Undergraduate Certificate:
Program in Technology and Society, Information Technology Track

The Center for Information Technology Policy and the Keller Center are pleased to offer an Undergraduate Certificate – Program in Technology and Society, Information Technology Track.

Information technology (IT) broadly covers the computation and communication technologies that permeate virtually all aspects of corporate and social activity. The products and services enabled by it have had a major impact on the world economy and on social interactions. As we look to the future, emerging technologies in IT continue to address critical societal challenges such as economic development, health care, politics, education, productivity, government and social organization. At the same time, these technologies raise new challenges in security, law enforcement, privacy, economic stability and justice.

Admission to the Program

Students interested in this certificate program should begin by submitting the Program Admission form.

Three Primary Requirements

  • One core course, two technology courses, two societal courses and one breadth course that combines science/technology and society in an area outside of IT. A breadth societal course will tend to have more coverage of societal subject matter, whereas a breadth technology course will have more coverage of science and technology subject matter.
  • A one-semester independent research project in IT and society
  • Present the projects/thesis to the program students and faculty at an annual symposium

See the Requirements tab above for more details.

Certificate of Proficiency

Students who fulfill the requirements of the program receive a Certificate of Proficiency in Technology and Society, Information Technology Track upon graduation.

The following course requirements need to be satisfied to earn the program certificate in Technology and Society, Information Technology Track. Pass/D/Fail policy: Students may use no more than one course taken on a Pass/D/Fail basis to satisfy program requirements.

Additional information regarding courses:

1. Courses that begin with “Advanced Topics in,” “Special Topics in,” or “Topics in STEP” may reuse course numbers but change course titles from year-to-year. Please make sure you are looking at an approved course title.

2. One-time courses may not be listed below. Please see the tab “Course Offering by Term” for one-time courses that have been approved for this certificate.

3. Feel free to email Professor Felten, felten@cs.princeton.edu, for approval of new courses that might be applicable to our certificate program. Please make sure you include the syllabus for the course when asking for approval.

Core Course required:

EGR/HIS/SOC 277 – Technology and Society (This course is offered every spring), or
SOC 357 – Sociology of Technology

This course provides students with the intellectual tools needed to approach the rest of the program – a “set of lenses” that will help them view the issues being addressed in their work. Ideally, this course will be taken before the other required courses.

IT and Society Courses:

This course requirement is intended to provide an understanding of the technology and societal aspects through a discipline based study of both sides.

Technology Courses:

Each student is required to take two technology courses from a list that includes the courses below. These courses are mostly drawn from a set that includes courses specifically designed for a wider campus audience (no prerequisites). An advanced/one-time only course may be used to replace one or both of these courses with the permission of the program adviser.

APC 524/MAE 506/AST 506 – Software Engineering for Scientific Computing
COS 109/EGR 109 – Computers in Our World (may be taken instead of COS 126, but not both)
COS 126 – General Computer Science (may be taken instead of COS 109, but not both)
COS 324 – Introduction to Machine Learning
COS 402 – Machine Learning and Artificial Intelligence
COS 424/SML 302 – Fundamentals of Machine Learning (previously entitled: Interacting with Data)
COS 429 – Computer Vision
COS 432/ELE 432 – Information Security
COS 433/MAT 473 – Cryptography
COS 435 – Information Retrieval, Discovery, and Delivery
COS 445 – Economics and Computing (was Networks, Economics and Computing)
COS 461 – Computer Networks
COS 495 – Special Topics in Computer Science: Neural Networks: Theory and Applications
COS 496 – Special Topics in Computer Science – Complex Networks – Analysis and Applications
COS 551/MOL 551/QCB 551 – Introduction to Genomics and Computational Molecular Biology (was COS/MOL/QCB 455)
COS 597E – Advanced Topics in Computer Science – Bitcoin and Cryptocurrency Technologies (one time course – fall 2014)
COS 597G – Advanced Topics in Computer Science – Surveillance and Countermeasures
COS 598B – Advanced Topics in Computer Science – Privacy Technologies
COS 598D – Advanced Topics in Computer Science – Analytics and Systems of Big Data
ELE 201 – Information Signals (may be taken instead of ELE 222)
ELE 206/COS 306 – Contemporary Logic Design (may be taken instead of ELE 222)
ELE 222A/B and EGR 222A/B – The Computing Age
ELE 364 – Machine Learning for Predictive Data Analytics
ELE 381/COS 381 – Networks: Friends, Money, and Bytes
ELE 386/EGR 386 – Cyber Security
ELE 391/EGR 391 – The Wireless Revolution: Telecommunications for the 21st Century
ELE 464 – Embedded Computing
ELE 470 – Smartphone Security and Architecture
ELE 477 – Kernel-Based Machine Learning
ELE 535 – Machine Learning and Pattern Recognition
ELE 538 – Special Topics in Information Sciences and Systems – Information Theoretic Security
ELE 574 – Security and Privacy in Computing and Communications
ELE 580/COS 580 – Advanced Topics in Computer Engineering: Trustworthy Computing
FRS 170 – The Mathematics of Secrecy, Search, and Society!
MAE 345 – Robotics and Intelligent Systems
ORF 350 – Analysis of Big Data
ORF 401 – Electronic Commerce
ORF 411 – Operations and Information Engineering
ORF 467 – Transportation Systems Analysis
POL 346 – Applied Quantitative Analysis
SML 101 – Reasoning with Data
SML 201 – Introduction to Data Science
TRA 301/COS 401/LIN 304 – Introduction to Machine Translation

