acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Rebecca Mackinnon Discusses Threats to Internet Freedom: Part 1
From ACM News

Rebecca Mackinnon Discusses Threats to Internet Freedom: Part 1

Rebecca MacKinnon shares insights about Internet freedom, including the roles and responsibilities of citizens, corporations, and governments.  

The Personalized Web Is Just an Interest Graph Away
From ACM Opinion

The Personalized Web Is Just an Interest Graph Away

You know how our social graphs are creeping into every aspect of our Web lives, from search results to coupons? Well, get ready for something a lot more personal...

Google Adds (even More) Links to the Pentagon
From ACM Opinion

Google Adds (even More) Links to the Pentagon

On Monday, the Defense Department’s best-known geek announced that she was leaving the Pentagon for a job at Google. It was an unexpected move: Washington and Mountain...

From ACM Opinion

Reading Over Your Shoulder: Social Readers and Privacy Law

My friends, who are generally well educated and intelligent, read a lot of garbage.

Cyberwar Is Already ­pon ­S
From ACM Opinion

Cyberwar Is Already ­pon ­S

In the nearly 20 years since David Ronfeldt and I introduced our concept of cyberwar, this new mode of conflict has become a reality.

Your Kinect Is Watching You
From ACM News

Your Kinect Is Watching You

There is a wave of concern—completely justified, to my mind—over the privacy implications of our increasing reliance on Facebook and Google. What most people don’t...

International Reactions to Google's New Privacy Policy
From ACM Opinion

International Reactions to Google's New Privacy Policy

Google's new privacy policy took effect last Thursday, following several weeks campaigning to educate users on the changes. The policy will allow them to consolidate...

­.s. Senators: No Time to Lose on Strengthening Cybersecurity
From ACM Opinion

­.s. Senators: No Time to Lose on Strengthening Cybersecurity

Four U.S. senators sound a warning on cybersecurity, comparing the present to the days prior to September 11, 2001. The system is blinking red, and we are failing...

From ACM Opinion

Https and Tor: Working Together to Protect Your Privacy and Security Online

This week EFF released a new version its HTTPS Everywhere extension for the Firefox browser and debuted a beta version of the extension for Chrome. EFF frequently...

From ACM Opinion

The Coming Entanglement: Bill Joy and Danny Hillis

Digital innovators Bill Joy, co-founder of Sun Microsystems, and Danny Hillis, co-founder of the Long Now Foundation, talk with Scientific American Executive Editor...

Web Privacy Standards: Easy to Break, Hard to Enforce
From ACM Opinion

Web Privacy Standards: Easy to Break, Hard to Enforce

Over the past week, Google has been called out for bypassing default privacy settings in both Safari and Internet Explorer in order to serve up advertising cookies...

Q&A: Chief Strategiest
From Communications of the ACM

Q&A: Chief Strategiest

ACM CEO John White talks about initiatives to serve the organization's professional members, increase international activities, and reform computer science education...

The Artificiality of Natural User Interfaces
From Communications of the ACM

The Artificiality of Natural User Interfaces

Toward user-defined gestural interfaces.

Training Users vs. Training Soldiers
From Communications of the ACM

Training Users vs. Training Soldiers: Experiences from the Battlefield

How military training methods can be applied to more effectively teach computer users.

The Idea Idea
From Communications of the ACM

The Idea Idea

What if practices rather than ideas are the main source of innovation?

Do Software Copyrights Protect What Programs Do?
From Communications of the ACM

Do Software Copyrights Protect What Programs Do?

A case before the European Court of Justice has significant implications for innovation and competition in the software industry.

War 2.0: Cyberweapons and Ethics
From Communications of the ACM

War 2.0: Cyberweapons and Ethics

Considering the basic ethical questions that must be resolved in the new realm of cyberwarfare.

From ACM Opinion

The Internet Is Broken; We Need to Start Over

Last year, the level and ferocity of cyberattacks on the Internet reached such a horrendous level that some are now thinking the unthinkable: let the Internet wither...

A High-Tech War on Leaks
From ACM Opinion

A High-Tech War on Leaks

Back in 2006, before the Obama administration made leak prosecutions routine, a panel of three federal appeals court judges in New York struggled to decide whether...

From ACM Opinion

Researchers Detail Flaw in Online Cryptography, but Don't Panic

First, the bad news: A small number of active RSA public encryption keys, a popular type of encryption protocol that secures billions of online transactions, offer...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account