COMS BC 3420 Privacy in a Networked World
COMS BC 3420 Privacy in a Networked World
Time: | | Wednesdays, 4:10pm - 6:00pm |
Location: | | Milstein LL016 |
Waiting List
This class has only 24 slots, and has been very popular. This
semester, I am handling the waitlist as an instructor-controlled
waiting list. Priority will be given to seniors, and half of the
seats will be reserved for Barnard students. To be considered for
being let into the class, please join the waiting list AND fill
out the form at
https://forms.gle/n8pQhcfdXCG6e6KG6, which asks three questions
about your interest in the class. Based on the strength of your
answers and looking to ensure we have a multidisciplinary perspective
in the class, as well as prioritizing seniority and reserving half of
the available slots for Barnard students (assuming sufficient demand),
I will make an initial round of enrollments from the waitlist on June
1, considering all responses that have been received by 11:59pm ET on
May 31. After that time, I will continue to add new students to the
class as other students drop, including taking into consideration any
additional responses received by that time. I will provide updates
here from time to time, with the goal of helping students plan.
Update as of June 20, 2023: I have made initial assignments into the class from the waiting list based on the form responses. I will continue to make new enrollments if slots open as students drop. If you have been added to the class and no longer wish to take it, please be considerate of your fellow students and drop the class so that someone else can be added. If you are on the waiting list and still wish to be considered for the class, make sure to fill out the "Assignment 0" form at https://forms.gle/n8pQhcfdXCG6e6KG6 so that you will be considered. Based on the current enrollments and rate of people dropping, I estimate that it is very unlikely that any juniors or sophomores will be admitted to the class.
Office Hours
Prof. Wright's open office hours: Mondays 12-2pm for Fall 2023, but sometimes rescheduled. Complete schedule of office hours.
Course Description
The ubiquity of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data: data that, if used improperly, can harm the data subjects. As a result, concern about the use, ownership, control, privacy, and accuracy of these data has become a top priority. This seminar course focuses on the technical challenges of handling sensitive data, the privacy implications of various technologies, and the policy and legal issues facing data subjects, data owners, and data users.
Specific topics to be discussed include:
- what is privacy?
- technology-specific issues (online social media, the Internet of Things, information consolidation, personalization, Internet commerce and payment technologies, ...)
- sector-specific issues (healthcare, finance, national security, Internet applications, Census data, ...)
- privacy legislation
- privacy in the attention economy
- fair information principles
- when cryptography can and cannot help
- anonymity vs. pseudonymity
- differential privacy
- deidentification and risks of reidentification
- tools for privacy management
- public information and privacy
This course is suitable for computer science majors and non-majors,
and we take a multidisciplinary approach to privacy. Coding background
is not required. Course readings draw on a variety of sources,
including both technical materials and the popular press. The course
includes a student-chosen privacy-related project. Projects are largely
student-directed, and can include activities such as a programming
project, a design proposal for a new privacy solution, a survey
article describing the state of the art in a particular area, a public
policy or legal argument, or an article suitable for the popular
press.
We start each class with a discussion of a privacy-related case
study. For each, we frame our discussion around a series of
specific questions, which you can find in the Courseworks site for the
class. Two of your assignments are to present your own case
studies. Some student case studies may be used during class as
examples.
Learning Outcomes
Students will be able to:
- demonstrate understanding of privacy issues associated with various technologies and their use.
- compare and contrast different approaches to privacy, and identify examples of when different approaches are relevant.
- develop, refine, and execute a privacy-related project based on feedback and iteration.
- evaluate the potential tradeoffs of privacy and other properties such as usability, transparency, profitability.
Additional Course Information
Additional course information, including a detailed syllabus, reading list, and information about grading, will be available for enrolled students via Courseworks.