Show    entries
Search: 

Examining The Third-Party Tracking Ecosystem

Serge Egelman, Research Director, International Computer Science Institute, UC Berkeley
Primal Wijesekera, Postdoctoral Researcher, International Computer Science Institute, UC Berkeley
Ahmad Bashir, Postdoctoral Researcher, International Computer Science Institute, UC Berkeley
Many mobile apps and online services use “third-party trackers,” which send data about specific user behaviors to various other companies. The purposes of these transmissions can include profiling individual users to target them with specific ads, amassing personal information to sell to data brokers, or monitoring activities to identify how...

Designing a Privacy Curriculum for the Elderly

Alisa Frik, Postdoctoral Fellow, International Computer Science Institute, UC Berkeley
Samy Cherfaoui, Undergraduate Student, Department of Electrical Engineering and Computer Science, UC Berkeley
Julia Bernd, Researcher, International Computer Science Institute, UC Berkeley
Prior work has demonstrated that older adults are particularly unaware of and susceptible to online privacy and security risks, due to their limited technological literacy and experience and their declining physical and mental abilities. Increasing awareness about privacy and security among the elderly is especially critical because older adults are...

The Cybersecurity of “Smart Infrastructure”

Alison Post, Associate Professor, Department of Political Science and Global Metropolitan Studies, UC Berkeley
Karen Trapenberg Frick, Associate Professor, College for Environmental Design, UC Berkeley
Kenichi Soga, Chancellor's Professor, Civil and Environmental Engineering, UC Berkeley
Marti Hearst, Professor, School of Information, UC Berkeley
Urban infrastructure, such as water and sanitation systems, subways, power grids, and flood defense systems, are crucial for social and economic life, yet are vulnerable to natural hazards that could disrupt services, such as earthquakes or floods. New sensor systems can potentially provide early warnings of problems, and thus help...

Cybersecurity for Non-Primary and Primary Users of Always-On Internet of Things Devices: An Ethnographic, Participatory, and Multidisciplinary Design Approach

James Pierce, Researcher/Assistant Professor of Design, CITRIS and the Banatao Institute, UC Berkeley|California College of the Arts
Richmond Wong, PhD Candidate, School of Information, UC Berkeley
Current design and user-oriented security/privacy research focuses on individual awareness, choice, and consent approaches. Despite some successes, decades of research highlights significant limitations to informed consent and usable choice approaches: policies are often ignored, overly time-consuming, and can actually decrease trust, even when they are clearly written; and privacy decisions...

Detecting Images Generated by Neural Networks

Alexei Efros, Associate Professor, Department of Electrical Engineering and Computer Science
Recent years have seen great advances in computer vision and machine learning. But with these advances comes an ethical dilemma: as our methods get better, so do the tools for malicious image manipulation. While these malicious uses were once only the domain of well-resourced dictators, spy agencies, and unscrupulous photojournalists,...

Crafting Public Policy for Reinforcement Learning Applications

Thomas Gilbert, PhD Candidate, Sociology, UC Berkeley
Sarah Dean, PhD Student, Department of Electrical Engineering and Computer Sciences, UC Berkeley
Tom Zick, PhD Candidate, College of Letters & Science, UC Berkeley
McKane Andrus, Graduate Student Researcher, Berkeley Artificial Intelligence Research, UC Berkeley
A team of graduate students, Graduates for Engaged and Extended Scholarship around computing and Engineering (GEESE), will build on their prior CLTC-funded project and develop suggested interventions in the design, training, and deployment of reinforcement learning (RL) systems that can be integrated into social infrastructure. These deliverables will include a...

Factors Affecting Trust Among Vulnerable Populations

Rajasi Desai, Graduate Student Researcher, School of Information, UC Berkeley
Varshine Chandrakanthan, Graduate Student Researcher, School of Information, UC Berkeley
This project aims to understand the trust dynamics and the factors affecting trust for vulnerable populations like human rights defenders, activists, and journalists who document and upload sensitive media, as well as people who receive this media in order to use it as evidence. The researchers will work to understand...

Hackers vs. Testers: Understanding Software Vulnerability Discovery Processes

Primal Wijesekera, Postdoctoral Researcher, International Computer Science Institute, UC Berkeley
Serge Egelman, Research Director, International Computer Science Institute, UC Berkeley
Noura Alomar, Researcher, International Computer Science Institute, UC Berkeley
Amit Elazari, Lecturer/Director, School of Information, UC Berkeley|Intel
Security vulnerabilities pose a grave danger to the integrity of any system because they can undermine almost any protection mechanism or safeguard. As such, finding vulnerabilities before the software gets deployed is a critical task in any current software development cycle. A vital tool has recently emerged in the arsenal...

Repercussions of Cyber-Security Measures in U.S. High Schools

Anne Jonas, PhD Candidate, School of Information, UC Berkeley
Public high schools in the United States have increasingly digitized administrative and instructional systems over the last twenty years. Consequently, the security and welfare of students has been a primary concern, as reflected in regulations like the Federal Children’s Internet Protection Act (CIPA). Yet some cybersecurity measures intended for children’s...

Probing the Ambivalence of Facial Recognition Technologies in China: An Ethnographic Study of Megvii

Michael Kowen, PhD Student, Department of Sociology, UC Berkeley
This researcher will undertake a residency and conduct an ethnography of Megvii, a startup company in Beijing that develops smart surveillance technologies, particularly facial recognition systems, using artificial intelligence techniques. Through interviews and ethnographic observations at this particular firm, the project will generate insights into how Chinese experts who currently...
Showing 21 - 30 of 120 entries