acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Hackers Could ­se 'the Internet of Things' to Turn Everyday Devices Into Paths of Attack
From ACM Opinion

Hackers Could ­se 'the Internet of Things' to Turn Everyday Devices Into Paths of Attack

The "Internet of Things" is great—we'll soon be able to build apps for our cars, thermostats, refrigerators, and more. But what happens when attackers get into...

The Art of Cyberwar
From ACM Opinion

The Art of Cyberwar

The New York Times’ front-page report last week that the Chinese army is hacking into America's most sensitive computer networks from a 12-story building outside...

What China's Hackers Get Wrong About Washington
From ACM Opinion

What China's Hackers Get Wrong About Washington

"Start asking security experts which powerful Washington institutions have been penetrated by Chinese cyberspies," report my colleagues Craig Timberg and Ellen...

Calling Out the Robocaller
From ACM Opinion

Calling Out the Robocaller

Last month, the Haggler was sitting at home when the phone rang.

The Mystery of Google Street View's Blurred Brooklyn Brownstone
From ACM Opinion

The Mystery of Google Street View's Blurred Brooklyn Brownstone

We've all had shifty neighbors.

The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking
From ACM Opinion

The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking

Like the flap of a butterfly's wings causing a hurricane half a world away, the ripples of unintended consequences from Ron Rosenbaum's "Secrets of the Little Blue...

Private ­.s. Firms Take Major Role Vs. Cyberattacks
From ACM Careers

Private ­.s. Firms Take Major Role Vs. Cyberattacks

When Kevin Mandia, a retired military cybercrime investigator, decided to expose China as a primary threat to U.S. computer networks, he didn't have to consult...

Funding Successful Research
From Communications of the ACM

Funding Successful Research

A proposal for result-based funding for research projects.

Can Computer Professionals and Digital Technology Engineers Help Reduce Gun Violence?
From Communications of the ACM

Can Computer Professionals and Digital Technology Engineers Help Reduce Gun Violence?

Ten idea seeds.

Ethics Viewpoints Efficacies
From Communications of the ACM

Ethics Viewpoints Efficacies

Seeking answers to ethical concerns.

Moods, Wicked Problems, and Learning
From Communications of the ACM

Moods, Wicked Problems, and Learning

Wicked problems and learning environments present tough mood challenges for leaders and teachers. Telepresence and sensory gadgets are unlikely to replace physical...

Academic Careers Workshop For Underrepresented Groups
From Communications of the ACM

Academic Careers Workshop For Underrepresented Groups

A longitudinal evaluation of the application of knowledge, skills, and attitudes of ACW participants.

A Copyright Challenge to Resales of Digital Music
From Communications of the ACM

A Copyright Challenge to Resales of Digital Music

A currently pending case will have significant implications for secondary markets in digital goods.

How Samsung Is Out-Innovating Apple
From ACM Opinion

How Samsung Is Out-Innovating Apple

There's no arguing that Apple set the standard for modern mobile devices with the iPhone and the iPad. It didn't take long after those two products launched for...

When Will the Internet Reach Its Limit (and How Do We Stop It from Happening)?
From ACM Opinion

When Will the Internet Reach Its Limit (and How Do We Stop It from Happening)?

The number of smartphones, tablets and other network-connected gadgets will outnumber humans by the end of the year.

From ACM Opinion

View from Iran: World Needs Rules on Cyberattacks

The world needs a new international legal instrument on cyberspace, in light of the new waves of trans-border cyberattacks that have become a disturbing aspect...

President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy
From ACM Opinion

President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy

With the reintroduction of the much-maligned Cyber Intelligence Sharing and Protection Act scheduled for the day after the State of the Union, the House of Representatives...

The Threat of Silence
From ACM Careers

The Threat of Silence

For the past few months, some of the world's leading cryptographers have been keeping a closely guarded secret about a pioneering new invention.

Can Machines Learn Morality?
From ACM Opinion

Can Machines Learn Morality?

When John Brennan, President Obama's choice to be the next head of the CIA, appeared before a Senate committee yesterday, one question supplanted all others at...

Invisible Fences
From ACM Opinion

Invisible Fences

When European farmers arrived in North America, they claimed it with fences.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account