Publications
The passage of China’s national cybersecurity law in June 2017 has been interpreted as an unprecedented impediment to the operation of foreign firms in the country, with its new requirements for data localization, network operators’ cooperation with law enforcement officials, and online content restrictions, among others. Although the law’s scope is indeed broader than that of any previous…
A system, method and non-transitory computer readable medium for detecting unsecured sensors in a network. A computing system can find an IP address associated with an unsecured sensor based on a port through which the unsecured sensor communicates with the network. The computing system can ascertain a prefix route associated with the IP address for the unsecured sensor based on a portion of…
Of the many problems faced by the field of information security, two are particularly pressing: cooperation and learning. To effectively respond to threats and vulnerabilities, information security practitioners must cooperate to securely share sensitive information and coordinate responses across organizational and territorial boundaries. Yet there are insufficient numbers of personnel who…
This essay explores the changing significance of gender in fiction, asking especially whether its prominence in characterization has varied from the end of the eighteenth century to the beginning of the twenty-first. We have reached two conclusions, which may seem in tension with each other. The first is that gender divisions between characters have become less sharply marked over the last 170…
Although "privacy by design" (PBD) — embedding privacy protections into products during design, rather than retroactively —uses the term "design" to recognize how technical design choices implement and settle policy, design approaches and methodologies are largely absent from PBD conversations. Critical, speculative, and value-centered design approaches can be used to elicit reflections on…
Blockchain is viewed by many as big as, or even bigger than, the development of the Internet. Blockchain technology and its applications have been evolving rapidly. A number of factors have contributed to both the advancement of this technology and the quick build-out and iteration of applications in financial services and other industries. This chapter will provide a survey of key activities…
As the modal sources of data in education have shifted over the past few decades, so too have the modeling paradigms applied to these data. In this paper, we overview the principle foci of modeling in the areas of standardized testing, computer tutoring, and online courses from whence these big data have come, and provide a rationale for their adoption in each context. As these data become…
We present a set of design fiction proposals related to sensing and tracking technologies, inspired by the 2013 science fiction novel The Circle. By creating design proposals that explore connections between the novel's imagined world and our present and future realities, we show that we are able to explore, expand, and articulate a range of social, technical, and legal configurations…
The role of emotion in social media has been the subject of considerable research and media attention. But while stereotypes about the emotional profile of status updates — that they are overly-positive, or overly-angry — have solidified, evidence remains circumstantial and indirect. Further, although researchers have made numerous efforts to use the emotions we express in status updates to…
How do companies creating new technologies featuring new forms of personal data respond to the radical uncertainty of designing data ecosystems and accompanying business models with that sensitive data?
This dissertation answers this question with an empirical, inductive, multiple case comparison of the development of pioneering fitness technologies by Suunto, Garmin, and Adidas. Cases…
Cognitive task analysis is a laborious process made more onerous in educational platforms where many problems are user created and mostly left without identified knowledge components. Past approaches to this issue of untagged problems have centered around text mining to impute knowledge components (KC). In this work, we advance KC imputation research by modeling both the content (text) of a…
In this paper, we demonstrate a first-of-its-kind adaptive intervention in a MOOC utilizing real-time clickstream data and a novel machine learned model of behavior. We detail how we augmented the edX platform with the capabilities necessary to support this type of intervention which required both tracking learners’ behaviors in real-time and dynamically adapting content based on each learner’…
“Should be read by anyone interested in understanding the future,” The Times Literary Supplement raved about the original edition of The Social Life of Information. We’re now living in that future, and one of the seminal books of the Internet Age is more relevant than ever.
The future was a place where technology was supposed to empower individuals and obliterate…
We live in an information society, or so we are often told. But what does that mean? This volume in the MIT Press Essential Knowledge series offers a concise, informal account of the ways in which information and society are related and of our ever-increasing dependence on a complex multiplicity of messages, records, documents, and data. Using information in its everyday, nonspecialized sense…
The development and deployment of Internet of Things (IoT) is rapidly emerging as the next major step in the ongoing evolution of the digital society and economy. To gain better insight and foresight into key characteristics that will differentiate this more intensely connected future from the present, we shift the focus of attention in this paper from the Internet of ‘things’ per se, to…
We present a microsociology of Minecraft play based on ethnographic observations of a 40-hour co-located Minecraft camp for 28 low-income and minority children in July 2015, supplemented by usage statistics and follow-up interviews. We consider the equity challenges presented by (1) Minecraft itself and the ecosystem supporting it; (2) the multiplayer server we used, which was founded on…
Poverty is one of the most important determinants of adverse health outcomes globally, a major cause of societal instability and one of the largest causes of lost human potential. Traditional approaches to measuring and targeting poverty rely heavily on census data, which in most low- and middle-income countries (LMICs) are unavailable or out-of-date. Alternate measures are needed to…
Massive open online courses (MOOCs) generate a granular record of the actions learners choose to take as they interact with learning materials and complete exercises towards comprehension. With this high volume of sequential data and choice comes the potential to model student behaviour. There exist several methods for looking at longitudinal, sequential data like those recorded from learning…
In the 1950’s a group of artists led by experimental composer John Cage actively engaged chance as a means to limit their control over the artworks they produced. These artists described a world filled with active and lively forces, from the sounds of rain to blemishes in paper, that could be harnessed in creative production to give rise to new aesthetics and cultivate new sensitivities to the…