Societal Courses:

Each student is required to take two societal courses from a list that includes the courses below. An advanced/one-time only course may be used to replace one or both of these courses with the permission of the program advisor.

AAS 301/SOC 367 – Black to the Future: Science, Fiction, and Society
ANT 455 – Visible Evidence: Documentary Film and Data Visualization
ARC 312/URB 312 – Technology and the City: The Architectural Implications of the Networked Urban Landscape
CHV 411/PHI 411 – Free Speech in the Internet Age
COS 448/EGR 448 – Innovating Across Technology, Business, & Marketplaces
COS 495/EGR 495/WWS 495 – Special Topics in Computer Science – Information Technology, Law and Policy, (one time course, spring 2014) (The title for this course number changes. Please see previous years for approved titles.)
COS 496/HLS 496/ART 496 – Special Topics in Computer Science – Modeling the Past – Digital Tech, and Excavations in Polis, Cyprus (The title for this course number changes. Please see previous years for approved titles.)
COS 586/WWS 586F* – Topics in STEP: Information Technology and Public Policy
COS 598F – Advanced Topics in Computer Science – Internet Law and Policy (one time course, spring 2015)
ECO 326 – Economics of the Internet: The Digital Revolution
ECO 406 – Radical Markets
EGR 385/ANT 385 – Ethnography and Wicked Problems
EGR 395 – Venture Capital and Finance of Innovation
FRS 102 – From Codex to Code: Technologies of Learning
FRS 122 – Connection and Communication in the Digital Bazaar
FRS 159 – Science, Technology and Public Policy
FRS 172 – Humans and Machines: Work and Technology in the 21st Century
GER 517/MOD 517 – Modernism and Modernity: Digital Cultures, title changed from Aesthetics of Surveillance, which included: ART 517/COM 519 (only these titles)
HIS 278 – Digital, Spatial, Visual, and Oral Histories
HIS 490 – The Attention Economy: Historical Perspectives
HUM 346/ENG 349 – Introduction to Digital Humanities
JRN 400 – The Media in America – What to Read and Believe in the Digital Age
JRN 452 – Digital Journalism – Writing about Digital Culture
MSE 407 – Communicating Science and Technology in the Modern World
POL 332 – Topics in American Statesmanship – Science, Technology, and the American Way (only this title)
POL 341 – Experimental Methods in Politics
POL 478/COS 478* – Politics in the Age of Digital Media (spring 2016 one time course)
PSY 214 – Human Identity in the Age of Neuroscience and Information Technology
PSY 322/ORF 322 – Human Machine Interaction
SOC 204 – Social Networks
SOC 214 – Creativity, Innovation, and Society
SOC 344 – Communications, Culture, and Society
SOC 346 – Sociology of the Cubicle: Work, Technology, and Organization
SOC 409*/COS 409 – Critical Approaches to Human Computer Interaction
SOC 412 – Designing Social and Behavioral Field Experiments at Scale
WRI 121/122 – Technology and Culture (this title only)
WRI 149/150 – Fans and Consumer Culture (this title only)
WWS 351/SOC 353/COS 351 – Information Technology and Public Policy (formerly WWS 451)
WWS 402e – Cyber Security: Attacks and Consequences (one time course, spring 2015)
WWS 403(1) – The Social and Economic Effects of Current Technological Change (This title only for 403. Please notify Laura Cumminngs-Abdo, the program manager, to have this course added manually as a RSC to your records.)
WWS 357 – Cybersecurity Law, Technology and Policy
WWS 528D* – Topics in Domestic Policy Analysis – Public Management in the Age of Digital Technology, (may be one time course spring 2016)

Breadth Course (1 course required):

In addition to the technology and society courses, each student is required to take one course that combines technology and society in an area outside of IT. For engineering/science students this should be based in the societal disciplines, and for humanities and social science students this should be based in the science/technology disciplines.

