Teaching

Independent Work Seminars

Juniors and Seniors in the Department of Computer Science have the opportunity to take an Independent Work Seminar in Tech Policy: 2025 COS IW 05: Technology Policy. In this seminar students get to work on crafting concrete policy responses to challenges posed by emerging computer and network technologies. 

2020-21

Independent Work

  • Justin Curl, Please Pay Attention: Reverse-Engineering YouTube’s Ad Algorithm to Analyze the Presentation of Unwanted Information
  • Melody Zheng, Analyzing the Digital Divide: A Quantitative and Qualitative Study of Six United States Cities
  • Michael Man, BotSpot, A Deep Learning Approach to Reddit Bot Identification
  • Ryan Yao, Safeguarding Consumer Privacy: Analysis of Data Obfuscation Mechanisms to Prevent Ubiquitous Network Tracking
  • Scott Aravena, A Jury of One's Peers: Ensuring the Fair Cross-Section Guarantee in Criminal Trials
  • Zaynab Masood, The Effects of Digital Accessibility on Healthcare Sites
  • Greg Weaving, Regulating Algorithmic Unfairness in Medical Machine Learning
  • Yael Stochel, Corroding Communities:Quantifying the Loss of Local News and the Rise of Disinformation
  • Pang Nganthavee, Using Clustering to Analyze the Correlation between Product Naming and Buyers’ Decision-Making
  • Henry Vecchione, Pan-app-ticon: What to Do About Ring’s Partnerships with Police Departments
  • Daniel Wey, Verifying Harms in Machine Learning Hiring Tools: Recommendations for NYC Council’s Int. 1894
  • Sara Dardik, COVID-19 Vaccine Distribution Plans

Senior Thesis

  • Jordan, Heinzel-Nelson, Using Computer Vision and Machine Learning to Analyze Satellite Imagery to Understand Food Insecurity in Sub-Saharan Africa, 2021
  • Vedika Patwari,  Evaluating the Impact of Data Localization on Technological Innovation in India, 2021

2019-20

Independent Work

  • Bevin Benson, Google’s Health, Consumer Health, or Both? Evaluating the Antitrust Implications of Google’s Acquisition of Fitbit
  • Emre Cakir, The Threat of Racial Biases in Facial Recognition Technology Use by Law Enforcement
  • Justin Chang, The Role of International Consensus in Cyberattack Attribution
  • Zyanne Clay-Hubbard, A Review of the Rise in Innovative Technologies in the U.S. Foster Care System
  • Michael Hallee, Protecting the Retail Investor: Evaluating the SEC’s Proposed Rule on “Market Data Infrastructure”
  • Edward Garnter, Protecting Against Cyberattacks on the Electric Grid
  • Andrew Griffin, Analysis of Potential Regulatory Frameworks for Artificial Intelligence in the Healthcare Industry
  • Jordan Heinzel-Nelson, Regulating Facial Recognition Technology to Mitigate Racial Bias
  • Joseph Kim, An Evaluation of Facial Recognition Usage in Public Transportation
  • Rachel Lee, Data Collection and Fairness in Insurance Apps
  • Austin Mejia, Lucky Break: Regulating Loot Boxes in the Games Industry
  • Jamison Mercurio, Facial Recognition in Public Safety Applications
  • Jamison Mercurio, Comments to the FDA on Patient Decision Support Software
  • Morlan Osgood, Measuring the Impact of Social Media Features on Mental Health
  • Jacob Schachner, Libra, a Solution to a Policy Nightmare?
  • Sten Sjoberg, Nailing Down Pseudonymization
  • Tyler Skow, Lessons Learned from New York and Vermont and the Role of Future Task Forces in Regulation Automated Decision Systems
  • Noah Weiss, Encryption Policy with the Advent of Quantum Cryptography

Senior Theses