acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

From Interests to Values
From Communications of the ACM

From Interests to Values

Computer science is not that difficult but wanting to learn it is.

Geography Is Alive and Well in Virtual Teams
From Communications of the ACM

Geography Is Alive and Well in Virtual Teams

Just because a team is virtual, it doesn't mean geography is dead.

The Campaign to Terrify You About Emp
From ACM Opinion

The Campaign to Terrify You About Emp

From Newt Gingrich to a Congressional "EMP Caucus," some conservatives warn the electronics-frying blast could pose gravely underestimated dangers to the U.S.

Could What Happened to Myspace Happen to Facebook?
From ACM Opinion

Could What Happened to Myspace Happen to Facebook?

MySpace fell from grace for several reasons. First, they sacrificed the service's integrity in pursuit of monetization. For those who remember, the user experience...

From ACM News

­.s. Cyber Approach 'too Predictable' For One Top General

The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...

From ACM News

The Race to Zero: Speech By Andrew Haldane

In a speech at the International Economic Association 16th World Congress in Beijing, Andrew Haldane, Executive Director for Financial Stability and member of...

From ACM News

Former CIA Director: Build a New Internet to Improve Cybersecurity

The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George...

From ACM Opinion

A Gold Standard in Cyber-Defense

The history of Internet security is both worrisome and instructive. When the first virus — the "Morris worm"—was launched in 1988, the Internet was a closed system...

Should the Government Need a Search Warrant to Track Your Car with Gps?
From ACM News

Should the Government Need a Search Warrant to Track Your Car with Gps?

The Supreme Court ended its term with a high-profile ruling that violent video games are protected by the First Amendment, but a bigger technology decision could...

From ACM News

Protect Your Computer and Phone from Illegal Police Searches

Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your...

Why Lulzsec Had No Choice but to Disband
From ACM Opinion

Why Lulzsec Had No Choice but to Disband

After just 50 days, the group said it was ceasing individual operations. Why, when you might have thought things were going so well?

From ACM Opinion

Eff and Bitcoin

For several months, EFF has been following the movement around Bitcoin, an electronic payment system that touts itself as "the first decentralized digital currency...

From ACM Opinion

Free to Search and Seize

This spring was a rough season for the Fourth Amendment.

Non-Myths About Programming
From Communications of the ACM

Non-Myths About Programming

Viewing computer science in a broader context to dispel common misperceptions and provide more accurate guidance to students who are...

The Status of Women of Color in Computer Science
From Communications of the ACM

The Status of Women of Color in Computer Science

Addressing the challenges of increasing the number of women of color in computing and ensuring their success.

Too Many Copyrights?
From Communications of the ACM

Too Many Copyrights?

Reinstituting formalities — notice of copyright claims and registration requirements — could help address problems related to too many copyrights that last for...

Values in Design
From Communications of the ACM

Values in Design

Focusing on socio-technical design with values as a critical component in the design process.

Driving Power in Global Supply Chains
From Communications of the ACM

Driving Power in Global Supply Chains

Supply chains are increasingly global. We pour energy into managing them efficiently, with their risks and rewards...

From ACM Opinion

China's Cyberassault on America

In justifying U.S. involvement in Libya, the Obama administration cited the "responsibility to protect" citizens of other countries when their governments engage...

From ACM News

All Your Bitcoins Are Ours

Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account