Breadth Technology Courses:

APC 199/MAT 199 – Math Alive
ARC 374 – Computational Design
AST 309/MAE 309/PHY 309/ENE 309 – Science and Technology of Nuclear Energy: Fission aond Fusion
CEE 102B/EGR 102B/MAE 102B – Engineering in the Modern World
CEE 475 – Cities in the 21st Century: The Nexus of the Climate, Water and Energy
CHM 440 – Drug Discovery in the Genomics Era
COS 436/ELE 469 – Human-Computer Interface Technology
ENE 202/ARC 208/EGR 208/ENV 206 – Designing Sustainable Systems – Applying the Science of Sustainability to Address Global Change and title: Designing Sustainable Systems – Demonstrating the Potential of Sustainable Design Thinking
ENE 273/ELE 273 – Renewable Energy and Smart Grids
ENE 308/MAE 308 – Engineering the Climate: Technical & Policy Challenges
ENE 414 – Renewable Energy Systems
ENV 360* – Biotech Plants and Animals: Frankenfood or Important Innovations?
ENV 367/GEO 367 – Modeling the Earth System: Assessing Strategies for Mitigating Climate Change
ENV 407 – Africa’s Food and Conservation Challenge (changed title from “Feeding Africa”)
MAE 228/EGR 228/CBE 228/ENE 228 – Energy Technologies for the 21st Century
MAE 244*/EGR 244 – Introduction to Biomedical Innovation and Global Health
MAE 328/EGR 328/ENV 328/ENE 328 – Energy for a Greenhouse-Constrained World
MAE 354 – Unmaking the Bomb: The Science & Technology of Nuclear Nonproliferation, Disarmament, and Verification
MAE 445/EGR 445 – Entrepreneurial Engineering
MOL 205 – Genes, Health, and Society
NEU 537/MOL 537/PSY 517 – Computational Neuroscience and Computing Networks
ORF 360 – Decision Modeling in Business Analytics
QCB 408 – Foundations of Applied Statistics and Data Science (with Applications in Biology)
WWS 353/MAE 353 – Science and Global Security: From Nuclear Weapons to Cyberwarfare

Breadth Societal Courses:

AMS 399/HIS 399 – In the Groove: Technology and Music in American History, From Edison to the iPod
ANT 344 – Science, Technology & Culture
ANT 356 – Technologies of Communication
CBE 260/EGR 260 – Ethics and Technology: Engineering in the Real World (changed to a BSC beginning fall 2016)
CEE 102A/EGR 102A/MAE 102A – Engineering in the Modern World
CHV 331/WWS 372 – Ethics and Public Health
CHV 333/PHI 344 – Bioethics: Clinical and Population-Level
ECO 332 – Economics of Health and Health Care
EGR 200 – Creativity, Innovation, and Design (was EGR 392)< (No longer counts toward certificate as of fall 2016)
EGR 390/CEE 390 – Innovation in Practice: Pathways and People
EGR 482 – Innovation through Empathic Design
EGR 488 – Designing Ventures to Change the World
EGR 489/ARC 487 – Design of the Imminent Future
EGR 491/ELE 491 – High-Tech Entrepreneurship
EGR 492 – Radical Innovation in Global Markets (No longer offered after fall 2016)
EGR 494 – Leadership Development for Business
EGR 495 – Special Topics in Entrepreneurship (The title for this course number changes. Please see previous semesters for approved titles.)
EGR 497 – Entrepreneurial Leadership
EGR 498/GHP 498 – Special Topics in Social Entrepreneurship – Ventures to Address Global Challenges (Fall 2015)
ENE 475/PSY 475 – Human Factors 2.0 – Psychology for Engineering, Energy, and Environmental Decisions
ENV 303/EEB 303 – Agriculture, Human Diets and the Environment
ENV 304/ECO 328/EEB 304/WWS 455 – Disease Ecology, Economics, and Policy
ENV 316 – Climate Science and Communication
FRS 138 – Oracle Bones to Smartphones: Reading Media in East Asia
FRS 140 – Bioethics and Public Policy
FRS 178 – Statistics, Journalism, and the Public Interest
GER 211 – Introduction to Media Theory
GHP 350/WWS 380/ANT 380 – Critical Perspectives in Global Health
GHP 404 – Science, Society, and Health Policy
HIS 292 – Science in the Modern World
HIS 295 – Making America: Technology and History in the United States
HIS 391 – History of Contemporary Science
HIS 398 – Technologies and Their Societies: Historical Perspectives
ITA 320/COM 378 – Cybernetics, Literary Ghosts and the Italian Way
NES 266*/ENV 266 – Oil, Energy and The Middle East
PHI 277/CHV 277 – Biomedical Ethics
POL 345/SOC 305 – Introduction to Quantitative Social Science
SOC 346* – Sociology of the Cubicle: Work, Technology, and Organization
SOC 356* – Sociology of Science (one time course, spring 2013)
SOC 401 – Advanced Social Statistics
STC 349 – Writing About Science (was called Science Journalism), (changed to be a BSC, April 2016)
THR 210A-B/STC 201A-B – Storytelling for Technology and Performance
WWS 354 – Modern Genetics and Public Policy

Registrar Course Offerings Homepage

Independent Work

All students are required to undertake a one-semester independent research project in IT and society. For AB students, this includes a junior paper. This may be substituted by a significant component in their senior thesis (at least a chapter). It is expected that some of these projects/theses will be jointly supervised by faculty members across the university divisions.

