Privacy, theory

group_project

Visible to the public EAGER: Exploring Heuristics and Designing Interface Cues to Understand Revealing or Withholding of Private Information

In individual pursuits of personalized service and other functionalities, people disclose personal and private information by trusting certain online sites and services. Scholars often assume that such trust is based on a careful assessment of the benefits and risks of disclosing information online. This project departs from such an assumption and investigates the possibility that decision-making about online information disclosure is not systematic, but rather based on cognitive heuristics (or mental shortcuts) triggered by cues in the interaction context.

group_project

Visible to the public EAGER: Privacy in Citizen Science: An Emerging Concern for Research and Practice

Citizen science is a form of collaboration where members of the public participate in scientific research. Citizen science is increasingly facilitated by a variety of wireless, cellular and satellite technologies. Data collected and shared using these technologies may threaten the privacy of volunteers. This project will discover factors which lead to, or allieviate, privacy concerns for citizen science volunteers.

group_project

Visible to the public TWC: Small: Collaborative: Computation and Access Control on Big Multiuser Data

This project is developing new foundational cryptographic techniques for outsourcing data and computations on it, which fully preserve data privacy. The focus is on real-world settings involving multiple users where privacy with respect to all other users is required, as well as privacy from the service provider. The project will aim to minimize the interaction between users in the system, making the computational complexity for each client independent of the total number of users.

group_project

Visible to the public ETHICS OF DATA AGGREGATION: PRIVACY, TRUST, AND FAIRNESS

This project closely examines data aggregation to understand what types of aggregation are normatively and descriptively important to individuals and how do different types and degree of aggregation impact individual trust. This proposed research would advance knowledge and understanding within the study of big data, trust, and business ethics. Initial investigations into data aggregation have been technical to ensure accuracy and diminish unwanted bias.

group_project

Visible to the public SBE: Small: Technological Con-Artistry: An Analysis of Social Engineering

One of the most serious threats in the world today to the security of cyberspace is "social engineering" - the process by which people with access to critical information regarding information systems security are tricked or manipulated into surrendering such information to unauthorized persons, thereby allowing them access to otherwise secure systems. To date, little systematic research has been conducted on social engineering.

group_project

Visible to the public TWC SBE: Small: Towards an Economic Foundation of Privacy-Preserving Data Analytics: Incentive Mechanisms and Fundamental Limits

The commoditization of private data has been trending up, as big data analytics is playing a more critical role in advertising, scientific research, etc. It is becoming increasingly difficult to know how data may be used, or to retain control over data about oneself. One common practice of collecting private data is based on "informed consent", where data subjects (individuals) decide whether to report data or not, based upon who is collecting the data, what data is collected, and how the data will be used.

group_project

Visible to the public TWC: Large: Collaborative: Computing Over Distributed Sensitive Data

Information about individuals is collected by a variety of organizations including government agencies, banks, hospitals, research institutions, and private companies. In many cases, sharing this data among organizations can bring benefits in social, scientific, business, and security domains, as the collected information is of similar nature, of about similar populations. However, much of this collected data is sensitive as it contains personal information, or information that could damage an organization's reputation or competitiveness.

group_project

Visible to the public TWC: Medium: Collaborative: New Protocols and Systems for RAM-Based Secure Computation

Secure computation allows users to collaboratively compute any program on their private data, while ensuring that they learn nothing beyond the output of the computation. Existing protocols for secure computation primarily rely on a boolean-circuit representation for the program being evaluated, which can be highly inefficient. This project focuses on developing secure-computation protocols in the RAM model of computation. Particularly challenging here is the need to ensure that memory accesses are oblivious, and do not leak information about private data.

group_project

Visible to the public CAREER: The Value of Privacy

This project takes a new approach to problems involving sensitive data, by focusing on rigorous mathematical modeling and characterization of the value of private information. By focusing on quantifying the loss incurred by affected individuals when their information is used -- and quantifying the attendant benefits of such use -- the approaches advanced by this work enable concrete reasoning about the relative risks and rewards of a wide variety of potential computations on sensitive data.

group_project

Visible to the public EAGER: Collaborative: Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems: Practices and Contexts in the Netherlands and US

The increasing ubiquity of mobile technologies creates unique privacy and surveillance challenges for users. These problems are global, but the way users, organizations, and governments approach these challenges varies based on cultural norms around privacy. This cross-cultural project evaluates how mobile users in the U.S. and the Netherlands think about and make decisions about their privacy when using mobile apps.