acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

5 Ways We Must Regulate Drones at the ­.s. Border
From ACM Opinion

5 Ways We Must Regulate Drones at the ­.s. Border

Border patrol agents have Predator drones at their disposal, and using them has the potential to become a serious breach of privacy — but it also could be a terrific...

The Culture Wars Invade Science Fiction
From ACM Opinion

The Culture Wars Invade Science Fiction

Theodore Beale had a big day when the nominations for science fiction's annual Hugo Awards were announced last month: He received two nominations for his editing...

New Ways to Crash the Market
From ACM Opinion

New Ways to Crash the Market

Five years ago, on the afternoon of May 6, 2010, the Dow and the S. & P. fell more than six per cent in a matter of minutes, losing a trillion dollars in value.

The White House Just Snagged One of the Most Valuable Players in the Tech Policy World
From ACM Opinion

The White House Just Snagged One of the Most Valuable Players in the Tech Policy World

The White House is adding one of the tech policy world's most valuable players to its roster: Princeton Professor Ed Felten.

'rise of the Robots' and 'shadow Work'
From ACM Opinion

'rise of the Robots' and 'shadow Work'

In the late 20th century, while the blue-collar working class gave way to the forces of globalization and automation, the educated elite looked on with benign condescension...

Why Nsa Surveillance Is Worse Than You've Ever Imagined
From ACM Opinion

Why Nsa Surveillance Is Worse Than You've Ever Imagined

Last summer, after months of encrypted emails, I spent three days in Moscow hanging out with Edward Snowden for a Wired cover story.

Why the Ruling Against the Nsa's Phone Records Program Could Have Huge Implications
From ACM Opinion

Why the Ruling Against the Nsa's Phone Records Program Could Have Huge Implications

A federal appeals court ruling that the National Security Agency's collection of millions of Americans' phone records is illegal could undercut more than just that...

The Illegal Phone-Data Sweeps
From ACM Opinion

The Illegal Phone-Data Sweeps

There is a lot to praise in the powerful ruling issued by a three-judge federal appeals panel in New York on Thursday, which held that the government's vast, continuing...

Eff at 25: Remembering the Case that Established Code as Speech
From ACM Opinion

Eff at 25: Remembering the Case that Established Code as Speech

One of EFF's first major legal victories was Bernstein v. Department of Justice, a landmark case that resulted in establishing code as speech and changed United...

Facebook Is Eating the Internet
From ACM Careers

Facebook Is Eating the Internet

Facebook, it seems, is unstoppable. The social publishing site, just 11 years old, is now the dominant force in American media.

You Can't Backdoor a Platform
From ACM Opinion

You Can't Backdoor a Platform

According to law enforcement and intelligence agencies, encryption should come with a backdoor.

Preparing For Warfare in Cyberspace
From ACM Opinion

Preparing For Warfare in Cyberspace

The Pentagon’s new 33-page cybersecurity strategy is an important evolution in how America proposes to address a top national security threat. It is intended to...

The Future of Sex: It Gets Better
From ACM Opinion

The Future of Sex: It Gets Better

When I was 10 years old, my friend Sarah and I found a newly minted copy of "The Joy of Sex" under her parents' bed.

Why the Entire Premise of Tor-Enabled Routers Is Ridiculous
From ACM Opinion

Why the Entire Premise of Tor-Enabled Routers Is Ridiculous

Ars recently reviewed two "Tor routers," devices that are supposed to improve your privacy by routing all traffic through the Tor anonymity network. Although the...

The Fbi's Stance on Encrypted Communications
From ACM Opinion

The Fbi's Stance on Encrypted Communications

Imagine an America where federal, state, and municipal law enforcement agencies cannot access critical communications, even when legally authorized to do so.

Should Law Enforcement Have the Ability to Access Encrypted Communications?
From ACM Opinion

Should Law Enforcement Have the Ability to Access Encrypted Communications?

People's distress over the privacy of their communications has never been more acute. Whether the fear is over U.S. surveillance or breaches by hackers of unknown...

Managing Your Digital Life
From Communications of the ACM

Managing Your Digital Life

Everyone should be able to manage their personal data with a personal information management system.

Teach Foundational Language Principles
From Communications of the ACM

Teach Foundational Language Principles

Industry is ready and waiting for more graduates educated in the principles of programming languages.

Oracle v. Google
From Communications of the ACM

Oracle v. Google: A High-Stakes Legal Fight For the Software Industry

Copyrighting APIs threatens significant harm to both consumers and the software industry.

What Are We Doing When We Teach Computing in Schools?
From Communications of the ACM

What Are We Doing When We Teach Computing in Schools?

Research on the cognitive, educational, and policy dimensions of teaching computing is critical to achieving "computer literacy."
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account