From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?Wired From ACM Opinion | February 3, 2014
Many of us now expect our online activities to be recorded and analyzed, but we assume the physical spaces we inhabit are different.Scientific American From ACM Opinion | January 31, 2014
Starting next week, the Internet is going to look very different—and ICANN Chief Executive Fadi Chehade is the one who'll get both the credit and the blame.CNET From ACM Opinion | January 29, 2014
Technology companies will soon be able to disclose more details about the number of national security orders and requests they receive, according to a joint statement...The Washington Post From ACM Opinion | January 29, 2014
In Spike Jonze's Oscar-nominated, futuristic film 'Her,' computers compose music, carry on seamless conversations with humans, organize emails instantaneously,...The Wall Street Journal From ACM Opinion | January 29, 2014
Ever since virtual worlds and online games emerged in the mainstream consciousness around 2005, the media has insisted on framing them as escapist fantasies.Slate From ACM Opinion | January 28, 2014
Sebastian Thrun was instrumental in building Google's self-driving car and Glass projects, and helped launch the company's Google X wing to spearhead "moonshot"...GigaOm From ACM Opinion | January 28, 2014
Privacy concerns have been ignited by "NameTag," a facial-recognition app designed to reveal personal information after analyzing photos taken on mobile devices...The Atlantic From ACM Opinion | January 27, 2014
For all its success, Google's famous Page Rank algorithm has never understood a word of the billions of Web pages it has directed people to over the years.Technology Review From ACM Opinion | January 27, 2014
Leading members of the U.S. cryptography and information-security research communities express their outrage over U.S. surveillance practices. .S. Cryptography and Information Security Researchers From ACM News | January 24, 2014
Assessing the benefits and challenges of knowledge spillovers.Marco Ceccagnoli, Chris Forman, Peng Huang, D. J. Wu From Communications of the ACM | February 1, 2014
Providing students, teachers, and parents with a better understanding of computer science and programming.Tim Bell From Communications of the ACM | February 1, 2014
Evaluating the trade-offs involved in cybersecurity professionalization.Diana L. Burley, Jon Eisenberg, Seymour E. Goodman From Communications of the ACM | February 1, 2014