Search for tag: "privacy"
CITP Seminar: Alice Marwick - Beyond the Binary: How LGBTQ+ People Negotiate Networked PrivacyNetworked privacy is the desire to maintain agency over information within the social and technological networks in which information is disclosed, given meaning, and shared. This agency is…
From CI Center for Information Technology Policy
0 likes
21 plays
|
|
Human-level reasoning without the need for an inhuman learning paradigm?, Nobline Yoo, UG '23 (2272767)Two-dimensional human pose estimation is a challenging task, where the goal is to localize key anatomical landmarks (e.g. elbows, knees, shoulders), given an image of a person in some pose. Current…
From Research Princeton Research Day
1 likes
42 plays
|
|
The Future of Global Digital GovernanceThe digital domain is fast emerging as a new landscape of global competition and conflict. The benefits of digitization have been immense, but so have the harms — rampant…
From CI Center for Information Technology Policy
0 likes
33 plays
|
|
CITP Seminar- Katrina Ligett - Data Privacy is Important, but it’s not EnoughOur current data ecosystem leaves individuals, groups, and society vulnerable to a wide range of harms, ranging from privacy violations to subversion of autonomy to discrimination to erosion of…
From CI Center for Information Technology Policy
0 likes
9 plays
|
|
Ethical Design For The Future Internet, Rolando Masís-Obando, G6 (3936699)The future internet, or what people have recently been calling the “Metaverse” will be a more spatial, more 3D, and more immersive internet. The room for innovation in the metaverse will…
From Research Princeton Research Day
2 likes
85 plays
|
|
CITP Seminar: Ryan Calo - Modeling ThroughTheorists of justice have long imagined a decision-maker capable of acting wisely in every circumstance. Policymakers seldom live up to this ideal. They face well-understood limits, including an…
From CI Center for Information Technology Policy
0 likes
21 plays
|
|
CITP Seminar: Ari Waldman - Industry Unbound: The Inside Story of Privacy, Data, and Corporate PowerWhy are there so many privacy laws and so many privacy professionals but no privacy on the ground? With research based on interviews with scores of tech employees and internal documents outlining…
From CI Center for Information Technology Policy
0 likes
30 plays
|
|
CITP Seminar: Arunesh Mathur - The Princeton Digital Ad ObservatoryIt is well known that digital ads violate privacy, yet we know little about their content. Digital ads are of increasingly low-quality, and often contain manipulative and deceptive components to lure…
From CI Center for Information Technology Policy
0 likes
6 plays
|
|
In Plain View - Open Source Intelligence(InfoSec 201) Did you ever think about all of the data publicly available? What if bad actors collect this “open source intelligence” and use it to attack you or Princeton University? …
From Stefanie Clerkin
0 likes
42 plays
|
|
Exploring Privacy Apps(InfoSec 101) In celebration of International Data Privacy Day (January 28) and in collaboration with the Center for Digital Humanities’ Privacy Initiative, the Information Security Office will…
From Stefanie Clerkin
0 likes
39 plays
|
|
CITP Seminar: Josh Goldfoot - Computer CrimeCriminal computer intrusions can endanger privacy, safety, financial security, and more. The problem of computer crime has grown so that it threatens not only businesses and government…
From CI Center for Information Technology Policy
0 likes
5 plays
|
|
CITP Seminar: Anita Allen - How Privacy Got Its RaceThere is increasing interest in understanding the difference race makes for the enjoyment of privacy and the protection of privacy rights. This talk surveys issues and concerns at the intersection of…
From CI Center for Information Technology Policy
0 likes
9 plays
|
|
CITP Seminar: Serge Egelman - Taking Responsibility for Someone Else’s Code: Studying the Privacy Behaviors of Mobile Apps at ScaleModern software development has embraced the concept of “code reuse,” which is the practice of relying on third-party code to avoid “reinventing the wheel” (and rightly so).…
From CI Center for Information Technology Policy
0 likes
13 plays
|
|
Maximizing the “Little Screen” in Online Language CoursesUnder emergency remote instruction, both language learners and instructors complained about long hours in front of laptop or desktop computers — Zoom fatigue, backaches, and not moving for…
From PC Princeton Center for Language Study
0 likes
7 plays
|
|
CITP Webinar: Ed Felten - COVID-19, Technology, Privacy and Civil LibertiesMany systems have been proposed for using technology to help individuals and public health officials better respond to the COVID-19 pandemic. This talk will analyze the major proposed uses of…
From CI Center for Information Technology Policy
0 likes
346 plays
|