acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Security: The Lock and the Key to Blockchain's Future
From ACM Opinion

Security: The Lock and the Key to Blockchain's Future

For blockchain technology to fulfill its full potential, the security standard needs to mature

Silicon Valley Enabled Russian State Propaganda, and Now It's Too Late
From ACM Opinion

Silicon Valley Enabled Russian State Propaganda, and Now It's Too Late

Facebook and YouTube could have limited the reach of RT and Sputnik years ago, but they didn't

Why You Can't Rebuild Wikipedia with Crypto
From ACM Opinion

Why You Can't Rebuild Wikipedia with Crypto

Software engineer and Wikipedia editor talks about her Web3 skepticism

Intelligence and Comprehension
From ACM Opinion

Intelligence and Comprehension

What does it mean to say a computer model 'understands'?

What Are the Rules for Celebrities Promoting NFTs?
From ACM Opinion

What Are the Rules for Celebrities Promoting NFTs?

Non-fungible tokens are the next frontier of promotional content on social media, but right now, it's the Wild West.

Deep Learning Is a Bad Idea for Security
From ACM Opinion

Deep Learning Is a Bad Idea for Security

Deep learning must address some major issues before AI can scale more widely into security applications

Tech Sanctions Won't Sting Russia for a While
From ACM Opinion

Tech Sanctions Won't Sting Russia for a While

Restricting computing equipment sends an important message, but businesses will find ways around the rules

Human Autonomy in the Age of AI
From ACM Opinion

Human Autonomy in the Age of AI

Current AI policy recommendations differ on what the risks to human autonomy are

Futures of Digital Governance
From Communications of the ACM

Futures of Digital Governance

Seeking to increase the interoperability among the technical and social sciences toward new forms of governance associated with digital technology.

Copyright Implications of Emulation Programs
From Communications of the ACM

Copyright Implications of Emulation Programs

How emulation programs might be affected by new claims of copyright infringement.

Why a Safe Metaverse Is a Must
From ACM Opinion

Why a Safe Metaverse Is a Must

Virtual worlds need strong, enforceable rules to avoid the harassment and stalking common on social media platforms

The Inevitability of Trusted Third Parties
From ACM Opinion

The Inevitability of Trusted Third Parties

The search for a crypto use case continues

The Race to Save the Internet from Quantum Hackers
From ACM Opinion

The Race to Save the Internet from Quantum Hackers

The quantum computer revolution could break encryption, but more-secure algorithms can safeguard privacy

Why the Prospect of the IRS Using Facial Recognition Is So Alarming
From ACM Opinion

Why the Prospect of the IRS Using Facial Recognition Is So Alarming

The U.S. government should put more care and due diligence into its use and advocacy of facial recognition technology

Giving an AI Control of Nuclear Weapons: What Could Go Wrong?
From ACM Opinion

Giving an AI Control of Nuclear Weapons: What Could Go Wrong?

The challenge of autonomous nuclear weapons is a serious one that has received little attention

The Rise and Fall (and Rise) of Datasets
From ACM Opinion

The Rise and Fall (and Rise) of Datasets

Retired and redacted datasets flagged as harmful or biased continue to rear their ugly heads

The Strange Allure of the Blockchain
From ACM Opinion

The Strange Allure of the Blockchain

Are we too aggressively looking to replace the danger of unjust financial systems with wildly risky alternative currencies?

Open Source Intelligence
From ACM Opinion

Open Source Intelligence

Averting strategic surprises requires uncovering secrets hidden in plain sight

The Lives of Hidden Figures Matter in Computer Science Education
From Communications of the ACM

The Lives of Hidden Figures Matter in Computer Science Education

"I cannot work on what I cannot see . . ." —Katherine Goble, Hidden Figures

Data Science Meets Law
From Communications of the ACM

Data Science Meets Law

Learning Responsible AI together.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account