acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Ars Speaks with Vocal Nsa Critic Sen. Ron Wyden
From ACM Opinion

Ars Speaks with Vocal Nsa Critic Sen. Ron Wyden

As a series of top-secret NSA documents have been leaked over the past several weeks, the issue of widespread government surveillance has been front-and-center...

Justice For Alan Turing?
From ACM Opinion

Justice For Alan Turing?

What do we do with the knowledge that people not all that different from ourselves have behaved with astounding stupidity and cruelty, over and over again, in the...

Eff to Court: Forced Decryption ­nconstitutional
From ACM Opinion

Eff to Court: Forced Decryption ­nconstitutional

You shouldn't have to surrender your constitutional rights in order to safeguard your electronic privacy.

Could the Government Get a Search Warrant For Your Thoughts?
From ACM Opinion

Could the Government Get a Search Warrant For Your Thoughts?

We don't have a mind reading machine.

I'm Still Waiting For My Phone to Become My Wallet
From ACM Opinion

I'm Still Waiting For My Phone to Become My Wallet

During the sweltering heat wave earlier this month, it seemed too hot to wear much, carry much or do much of anything at all.

Technology to Protect Against Mass Surveillance
From ACM Opinion

Technology to Protect Against Mass Surveillance

In the past several weeks, EFF has received many requests for advice about privacy tools that provide technological shields against mass surveillance.

How Protecting Your Privacy Could Make You the Bad Guy
From ACM Opinion

How Protecting Your Privacy Could Make You the Bad Guy

There's a funny catch-22 when it comes to privacy best practices.

Money Models For MOOCs
From Communications of the ACM

Money Models For MOOCs

Considering new business models for massive open online courses.

Ultra-Low-Cost Computing and Developing Countries
From Communications of the ACM

Ultra-Low-Cost Computing and Developing Countries

Raspberry Pi and its potential in the "global South."

The Air Gap
From Communications of the ACM

The Air Gap: SCADA's Enduring Security Myth

Attempting to use isolation as a security strategy for critical systems is unrealistic in an increasingly connected world.

Cherry-Picking and the Scientific Method
From Communications of the ACM

Cherry-Picking and the Scientific Method

Software is supposed be a part of computer science, and science demands proof.

Success in Introductory Programming
From Communications of the ACM

Success in Introductory Programming: What Works?

How pair programming, peer instruction, and media computation have improved computer science education.

Overt Censorship
From Communications of the ACM

Overt Censorship: A Fatal Mistake?

Censorship of information often has the opposite effect by drawing attention to the censored material.

Nsa Can Reportedly Track Phones Even When They're Turned Off
From ACM Opinion

Nsa Can Reportedly Track Phones Even When They're Turned Off

The NSA has a diverse range of surveillance capabilities—from monitoring Google Maps use to sifting through millions of phone call records and spying on Web searches...

Your Creative, Open Hackathon Is Ripe For Legal Challenges
From ACM Opinion

Your Creative, Open Hackathon Is Ripe For Legal Challenges

NASA's Space Apps Challenge recently became the world's largest open hackathon, with over 8,000 participants spanning 44 countries.

Bradley Manning 'aiding the Enemy' Charge Is a Threat to Journalism
From ACM Opinion

Bradley Manning 'aiding the Enemy' Charge Is a Threat to Journalism

Thursday, Colonel Denise Lind, the judge in the Bradley Manning court martial, refused to dismiss the "aiding the enemy" charge.

How to Be an Email Survivalist
From ACM Opinion

How to Be an Email Survivalist

In the early 2000s it was the height of geek fashion to run your own email server—then along came Gmail with two gigabytes of free storage and excellent spam filtering...

Responding to Government Legal Demands For Customer Data
From ACM Opinion

Responding to Government Legal Demands For Customer Data

Today we have asked the Attorney General of the United States to personally take action to permit Microsoft and other companies to share publicly more complete...

From ACM Opinion

The Crypto-Currency Ecosystem

Just like the IP protocol, bitcoin is the culmination of several important advancements, all combining to form a paradigm-changing innovation.

Internet Inventor: No Technological Cure For Privacy Ills
From ACM Opinion

Internet Inventor: No Technological Cure For Privacy Ills

Is there technological solution for protecting people from online surveillance?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account