acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Learning to Live with Privacy-Preserving Analytics
From Communications of the ACM

Learning to Live with Privacy-Preserving Analytics

Seeking to close the gap between research and real-world applications of PPAs.

Lost in Afghanistan: Can the World Take ICT4D Seriously?
From Communications of the ACM

Lost in Afghanistan: Can the World Take ICT4D Seriously?

Seeking to maximize the value of information and communication technologies for development research.

Computer-Related Risks and Remediation Challenges
From Communications of the ACM

Computer-Related Risks and Remediation Challenges

Surveying the nontechnical issues interwoven with computer-related technologies.

The Parchment Path?
From Communications of the ACM

The Parchment Path?

Is there ever a time when learning is not of value—for its own sake?

Conjoined Twins: Artificial Intelligence and the Invention of Computer Science
From Communications of the ACM

Conjoined Twins: Artificial Intelligence and the Invention of Computer Science

How artificial intelligence and computer science grew up together.

Breaking Up a Digital Monopoly
From Communications of the ACM

Breaking Up a Digital Monopoly

How to decompose a vertically integrated digital monopoly to enable competitive services based on a shared data structure.

Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society
From Communications of the ACM

Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society

Searching for improved algorithmic accountability.

Decentraland: The Alleged Decentralization of Blockchain Applications
From Communications of the ACM

Decentraland: The Alleged Decentralization of Blockchain Applications

Breaking down the blockchain.

Unfair Automated Hiring Systems Are Everywhere
From ACM Careers

Unfair Automated Hiring Systems Are Everywhere

The U.S. Federal Trade Commission urgently needs to regulate automated hiring systems.

Updates, Threats, and Risk Management
From Communications of the ACM

Updates, Threats, and Risk Management

Revisiting a recent column considering security updates.

Putting a Teaspoon of Programming into Other Subjects
From Communications of the ACM

Putting a Teaspoon of Programming into Other Subjects

Using teaspoon languages to integrate programming across myriad academic disciplines.

Ethics as a Participatory and Iterative Process
From Communications of the ACM

Ethics as a Participatory and Iterative Process

Facilitating ethical reflection, inquiry, and deliberation.

Please Report Your Compute
From Communications of the ACM

Please Report Your Compute

Seeking consistent means of measure.

Long-Term Mentoring for Computer Science Researchers
From Communications of the ACM

Long-Term Mentoring for Computer Science Researchers

Reaching out across computer science research communities.

NSF on Chien's Grand Challenge for Sustainability
From Communications of the ACM

NSF on Chien's Grand Challenge for Sustainability

This Viewpoint focuses on ways the computing community can contribute broadly to environmental sustainability and identifies NSF Directorate for Computer and Information...

Cyber Efficiency and Cyber Resilience
From Communications of the ACM

Cyber Efficiency and Cyber Resilience

Complementary objectives competing for the same resources.

Where Is the Research on Cryptographic Transition and Agility?
From Communications of the ACM

Where Is the Research on Cryptographic Transition and Agility?

Gaps facing the industry as quantum safe algorithms move closer to standardization.

All Sliders to the Right
From Communications of the ACM

All Sliders to the Right

Hardware overkill.

Contracting for Artificial Intelligence
From Communications of the ACM

Contracting for Artificial Intelligence

Considering the promises and perils of contracting for the use of artificial intelligence tools and data.

Designing an Ethical Tech Developer
From Communications of the ACM

Designing an Ethical Tech Developer

Studying how to improve teaching young people to ethically exercise the power of technology.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account