Understand and Measure Privacy
group_project
Submitted by Jianping Fan on Tue, 11/14/2017 - 11:35am
The objective of this project is to investigate a comprehensive image privacy recommendation system, called iPrivacy (image Privacy), which can efficiently and automatically generate proper privacy settings for newly shared photos that also considers consensus of multiple parties appearing in the same photo. Photo sharing has become very popular with the growing ubiquity of smartphones and other mobile devices.
group_project
Submitted by Jessica Vitak on Tue, 11/14/2017 - 10:49am
The increasing ubiquity of mobile technologies creates unique privacy and surveillance challenges for users. These problems are global, but the way users, organizations, and governments approach these challenges varies based on cultural norms around privacy. This cross-cultural project evaluates how mobile users in the U.S. and the Netherlands think about and make decisions about their privacy when using mobile apps.
group_project
Submitted by Jaideep Vaidya on Mon, 11/13/2017 - 5:00pm
Social networks provide many benefits, but also give rise to serious concerns regarding privacy. Indeed, since privacy protections are not intrinsically incorporated into the underlying technological framework, user data is still accessible to the social network and is open to misuse. While there have been efforts to incorporate privacy into social networks, existing solutions are not sufficiently lightweight, transparent, and functional, and therefore have achieved only limited adoption.
group_project
Submitted by Gwendolyn Lee on Mon, 11/13/2017 - 8:52am
As companies collect consumer data in increasingly larger quantity and mine the data more deeply, trade-offs arise with respect to companies' practices about information privacy. A company may choose practices that augment targeted advertisements or services. However, the financial rewards associated with privacy practices are highly uncertain, since they are affected by a company's competition with rivals.
group_project
Submitted by Giovanni Vigna on Mon, 11/13/2017 - 8:21am
The adoption of smartphones has steadily increased in the past few years, and smartphones have become the tool with which millions of users handle confidential information, such as financial and health-related data. As a result, these devices have become attractive targets for cybercriminals, who attempt to violate the trust assumptions underlying the smartphone platform in order to compromise the security and privacy of users.
group_project
Submitted by Franziska Roesner on Mon, 11/13/2017 - 7:33am
Advances in digital communication technologies, and their proliferation in recent decades, have had a remarkable impact on journalism. Security weaknesses in these technologies have put journalists and their sources increasingly at risk, hindering efforts at investigative reporting, transparency, and whistleblowing. Because of their willingness to be early adopters, and to openly communicate their issues, journalists provide an opportunity to identify security issues and requirements in new communication methods.
group_project
Submitted by Fariborz Farahmand on Mon, 11/13/2017 - 6:57am
When making decisions about information privacy, people do not always act rationally according to their best interests. It is thus important to understand why people express concerns about privacy, but often act contrary to their stated intentions.
group_project
Submitted by Emilee Rader on Thu, 11/09/2017 - 7:00am
Ubiquitous computing technologies such as "smart" door locks, thermostats, fitness trackers and video monitors can help make users' lives safer and more efficient. These devices automatically collect data about users and their activities within their homes, which are then combined and processed by algorithms on a cloud server owned by the service provider. This enables beneficial system functionality that would not be possible from the devices in isolation.
group_project
Submitted by Donald Truxillo on Tue, 11/07/2017 - 7:06am
Millions of people in the U.S. and worldwide apply for jobs online, and the use of online job application systems is growing. Thus, online job applicants are an important population to study. However, few studies have examined job applicants' concerns about their privacy and how to protect it. Further, job applicants' privacy concerns may affect how willing they are to apply for jobs and even whether job applicants pursue legal action against employers for privacy violations.
group_project
Submitted by Donald Towsley on Tue, 11/07/2017 - 7:03am
Security and privacy are prominent concerns in modern communications. Although cryptographic approaches have been widely studied to protect a message's content from deciphering by an eavesdropper, there are many times when hiding the very existence of the communication is critical. The hiding of communication, termed covert (private) communication, is important in many domains such as covert military operations, and removing the ability of users to be tracked in their everyday activities.