Posts tagged Security
Communications of the Association for Computing Machinery

“Communications of the ACM is the leading print and online publication for the computing and information technology fields. Read by computing's leading professionals worldwide, Communications is recognized as the most trusted and knowledgeable source of industry information for today’s computing professional.”

Read More
Being Recognized Everywhere

Communications of the ACM, February 2019
By Logan Kugler

"A core challenge for democratic governments will be continued adherence to the rule of law, where restrictions on individual liberty that flow from use of this technology must be justified by necessity, legitimate purpose, and use of the least restrictive means available."

Read More
Tony's Law

Communications of the ACM, February 2019
By Dror G. Feitelson

“Someone did not tighten the lid, and the ants got into the honey again. This can be prevented by placing the honey jar in a saucer of water, but it is a nuisance, occupies more counter space, and one must remember to replenish the water. So we try at least to remember to tighten the lid.

In the context of security, the software industry does not always tighten the lid. In some cases it fails to put the lid on at all, leaving the honey exposed and inviting.”

Read More
The End of Privacy Began in the 1960s

The New York Times, Dec. 5, 2018
Opinion by Margaret O’Mara

“In the fall of 1965, President Lyndon Johnson’s administration announced a plan to consolidate hundreds of federal databases into one centralized National Data Bank. It was meant as an efficiency move to make the Great Society even greater.”

Read More