Recent Research News
April 3, 2014
Capped by a keynote from Obama adviser John Podesta, a day-long workshop brought together the worlds of government, business, the law, and academia for what assistant professor Deirdre Mulligan called “a frank and honest conversation about our values,” and about how to balance those values with the omnipresent, often invisible collection of data about every aspect of our lives.
February 18, 2014
Parikh is transforming the world’s poorest areas by designing, evaluating, and deploying appropriate information systems that support sustainable economic development.
February 6, 2014
New research presents case studies from the 1906 San Francisco earthquake; Rajasthan, India, at the turn of the 20th century; and a present-day Indian welfare system.
December 11, 2013
Professor Hearst was honored for her contributions to information retrieval and computational linguistics.
December 11, 2013
Faculty, Ph.D. students, and alumni present over a dozen papers, notes, demonstrations, and workshops at the international Information and Communication Technologies and Development conference in Cape Town, South Africa.
November 12, 2013
Thinkers50 is a global ranking of management thinkers published every two years.
October 15, 2013
Pardos is an expert in the emerging field of educational data mining — applying data science methodologies to online learning environments to understand student learning.
September 25, 2013
Although case law is technically public domain, legal decisions are often scattered across the Internet, locked up in proprietary systems, and only available by paying exorbitant fees. A new non-profit aims to make these legal materials easily and freely available to all.
April 25, 2013
Eight I School faculty and students will be presenting their research at the upcoming CHI Conference in Paris, France.
April 3, 2013
Instead of typing your password, in the future you may only have to think your password. A new School of Information study explores the feasibility of brainwave-based computer authentication as a substitute for passwords.