Course Syllabus

Computer Science 105 

Note: For the first two meetings of this course, we will meet in the Geology Lecture Hall, Geology 100. After that, we will meet in Pierce 301.

Privacy and Technology

Course Information - Fall 2017

This course examines several areas in which privacy and technology are thought to be in conflict. Students will explore whether these conflicts are real and, if so, discuss what could reasonably be done about them in the areas of both technology and policy. The subtext of this focus is that much of the current debate over the privacy-invasiveness of technology rests on misunderstandings of what is really possible with technology, or what policy can dictate of that technology. This lack of mutual understanding between technologists and those that propose and implement policy may well constitute the most potent threats to individual privacy. We will look at a number of current controversies having to do with the use of technology and the effects of that use on individual privacy, along with the laws and regulations that have been designed or interpreted as relevant to these issues. 

In the course of these explorations, we will focus on the development of three sets of tools. First, students will learn to think critically about the complex and often nebulous ideas of privacy, studying it from ethical, legal, philosophical and economic perspectives. Second, students will learn to analyze a technical system for its policy relevance. Using technical documents as well as secondary sources, students should distinguish between marketing jargon, fear-mongering and actual policy issues by looking to the structure of the system itself, as well as analysis and prediction of system implementation. Students will learn how to construct threat models for various scenarios, and how to analyze those scenarios to determine the plausibility of various alleged privacy violations.  Finally, students will learn to effectively communicate technical concepts and policy concerns.  

A defining goal of the course is to bring together students from disparate disciplines so that each can learn from the other while tackling problems where technology and policy are deeply tangled. The course is designed around a case-study approach; we will create inter-disciplinary teams of students for discussing and studying the various cases. 

Administrative Details 

Course Admission: There are generally a lot more people wanting to take this course than we have slots available, so getting in requires you to apply. Details of the application can be found as the first assignment; essentially we are asking for a short essay on why you want to take the course, and a one-minute video of what you will contribute to the course. 

Class hours: Tuesdays and Thursdays from 1:00- 2:30 pm. There may also be occasional (optional) labs at a time tbd. During the first week, we will be meeting in the Geology 100. After study card day, we will meet in Pierce 301.

Instructors:     

  Jim Waldo ( waldo [at] g dot harvard dot edu ) (MD 127 or One Brattle 480)

  Molly Cinnamon (cinnamon [at] college dot harvard dot edu

  Katherine Loboda (kloboda [at] college dot harvard dot edu )

  Elizabeth Elmgren (elmgren [at] college dot harvard dot edu)

Office hours:

    Jim Waldo: Tuesdays and Thursdays, 3-4, MD 127 or by appointment.

Prerequisites

None. This course is open to all students. However, enrollment will be limited to approximately 30 students, so permission of the instructors will be required. 

Special arrangements can be made with graduate students and cross-registrants to meet personal requirements.

Course Requirements

Each two-week unit in the course will comprise three classroom sessions, one of which may be a speaker from industry or academia with particular expertise in the area under consideration. The classroom sessions will be a combination of lecture and discussion; much of the grade will depend on class participation. In support of each unit, each student will be asked to read a number of papers on the topic of the unit and submit a question on the reading, write a short position paper (2-3 pages) responding to a couple of open-ended questions, and prepare for and participate in the discussion sections. In the final session of each two-week study, students will work together with a handful of classmates to produce a briefing document, position paper, or other artifact relevant to the week's discussion. Students should be prepared to work together under a short deadline to produce the collaborative project following each unit. These group assignments will be given Thursday afternoon and will be due Sunday night, so students should expect to spend a considerable part of the intervening time working on the project.

For some of the case studies, we will offer hands-on labs either before the group assignment is given or outside of regular class hours to allow students to get hands-on experience with the technologies being studied. The labs taught outside of regular class hours will be optional (but highly recommended).

The final project will allow students, working alone or in pairs, to explore an aspect of the topic of this course in greater detail. Every project should require research into an idea or issue beyond that directly discussed during the semester, clearly implementing skills learned from the class. The primary output of your research may be a position paper, experimental analysis, or engineering prototype, as well as a presentation during reading period.

Late assignments will not be accepted; attendance at all course meetings will be expected.

Rules of digital etiquette will be expected; if you are using a laptop or other device to take notes, it is expected that you will not also be reading or composing email, chatting with friends, checking Facebook, or shopping. Cell phones that ring during class will be answered by the instructors.

There will not be any examinations given in this course.

Cooperation

Due to the interdisciplinary nature of the course topic, students will be expected to work with each other and learn from each others' perspectives and backgrounds. Individual papers should be written by and worked on individually, but everything else in the class is designed to encourage group discussion, interaction, and participation.

Grading

  10% Class participation
  10% Reading questions
  25% Personal writings
  25% Group writings
  30% Final project/paper

Textbooks and Other Readings

There is no required text for this course. All reading material will be distributed on the class site or will be available on the Internet. This material will be supplemented with technical, academic, and popular-press readings from the Internet.  Outside speakers will also be invited to shed light (or generate heat) on some of the topics.

Planned Course Sequence 

(Note that the following is subject to change without notice)

Weeks 1-2: Privacy Concepts

      Theories of privacy: legal, theoretical, social science

Week 3-4: Surveillance

      Identification and observation in the physical world

      Identification and observation in the virtual world

      Law enforcement, corporations, and surveillance

Week 5-6: Anonymity and re-identification

      What is anonymity

      Mechanisms of re-identification

      Big Data, anonymity, re-identification, and accuracy

 Week 7-8: Who are you?

      In the digital world, how do you prove that you are you?

      Biometrics

      Digital Signatures

Week 9-10: Wiretaps, traces and networks

       What is tapping, tracing, and how does it work on the phone network, and internet complications

       Search and seizure in digital worlds

       Encryption, security, and dissent

Week 11-12: Algorithms, big data, and privacy

       Intro to research design and computational science

       Algorithms, transparency, and privacy

       Big Data, Algorithms, and Elections

Week 13 (and, perhaps, 14): Project Presentations 

 

Course Summary:

Date Details Due