CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
This is the first part of a two-part series about a class project on online filter bubbles. In this post, we talk about our pedagogical approach and how we carried…
-
SESTA May Encourage the Adoption of Broken Automated Filtering Technologies
The Senate is currently considering the Stop Enabling Sex Traffickers Act (SESTA, S. 1693), with a scheduled hearing tomorrow. In brief, the proposed legislation threatens to roll back aspects of Section 230 of…
-
Getting serious about research ethics: AI and machine learning
[This blog post is a continuation of our series about research ethics in computer science.] The widespread deployment of artificial intelligence and specifically machine learning algorithms causes concern for some…
-
Blockchains and voting
I’ve been asked about a number of ideas lately involving voting systems and blockchains. This blog piece talks about all the security properties that a voting system needs to have,…
-
BlockSci: a platform for blockchain science and exploration
The Bitcoin blockchain — currently 140GB and growing — contains a massive amount of data that can give us insights into the Bitcoin ecosystem, including how users, businesses, and miners…
-
Getting serious about research ethics: Security and Internet Measurement
[This blog post is a continuation of our series about research ethics in computer science that we started last week] Research projects in the information security and Internet measurement sub-disciplines…
-
Help us improve the usability of Tor and onion services!
Update 2017-09-11: We have collected several hundred responses, so we are now closing the survey to begin data analysis. Thanks for your help! We are looking for volunteers for a…
-
When the cookie meets the blockchain
Cryptocurrencies are portrayed as a more anonymous and less traceable method of payment than credit cards. So if you shop online and pay with Bitcoin or another cryptocurrency, how much…
-
Getting serious about research ethics in computer science
Digital technology mediates our public and private lives. That makes computer science a powerful discipline, but it also means that ethical considerations are essential in the development of these technologies.…
-
Design Ethics for Gender-Based Violence and Safety Technologies
Authored (and organized) by Kate Sim and Ben Zevenbergen. Digital technologies are increasingly proposed as innovative solution to the problems and threats faced by vulnerable groups such as children, women,…