acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Learning to Live with Privacy-Preserving Analytics
From Communications of the ACM

Learning to Live with Privacy-Preserving Analytics

Seeking to close the gap between research and real-world applications of PPAs.

Fragility in AIs Using Artificial Neural Networks
From Communications of the ACM

Fragility in AIs Using Artificial Neural Networks

Suggesting ways to reduce fragility in AI systems that include artificial neural networks.

Lost in Afghanistan: Can the World Take ICT4D Seriously?
From Communications of the ACM

Lost in Afghanistan: Can the World Take ICT4D Seriously?

Seeking to maximize the value of information and communication technologies for development research.

Can Generative AI Bots Be Trusted?
From Communications of the ACM

Can Generative AI Bots Be Trusted?

It will be a long road to learning how to use generative AI wisely.

The Parchment Path?
From Communications of the ACM

The Parchment Path?

Is there ever a time when learning is not of value—for its own sake?

Conjoined Twins: Artificial Intelligence and the Invention of Computer Science
From Communications of the ACM

Conjoined Twins: Artificial Intelligence and the Invention of Computer Science

How artificial intelligence and computer science grew up together.

Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society
From Communications of the ACM

Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society

Searching for improved algorithmic accountability.

Decentraland: The Alleged Decentralization of Blockchain Applications
From Communications of the ACM

Decentraland: The Alleged Decentralization of Blockchain Applications

Breaking down the blockchain.

Do the Right Thing
From Communications of the ACM

Do the Right Thing

Exploring the intersection of legal compliance and ethical judgment.

Updates, Threats, and Risk Management
From Communications of the ACM

Updates, Threats, and Risk Management

Revisiting a recent column considering security updates.

Ethics as a Participatory and Iterative Process
From Communications of the ACM

Ethics as a Participatory and Iterative Process

Facilitating ethical reflection, inquiry, and deliberation.

Please Report Your Compute
From Communications of the ACM

Please Report Your Compute

Seeking consistent means of measure.

Faculty Can Save Lives of the Elderly
From Communications of the ACM

Faculty Can Save Lives of the Elderly

A unique viewpoint on risks to senior citizens from academia.

Cyber Efficiency and Cyber Resilience
From Communications of the ACM

Cyber Efficiency and Cyber Resilience

Complementary objectives competing for the same resources.

Where Is the Research on Cryptographic Transition and Agility?
From Communications of the ACM

Where Is the Research on Cryptographic Transition and Agility?

Gaps facing the industry as quantum safe algorithms move closer to standardization.

Improving Section 230, Preserving Democracy, and Protecting Free Speech
From Communications of the ACM

Improving Section 230, Preserving Democracy, and Protecting Free Speech

Proposing a framework for a decentralized market where no one party controls the flow of information.

All Sliders to the Right
From Communications of the ACM

All Sliders to the Right

Hardware overkill.

Contracting for Artificial Intelligence
From Communications of the ACM

Contracting for Artificial Intelligence

Considering the promises and perils of contracting for the use of artificial intelligence tools and data.

A Turning Point for Cyber Insurance
From Communications of the ACM

A Turning Point for Cyber Insurance

Technologists who understand and measure cyber risk can motivate policyholders to improve security.

Metrics for Success
From Communications of the ACM

Metrics for Success: Why and How to Evaluate Privacy Choice Usability

Assessing the usability of choice and consent mechanisms.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account