From Communications of the ACM
Digital innovation is not working in the interest of the whole of society. It is time to radically rethink its purpose without…
Filippo Gualtiero Blancato| March 1, 2024
A series of recent reports claim the U.S. education system is in a very severe crisis; others suggest the crisis is...Mark Guzdial From Communications of the ACM | February 1, 2011
Revisiting the need to educate professionals to defend against malware in its various guises.George Ledin From Communications of the ACM | February 1, 2011
How much are consumers willing to pay for broadband service? Our research estimates consumer willingness-to-pay...Gregory Rosston, Scott Savage, Donald Waldman From Communications of the ACM | February 1, 2011
Cyberterrorism is a concept that appears recurrently in contemporary media. This coverage is particularly interesting...Maura Conway From Communications of the ACM | February 1, 2011
This past June, Alan Rusbridger, the editor of The Guardian, phoned me and asked, mysteriously, whether I had any idea how to arrange a secure communication....The New York Times From ACM News | January 27, 2011
This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes ofreported...Electronic Frontier Foundation From ACM News | January 24, 2011
High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts...InfoWorld From ACM News | January 7, 2011
Here is how Jon Leibowitz, chairman of the U.S. Federal Trade Commission, describes the current state of affairs on the Internet: "Say I’m walking through a mall...Newsweek From ACM Opinion | January 4, 2011
As in the real world, cyberspace has bad neighborhoods. But unlike the real world, risks in cyberspace are not easy to spot—and the location of those digital...MSNBC From ACM Opinion | December 29, 2010
Seeking to improve the educational mechanisms for efficiently training large numbers of information security workers.Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou From Communications of the ACM | January 1, 2011
Privacy and confidentiality issues in cloud-based conference management systems reflect more universal themes.Mark D. Ryan From Communications of the ACM | January 1, 2011
You want to know how to get my attention?" Jason Kalich asked the audience rhetorically. "First off, don't bring me a good...Phillip G. Armour From Communications of the ACM | January 1, 2011
The easiest way to sum up the Web in 2010 is that it was a year of growth. The big got bigger and smaller companies came out of the woodwork with new plays on...CNET From ACM News | December 21, 2010
In May 2009, The Daily Telegraph set off a political storm in Britain when it detailed widespread expense-account abuse by members of Parliament. Among the claims...The New York Times From ACM Opinion | December 20, 2010
I recently wrote a white paper entitled “Dragons, Tigers, Pearls, and Yellowcake” in which I proposed four alternative scenarios for the Stuxnet worm other than...Forbes From ACM Opinion | December 17, 2010
In case you hadn't noticed, Google isn't just a Web search company any longer. In addition to online advertising, it's moving into operating system and application...The Washington Post From ACM Opinion | December 16, 2010