XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Surveillance

Articles & Features

SECTION: Features

Ethical Tech Begins with Ethical Workplaces: Power Dynamics in Companies and Universities

My research shows how engineers in companies often feel little power to account for the ethics of what they create, and my student activism shows how universities often reproduce similar dynamics, harming their community in the process. Here are some ways students can---and must---resist.

By David Gray Widder, June 2024

PDF | HTML | In the Digital Library

From individual consent to collective refusal

Big tech companies have been found to misuse personal data, often collected without consent. What can the public do to change unjust collection and use of their personal data, and what role can computer scientists play in these efforts?

By Jonathan Zong, December 2020

PDF | HTML | In the Digital Library

Navigating through the hype that surrounds machine learning

Artificial intelligence technologies: Eight viewpoints

SECTION: Features

Artificial intelligence technologies: Eight viewpoints

Every year, the ACM Special Interest Group on Artificial Intelligence sponsors a student essay writing contest. This article presents a clear perspective on last year's winners, which represent a diverse collection of opinions on artificial intelligence.

By Johanna Schacht, January 2019

PDF | HTML | In the Digital Library

Pseudonimity and anonymity as tools for regaining privacy

COLUMN: INIT

Pseudonimity and anonymity as tools for regaining privacy

By Vasilis Ververis, Gunnar Wolf, July 2018

PDF | HTML | In the Digital Library

Demistifying the dark web

SECTION: Features

Demistifying the dark web

Anonymity network overlays have a dark shroud of mystery. The "dark web" is known to everybody and nobody. But what is it, really?

By Vasilis Ververis, July 2018

PDF | HTML | In the Digital Library

Stop looking over our shoulders!

Stop looking over our shoulders!

The global push for secure digital identities, privacy tools, and online rights.

By Kali Kaneko, July 2018

PDF | HTML | In the Digital Library

How to fix email: making communication encrypted and decentralized with autocrypt

How to fix email: making communication encrypted and decentralized with autocrypt

Email has been declared dead many times but refuses to die. There is a new effort underway to make encrypted end-to-end email communication as automatic as possible. It is part of a diverse set of efforts to reinvigorate the email ecosystem, which remains a crucial cornerstone of a functioning, open internet.

By Holger Krekel, Karissa McKelvey, Emil Lefherz, July 2018

PDF | HTML | In the Digital Library