Security

Related Faculty

Daniel Aranki
Assistant Professor of Practice
Predictive medicine; artificial intelligence; machine learning; tele-health; information disclosure; privacy; security.
chuang2019.jpg
Professor
Biosensory computing; climate informatics; information economics and policy
Chris Hoofnagle
Professor of Practice
Internet law, information privacy, consumer protection, cybersecurity, computer crime, regulation of technology, edtech
Headshot of Professor Deirdre K. Mulligan
Professor
privacy, fairness, human rights, cybersecurity, technology and governance, values in design
headshot of Andrew Reddie, smiling, black background
Assistant Professor of Practice
Politics, Security, Emerging Technologies, Arms Control, Global Governance, Cybersecurity

Recent Publications

May 8, 2018

The creators of technical infrastructure are under social and legal pressure to comply with expectations that can be difficult to translate into computational and business logics. This dissertation bridges this gap through three projects that focus on privacy engineering, information security, and data economics, respectively. These projects culminate in a new formal method for evaluating the strategic and tactical value of data: data games. This method relies on a core theoretical contribution building on the work of Shannon, Dretske, Pearl, Koller, and Nissenbaum: a definition of situated information flow as causal flow in the context of other causal relations and strategic choices.

Pages

Security news

Chris Hoofnagle and Jen King

Washington Post op-ed cites privacy research by Chris Hoofnagle and Jen King.

graphic displaying passthoughts and earEEG

I School researchers have developed a custom-fit earpiece that that can capture “passthoughts” through brainwave signals from the ear canal, and for the first time demonstrated one-step three-factor authentication.

labmd-ftc-amicus.jpg

Chris Jay Hoofnagle, Deirdre Mulligan, and others weighed in on an ongoing lawsuit challenging the authority of the Federal Trade Commission to regulate companies’ data security practices.

cltc-scenario_0.jpg
How might we function in a world where everything we do online can be hacked or stolen, or where powerful algorithms predict human behavior at the most granular scale?
irgc-article_0.jpg
In a new article, I School scholars ponder the implications of considering cybersecurity a public good, like public health.

Pages