From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
Tech has always played a prominent role in the Bond franchise; it's a key element of the plot formula: Bond opens with a chase scene, the core mission is revealed...The Atlantic From ACM Opinion | November 16, 2012
Monday afternoon, just half a day before the polls opened, Prof. Mark Crispin Miller was feeling pessimistic about the electoral process.The New York Times From ACM Opinion | November 8, 2012
Security experts are pushing back against what they see as alarmist rhetoric from U.S. Department of Homeland Security secretary Janet Napolitano and Department...CSO Online From ACM TechNews | November 8, 2012
When Barack Obama was sworn in four years ago for his first term, there was genuine optimism that he would make meaningful improvements to the security of the nation's...Threatpost From ACM Opinion | November 8, 2012
Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self.The New York Times From ACM Opinion | November 8, 2012
Many people cite Albert Einstein's aphorism "Everything should be made as simple as possible, but no simpler." Only a handful, however, have had the opportunity...The New York Times From ACM Opinion | November 1, 2012
In a Monday article, we described the security and reliability problems that have undermined public confidence in electronic voting machines within the United States...ArsTechnica From ACM Opinion | October 25, 2012
The FBI recently put out a mobile malware alert, providing us with a sobering reminder of this "evil software" for phones and tablets.Wired From ACM Opinion | October 25, 2012
Seeking solutions to concerns that go beyond the engineering of the smart grid.Timothy Kostyk, Joseph Herkert From Communications of the ACM | November 1, 2012
A multipronged approach to preparing computer science teachers is critical to success.Aman Yadav, John T. Korb From Communications of the ACM | November 1, 2012
Assessing the first phase of the trial based on claims that Google's Android platform infringes Oracle's Java-related copyrights and patents.
Pamela Samuelson From Communications of the ACM | November 1, 2012
Security research can be improved by more effectively sharing what is learned from attacks on information systems.David Basin, Srdjan Capkun From Communications of the ACM | November 1, 2012
Since the days of Alan Turing, the promise of a digital computer has been that of a universal machine, one that can be a word processor one minute and a robot brain...Forbes From ACM Opinion | October 23, 2012
Defense secretary Leon Panetta couldn't resist, could he? He couldn't fight the urge to dig deep into the information security cliché handbook and yank out that...Threatpost From ACM Opinion | October 22, 2012
As soon as Sherry Turkle arrived at the studio for her Fresh Air interview, she realized she'd forgotten her phone.NPR From ACM Opinion | October 19, 2012
There's much to like about "This Machine Kills Secrets," Andy Greenberg's well-reported history of WikiLeaks and the many projects it has inspired, but one unintentionally...The New York Times From ACM Opinion | October 18, 2012
Craig Venter imagines a future where you can download software, print a vaccine, inject it, and presto! Contagion averted.Wired From ACM Opinion | October 17, 2012