Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
ACM SIGCAS Computers and Society
ACM Press
 
   
 
Options:
 
  1-10 of 12 reviews Date Reviewed 
  Faking it and breaking it: responsible AI is needed now
Trim M. ACM SIGCAS Computers and Society 51(3): 7-9, 2022.  Type: Article

The paper’s title is catchy and promising. However, readers will find themselves immersed in another trendy cry that criticizes artificial intelligence (AI) evolution while at the same time promoting it, because the paper is just nonsense. I...

Aug 16 2023
  Digital alienation as the foundation of online privacy concerns
Dainow B. ACM SIGCAS Computers and Society 45(3): 109-117, 2015.  Type: Article

The issue of digital alienation, or alienation online, is discussed in this paper, specifically in terms of the Marxist concept of alienation, historically based on the realm of the factory, where labor activity is “coerced i...

Aug 1 2016
  Between insanity and love
Asai R. ACM SIGCAS Computers and Society 45(3): 154-158, 2015.  Type: Article

The premise of this paper is that humans can have legitimate feelings of love or sexual desire for nonorganic objects, specifically robots or graphical constructions such as avatars. This claim, according to the authors, is justified b...

Feb 9 2016
  The NSA and Edward Snowden: surveillance in the 21st century
Verble J. ACM SIGCAS Computers and Society 44(3): 14-20, 2014.  Type: Article

There have been many works about surveillance issues in the modern Information Age, especially connected to privacy in a world of ever-growing information technology (IT) use in tracing an individual, group, or organization. They are n...

Nov 30 2015
  A synthesized definition of computer ethics
Hall B. ACM SIGCAS Computers and Society 44(3): 21-35, 2014.  Type: Article

“This paper presents details of a content analysis study that analyzed definitions of computer ethics,” because consensus is lacking on the meaning of the term. The research began with 30 “explicit definit...

Dec 30 2014
  Cloudsweeper and data-centric security
Snyder P., Kanich C. ACM SIGCAS Computers and Society 44(2): 8-10, 2014.  Type: Article

Internet users want their data on the Internet--for example, emails and Facebook data--to be well protected against malicious attacks. Current technologies either use end-to-end encryption for all data in the user&...

Nov 20 2014
  The error of futurism: prediction and computer ethics
Horner D. ACM SIGCAS Computers and Society 32(7): 42004.  Type: Article

Computer ethics seeks to reduce the unintended or undesirable consequences of technology through accurate prediction. In this paper, Horner argues that predictive modeling does not provide any protection against future risk. Rather, he...

Apr 30 2004
  Resolving Webuser on the fly
Parthasarathy P., Krishnaiah M. ACM SIGCAS Computers and Society 32(2): 4-9, 2002.  Type: Article

This work is difficult to summarize because of a lack of clarity in the presentation. The irrelevant title, abstract, and first sections give no concrete hints, and then the paper leaps into the algorithms used by a prototype implemen...

Oct 14 2002
  Imagination, truth and possible consequentialism
Artz J. ACM SIGCAS Computers and Society 31(3): 32-34, 2001.  Type: Article

In this short essay, the author develops the argument that in an age of rapid change, history provides poor guidelines, and imagination is the way to outline potential futures and provide a choice for action. He goes on to provide a cl...

Jul 2 2002
  Beyond numbers and demographics: "experience-near" explorations of the digital divide
Adams R. ACM SIGCAS Computers and Society 31(3): 5-8, 2001.  Type: Article

The focus of the September 2001 issue of Computers and Society, the newsletter of the ACM’s special interest group on computers and society, is the digital divide. It contains three papers on this topic, which were als...

Jun 26 2002
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy