CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
Why the FCC should prevent ISPs from micromanaging our lives by Brett Frischmann and Evan Selinger* Network neutrality prevents broadband Internet service providers from micromanaging our lives online. Constraining the…
-
How the Contextual Integrity Framework Helps Explain Children’s Understanding of Privacy and Security Online
This post discusses a new paper that will be presented at the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW). I wrote this paper with co-authors…
-
AI and Policy Event in DC, December 8
Princeton’s Center for Information Technology Policy (CITP) recently launched an initiative on Artificial Intelligence, Machine Learning, and Public Policy. On Friday, December 8, 2017, we’ll be in Washington DC talking…
-
No boundaries: Exfiltration of personal data by session-replay scripts
This is the first post in our “No Boundaries” series, in which we reveal how third-party scripts on websites have been extracting personal information in increasingly intrusive ways. [0] by…
-
HOWTO: Protect your small organization against electronic adversaries
October is “cyber security awareness month“. Among other notable announcements, Google just rolled out “advanced protection” — free for any Google account. So, in the spirit of offering pragmatic advice…
-
The Second Workshop on Technology and Consumer Protection
Arvind Narayanan and I are excited to announce that the Workshop on Technology and Consumer Protection (ConPro ’18) will return in May 2018, once again co-located with the IEEE Symposium…
-
AI Mental Health Care Risks, Benefits, and Oversight: Adam Miner at Princeton
How does AI apply to mental health, and why should we care? Today the Princeton Center for IT Policy hosted a talk by Adam Miner, ann AI psychologist, whose research…
-
Avoid an Equifax-like breach? Help us understand how system administrators patch machines
The recent Equifax breach that leaked around 140 million Americans’ personal information was boiled down to a system patch that was never applied, even after the company was alerted to…
-
I never signed up for this! Privacy implications of email tracking
In this post I discuss a new paper that will appear at PETS 2018, authored by myself, Jeffrey Han, and Arvind Narayanan. What happens when you open an email and…
-
What our students found when they tried to break their bubbles
This is the second part of a two-part series about a class project on online filter bubbles. In this post, where we focus on the results. You can read more…