Year: 2012
-
Unlocking Hidden Consensus in Legislatures
A legislature is a small group with a big impact. Even for people who will never be part of one, the mechanics of a legislature matter — when they work well, we all benefit, and when they work poorly, we all lose out. At the same time, with several hundred participants, legislatures are large enough…
-
Supreme Court to Hear State Freedom of Information Act Case "McBurney v. Young"
On Friday, the Supreme Court granted certiorari to McBurney v. Young. This case formally concerns the “Privileges and Immunities Clause” of the Constitution. It raises questions about what access rights citizens have to government records and about who counts as a journalist. Oral argument will likely be scheduled for 2013. Mark McBurney is a citizen…
-
Introducing Myself: Technology, Society, and Public Policy
I’m a fellow at the Center for Information Technology Policy at Princeton this year. My first months here have already been amazing. I’m pleased to be joining this blog as well! My conceptual toolkit and my method comes mostly from sociology, but I’m also a former computer programmer. That means that I feel welcome in…
-
Sloppy Reporting on the "University Personal Records" Data Breach by the New York Times Bits Blog
This morning I ran across a distressing headline while perusing my RSS feeds. The New York Times’ Bits Blog proclaimed that, “Hackers Breach 53 Universities and Dump Thousands of Personal Records Online.” I clicked, and was informed that: Hackers published online Monday thousands of personal records from 53 universities, including Harvard, Stanford, Cornell, Princeton, Johns…
-
CITP Welcomes This Year's Fellows
The 2012-2013 academic year is well underway, and the Center for Information Technology Policy is buzzing with fellows and departmental guests. Look forward to their posts here on Freedom to Tinker in the days and weeks to come, and read their full bios on the CITP site.
-
Which States have the Highest Risk of an E-Voting Meltdown?
This post is joint work by Joshua Kroll, Ian Davey, Alex Halderman, and Ed Felten. Computer scientists, including us, have long been skeptical of electronic voting systems. E-voting systems are computers, with all of the attendant problems. If something goes wrong, can the problem be detected? Can it be fixed? Some e-voting systems are much…
-
Goodbye, Stanford. Hello, Princeton!
[Editor’s note: The Center for Information Technology Policy (CITP) is delighted to welcome Arvind Narayanan as an Assistant Professor in Computer Science, and an affiliated faculty member in CITP. Narayanan is a leading researcher in digital privacy, data anonymization, and technology policy. His work has been widely published, and includes a paper with CITP co-authors…
-
Is Spotify the Celestial Jukebox for Music?
In 1994, law professor Paul Goldstein popularized the term “celestial jukebox” to refer to his vision of a networked database of consumable on-demand media. In the face of copyright law that was ill-suited to the rapid rate of technological change, he described a system in which consumers would pay-per-play rather than purchasing and owning individual…
-
Accountable Algorithms: An Example
I wrote yesterday about accountable algorithms. When I say that a public algorithm is “accountable” I mean that the output produced by a particular execution of the algorithm can be verified as correct after the fact by a skeptical member of the public. Today I want to work through an example.
-
Accountable Algorithms
Ethan Zuckerman had an interesting reaction to his first experience with the TSA Pre-Check program, which lets frequent flyers go through a much shorter and less elaborate procedure at airport security checkpoints. Ethan’s concerns about unfairness are worth pondering, but I want to focus here on his call for more openness about the algorithm that…