Search for tag: "privacy"

CITP Seminar: Alice Marwick - Beyond the Binary: How LGBTQ+ People Negotiate Networked Privacy

Networked privacy is the desire to maintain agency over information within the social and technological networks in which information is disclosed, given meaning, and shared. This agency is…

+20 More
From  CI Center for Information Technology Policy 0 likes 21 plays

Human-level reasoning without the need for an inhuman learning paradigm?, Nobline Yoo, UG '23 (2272767)

Two-dimensional human pose estimation is a challenging task, where the goal is to localize key anatomical landmarks (e.g. elbows, knees, shoulders), given an image of a person in some pose. Current…

From  Research Princeton Research Day 1 likes 42 plays

CITP Lecture: "Designing Usable and Useful Privacy Choice Interfaces"

From  Broadcast Broadcast Center Staff 0 likes 11 plays

The Future of Global Digital Governance

The digital domain is fast emerging as a new landscape of global competition and conflict. The benefits of digitization have been immense, but so have the harms — rampant…

+23 More
From  CI Center for Information Technology Policy 0 likes 33 plays

CITP Seminar- Katrina Ligett - Data Privacy is Important, but it’s not Enough

Our current data ecosystem leaves individuals, groups, and society vulnerable to a wide range of harms, ranging from privacy violations to subversion of autonomy to discrimination to erosion of…

+20 More
From  CI Center for Information Technology Policy 0 likes 9 plays

Ethical Design For The Future Internet, Rolando Masís-Obando, G6 (3936699)

The future internet, or what people have recently been calling the “Metaverse” will be a more spatial, more 3D, and more immersive internet. The room for innovation in the metaverse will…

+26 More
From  Research Princeton Research Day 2 likes 85 plays

CITP Seminar: Ryan Calo - Modeling Through

Theorists of justice have long imagined a decision-maker capable of acting wisely in every circumstance. Policymakers seldom live up to this ideal. They face well-understood limits, including an…

+25 More
From  CI Center for Information Technology Policy 0 likes 21 plays

CITP Seminar: Ari Waldman - Industry Unbound: The Inside Story of Privacy, Data, and Corporate Power

Why are there so many privacy laws and so many privacy professionals but no privacy on the ground? With research based on interviews with scores of tech employees and internal documents outlining…

+20 More
From  CI Center for Information Technology Policy 0 likes 30 plays

CITP Seminar: Arunesh Mathur - The Princeton Digital Ad Observatory

It is well known that digital ads violate privacy, yet we know little about their content. Digital ads are of increasingly low-quality, and often contain manipulative and deceptive components to lure…

From  CI Center for Information Technology Policy 0 likes 6 plays

In Plain View - Open Source Intelligence

(InfoSec 201) Did you ever think about all of the data publicly available? What if bad actors collect this “open source intelligence” and use it to attack you or Princeton University? …

From  Stefanie Clerkin 0 likes 42 plays

Exploring Privacy Apps

(InfoSec 101) In celebration of International Data Privacy Day (January 28) and in collaboration with the Center for Digital Humanities’ Privacy Initiative, the Information Security Office will…

From  Stefanie Clerkin 0 likes 39 plays

CITP Seminar: Josh Goldfoot - Computer Crime

Criminal computer intrusions can endanger privacy, safety, financial security, and more. The problem of computer crime has grown so that it threatens not only businesses and government…

+24 More
From  CI Center for Information Technology Policy 0 likes 5 plays

CITP Seminar: Anita Allen - How Privacy Got Its Race

There is increasing interest in understanding the difference race makes for the enjoyment of privacy and the protection of privacy rights. This talk surveys issues and concerns at the intersection of…

+20 More
From  CI Center for Information Technology Policy 0 likes 9 plays

CITP Seminar: Serge Egelman - Taking Responsibility for Someone Else’s Code: Studying the Privacy Behaviors of Mobile Apps at Scale

Modern software development has embraced the concept of “code reuse,” which is the practice of relying on third-party code to avoid “reinventing the wheel” (and rightly so).…

From  CI Center for Information Technology Policy 0 likes 13 plays

Maximizing the “Little Screen” in Online Language Courses

Under emergency remote instruction, both language learners and instructors complained about long hours in front of laptop or desktop computers — Zoom fatigue, backaches, and not moving for…

+10 More
From  PC Princeton Center for Language Study 0 likes 7 plays

CITP Webinar: Ed Felten - COVID-19, Technology, Privacy and Civil Liberties

Many systems have been proposed for using technology to help individuals and public health officials better respond to the COVID-19 pandemic. This talk will analyze the major proposed uses of…

+26 More
From  CI Center for Information Technology Policy 0 likes 346 plays