acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Imposing Security
From ACM Opinion

Imposing Security

Three computer bugs this year exposed passwords, e-mails, financial data, and other kinds of sensitive information connected to potentially billions of people.

Spy vs. Spy
From ACM Opinion

Spy vs. Spy

Last month, Attorney General Eric Holder announced that the United States was charging members of the Chinese military with economic espionage.

How the Nsa Could Bug Your Powered-Off Phone, and How to Stop Them
From ACM Opinion

How the Nsa Could Bug Your Powered-Off Phone, and How to Stop Them

Just because you turned off your phone doesn't mean the NSA isn't using it to spy on you.

Why Did the Justice Department Indict Five Chinese Military Officers?
From ACM Opinion

Why Did the Justice Department Indict Five Chinese Military Officers?

At first glance, the Justice Department's 31-count indictment of five Chinese military officers for hacking into the computers of six American corporations, in...

China's Cyber-Generals Are Reinventing the Art of War
From ACM Opinion

China's Cyber-Generals Are Reinventing the Art of War

The conventional wisdom is that the future of war will involve private robot armies, predator drones carrying out precision strikes, and maybe even the militarization...

Man Behind the First Computer Password: It's Become a Nightmare
From ACM Opinion

Man Behind the First Computer Password: It's Become a Nightmare

In the early 1960s, Fernando Corbató helped deploy the first known computer password.

Beyond Data and Analysis
From Communications of the ACM

Beyond Data and Analysis

Why business analytics and big data really matter for modern business organizations.

The Logic of Logging
From Communications of the ACM

The Logic of Logging

And the illogic of PDF.

Avalanches Are Coming
From Communications of the ACM

Avalanches Are Coming

Computing technology has generated conditions for radical transformations of jobs and professions — including education. How shall we cope?

FUD
From Communications of the ACM

FUD: A Plea For Intolerance

Relying on dubious claims can cause researchers to focus on the wrong questions and organizations to misdirect security spending.

Owning and Using
From Communications of the ACM

Owning and Using

On vital and supporting systems.

EMV
From Communications of the ACM

EMV: Why Payment Systems Fail

What lessons might we learn from the chip cards used for payments in Europe, now that the U.S. is adopting them too?

Secrets, Lies and Snowden's Email: Why I Was Forced to Shut Down Lavabit
From ACM Opinion

Secrets, Lies and Snowden's Email: Why I Was Forced to Shut Down Lavabit

My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation...

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?
From ACM Opinion

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?

There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...

The Internet's History Isn’t As "open" As You Think
From ACM Opinion

The Internet's History Isn’t As "open" As You Think

This spring, the Federal Communications Commission is deciding how to regulate the "Open Internet"—a term it uses to refer to the movement for net neutrality.

Ungoogle Me: The Case For Scrubbing Search Results
From ACM Opinion

Ungoogle Me: The Case For Scrubbing Search Results

The Internet has much to say about the recent ruling by the Court of Justice of the European Union, which determines that if a person wants some personal information...

Who Watches the Watchers? Big Data Goes ­nchecked
From ACM Opinion

Who Watches the Watchers? Big Data Goes ­nchecked

The National Security Agency might be tracking your phone calls. But private industry is prying far more deeply into your life.

Do We Need Asimov's Laws?
From ACM News

Do We Need Asimov's Laws?

In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...

Ordering Google to Forget
From ACM Opinion

Ordering Google to Forget

In a ruling that could undermine press freedoms and free speech, the highest court of the European Union said on Tuesday that Google must comply with requests from...

Glenn Greenwald's Pulse-Pounding Tale of Breaking the Snowden Leaks
From ACM Opinion

Glenn Greenwald's Pulse-Pounding Tale of Breaking the Snowden Leaks

In June 2013, Edward Snowden was sitting in his room at the Mira hotel in Hong Kong, watching the world react to the first of his explosive leaks about the NSA's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account