Security

Related Faculty

Assistant Professor of Practice
Predictive medicine; artificial intelligence; machine learning; tele-health; information disclosure; privacy; security.
Professor
Climate informatics; biosensory computing; incentive-centered design
Professor
privacy, fairness, human rights, cybersecurity, technology and governance, values in design, public interest tech

Recent Publications

What can machines know about the mind? This dissertation seeks to understand people’s beliefs about this question: how these beliefs affect and arise from interactions with digital sensors, from prior beliefs about the mind and the body; and how these beliefs may shape the design of technical systems in the future.

The purpose of this dissertation is twofold. First, it surfaces that the boundary between sensing bodies and sensing minds is unstable, deeply entangled with social context and beliefs about the body and mind. Second, it proposes the porousness of this boundary as a site for studying the role that biosensing devices will play in near future. As biosensors creep into smart watches, bands, and ingestibles, their ability to divine not just what these bodies do, but what they think and feel, presents an under-explored avenue for understanding and imagining how thesetechnologies will come to matter in the course of life.

We investigate cybersecurity toolkits, collections of public facing materials intended to help users achieve security online. We look at design dimensions of these toolkits, and investigate how the toolkits construct security as a value and how they construct people as (in)secure users.

The creators of technical infrastructure are under social and legal pressure to comply with expectations that can be difficult to translate into computational and business logics. This dissertation bridges this gap through three projects that focus on privacy engineering, information security, and data economics, respectively. These projects culminate in a new formal method for evaluating the strategic and tactical value of data: data games. This method relies on a core theoretical contribution building on the work of Shannon, Dretske, Pearl, Koller, and Nissenbaum: a definition of situated information flow as causal flow in the context of other causal relations and strategic choices.

Security news

Outstanding MICS and MIDS capstone projects.

Conceived last September and officially launched this summer, the Web Application Security Assessment class, headed by lecturer Jennia Hizver, is addressing the major cybersecurity issue of web application data leaks.

Addressing the toughest questions at the intersection of technology, politics, and security.

Outstanding MICS, MIDS, and 5th Year MIDS capstone projects.

Craig Newmark Philanthropies has announced a three-year, $1.725M commitment to support the newly established Consortium of Cybersecurity Clinics.

Rachael Cornejo shares how her experience in Citizen Clinic led to her career today. 

Professor Emeritus Steven Weber and the Center for Long-Term Cybersecurity (CLTC) will be honored with the 2021-2022 Chancellor’s Award for Research in the Public Interest.