CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
- 
This is the first post in our “No Boundaries” series, in which we reveal how third-party scripts on websites have been extracting personal information in increasingly intrusive ways. [0] by… 
- 
HOWTO: Protect your small organization against electronic adversariesOctober is “cyber security awareness month“. Among other notable announcements, Google just rolled out “advanced protection” — free for any Google account. So, in the spirit of offering pragmatic advice… 
- 
The Second Workshop on Technology and Consumer ProtectionArvind Narayanan and I are excited to announce that the Workshop on Technology and Consumer Protection (ConPro ’18) will return in May 2018, once again co-located with the IEEE Symposium… 
- 
AI Mental Health Care Risks, Benefits, and Oversight: Adam Miner at PrincetonHow does AI apply to mental health, and why should we care? Today the Princeton Center for IT Policy hosted a talk by Adam Miner, ann AI psychologist, whose research… 
- 
Avoid an Equifax-like breach? Help us understand how system administrators patch machinesThe recent Equifax breach that leaked around 140 million Americans’ personal information was boiled down to a system patch that was never applied, even after the company was alerted to… 
- 
I never signed up for this! Privacy implications of email trackingIn this post I discuss a new paper that will appear at PETS 2018, authored by myself, Jeffrey Han, and Arvind Narayanan. What happens when you open an email and… 
- 
What our students found when they tried to break their bubblesThis is the second part of a two-part series about a class project on online filter bubbles. In this post, where we focus on the results. You can read more… 
- 
Breaking your bubbleThis is the first part of a two-part series about a class project on online filter bubbles. In this post, we talk about our pedagogical approach and how we carried… 
- 
SESTA May Encourage the Adoption of Broken Automated Filtering TechnologiesThe Senate is currently considering the Stop Enabling Sex Traffickers Act (SESTA, S. 1693), with a scheduled hearing tomorrow. In brief, the proposed legislation threatens to roll back aspects of Section 230 of… 
- 
Getting serious about research ethics: AI and machine learning[This blog post is a continuation of our series about research ethics in computer science.] The widespread deployment of artificial intelligence and specifically machine learning algorithms causes concern for some… 

