acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective
From Communications of the ACM

Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective

Why disinformation is a cyber threat.

Dear Diary
From Communications of the ACM

Dear Diary

On keeping a laboratory notebook.

Toward a Solid Acceptance of the Decentralized Web of Personal Data: Societal and Technological Convergence
From Communications of the ACM

Toward a Solid Acceptance of the Decentralized Web of Personal Data: Societal and Technological Convergence

Giving individuals more control of their personal data.

The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers
From Communications of the ACM

The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers

Seeking more secure and effective digital representations.

Ulterior Motives
From Communications of the ACM

Ulterior Motives

2023-2024 ACM Athena Lecturer Margo Seltzer recalls the motivations behind the development of the Berkeley DB database software library, and other achievements...

Halfway Around the World
From Communications of the ACM

Halfway Around the World

Learn the language, meet the people, eat the food.

A Strategy for Scaling Advanced Analytics
From Communications of the ACM

A Strategy for Scaling Advanced Analytics

Key elements for scaling advanced analytics.

Privacy in the Age of AI
From Communications of the ACM

Privacy in the Age of AI

What has changed and what should we do about it?

New Threats to Society from Free-Speech Social Media Platforms
From Communications of the ACM

New Threats to Society from Free-Speech Social Media Platforms

Understanding emerging threats from social media platforms.

Stone Knives and Bear Skins
From Communications of the ACM

Stone Knives and Bear Skins

There is no money in tools.

Certification of Safety-Critical Systems
From Communications of the ACM

Certification of Safety-Critical Systems

Seeking new approaches toward ensuring the safety of software-intensive systems.

Coming of Age
From Communications of the ACM

Coming of Age

Stressing the importance of threat models.

The Smallness of Large Language Models
From Communications of the ACM

The Smallness of Large Language Models

There is so much more to language and human beings than large language models can possibly master.

Francis Enyi on Bridging the Healthcare Deficit in Africa
From ACM Opinion

Francis Enyi on Bridging the Healthcare Deficit in Africa

Francis Enyi, a senior program analyst with Delta State University Teaching Hospital in Nigeri, discusses how his team of software developers, medical personnel...

Francis Enyi on Bridging the Healthcare Deficit in Africa
From ACM Opinion

Francis Enyi on Bridging the Healthcare Deficit in Africa

Francis Enyi, a senior program analyst with Delta State University Teaching Hospital in Nigeri, discusses how his team of software developers, medical personnel...

The Human Touch
From Communications of the ACM

The Human Touch

There is no substitute for good, direct, honest training.

SI and Binary Prefixes: Clearing the Confusion
From Communications of the ACM

SI and Binary Prefixes: Clearing the Confusion

Considering the emergence of non-standard acceptance of SI prefixes.

For a More Transparent Governance of Open Source
From Communications of the ACM

For a More Transparent Governance of Open Source

Seeking the best governance models for FOSS projects.

Learning to Live with Privacy-Preserving Analytics
From Communications of the ACM

Learning to Live with Privacy-Preserving Analytics

Seeking to close the gap between research and real-world applications of PPAs.

Lost in Afghanistan: Can the World Take ICT4D Seriously?
From Communications of the ACM

Lost in Afghanistan: Can the World Take ICT4D Seriously?

Seeking to maximize the value of information and communication technologies for development research.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account