All independent work topics for the certificate must be pre-approved by the information technology track director of the certificate program. Please make sure approval is granted before beginning your semester of independent study. Please submit a one-page summary of your IW to the Program Manager, Laura Cummings-Abdo, lcumming@princeton.edu. Approval must be received by December 10th of your senior year.

Annual Symposium
Students are required to present their projects/theses to the program students and faculty at an annual symposium. This provides a mechanism for shared learning as well as for developing the common themes across the program.

*Indicates the course may not always be offered.

RTC – Required Technology Course
RSC – Required Societal Course
BTC – Breadth Technology Course
BSC – Breadth Societal Course

Please note that if a course has two designations, i.e., RSC/BSC, that this means there is an exception for that semester only. It does not apply to other semesters. Please see the “Requirements” tab for the regular course designation.

Fall 2018
ANT 455 – Visible Evidence: Documentary Film and Data Visualization, RSC
APC 524/MAE 506/AST 506 – Software Engineering for Scientific Computing, RTC
ARC 374 – Computational Design, BTC
CBE 260/EGR 260 – Ethics and Technology: Engineering in the Real World, BSC
CEE 102A/EGR 102A/MAE 102A – Engineering in the Modern World, BSC
CEE 102B/EGR 102B/MAE 102B – Engineering in the Modern World, BTC
CHM 440 – Drug Discovery in the Genomics Era, BTC
COS 109/EGR 109 – Computers in Our World, RTC (only COS 109 or COS 126 count for credit for the certificate)
COS 126/EGR 126 – Computer Science: An Interdisciplinary Approach, RTC (only COS 109 or COS 126 count for credit for the certificate)
COS 324 – Introduction to Machine Learning, RTC
COS 429 – Computer Vision, RTC
COS 432/ELE 432 – Information Security, RTC
COS 436/ELE 469 – Human-Computer Interface Technology, BTC
COS 551/MOL 551/QCB 551 – Introduction to Genomics and Computational Molecular Biology, RTC
ECO 326 – Economics of the Internet: The Digital Revolution, RSC
ECO 332/GHP 332 – Economics of Health and Health Care, BSC
ECO 406 – Radical Markets, RSC
EGR 385/ANT 385 – Ethnography and Wicked Problems, RSC
EGR 395 – Venture Capital and Finance of Innovation, RSC
EGR 488 – Designing Ventures to Change the World, BSC
EGR 491/ELE 491 – High-Tech Entrepreneurship, BSC
EGR 494 – Leadership Development for Business, BSC
EGR 497 – Entrepreneurial Leadership, BSC
ELE 206/COS 306 – Contemporary Logic Design, RTC
ELE 364 – Machine Learning for Predictive Data Analytics, RTC
ELE 535 – Machine Learning and Pattern Recognition, RTC
ELE 574 – Security and Privacy in Computing and Communications, RTC
ENE 273/ELE 273 – Renewable Energy and Smart Grids, BTC
ENV 304/ECO 328/EEB 304/ WWS 455 – Disease Ecology, Economics, and Policy, BSC
ENV 367/GEO 367 – Modeling the Earth System: Assessing Strategies for Mitigating Climate Change, BTC
GHP 350/WWS 380/ANT 380 – Critical Perspectives in Global Health, BSC
HIS 490 – The Attention Economy: Historical Perspectives, RSC
HUM 346 – Introduction to Digital Humanities, RSC
MAE 228/EGR 228/CBE 228/ENE 228 – Energy Technologies in the 21st Century, BTC
ORF 350 – Analysis of Big Data, RTC
ORF 467 – Transportation Systems Analysis, RTC
POL 345/SOC 305 – Introduction to Quantitative Social Science, BSC
SML 201 – Introduction to Data Science, RTC
THR 210A/STC 210A – Storytelling for Technology and Performance, BSC
THR 210B/STC 210B – Storytelling for Technology and Performance, BSC
WWS 354 – Modern Genetics and Public Policy, BSC

