CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
Modern batteries are powerful – indeed they are smart, and have a privileged position enabling them to sense device utilization patterns. A recent research paper has identified a potential threat: researchers…
-
Princeton Dialogues of AI and Ethics: Launching case studies
Summary: We are releasing four case studies on AI and ethics, as part of the Princeton Dialogues on AI and Ethics. The impacts of rapid developments in artificial intelligence (“AI”)…
-
How to constructively review a research paper
Any piece of research can be evaluated on three axes: Correctness/validity — are the claims justified by evidence? Impact/significance — how will the findings affect the research field (and the…
-
When Terms of Service limit disclosure of affiliate marketing
By Arunesh Mathur, Arvind Narayanan and Marshini Chetty In a recent paper, we analyzed affiliate marketing on YouTube and Pinterest. We found that on both platforms, only about 10% of…
-
Refining the Concept of a Nutritional Label for Data and Models
By Julia Stoyanovich (Assistant Professor of Computer Science at Drexel University) and Bill Howe (Associate Professor in the Information School at the University of Washington) In August 2016, Julia Stoyanovich and…
-
Ethics Education in Data Science: Classroom Topics and Assignments
[This blog post is a continuation of a recap of a recent workshop on data science ethics education.] The creation of ethics modules that can be inserted into a variety…
-
Announcing IoT Inspector: Studying Smart Home IoT Device Behavior
By Noah Apthorpe, Danny Y. Huang, Gunes Acar, Frank Li, Arvind Narayanan, Nick Feamster An increasing number of home devices, from thermostats to light bulbs to garage door openers, are…
-
No boundaries for Facebook data: third-party trackers abuse Facebook Login
by Steven Englehardt [0], Gunes Acar, and Arvind Narayanan So far in the No boundaries series, we’ve uncovered how web trackers exfiltrate identifying information from web pages, browser password managers,…
-
Ethics Education in Data Science
Data scientists in academia and industry are increasingly recognizing the importance of integrating ethics into data science curricula. Recently, a group of faculty and students gathered at New York University…
-
When the business model *is* the privacy violation
Sometimes, when we worry about data privacy, we’re worried that data might fall into the wrong hands or be misused for unintended purposes. If I’m considering participating in a medical…