Stop Using Vulnerability Counts to Measure Software Security
A project with a history of vulnerability fixes doesn't mean it is less secure.
Stop Using Vulnerability Counts to Measure Software Security
A project with a history of vulnerability fixes doesn't mean it is less secure.
New ideas are emerging to make communication among interacting agents more reliable and precise.
An AI system targeting company management may be subtly manipulating communication channels like email and chat.
Empowering Virtual Agents With Intelligent Systems
Environmental Embodied AI employs virtual agents in non-robotic applications to influence and affect physical or operational states within environments.
There is a tendency in software to keep piling on features and functions, which is anathema to simplicity and repeatability.
Two Types of Data Privacy Controls
Precise, sensible, and easy to use terms to differentiate the two intrinsic types of privacy controls will positively impact the accuracy of privacy research and discussions.
Active learning provides a compelling alternative to the “bigger is better” assumption dominating current thinking about AI.
The Future of Professional Ethics in Computing
Computing professionals should use their privileges and insights to help societies navigate questions about digital technologies that traditional ethical theories find difficult to answer.
Balancing Secrecy and Transparency in Bug Bounty Programs
Embracing transparency while balancing temporary secrecy can lead to a more resilient and accountable software ecosystem.
The Ethical Implications of Online Computer Science Education
Can online computer science programs adequately prepare students for industry demands, especially in fields requiring hands-on problem-solving?
A consensus is emerging that copyright laws should include human creation requirements.
DeepSeek Inside: Origins, Technology, and Impact
How a little-known Chinese startup disrupted the GenAI ecosystem.
I Teach Computer Science, and That Is Not All
I believe the purpose of universities was best expressed in an influential 1940 statement on academic freedom: “Institutions of higher education are conducted for the common good.”
Beyond the Checkbox: Upgrading the Right to Opt Out
How to make the right to opt out work for everyone.
Generative Artificial Intelligence Policies under the Microscope
CS conferences are increasingly adopting and sharing GenAI policies for authors, and guidelines for reviewers.
Formal computer science may never model practical computer engineering well enough to be predictive in the way the physical sciences are.
We need people who understand not just technology, but also law, policy, ethics, and all in an international context.
It turns out your mental state when writing code or solving a problem often has a bearing on the solution.
Thoughts about Some Surprising AI-Era Technology Readiness Findings
Survey findings define the essence of risk in companies' business-technology plans and readiness.
As Government Outsources More IT, Highly Skilled In-House Technologists Are More Essential
Agencies need the ability to examine their own software and data to ensure that policy rules are instantiated correctly, to analyze operations and performance, or to experiment to improve processes.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More