News
Federal funding of basic research sparked and has sustained the modern technological revolution. Technological innovation is ...
Long-term investment in curiosity-driven academic research is the bedrock of technological transformation.
The zero trust security framework assumes that no device, user, or network is inherently trustworthy.
“When people create illusions by themselves, it’s often a bit random because we don’t know why some illusions work or not,” ...
“Right to Repair is a direct outgrowth of the erosion of consumer property interests that we’ve seen over the past couple of ...
Early lessons in research managment at Xerox PARC have stood the test of time. Early in my career, I had the opportunity to ...
At CHI 2025 in Yokohama, Japan, the annual ACM conference on Human Factors in Computing Systems, where researchers identify salient problems in interaction design and bring them into sharp relief t0 ...
The use of artificial intelligence (AI) in medical care is a salient example of the technology’s value. Yet AI’s improvements may be marginal and may also introduce downsides, such as higher costs and ...
A lack of awareness of the way scammers operate, of key red flags, and of techniques leveraged to verify fake profiles ...
To address such issues of cultural inclusion in AI, the field has attempted to incorporate cultural knowledge into models ...
But tech alone isn’t enough. If social engineering is now 2.0, user awareness should also be 2.0. Teams need exposure to ...
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results