Spring 2018

APC 199/MAT 199 – Math Alive, BTC
ARC 312/URB 312 – Technology and the City: The Architectural Implications of the Networked Urban Landscape, RSC
CHV 333/PHI 344 – Bioethics: Clinical and Population-Level, BSC
COS 126/EGR 126 – Computer Science: An Interdisciplinary Approach, RTC
COS 424/SML 302 – Fundamentals of Machine Learning, RTC
COS 432/ELE 432 – Information Security, RTC
COS 433/MAT 473 – Cryptography, RTC
COS 445 – Economics and Computing (was Networks, Economics and Computing), RTC
COS 448/EGR 448 – Innovating Across Technology, Business, and Marketplaces, RSC
COS 461 – Computer Networks, RTC
COS 495: Special Topics in Computer Science – Neural Networks: Theory and Applications, RTC
ECO 332/GHP 332 – Economics of Health and Health Care, BSC
EGR 277/SOC 277/HIS 277 – Technology and Society, Core Course
EGR 395 – Venture Capital and Finance of Innovation, RSC
EGR 491/ELE 491 – High Tech Entrepreneurship, BSC
EGR 494 – Leadership Development for Business, BSC
ELE 201 – Information Signals, RTC
ELE 464 – Embedded Computing, RTC
ENE 202/ARC 208/EGR 208/ENV 206 – Designing Sustainable Systems – Demonstrating the Potential of Sustainable Design Thinking, BTC
ENV 303/EEB 303 – Agriculture, Human Diets and the Environment, BSC
FRS 102 – From Codex to Code: Technologies of Learning, RSC
FRS 122 – Connection and Communication in the Digital Bazaar, RSC
FRS 140 – Bioethics and Public Policy, BSC
FRS 159 – Science, Technology and Public Policy, RSC
FRS 170 – The Mathematics of Secrecy, Search, and Society!, RTC
GER 211 – Introduction to Media Theory, BSC
HIS 295 – Making America: Technology and History in the United States, BSC
HUM 346 – Introduction to Digital Humanities, RSC
JRN 400 – The Media in America – What to Read and Believe in the Digital Age, RSC
MAE 328/EGR 328/ENV 328/ENE 328 – Energy for a Greenhouse-Constrained World, BTC
ORF 360 – Decision Modeling in Business Analytics, BTC
ORF 401 – Electronic Commerce, RTC
POL 346 – Applied Quantitative Analysis, RTC
SML 201 – Introduction to Data Science, RTC
SOC 401 – Advanced Social Statistics, BSC
SOC 412 – Designing Social and Behavioral Field Experiments at Scale, RSC
TRA 301/COS 401/LIN 304 – Introduction to Machine Translation, RTC
WWS 351/SOC 353/COS 351 – Information Technology and Public Policy, RSC
WWS 353 – Science and Global Security: From Nuclear Weapons to Cyberwarfare and Artificial Intelligence, BTC
WWS 357 – Cybersecurity, Law, Technology and Policy, RSC

Fall 2017

AAS 301/SOC 367 – Black to the Future: Science, Fiction, and Society, RSC
AMS 399/HIS 399 – In the Groove: Technology and Music in American History, From Edison to the iPod, BSC
APC 524/MAE 506/AST 506 – Software Engineering for Scientific Computing, RTC
ARC 374 – Computational Design, BTC
CBE 260/EGR 260 – Ethics and Technology: Engineering in the Real World, BSC
CEE 102A/EGR 102A/MAE 102A – Engineering in the Modern World, BSC
CEE 102B/EGR 102B/MAE 102B – Engineering in the Modern World, BTC
CHM 440 – Drug Discovery in the Genomics Era, BTC
COS 109/EGR 109 – Computers in Our World, RTC (only COS 109 or COS 126 count for credit for the certificate)
COS 126/EGR 126 – Computer Science: An Interdisciplinary Approach, RTC (only COS 109 or COS 126 count for credit for the certificate)
COS 324 – Introduction to Machine Learning, RTC
COS 429 – Computer Vision, RTC
COS 432/ELE 432 – Information Security, RTC
COS 436/ELE 469 – Human-Computer Interface Technology, BTC
COS 496 – Special Topics in Computer Science – Complex Networks – Analysis and Applications, RTC
COS 551/MOL 551/QCB 551 – Introduction to Genomics and Computational Molecular Biology, RTC
ECO 326 – Economics of the Internet: The Digital Revolution, RSC
EGR 385/ANT 385 – Ethnography and Wicked Problems, RSC
EGR 488 – Designing Ventures to Change the World, BSC
EGR 491/ELE 491 – High-Tech Entrepreneurship, BSC
EGR 494 – Leadership Development for Business, BSC
EGR 497 – Entrepreneurial Leadership, BSC
ELE 206/COS 306 – Contemporary Logic Design, RTC
ELE 364 – Machine Learning for Predictive Data Analytics, RTC
ELE 381/COS 381 – Networks: Friends, Money, and Bytes, RTC
ELE 470 – Smartphone Security and Architecture, RTC
ELE 477 – Kernel-Based Machine Learning, RTC
ELE 535 – Machine Learning and Pattern Recognition, RTC
ELE 538 – Special Topics in Information Sciences and Systems – Information Theoretic Security, RTC
ELE 574 – Security and Privacy in Computing and Communications, RTC
ENE 273/ELE 273 – Renewable Energy and Smart Grids, BTC
ENE 475/PSY 475 – Human Factors 2.0 – Psychology for Engineering, Energy, and Environmental Decisions, BSC
ENV 304/ECO 328/EEB 304/ WWS 455 – Disease Ecology, Economics, and Policy, BSC
ENV 367/GEO 367 – Modeling the Earth System: Assessing Strategies for Mitigating Climate Change, BTC
ENV 407 – Africa’s Food and Conservation Challenge, BTC
FRS 127 – Big Brothers are Watching You: Internet Privacy and Security, RSC
FRS 159 – Science, Technology and Public Policy, RSC
GHP 350/WWS 380/ANT 380 – Critical Perspectives in Global Health, BSC
MAE 228/EGR 228/CBE 228/ENE 228 – Energy Technologies in the 21st Century, BTC
MAE 345 – Robotics and Intelligent Systems, RTC
ORF 350 – Analysis of Big Data, RTC
ORF 467 – Transportation Systems Analysis, RTC
POL 345/SOC 305 – Introduction to Quantitative Social Science, BSC
SML 201 – Introduction to Data Science, RTC
WWS 354 – Modern Genetics and Public Policy, BSC

