Public Policy Reports
Transition Pathways for Community College Students in Computing
ACM Education Policy Committee (Forthcoming September 2017)
This forthcoming report will focus on ways to improve the transition of students from community colleges to four-year institutions. The report will assess and provide insights on workforce opportunities for postsecondary computing degrees, the new roles that community colleges are playing in ongoing professional career development, best practices in articulation agreements and transition paths, and effective initiatives to foster diversity and inclusion.
White Paper on Advancing Cybersecurity Research and Education in Europe: Major Drivers of Growth in the Digital Landscape
ACM Europe Policy Committee (2016)
This policy white paper explores the important role of cybersecurity research and education in enhancing cybersecurity. The paper provides an overview of cybersecurity challenges, explores its multifaceted and multidisciplinary nature, and covers some emergent trends generating new privacy and security concerns. The paper identifies twelve guiding principles for public policies to advance cybersecurity research, education, and workforce development.
Rebooting the Pathway to Success: Preparing Students for Computing Workforce Needs in the United States
ACM Education Policy Committee (2014)
This report evaluates computer science education and workforce needs across the United States and provides ten public policy recommendations. The report calls on education, business, and policy leaders in every state to take immediate action to strengthen inclusive educational opportunities in computer science for all students and to strengthen the pipeline of students pursuing computing and computing-related degrees and careers. The report includes summaries for each of the 50 states and the District of Columbia.
ACM/Computer Science Teachers Association (2013)
This report demonstrates the process of qualifying to teach computer science can be difficult to discover and difficult to achieve. The report recommends clear, consistent, and attainable K-12 computer science teacher certification. The report provides state-by-state reports covering the variety of requirements for computer science teacher certification and computer science high school graduation requirements for students in the 50 states and the District of Columbia. The full-text of the report is available for download. The website also provides an interactive map of state reports.
ACM/IEEE-CS Joint Task Force (2013)
These recommended computing curricula address core learning outcomes for undergraduate programs in computing. The report offers curricular and pedagogical guidance for educators at public and private universities and colleges.
Computer Science Teachers Association (2011)
These standards provide a framework for comprehensive integration of computer science into the primary and secondary curriculum. The standards provide a three-level framework for computer science education, including detailed learning outcomes, sample activities, and other resources to guide implementation. The standards are designed to strengthen computer science competency and fluency for all students and to provide clear education pathways for students with an interest in computing careers.
ACM/Computer Science Teachers Association (2010)
This report identifies the numerous and significant gaps between state secondary education standards and nationally recognized computer science standards. It shows clearly that K-12 computer science curricular standards were not widely adopted, and that rigorous computer science courses rarely satisfied a core mathematics or science credit for high school graduation. It provides state-by-state reports for the 50 states and the District of Columbia.
ACM U.S. Public Policy Committee (1994)
This report explores and discusses the implications of cryptography for secure digital communications, individual privacy, industry success, effective law enforcement, and national security. After describing the historical legal and technical contexts, it discusses the implications for public policy approaches. It poses questions for policy leaders and stakeholders to consider when approaching and deciding how to address cryptography.