CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
In this second installment of the “No Boundaries” series, we show how a long-known vulnerability in browsers’ built-in password managers is abused by third-party scripts for tracking on more than…
-
How have In-Flight Web Page Modification Practices Changed over the Past Ten Years?
When we browse the web, there are many parties and organizations that can see which websites we visit, because they sit on the path between web clients (our computers and…
-
Why the FCC should prevent ISPs from micromanaging our lives
Why the FCC should prevent ISPs from micromanaging our lives by Brett Frischmann and Evan Selinger* Network neutrality prevents broadband Internet service providers from micromanaging our lives online. Constraining the…
-
How the Contextual Integrity Framework Helps Explain Children’s Understanding of Privacy and Security Online
This post discusses a new paper that will be presented at the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW). I wrote this paper with co-authors…
-
AI and Policy Event in DC, December 8
Princeton’s Center for Information Technology Policy (CITP) recently launched an initiative on Artificial Intelligence, Machine Learning, and Public Policy. On Friday, December 8, 2017, we’ll be in Washington DC talking…
-
No boundaries: Exfiltration of personal data by session-replay scripts
This is the first post in our “No Boundaries” series, in which we reveal how third-party scripts on websites have been extracting personal information in increasingly intrusive ways. [0] by…
-
HOWTO: Protect your small organization against electronic adversaries
October is “cyber security awareness month“. Among other notable announcements, Google just rolled out “advanced protection” — free for any Google account. So, in the spirit of offering pragmatic advice…
-
The Second Workshop on Technology and Consumer Protection
Arvind Narayanan and I are excited to announce that the Workshop on Technology and Consumer Protection (ConPro ’18) will return in May 2018, once again co-located with the IEEE Symposium…
-
AI Mental Health Care Risks, Benefits, and Oversight: Adam Miner at Princeton
How does AI apply to mental health, and why should we care? Today the Princeton Center for IT Policy hosted a talk by Adam Miner, ann AI psychologist, whose research…
-
Avoid an Equifax-like breach? Help us understand how system administrators patch machines
The recent Equifax breach that leaked around 140 million Americans’ personal information was boiled down to a system patch that was never applied, even after the company was alerted to…