Spring 2017

AMS 399/HIS 399 – In the Groove: Technology and Music in American History, From Edison to the iPod, BSC
APC 199/MAT 199 – Math Alive, BTC
CEE 475 – Cities in the 21st Century: The Nexus of the Climate, Water and Energy, BTC
CHM 440/GHP 440 – Drug Discovery in the Genomics Era, BTC
COS 126/EGR 126 – Computer Science: An Interdisciplinary Approach, RTC
COS 424/SML 302 – Fundamentals of Machine Learning, RTC
COS 432/ELE 432 – Information Security, RTC
COS 433/MAT 473 – Cryptography, RTC
COS 435 – Information Retrieval, Discovery, and Delivery, RTC
COS 445 – Economics and Computing (was Networks, Economics and Computing), RTC
COS 448/EGR 448 – Innovating Across Technology, Business, and Marketplaces, RSC
COS 461 – Computer Networks, RTC
COS 495: Special Topics in Computer Science – Neural Networks: Theory and Applications, RTC
ECO 332/GHP 332 – Economics of Health and Health Care, BSC
EGR 277/SOC 277/HIS 277 – Technology and Society, Core Course
EGR 491/ELE 491 – High Tech Entrepreneurship, BSC
EGR 494 – Leadership Development for Business, BSC
EGR 489/ARC 487 – Design of the Imminent Future, BSC
ELE 201 – Information Signals, RTC
ELE 464 – Embedded Computing, RTC
ELE 580 – Advanced Topics in Computer Engineering – Trustworthy Computing, RTC
ENE 202/ARC 208/EGR 208/ENV 206 – Designing Sustainable Systems – Demonstrating the Potential of Sustainable Design Thinking, BTC
ENV 316 – Climate Science and Communications, BSC
FRS 122 – Connection and Communication in the Digital Bazaar, RSC
FRS 138 – Oracle Bones to Smartphones: Reading Media in East Asia, BSC
FRS 140 – Bioethics and Public Policy, BSC
FRS 170 – The Mathematics of Secrecy, Search, and Society!, RTC
FRS 172 – Humans and Machines: Work and Technology in the 21st Century, RSC
FRS 178 – Statistics, Journalism, and the Public Interest, BSC
GER 211 – Introduction to Media Theory, BSC
GER 517/MOD 517 – Modernism and Modernity – Digital Cultures, RSC
JRN 400 – The Media in America – What to Read and Believe in the Digital Age, RSC
MAE 328/EGR 328/ENV 328/ENE 328 – Energy for a Greenhouse-Constrained World, BTC
NEU 437//MOL 437/PSY 437 – Computational Neuroscience, BTC
ORF 350 – Analysis of Big Data, RTC
ORF 360 – Decision Modeling in Business Analytics, BTC
ORF 401 – Electronic Commerce, RTC
PHI 277/CHV 277 – Biomedical Ethics, BSC
POL 346 – Applied Quantitative Analysis, RTC
QCB 408 – Foundations of Applied Statistics and Data Science (with Applications in Biology), BTC
SML 201 – Introduction to Data Science, RTC
SOC 204 – Social Networks, RSC
SOC 558 – Being Human in the 21st Century: How Social and Technological Tools are Reshaping Humanity, RSC
TRA 301/COS 401/LIN 304 – Introduction to Machine Translation, RTC
WWS 352/COS 352 – Artificial Intelligence and Public Policy, RSC
WWS 353 – Science and Global Security: From Nuclear Weapons to Cyberwarfare, BTC
WWS 357 – Cybersecurity Law, Technology and Policy, RSC

