acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

What, Exactly, Were Russians Trying to Do With Those Facebook Ads?
From ACM Opinion

What, Exactly, Were Russians Trying to Do With Those Facebook Ads?

Many questions remain about the ads purchased by Russian-linked accounts during the 2016 presidential election.

Facebook's Belated Awakening
From ACM Opinion

Facebook's Belated Awakening

Chastened by criticism that Facebook had turned a blind eye to Russia's manipulation of the social network to interfere in the 2016 election, the company's executives...

Amazon and Whole Foods
From Communications of the ACM

Amazon and Whole Foods: Follow the Strategy (and the Money)

Checking out the recent Amazon acquisition of Whole Foods.

Fintech Platforms and Strategy
From Communications of the ACM

Fintech Platforms and Strategy

Integrating trust and automation in finance.

What Can Agile Methods Bring to High-Integrity Software Development?
From Communications of the ACM

What Can Agile Methods Bring to High-Integrity Software Development?

Considering the issues and opportunities raised by Agile practices in the development of high-integrity software.

Facebook's Ad Scandal Isn't a 'fail,' It's a Feature
From ACM Opinion

Facebook's Ad Scandal Isn't a 'fail,' It's a Feature

What does it take to advertise on Facebook to people who openly call themselves "Jew haters" and want to know "how to burn Jews"? About $10 and 15 minutes, according...

I Helped Create Facebook's Ad Machine. Here's How I'd Fix It
From ACM Opinion

I Helped Create Facebook's Ad Machine. Here's How I'd Fix It

This month, two magnificently embarrassing public-relations disasters rocked the Facebook money machine like nothing else in its history.

Software Has a Serious Supply-Chain Security Problem
From ACM Opinion

Software Has a Serious Supply-Chain Security Problem

The warnings consumers hear from information security pros tend to focus on trust: Don't click web links or attachments from an untrusted sender.

Apple's Faceid Could Be a Powerful Tool For Mass Spying
From ACM Opinion

Apple's Faceid Could Be a Powerful Tool For Mass Spying

This Tuesday Apple unveiled a new line of phones to much fanfare, but one feature immediately fell under scrutiny:FaceID, a tool that would use facial recognition...

You Are Already Living Inside a Computer
From ACM Opinion

You Are Already Living Inside a Computer

Suddenly, everything is a computer. Phones, of course, and televisions. Also toasters and door locks, baby monitors and juicers, doorbells and gas grills. Even ...

Why the Iphone X's Face Id Is a Terrible Way to Secure Your Data
From ACM Opinion

Why the Iphone X's Face Id Is a Terrible Way to Secure Your Data

The new iPhone X puts face recognition front and centre. Why? Because it is the quickest and easiest way to unlock your phone.

The Only Safe Email Is text-Only email
From ACM Opinion

The Only Safe Email Is text-Only email

It's troubling to think that at any moment you might open an email that looks like it comes from your employer, a relative or your bank, only to fall for a ...

How Facebook Changed the Spy Game
From ACM Opinion

How Facebook Changed the Spy Game

Any doubt that Russia has been running a strategically targeted disinformation campaign in the United States was erased on Wednesday, when Facebook revealed that...

Irobot Ceo Colin Angle on Data Privacy and Robots in the Home
From ACM Opinion

Irobot Ceo Colin Angle on Data Privacy and Robots in the Home

About a month ago, iRobot CEO Colin Angle mentioned something about sharing Roomba mapping data in an interview with Reuters.

The Fake-News Fallacy
From ACM Opinion

The Fake-News Fallacy

On the evening of October 30, 1938, a seventy-six-year-old millworker in Grover's Mill, New Jersey, named Bill Dock heard something terrifying on the radio.

The Darkening Web: Misinformation Is the Strongest Cyberweapon
From ACM Opinion

The Darkening Web: Misinformation Is the Strongest Cyberweapon

In late June, I was leaving for a flight from Kiev's Boryspil Airport as news broke that Ukraine was the victim of another massive cyberattack.

Stop Cyberattacks. Just Add Robots
From ACM Opinion

Stop Cyberattacks. Just Add Robots

"Are you a hacker?"

Is the Power Grid Getting More Vulnerable to Cyber Attacks?
From ACM Opinion

Is the Power Grid Getting More Vulnerable to Cyber Attacks?

Two weeks ago it was cyberattacks on the Irish power grid. Last month it was a digital assault on U.S. energy companies, including a nuclear power plant. Back in...

When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind?
From Communications of the ACM

When Does Law Enforcement's Demand to Read Your Data Become a Demand to Read Your Mind?

On cryptographic backdoors and prosthetic intelligence.

A Hunt For Ways to Combat Online Radicalization
From ACM Opinion

A Hunt For Ways to Combat Online Radicalization

Law enforcement officials, technology companies and lawmakers have long tried to limit what they call the "radicalization" of young people over the internet.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account