Search for tag: "permissions"

Sending Files Securely

(InfoSec 201) You’ve been asked to send personal information to your lawyer’s office, doctor’s office, or another trusted organization. Do you ever get confused about the proper way…

From  Stefanie Clerkin 0 likes 2 plays

Ethical Design For The Future Internet, Rolando Masís-Obando, G6 (3936699)

The future internet, or what people have recently been calling the “Metaverse” will be a more spatial, more 3D, and more immersive internet. The room for innovation in the metaverse will…

From  Research Princeton Research Day 2 likes 38 plays

(Episode 3) Mobile Security Tips

This series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important questions and have some fun…

From  Stefanie Clerkin 1 likes 88 plays

CITP Seminar: Serge Egelman - Taking Responsibility for Someone Else’s Code: Studying the Privacy Behaviors of Mobile Apps at Scale

Modern software development has embraced the concept of “code reuse,” which is the practice of relying on third-party code to avoid “reinventing the wheel” (and rightly so).…

From  CI Center for Information Technology Policy 0 likes 12 plays