CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
What technology risks are faced by people who experience intimate partner violence? How is the security community failing them, and what questions might we need to ask to make progress…
-
Are voting-machine modems truly divorced from the Internet?
(This article is written jointly with my colleague Kyle Jamieson, who specializes in wireless networks.) [See also: The myth of the hacker-proof voting machine] The ES&S model DS200 optical-scan voting…
-
(Mis)conceptions About the Impact of Surveillance
Does surveillance impact behavior? Or is its effect, if real, only temporary or trivial? Government surveillance is back in the news thanks to the so-called “Nunes memo”, making this is a…
-
Software-Defined Networking: What’s New, and What’s New For Tech Policy?
The Silicon Flatirons Conference on Regulating Computing and Code is taking place in Boulder. The annual conference addresses a range of issues at the intersection of technology and policy and…
-
Making Sense of Child Protection Predictive Models: Tech-Soc Reading Group Feb 20
How are predictive models transforming how we think about child protection, and how should we think about the role of such systems in a democracy? If you’re interested to ask…
-
How Data Science and Open Science are Transforming Research Ethics: Edward Freeland at CITP
How are data science and open science movement transforming how researchers manage research ethics? And how are these changes influencing public trust in social research? I’m here at the…
-
Why Everyone in Tech Should Visit the American Museum of Tort Law
This Monday, Nikki Bourassa and I organized a van from Harvard’s Berkman Klein Center for Internet and Society to visit the American Museum of Tort Law, which I have decided…
-
Workshop on Technical Applications of Contextual Integrity
The theory of contextual integrity (CI) has inspired work across the legal, privacy, computer science and HCI research communities. Recognizing common interests and common challenges, the time seemed ripe for…
-
Automating Inequality: Virginia Eubanks Book Launch at Data & Society
What does it mean for public sector actors to implement algorithms to make public services to be more efficient? How are these systems experienced by the families and people who…
-
Website operators are in the dark about privacy violations by third-party scripts
by Steven Englehardt, Gunes Acar, and Arvind Narayanan. Recently we revealed that “session replay” scripts on websites record everything you do, like someone looking over your shoulder, and send it…

