acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Software Professionals, Malpractice Law, and Codes of Ethics
From Communications of the ACM

Software Professionals, Malpractice Law, and Codes of Ethics

In pursuit of professional status for computing professionals.

Understanding Law and the Rule of Law
From Communications of the ACM

Understanding Law and the Rule of Law: A Plea to Augment CS Curricula

Why law matters for computer scientists and other folk.

The 10 Best Practices for Remote Software Engineering
From Communications of the ACM

The 10 Best Practices for Remote Software Engineering

Focusing on the human element of remote software engineer productivity.

When Hackers Were Heroes
From Communications of the ACM

When Hackers Were Heroes

The complex legacy of Steven Levy's obsessive programmers.

Reflections on Black in Computing
From Communications of the ACM

Reflections on Black in Computing

Seeking to improve systemic fairness in the computing realm.

From Remote Work to Working From Anywhere
From Communications of the ACM

From Remote Work to Working From Anywhere

Tracing temporary work modifications resulting in permanent organizational changes.

The Transformation of Patient-Clinician Relationships with AI-based Medical Advice
From Communications of the ACM

The Transformation of Patient-Clinician Relationships with AI-based Medical Advice

A "bring your own algorithm" era in healthcare.

What Can the Maker Movement Teach Us About the Digitization of Creativity?
From Communications of the ACM

What Can the Maker Movement Teach Us About the Digitization of Creativity?

Experimenting with the creative process.

Science Is Not Another Opinion
From Communications of the ACM

Science Is Not Another Opinion

The issue is not who has the "truth," but whose claims deserve more credence.

What To Do About Deepfakes
From Communications of the ACM

What To Do About Deepfakes

Seeking to reap the positive uses of synthetic media while minimizing or preventing negative societal impact.

Informing California Privacy Regulations with Evidence from Research
From Communications of the ACM

Informing California Privacy Regulations with Evidence from Research

Designing and testing 'Do Not Sell My Personal Information' icons.

The Push for Stricter Rules for Internet Platforms
From Communications of the ACM

The Push for Stricter Rules for Internet Platforms

Considering the origins, interpretations, and possible changes to Communications Decency Act §230 amid an evolving online environment.

Let's Not Dumb Down the History of Computer Science
From Communications of the ACM

Let's Not Dumb Down the History of Computer Science

Donald Knuth on the best way to recognize the history of computer science.

Polanyi's Revenge and AI's New Romance with Tacit Knowledge
From Communications of the ACM

Polanyi's Revenge and AI's New Romance with Tacit Knowledge

Artificial intelligence systems need the wisdom to know when to take advice from us and when to learn from data.

Cybersecurity
From Communications of the ACM

Cybersecurity: Is It Worse than We Think?

Evaluating actual implementations and practices versus stated goals.

When Permissioned Blockchains Deliver More Decentralization Than Permissionless
From Communications of the ACM

When Permissioned Blockchains Deliver More Decentralization Than Permissionless

Considerations for the governance of distributed systems.

Excessive Use of Technology
From Communications of the ACM

Excessive Use of Technology: Can Tech Providers be the Culprits?

Seeking to assess the possible responsibility of tech providers for excessive use patterns.

The Immortal Soul of an Old Machine
From Communications of the ACM

The Immortal Soul of an Old Machine

Taking apart a book to figure out how it works.

Content Moderation Modulation
From Communications of the ACM

Content Moderation Modulation

Deliberating on how to regulate—or not regulate—online speech in the era of evolving social media.

Cybersecurity Research for the Future
From Communications of the ACM

Cybersecurity Research for the Future

Considering the wide range of technological and societal trade-offs associated with cybersecurity.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account