acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Do Software Copyrights Protect What Programs Do?
From Communications of the ACM

Do Software Copyrights Protect What Programs Do?

A case before the European Court of Justice has significant implications for innovation and competition in the software industry.

War 2.0: Cyberweapons and Ethics
From Communications of the ACM

War 2.0: Cyberweapons and Ethics

Considering the basic ethical questions that must be resolved in the new realm of cyberwarfare.

From ACM Opinion

The Internet Is Broken; We Need to Start Over

Last year, the level and ferocity of cyberattacks on the Internet reached such a horrendous level that some are now thinking the unthinkable: let the Internet wither...

A High-Tech War on Leaks
From ACM Opinion

A High-Tech War on Leaks

Back in 2006, before the Obama administration made leak prosecutions routine, a panel of three federal appeals court judges in New York struggled to decide whether...

From ACM Opinion

Researchers Detail Flaw in Online Cryptography, but Don't Panic

First, the bad news: A small number of active RSA public encryption keys, a popular type of encryption protocol that secures billions of online transactions, offer...

Cyberwar Is the New Yellowcake, Fueling a Cybersecurity-Industrial Complex
From ACM Opinion

Cyberwar Is the New Yellowcake, Fueling a Cybersecurity-Industrial Complex

In last month's State of the Union address, President Obama called on Congress to pass "legislation that will secure our country from the growing dangers of cyber...

From ACM Opinion

A Cyber Risk to the ­.s.

In a recent briefing to Congress about worldwide threats, FBI Director Robert S. Mueller III said that the danger of cyberattacks will equal or surpass the danger...

From ACM Opinion

No Objections to Nano?

Some forms of biotechnology have become notoriously controversial. Genetic modification of crops, for example, altered the food supply in ways some consumers...

A Discussion With David Farber: Bandwidth, Cyber Security, and the Obsolescence of the Internet
From ACM TechNews

A Discussion With David Farber: Bandwidth, Cyber Security, and the Obsolescence of the Internet

Internet technology veteran David Farber projects that within a decade, computers will be outfitted with optical connections rather than pins for networking, and...

From ACM Opinion

Facebook Is Using You

Last week, Facebook filed documents with the government that will allow it to sell shares of stock to the public. It is estimated to be worth at least $75 billion...

'a Clockwork Orange' Strikes 40
From ACM Opinion

'a Clockwork Orange' Strikes 40

The New York Times recently ran an opinion piece about the concept of a morality pill, a theoretical-but-apparently-not-implausible panacea for humankind's ethical...

From ACM Opinion

Privacy, Technology, and Law

Every day, those of us who live in the digital world give little bits of ourselves away. On Facebook and LinkedIn. To servers that store our email, Google searches...

From ACM Opinion

How to Tackle Cybersecurity

There is a right way and a wrong way to address cybersecurity.

Beyond Sopa
From ACM Opinion

Beyond Sopa

We welcomed the collapse this month of two flawed bills to prevent online piracy, bills that could have stifled speech and undermined Internet safety. But piracy...

How Can the U.s. Seize a 'hong Kong Site' Like Megaupload?
From ACM Opinion

How Can the U.s. Seize a 'hong Kong Site' Like Megaupload?

The Megaupload takedown, and the arrest of its key employees, might seem to vindicate late 1990s worries about the Internet and jurisdiction. Does putting a site...

From ACM Opinion

Why 2012, Despite Privacy Fears, Isn't Like Orwell's 1984

Last week was a remarkable one for the Web: A week that proved George Orwell's "Nineteen Eighty-Four" incredibly prescient yet woefully incorrect.

What Have We Learned About Software Engineering?
From Communications of the ACM

What Have We Learned About Software Engineering?

Upon closer examination, everything old appears to be new again in the realm of software engineering.

Emotion and Security
From Communications of the ACM

Emotion and Security

Examining the role of human emotional response in making complex security-related decisions.

Wanton Acts of Debuggery
From Communications of the ACM

Wanton Acts of Debuggery

Keep your debug messages clear, useful, and not annoying.

Yet Another Technology Cusp
From Communications of the ACM

Yet Another Technology Cusp: Confusion, Vendor Wars, and Opportunities

Considering the unexpected risks associated with seemingly minor technological changes.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account