Privacy in a Networked World
CS578A/SOC551 Spring 2017
Class Meetings: Mondays, 3:00–5:30pm, Burchard 229
Antonio R. Nicolosi
Office hours: Wednesday & Thursdays, 1:00–2:00pm,
This course focuses on both the technical challenges of handling
sensitive data and the policy and legal issues facing data subjects,
data owners, and data users. This course is suitable for advanced
undergraduate computer science majors and graduate students in
computer science with suitable background knowledge of IT security
techniques. Course readings draw on a variety of sources, including
both technical materials and the popular press. Student participation
is encouraged, both in and out of the classroom (e.g., student
presentations and email/online discussions). The course includes a
- Miscellaneous articles as assigned in class (see Syllabus below)
Work Load Breakdown & Grading
- Work load breakdown
2.5 hrs/week: Class attendance
3.5 hrs/week: Readings
3.0 hrs/week: Class project
25%: Class participation
20%: Book reading
25%: Class project (rubric):
- Oct 10:
Book presentation (10%)
- Oct 10:
Book summary (10%)
30%: Final exam (Dec 11???)
- Oct 30:
Project proposal (5%)
- Dec 4:
Final presentations (10%)
- Dec 4:
Final report (10%)
- What is privacy and why it matters
- Informational privacy
- The skeptic's arguments
- Conceptualizing privacy: Contextual integrity and other frameworks
- Identity and Anonymity
- Technological threats to privacy`
- User tracking (online and offline): GPS, GSM/CDMA, RFID, WWW
- Web profiling & ads
- PII leaks, phishing and ID-theft
- Protecting privacy
- Privacy regulations and best practices
- Privacy-enhancing technologies (
- Anonymous remailers (mix-nets,
- Crypto tools (e-cash, credentials, multi-party computation)
- Randomization and DB privacy
- Differential privacy
Suggested Book Readings
- Nothing to Hide: The False Tradeoff between Privacy and Security.
- The Future of Reputation.
- Understanding Privacy.
- The Digital Person.
- Privacy in Context.
- The Limits of Privacy.
- Code 2.0.
- Privacy Lost.
- Cellular Convergence and the Death of Privacy.
- The Future of the Internet and How to Stop It.
- The Unwanted Gaze.
- The Naked Crowd.
- Privacy and Freedom.
- Conceptualizing privacy
- Privacy, identity & anonymity
- (Self-)Regulatory approaches to protecting privacy &
on-line privacy policies
- Web privacy—Threats: User tracking
Permission hereby granted for anyone to copy, modify, and redistribute
any lecture note material from this class that belongs to the