Category: Uncategorized

  • Building a Bridge with Concrete… Examples

    Thanks to Annette Zimmermann and Arvind Narayanan for their helpful feedback on this post. Algorithmic bias is currently generating a lot of lively public and scholarly debate, especially amongst computer scientists and philosophers. But do these two groups really speak the same language—and if not, how can they start to do so? I noticed at…

  • Ballot-level comparison audits: BMD

    In my previous posts, I’ve been discussing ballot-level comparison audits, a form of risk-limiting audit. Ballots are imprinted with serial numbers (after they leave the voter’s hands); during the audit, a person must find a particular numbered ballot in a batch of a thousand (more or less). With CCOS (central-count optical scan) this works fine:…

  • Finding a randomly numbered ballot

    In my previous posts, I’ve been discussing ballot-level comparison audits, a form of risk-limiting audit. Ballots are imprinted with serial numbers (after they leave the voter’s hands); during the audit, a person must find a particular numbered ballot in a batch of a thousand (more or less). If the ballot papers are numbered consecutively, that’s…

  • Why we can’t do random selection the other way round in PCOS RLAs

    In my last article, I posed this puzzle for the reader. We want to do ballot-level comparison audits, a form of RLA (risk-limiting audit) on a precinct-count optical-scan (PCOS) voting system. This requires a serial number printed on every ballot, linked with an entry in the cast-vote-record (CVR) file. The standard method is to pick…

  • Ballot-level comparison audits: precinct-count

    Special bonus: This article contains two puzzles for the reader, marked in green. Try to solve them yourself before reading the solutions in a future post! In my last post I described a particularly efficient kind of risk-limiting audit (RLA) of election results: ballot-level comparison audits, which rely on a unique serial number on every…

  • Ballot-level comparison audits: central-count

    All voting machines these days are computers, and any voting machine that is a computer can be hacked to cheat. The widely accepted solution is to use voting machines to count paper ballots, and do Risk-Limiting Audits: random-sample inspections of those paper ballots to ensure (with a guaranteed level of assurance) that the election outcome…

  • CITP Tech Policy Boot Camp 2019

    [This post was written by Liza Paudel, MPA’21 and Allison Huang, History’20.] Over Fall Break, the Center for Information Technology Policy (CITP) hosted 17 current students on a two-day tech policy bootcamp in Washington D.C. The group was a mix of undergraduate and graduate students from various disciplines including Computer Science, Public Policy, Economics, and…

  • The Unknown History of Digital Cash

    How could we create “a digital equivalent to cash, something that could be created but not forged, exchanged but not copied, and which reveals nothing about its users”? Why would we need this digital currency? Dr. Finn Brunton, Associate Professor in the Department of Media, Culture, and Communication at NYU, discussed his new book Digital Cash:…

  • CITP Call for Visitors 2020-21

    The Center for Information Technology Policy is an interdisciplinary research center at Princeton University that sits at the crossroads of engineering, the social sciences, law, and policy. CITP seeks applicants for various visiting positions each year. Visitors are expected to live in or near Princeton and to be in residence at CITP on a daily basis. They…

  • Deconstructing Google’s excuses on tracking protection

    By Jonathan Mayer and Arvind Narayanan. Blocking cookies is bad for privacy. That’s the new disingenuous argument from Google, trying to justify why Chrome is so far behind Safari and Firefox in offering privacy protections. As researchers who have spent over a decade studying web tracking and online advertising, we want to set the record…