acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking
From ACM Opinion

The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking

Like the flap of a butterfly's wings causing a hurricane half a world away, the ripples of unintended consequences from Ron Rosenbaum's "Secrets of the Little Blue...

Funding Successful Research
From Communications of the ACM

Funding Successful Research

A proposal for result-based funding for research projects.

Can Computer Professionals and Digital Technology Engineers Help Reduce Gun Violence?
From Communications of the ACM

Can Computer Professionals and Digital Technology Engineers Help Reduce Gun Violence?

Ten idea seeds.

Ethics Viewpoints Efficacies
From Communications of the ACM

Ethics Viewpoints Efficacies

Seeking answers to ethical concerns.

Moods, Wicked Problems, and Learning
From Communications of the ACM

Moods, Wicked Problems, and Learning

Wicked problems and learning environments present tough mood challenges for leaders and teachers. Telepresence and sensory gadgets are unlikely to replace physical...

Academic Careers Workshop For Underrepresented Groups
From Communications of the ACM

Academic Careers Workshop For Underrepresented Groups

A longitudinal evaluation of the application of knowledge, skills, and attitudes of ACW participants.

A Copyright Challenge to Resales of Digital Music
From Communications of the ACM

A Copyright Challenge to Resales of Digital Music

A currently pending case will have significant implications for secondary markets in digital goods.

How Samsung Is Out-Innovating Apple
From ACM Opinion

How Samsung Is Out-Innovating Apple

There's no arguing that Apple set the standard for modern mobile devices with the iPhone and the iPad. It didn't take long after those two products launched for...

From ACM Opinion

View from Iran: World Needs Rules on Cyberattacks

The world needs a new international legal instrument on cyberspace, in light of the new waves of trans-border cyberattacks that have become a disturbing aspect...

President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy
From ACM Opinion

President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy

With the reintroduction of the much-maligned Cyber Intelligence Sharing and Protection Act scheduled for the day after the State of the Union, the House of Representatives...

The Threat of Silence
From ACM Careers

The Threat of Silence

For the past few months, some of the world's leading cryptographers have been keeping a closely guarded secret about a pioneering new invention.

Can Machines Learn Morality?
From ACM Opinion

Can Machines Learn Morality?

When John Brennan, President Obama's choice to be the next head of the CIA, appeared before a Senate committee yesterday, one question supplanted all others at...

­nseen, All-Out Cyber War on the ­.s. Has Begun
From ACM Opinion

­nseen, All-Out Cyber War on the ­.s. Has Begun

There's a war going on, and it's raging here at home—not in the streets or the fields, but on the Internet.

Phreaks and Geeks
From ACM Opinion

Phreaks and Geeks

One of the most heartfelt—and unexpected—remembrances of Aaron Swartz, who committed suicide last month at the age of 26, came from Yale professor Edward Tufte.

Geeks Are the New Guardians of Our Civil Liberties
From ACM Opinion

Geeks Are the New Guardians of Our Civil Liberties

A decade-plus of anthropological fieldwork among hackers and like-minded geeks has led me to the firm conviction that these people are building one of the most...

The Increasingly Blurry Line Between Big Data and Big Brother
From ACM Opinion

The Increasingly Blurry Line Between Big Data and Big Brother

The potential benefits of "big data" have been well described, both by us and others: the ability to spot flu trends earlier and potentially save lives, for example...

Eric Schmidt ­nloads on China in New Book
From ACM Opinion

Eric Schmidt ­nloads on China in New Book

Google executive chairman Eric Schmidt is brutally clear: China is the most dangerous superpower on Earth.

Inside the Targeted Attack on The New York Times
From ACM Opinion

Inside the Targeted Attack on The New York Times

The Chinese group behind the targeted attack on The New York Times was laser focused on accessing the email of a reporter and the newspaper’s former Beijing bureau...

A Fuzzy and Shifting Line Between Hacker and Criminal
From ACM Opinion

A Fuzzy and Shifting Line Between Hacker and Criminal

In January 2011, I was assigned to cover a hearing in Newark, where Daniel Spitler, then 26, stood accused of breaching AT&T's servers and stealing 114,000 email...

The Two Classes of Cyber Threats
From ACM Opinion

The Two Classes of Cyber Threats

There is one number that matters most in cybersecurity.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account