Skip to main content

Research Area: Privacy Protection

Projects List

Accountable Mobile Computing Framework Based on User Behavior Modeling
Research Area: Secure Home Computing | Mobility | Privacy Protection | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researchers: Martin Griss, Anind Dey, Joy Zhang

An Experiment in Hiring Discrimination via Online Social Networks
Research Area: Privacy Protection
Researchers: Alessandro Acquisti, Christina Fong

Are There Evolutionary Roots To Privacy Concerns?
Research Area: Privacy Protection
Researchers: Alessandro Acquisti, Laura Brandimarte, Jeff Hancock

Attention Economics in Information Rich Environments
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Usable Privacy and Security
Researcher: Alessandro Acquisti

Campus Navigation
Research Area: Privacy Protection | Mobility
Researchers: James Morris, Norman Sadeh

Comprehensive Security & Privacy for Next Generation Mobile Networks
Research Area: Mobility | Privacy Protection | Next Generation Secure and Available Networks
Researcher: Patrick Tague

Contractual Anonymity
Research Area: Trustworthy Computing Platforms and Devices | Privacy Protection
Cross Cutting Thrusts: Cryptography
Researchers: David Brumley, Jonathan McCune

CrowdScanning: Using Crowdsourcing and Static Analysis to understand the Privacy Issues in Smartphone Apps
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Norman Sadeh

Data Confidentiality, Privacy, and Security
Research Area: Privacy Protection
Cross Cutting Thrusts: Cryptography
Researcher: Stephen Fienberg

Differentially-Private Synthetic Dataset Release for Machine Learning and Clustering
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Avrim Blum

Effective Trust Indicators
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

Empirical Analysis of Data Breach Litigation
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researchers: Alessandro Acquisti, Sasha Romanosky

Evolutionary Roots of Privacy and Security Concerns
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Alessandro Acquisti

Extracting Security Policies from Source Code
Research Area: Privacy Protection
Researchers: Michael Tschantz

Formalizing and Enforcing Privacy
Research Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researchers: Anupam Datta, Limin Jia, Jeremiah Blocki, Zeliha Dilsun Kaynar, Divya Sharma, Arunesh Sinha, Michael Tschantz

Gort: An analysis tool for understanding the privacy and security behaviors of smartphone apps
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

Impact of Online Social Networks on Hiring Practices
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researchers: Alessandro Acquisti, Christina Fong

Logical Reasoning About Obligations
Research Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researcher: Frank Pfenning

Machine Learning Techniques for Phishing Attacks
Research Area: Trustworthy Computing Platforms and Devices | Privacy Protection
Researcher: Jason Hong

Measuring and Modeling Security and Privacy Laws
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researchers: Alessandro Acquisti, Sasha Romanosky, Richard Sharp

Mobile Users Effectively Control Privacy in a Friend-Finder Application
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor, Jason Hong

On Privacy and Compliance
Research Area: Privacy Protection
Cross Cutting Thrusts: Cryptography
Researchers: Anupam Datta, Zeliha Dilsun Kaynar

Password-Composition Policies and the Security and Usability of Passwords
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Nicolas Christin, Lorrie Cranor

Personal Information Revelation in Online Social Networks
Research Area: Privacy Protection
Researcher: Alessandro Acquisti

Personal Information Security, Conflation of Dissemination and Access, and Illusion of Control
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researcher: Alessandro Acquisti

Privacy, Audit and Accountability
Research Area: Privacy Protection
Researchers: Anupam Datta, Limin Jia

Privacy and Security in Real Time Monitoring Systems
Research Area: Mobility | Privacy Protection
Researchers: Daniel Siewiorek, Asim Smailagic, Martin Griss

Privacy and the Illusion of Control
Research Area: Privacy Protection
Researchers: Alessandro Acquisti, Laura Brandimarte, George Lowenstein

Privacy Decision-Making
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lorrie Cranor, Alessandro Acquisti

Privacy notice and choice in practice
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

Privacy Nudging
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Alessandro Acquisti, Lorrie Cranor, Norman Sadeh

Protecting Privacy and Confidentiality of Information
Research Area: Privacy Protection
Researcher: Rahul Telang

Providing Privacy & Authentication
Research Area: Privacy Protection
Researcher: Rohit Negi

Reconciling Privacy and Usability by Learning Default Privacy Policies
Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Norman Sadeh

Security Behavior Observatory
Research Area: Secure Home Computing | Privacy Protection
Cross Cutting Thrusts: Software Security | Usable Privacy and Security | Threat Analysis and Modeling
Researchers: Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang

Simplifying Access Control for Home Networking
Research Area: Privacy Protection | Security of Cyber-Physical Systems
Researchers: Jason Hong, Bryan Pendleton

Simplifying Logins with Web Ticket
Research Area: Privacy Protection | Security of Cyber-Physical Systems
Researchers: Jason Hong, Eiji Hayashi

Smart Meters and Their Impact on Residential Privacy
Research Area: Security of Cyber-Physical Systems | Privacy Protection
Researcher: Anthony Rowe

Understanding Human Behaviors at Large Scales through Mobile Devices
Research Area: Mobility | Privacy Protection | Security of Cyber-Physical Systems
Researchers: Jason Hong, Norman Sadeh, Justin Cranshaw, Eran Toch

Usable Cyber Trust Indicators
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

User-Controllable Policy Learning
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor

User Controllable Security & Privacy for Mobile Social Networking
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor, Jason Hong

User-Controllable Security and Privacy for Pervasive Computing
Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Jason Hong, Lorrie Cranor, Lujo Bauer

Using Personalized Face Composites for Visceral Targeting
Research Area: Privacy Protection
Researchers: Alessandro Acquisti, Ralph Gross, Sonam Samat, Eyal Pe'er

VMA: Dynamic and Secure Heterogeneous System for Elder Care
Research Area: Next Generation Secure and Available Networks | Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Pei Zhang, Martin Griss, Raj Rajkumar, Daniel Siewiorek, Asim Smailagic