acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Computer Security and the Risks of Online Voting
From BLOG@CACM

Computer Security and the Risks of Online Voting

An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being used.

The Three Faces of Cyberwar
From BLOG@CACM

The Three Faces of Cyberwar

The different aspects of cyberwar, and what can be done about them.

Battling Bias
From ACM News

Battling Bias

A regional Grace Hopper Celebration event this week focused on "advancing a gender diverse technology workforce in New York."

Human Subjects Research For the Twenty-First Century, Or, What Can We Learn from the Facebook Mood Study?
From BLOG@CACM

Human Subjects Research For the Twenty-First Century, Or, What Can We Learn from the Facebook Mood Study?

There is tremendous value to society in doing large-scale A/B studies, and the current framework we have for human subjects research is a poor match for the 21st...

The Danger of Requiring Computer Science in K-12 Schools
From BLOG@CACM

The Danger of Requiring Computer Science in K-12 Schools

We are not ready to make CS a requirement for all children in the U.S., even if that's where we want to be one day.

A Summit on Computing Education in South Carolina
From BLOG@CACM

A Summit on Computing Education in South Carolina

A summit of legislators, business leaders, officials from the Department of Education, and teachers convenes in South Carolina to advance computing education in...

Computing Does Not Support Its Infrastructure
From BLOG@CACM

Computing Does Not Support Its Infrastructure

All large, multinational companies that depend on their intellectual prowess are able to avoid most taxation. Two factors enable the trend: first intellectual property...

Privacy and Google Glass
From BLOG@CACM

Privacy and Google Glass

Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...

Most Smartphone Apps Are Spyware
From BLOG@CACM

Most Smartphone Apps Are Spyware

Why does  this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?

All Grown ­Up Now: Service and Serial Reciprocity
From BLOG@CACM

All Grown ­Up Now: Service and Serial Reciprocity

Computing is central to the debate about so many aspects of our present and future that we have a duty and responsibility to be active and enthusiastic participants...

Being Bilingual: Speaking Technology and Policy
From BLOG@CACM

Being Bilingual: Speaking Technology and Policy

How do we cross the intellectual divide, providing technical advice to policy experts in ways that they find useful and actionable? Equally importantly, how do...

Information Privacy: Changing Norms and Expectations
From BLOG@CACM

Information Privacy: Changing Norms and Expectations

That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...

Why Have There Been So Many Security Breaches Recently?
From BLOG@CACM

Why Have There Been So Many Security Breaches Recently?

We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...

Remembering Internet Dogs
From BLOG@CACM

Remembering Internet Dogs

An iconic cartoon by Peter Steiner, which appeared in The New Yorker in 1993, captured the nature of the nascent Internet. It shows a dog seated at a computer,...

CFP: Intelligent Transportation Systems
From BLOG@CACM

CFP: Intelligent Transportation Systems

One of the goals of this years Computers Freedom and Privacy conference is to ask the question, "Can we be 'smart' and private?"  Wednesday's panel onIntellegent...

Robots: From 'What If' to 'Now That'
From BLOG@CACM

Robots: From 'What If' to 'Now That'

Our panel at CFP will explore how robotics implicates civil liberties today, and in the near term. We will discuss issues from the ethical ramifications of robots...

Online Information Brokers & the Challenges of Privacy in a Networked World
From BLOG@CACM

Online Information Brokers & the Challenges of Privacy in a Networked World

At Privacy Rights Clearinghouse, we receive phone calls and emails about online information brokers almost daily. The individuals who contact us are often those...

Robots After Roomba: The Ethics of Electronic Companions
From BLOG@CACM

Robots After Roomba: The Ethics of Electronic Companions

As robots become woven into the fabric of daily life, what ethical issues will the world face?

Thinking Globally, Thinking Locally: Infrastructures For Collaboration
From BLOG@CACM

Thinking Globally, Thinking Locally: Infrastructures For Collaboration

What does it take for people to collaborate in spite of geographical, disciplinary and cultural differences?  This article looks at the work of two researchers...

Terms of Service, Ethics and Bias
From BLOG@CACM

Terms of Service, Ethics and Bias

Data mining researchers, application builders, and social scientists want to collect and analyze data about your activities online. But when do we cross the line...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account