Privacy in a Networked World
CS578A/SOC551 Spring 2017
Class Meetings: Mondays, 3:00–5:30pm, E.A.S. 231
Antonio R. Nicolosi
Office hours: Tuesday & Wednesdays, 1:00–2:00pm,
This course focuses on both the technical challenges of handling
sensitive data and the policy and legal issues facing data subjects,
data owners, and data users. This course is suitable for advanced
undergraduate computer science majors and graduate students in
computer science with suitable background knowledge of IT security
techniques. Course readings draw on a variety of sources, including
both technical materials and the popular press. Student participation
is encouraged, both in and out of the classroom (e.g., student
presentations and email/online discussions). The course includes a
- Miscellaneous articles as assigned in class (see Syllabus below)
Work Load Breakdown & Grading
- Work load breakdown
2.5 hrs/week: Class attendance
3.5 hrs/week: Readings
3.0 hrs/week: Class project
25%: Class participation
20%: Book reading
25%: Class project (rubric):
- Oct 10:
Book presentation (10%)
- Oct 10:
Book summary (10%)
30%: Final exam (Dec 11???)
- Oct 30:
Project proposal (5%)
- Dec 4:
Final presentations (10%)
- Dec 4:
Final report (10%)
- What is privacy and why it matters
- Informational privacy
- The skeptic's arguments
- Conceptualizing privacy: Contextual integrity and other frameworks
- Identity and Anonymity
- Technological threats to privacy
- User tracking (online and offline): GPS, GSM/CDMA, RFID, WWW
- Web profiling & ads
- PII leaks, phishing and ID-theft
- Protecting privacy
- Privacy regulations and best practices
- Privacy-enhancing technologies (
- Anonymous remailers (mix-nets,
- Crypto tools (e-cash, credentials, multi-party computation)
- Randomization and DB privacy
- Differential privacy
Suggested Book Readings
- The Attention Merchants: From the Daily Newspaper to Social
Media, How Our Time and Attention Is Harvested and Sold.
- Nothing to Hide: The False Tradeoff between Privacy and Security.
- The Future of Reputation.
- Understanding Privacy.
- The Digital Person.
- Privacy in Context.
- The Limits of Privacy.
- Code 2.0.
- Privacy Lost.
- Cellular Convergence and the Death of Privacy.
- The Future of the Internet and How to Stop It.
- The Unwanted Gaze.
- The Naked Crowd.
- Privacy and Freedom.
- Conceptualizing privacy
- Privacy, identity & anonymity
- (Self-)Regulatory approaches to protecting privacy &
on-line privacy policies
- Web privacy—Threats: User tracking
- Crypto basics
Student presentations—Book readings
- Web privacy—Defenses: Anonymous network connectivity
- Private data analysis I: k-anonymity and other classical techniques
- Private data analysis II: De-anonymization attacks
- Private data analysis III: Differential privacy
- Private data analysis III: More on differential privacy
- Private data analysis IV: Multiparty computation
- Private data analysis IV: More on multiparty computation
Student presentations—term projects
Permission hereby granted for anyone to copy, modify, and redistribute
any lecture note material from this class that belongs to the