Independent Work SeminarsJuniors and Seniors in the Department of Computer Science have the opportunity to take an Independent Work Seminar in Tech Policy: 2025 COS IW 05: Technology Policy. In this seminar students get to work on crafting concrete policy responses to challenges posed by emerging computer and network technologies. 2020-21Independent WorkJustin Curl, Please Pay Attention: Reverse-Engineering YouTube’s Ad Algorithm to Analyze the Presentation of Unwanted InformationMelody Zheng, Analyzing the Digital Divide: A Quantitative and Qualitative Study of Six United States CitiesMichael Man, BotSpot, A Deep Learning Approach to Reddit Bot IdentificationRyan Yao, Safeguarding Consumer Privacy: Analysis of Data Obfuscation Mechanisms to Prevent Ubiquitous Network TrackingScott Aravena, A Jury of One's Peers: Ensuring the Fair Cross-Section Guarantee in Criminal TrialsZaynab Masood, The Effects of Digital Accessibility on Healthcare SitesGreg Weaving, Regulating Algorithmic Unfairness in Medical Machine LearningYael Stochel, Corroding Communities:Quantifying the Loss of Local News and the Rise of DisinformationPang Nganthavee, Using Clustering to Analyze the Correlation between Product Naming and Buyers’ Decision-MakingHenry Vecchione, Pan-app-ticon: What to Do About Ring’s Partnerships with Police DepartmentsDaniel Wey, Verifying Harms in Machine Learning Hiring Tools: Recommendations for NYC Council’s Int. 1894Sara Dardik, COVID-19 Vaccine Distribution PlansSenior ThesisJordan, Heinzel-Nelson, Using Computer Vision and Machine Learning to Analyze Satellite Imagery to Understand Food Insecurity in Sub-Saharan Africa, 2021Vedika Patwari, Evaluating the Impact of Data Localization on Technological Innovation in India, 20212019-20Independent WorkBevin Benson, Google’s Health, Consumer Health, or Both? Evaluating the Antitrust Implications of Google’s Acquisition of FitbitEmre Cakir, The Threat of Racial Biases in Facial Recognition Technology Use by Law EnforcementJustin Chang, The Role of International Consensus in Cyberattack AttributionZyanne Clay-Hubbard, A Review of the Rise in Innovative Technologies in the U.S. Foster Care SystemMichael Hallee, Protecting the Retail Investor: Evaluating the SEC’s Proposed Rule on “Market Data Infrastructure”Edward Garnter, Protecting Against Cyberattacks on the Electric GridAndrew Griffin, Analysis of Potential Regulatory Frameworks for Artificial Intelligence in the Healthcare IndustryJordan Heinzel-Nelson, Regulating Facial Recognition Technology to Mitigate Racial BiasJoseph Kim, An Evaluation of Facial Recognition Usage in Public TransportationRachel Lee, Data Collection and Fairness in Insurance AppsAustin Mejia, Lucky Break: Regulating Loot Boxes in the Games IndustryJamison Mercurio, Facial Recognition in Public Safety ApplicationsJamison Mercurio, Comments to the FDA on Patient Decision Support SoftwareMorlan Osgood, Measuring the Impact of Social Media Features on Mental HealthJacob Schachner, Libra, a Solution to a Policy Nightmare?Sten Sjoberg, Nailing Down PseudonymizationTyler Skow, Lessons Learned from New York and Vermont and the Role of Future Task Forces in Regulation Automated Decision SystemsNoah Weiss, Encryption Policy with the Advent of Quantum CryptographySenior Theses2020, Kadamani, Samer, Encrypting Traffic: A Proposal for Encrypting Online Messaging Applications2020, Oh, Juliet, Mitigating Political Misinformation on Social Media Platforms2020, Gupta, Arul, The Effect of Electromagnetic Radiation on Public Health: Implications on 5G Policy