Fall 2016

APC 524/MAE 506/AST 506 – Software Engineering for Scientific Computing, RTC
ARC 374 – Computational Design, BTC
CBE 260/EGR 260 – Ethics and Technology: Engineering in the Real World, BSC
CEE 102A/EGR 102A/MAE 102A – Engineering in the Modern World, BSC
CEE 102B/EGR 102B/MAE 102B – Engineering in the Modern World, BTC
CHM 440 – Drug Discovery in the Genomics Era, BTC
COS 109/EGR 109 – Computers in Our World, RTC
COS 126/EGR 126 – Computer Science: An Interdisciplinary Approach, RTC
COS 402 – Machine Learning and Artificial Intelligence, RTC
COS 429 – Computer Vision, RTC
COS 432/ELE 432 – Information Security, RTC
COS 455/MOL 455/QCB 455 – Introduction to Genomics and Computational Molecular Biology, RTC
ECO 326 – Economics of the Internet: The Digital Revolution, RSC
EGR 488 – Designing Ventures to Change the World, BSC
EGR 491/ELE 491 – High-Tech Entrepreneurship, BSC
EGR 492 – Radical Innovation in Global Markets, BSC
EGR 494 – Leadership Development for Business, BSC
EGR 497 – Entrepreneurial Leadership, BSC
ELE 206/COS 306 – Contemporary Logic Design, RTC
ELE 381/COS 381 – Networks: Friends, Money, and Bytes, RTC
ELE 470 – Smartphone Security and Architecture, RTC
ELE 477 – Kernel-Based Machine Learning, RTC
ELE 535 – Machine Learning and Pattern Recognition, RTC
ELE 538 – Special Topics in Information Sciences and Systems – Information Theoretic Security, RTC
ELE 574 – Security and Privacy in Computing and Communications, RTC
ENV 304/ECO 328/EEB 304/ WWS 455 – Disease Ecology, Economics, and Policy, BSC
ENV 407 – Africa’s Food and Conservation Challenge, BTC
FRS 127 – Big Brothers are Watching You: Internet Privacy and Security, RSC
GER 211 – Introduction to Media Theory, BSC
GER 517/MOD 517/ART 517/COM 519 – Modernism and Modernity – Aesthetics of Surveillance, RSC
GHP 350/WWS 380/ANT 380 – Critical Perspectives in Global Health, BSC
HIS 295 – Making America: Technology and History in the United States, BSC
HUM 346/ENG 349 – Introduction to Digital Humanities, RSC
ITA 320/COM 378 – Cybernetics, Literary Ghosts and the Italian Way, BSC
MAE 228/EGR 228/CBE 228/ENE 228 – Energy Technologies in the 21st Century, BTC
ORF 411 – Operations and Information Engineering, RTC
ORF 467 -Transportation Systems Analysis, RTC
POL 341 – Experimental Methods in Politics, RSC
STC 349/ENV 349 – Writing About Science, BSC
WWS 354 – Modern Genetics and Public Policy, BSC

Spring 2016

AMS 399/HIS 399 – In the Groove: Technology and Music in American History, From Edison to the iPod, BSC
ANT 356 – Technologies of Communication, BSC
AST 309/MAE 309/PHY 309/ENE 309 – Science and Technology of Nuclear Energy: Fission and Fusion, BTC
COS 126/EGR 126 – General Computer Science RTC
COS 424/SML 302 – Fundamentals of Machine Learning (previously titled: Interacting with Data), RTC
COS 432/ELE 432 – Information Security, RTC
COS 433/MAT 473 – Cryptography, RTC
COS 435 – Information Retrieval, Discovery, and Delivery, RTC
COS 448/EGR 448 – Innovating Across Technology, Business, and Marketplaces, RSC
COS 461 – Computer Networks, RTC
EGR 277/HIS 277/SOC 277 – Technology and Society, Core Course
EGR 390/CEE 390 – Innovation in Practice: Pathways and People, BSC
EGR 392 – Creativity, Innovation, and Design, BSC
EGR 482 – Innovation through Empathic Design, BSC
EGR 491/ELE 491 – High-Tech Entrepreneurship, BSC
EGR 494 – Leadership Development for Business, BSC
ELE 464 – Embedded Computing, RTC
ELE 580 – Advanced Topics in Computer Engineering – Trustworthy Computing, RTC
ENE 308/MAE 308 – Engineering the Climate: Technical & Policy Challenges, BTC
ENE 414 – Renewable Energy Systems, BTC
ENG 349/HUM 346 – Introduction to Digital Humanities, RSC
FRS 122 – Connection and Communication in the Digital Bazaar, RSC
GER 211 – Introduction to Media Theory, BSC
HIS 278 – Digital, Spatial, Visual, and Oral Histories, RSC
JRN 400 – The Media in America – What to Read and Believe in the Digital Age, RSC
JRN 452 – Digital Journalism – Writing about Digital Culture, RSC
MAE 328/EGR 328/ENV 328/ENE 328 – Energy for a Greenhouse-Constrained World, BTC
MAE 354 – Unmaking the Bomb: The Science & Technology of Nuclear Nonproliferation, Disarmament, and Verification, BTC
MSE 407 – Communicating Science and Techonlogy in the Modern World, RSC
ORF 350 – Analysis of Big Data, RTC
ORF 401 – Electronic Commerce, RTC
POL 478/COS 478 – Politics in the Age of Digital Media, RSC
SML 101 – Reasoning with Data, RTC
SML 201 – Introduction to Data Science, RTC
TRA 301/COS 401/LIN 304 – Introduction to Machine Translation, RTC
WWS 357 – Cybersecurity Law, Technology and Policy, RSC
WWS 528D – Topics in Domestic Policy Analysis – Public Management in the Age of Digital Technology, RSC

