CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
Any piece of research can be evaluated on three axes: Correctness/validity — are the claims justified by evidence? Impact/significance — how will the findings affect the research field (and the…
-
When Terms of Service limit disclosure of affiliate marketing
By Arunesh Mathur, Arvind Narayanan and Marshini Chetty In a recent paper, we analyzed affiliate marketing on YouTube and Pinterest. We found that on both platforms, only about 10% of…
-
Refining the Concept of a Nutritional Label for Data and Models
By Julia Stoyanovich (Assistant Professor of Computer Science at Drexel University) and Bill Howe (Associate Professor in the Information School at the University of Washington) In August 2016, Julia Stoyanovich and…
-
Ethics Education in Data Science: Classroom Topics and Assignments
[This blog post is a continuation of a recap of a recent workshop on data science ethics education.] The creation of ethics modules that can be inserted into a variety…
-
Announcing IoT Inspector: Studying Smart Home IoT Device Behavior
By Noah Apthorpe, Danny Y. Huang, Gunes Acar, Frank Li, Arvind Narayanan, Nick Feamster An increasing number of home devices, from thermostats to light bulbs to garage door openers, are…
-
No boundaries for Facebook data: third-party trackers abuse Facebook Login
by Steven Englehardt [0], Gunes Acar, and Arvind Narayanan So far in the No boundaries series, we’ve uncovered how web trackers exfiltrate identifying information from web pages, browser password managers,…
-
Ethics Education in Data Science
Data scientists in academia and industry are increasingly recognizing the importance of integrating ethics into data science curricula. Recently, a group of faculty and students gathered at New York University…
-
When the business model *is* the privacy violation
Sometimes, when we worry about data privacy, we’re worried that data might fall into the wrong hands or be misused for unintended purposes. If I’m considering participating in a medical…
-
Routing Attacks on Internet Services
by Yixin Sun, Annie Edmundson, Henry Birge-Lee, Jennifer Rexford, and Prateek Mittal [In this post, we discuss a recent thread of research that highlights the insecurity of Internet services due…
-
Is It Time for an Data Sharing Clearinghouse for Internet Researchers?
Today’s Senate hearing with Facebook’s Mark Zuckerberg will start a long discussion on data collection and privacy from Internet companies. Although the spotlight is currently on Facebook, we shouldn’t forget…