Prof. Rebecca Wright |
Spring 2005 |
Time: | Tuesday and Thursdays, 9:30am - 10:45am |
Location: | Tuesdays, Burchard 430 | Thursdays, Pierce 116 |
In addition to this web page, the course mailing list is a primary source for announcements and other course information. All students in the course should be subscribed to the list.
Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data, i.e., data that, if used improperly, can harm the data subjects. As a result, concern about the ownership, control, privacy, and accuracy of these data has become a top priority. This course focuses on both the technical challenges of handling sensitive data and the policy and legal issues facing data subjects, data owners, and data users.
Specific topics to be discussed may include:
This course is suitable for advanced undergraduate computer science majors, graduate students in computer science, and students in technology management or other majors with some computer science background. Course readings will draw on a variety of sources, including both technical materials and the popular press. The course will include a privacy-related project. Projects are largely student-directed, and can include activities such as a programming project, a research paper describing new results (or documenting failed attempts to obtain such results), a survey article describing the state of the art in a particular research area, or an article suitable for the popular press.
We will start some of our class meetings with a discussion of one or more privacy-related case studies. For each, we will frame our discussion around a series of questions. Please bring the questions with you to every class.
10% | Project: initial proposals. | Due Feb. 3 |
10% | Project: revised proposals. | Due Feb. 17 |
15% | Project: status reports. | Due Mar. 31 |
15% | Project: final reports. | Due Apr. 28 |
35% | Class participation. | Throughout |
15% | In-class final exam. | May 3 |
Each project component is due at the start of class on the specified day. Lateness on any project deliverable will be penalized at a rate of 5% of the available points per day.
The following is a schedule showing class dates, assignment due dates, and a partial list of topics.
Date | Topics | Assigned Reading Material |
---|---|---|
Tues, Jan 18 | What is privacy? | |
Thur, Jan 20 | Cryptography basics | Garfinkel, Chapters 1 and 2 Privacy Tradeoffs: Myth or Reality? |
Tues, Jan 25 | Discuss class projects | Garfinkel, Chapters 3, 4, and 5 |
Thur, Jan 27 | Threats to privacy | Garfinkel, Chapters 6, 7, and 8 |
Tues, Feb 1 | Approaches to protecting privacy | Garfinkel, Chapters 9 and 10 |
Thur, Feb 3 | Approaches to protecting privacy, cont'd Initial project proposals due |
|
Tues, Feb 8 | Mix nets | Garfinkel, Chapter 11 Untraceable electronic mail, return addresses, and digital pseudonyms, by David Chaum (see required reading for links). |
Thur, Feb 10 | Mix nets, cont'd Initial project proposals returned |
O'Harrow, Intro, Chapters 1 and 2 |
Tues, Feb 15 | Case study: strip searches Anonymous web browsing: Crowds |
O'Harrow, Chapters 3, 4, and 5 Crowds: Anonymity for Web Transactions |
Thur, Feb 17 | Case study: Use of SSN as student ID Anonymous web browsing, cont'd Revised project proposals due |
|
Tues, Feb 22 | Monday schedule: No class | |
Thur, Feb 24 | No class | |
Tues, Mar 1 | Cancelled due to snow. Revised project proposals returned |
O'Harrow, Chapters 6, 7, and 8 |
Thur, Mar 3 | P3P and related tools, I | Chapter 1 of Web Privacy with P3P |
Tues, Mar 8 | P3P and related tools, II | User Interfaces for Privacy Agents O'Harrow, Chapter 9 |
Thur, Mar 10 | P3P and related tools, III |
Specifying Privacy Policies with P3P and EPAL: Lessons Learned O'Harrow, Chapter 10 |
Tues, Mar 15 | national security and privacy, I | The U.S. Department of Homeland Security's Privacy Office : the body of the 2004 annual report is required reading (linked under "The Body") from that page. |
Thur, Mar 17 | national security and privacy, II | EPIC's
Privacy Act of 1974 page. EPIC's PATRIOT Act page. |
Tues, Mar 22 | Spring Break: No class | |
Thur, Mar 24 | Spring Break: No class | |
Tues, Mar 29 | Case study: RFID in the
workplace RFID and privacy |
Radio-Frequency Identification: Security Risks and Challenges
(The case study document is not required reading, but is linked at left in case you want to read it.) |
Thur, Mar 31 | RFID, ctd. health information and privacy Project status reports due |
Summary of the HIPAA Privacy Rule |
Tues, Apr 5 | Case study: medical records and health decisions health information and privacy, ctd Hippocratic Databases |
Hippocratic Databases |
Thur, Apr 7 | census data and privacy, statistical databases Project status reports returned |
Security-control methods for statistical databases: a comparative
study (You should read pages 515-522 in detail, and can skim the rest.) |
Tues, Apr 12 | Guest lecturer: Michael Freedman, NYU Anonymity systems and censorship-resistant systems |
Protecting Freedom of Information Online with Freenet |
Thur, Apr 14 | privacy-preserving data mining, I | From
SIGKDD Explorations, Volume 4, Issue 2, you should read: Data Mining, National Security, Privacy and Civil Liberties Randomization in Privacy Preserving Data Mining Cryptographic Techniques for Privacy-Preserving Data Mining |
Tues, Apr 19 | privacy-preserving data mining, II |
Experimental Analysis of Privacy-Preserving Statistics
Computation, and From SIGKDD Explorations, Volume 4, Issue 2, you should read: Tools for Privacy Preserving Distributed Data Mining |
Thur, Apr 21 | Guest lecturer: Prof. Joan Feigenbaum, Yale University Privacy and the Law |
Privacy and Human Rights 2003 Overview A term paper discussing conflicts between privacy legislation in different countries |
Tues, Apr 26 | Final project presentations Class will run 30-40 minutes overtime. |
|
Thur, Apr 28 | Final project presentations Final project reports due Class will run 10 minutes overtime. |
|
Tues, May 3 | FINAL EXAM |
Required reading:
You are responsible for reading the assigned material for each class before the class, so that you can participate fully in class discussions.
Additional required readings may be added later.
Other Resources:
Some readings and other resources you may find interesting and/or helpful for your project as below. More will be added throughout the semester.
Various news groups and print or on-line publications, including:
Last updated 4/13/05 by rwright (at) cs.stevens.edu |
Copyright © 2005 Rebecca N. Wright |