Borders
From Communications of the ACM

Artificial Intelligence Across Company Borders

Enabling effective cross-company AI without data disclosure.

The Long Road Ahead to Transition to Post-Quantum Cryptography
From Communications of the ACM

The Long Road Ahead to Transition to Post-Quantum Cryptography

Anticipating the output of the competition for new cryptographic algorithms.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account