Fall 2015

APC 524/MAE 506/AST 506 – Software Engineering for Scientific Computing, RTC
ARC 374 – Computational Design, BTC
CBE 260/EGR 260 – Ethics and Technology: Engineering in the Real World, BTC
CEE 102A/EGR 102A/MAE 102A – Engineering in the Modern World, BSC
CEE 102B/EGR 102B/MAE 102B – Engineering in the Modern World, BTC
CHM 440 – Drug Discovery in the Genomics Era, BTC
COS 109/EGR 109 – Computers in Our World, RTC
COS 126/EGR 126 – General Computer Science, RTC
COS 402 – Artificial Intelligence, RTC
COS 429 – Computer Vision, RTC
COS 432 – Information Security, RTC
COS 455/MOL 455 – Introduction to Genomics and Computational Molecular Biology, RTC
ECO 326 – Economics of the Internet: The Digital Revolution, RSC
EGR 201 – Introduction to Entrepreneurship, BSC, (No longer counts toward the TS certificate after this semester.)
EGR 491/ELE 491 – High-Tech Entrepreneurship, BSC
EGR 492 – Radical Innovation in Global Markets, RSC/BSC – This is the last semester this course will count for a RSC. It will still be a BSC.
EGR 494 – Leadership Development for Business, BSC
EGR 495 – Special Topics in Entrepreneurship – Building and Financing Technical Ventures, BSC
EGR 497 – Entrepreneurial Leadership, BSC
EGR 498/GHP 498 – Special Topics in Social Entrepreneurship – Ventures to Address Global Challenges, BSC
ELE 206/COS 306 – Contemporary Logic Design, RTC
ELE 381/COS 381 – Networks: Friends, Money, and Bytes, RTC
ELE 470 – Smartphone Security and Architecture, RTC
ELE 477 – Kernel-Based Machine Learning, RTC
ELE 535 – Machine Learning and Pattern Recognition, RTC
ELE 580 – Advanced Topics in Computer Engineering – Trustworthy Computing, RTC
ENV 304/ECO 328/EEB 304/ WWS 455 – Disease Ecology, Economics, and Policy, BSC
ENV 407 – Africans Feeding Africa, BTC
GHP 350/WWS 380/ANT 380 – Critical Perspectives in Global Health, BSC
MAE 228/EGR 228/CBE 228/ENE 228 – Energy Solutions for the Next Century, BTC
MAE 345 – Robotics and Intelligent Systems, RTC
ORF 411 – Operations and Information Engineering, RTC
SOC 346 – Sociology of the Cubical: Work, Technology, and Organization, RSC
WWS 353/MAE 353 – Science and Global Security: From Nuclear Weapons to Cyberwarfare, BTC (Please note that this used to be allowed as a RSC, but it is now only a BTC.)
WWS 354 – Modern Genetics and Public Policy, BSC
WWS 403(1) – The Social and Economic Effects of Current Technological Change, RSC

Spring 2015

APC 199/MAT 199 – Math Alive, BTC
CHV 331/WWS 372 – Ethics and Public Health, BSC
COS 126/EGR126 – General Computer Science, RTC
COS 424 – Interacting with Data, RTC
COS 432/ELE 432 – Information Security, RTC
COS 448/EGR 448 – Innovating Across Technology, Business, and Marketplaces, RSC
COS 598B – Advanced Topics in Computer Science – Privacy Technologies, RTC
COS 598D – Advanced Topics in Computer Science – Analytics and Systems of Big Data, RTC
COS 598F – Advanced Topics in Computer Science – Internet Law and Policy, RSC
ECO 332 – Economics of Health and Health Care, BSC
EGR 277/SOC 277/HIS 277 – Technology and Society, Core Course
EGR 392 – Creativity, Innovation, and Design, BSC
EGR 491/ELE 491 – High-Tech Entrepreneurship, BSC
EGR 495 – Special Topics in Entrepreneurship – How to Launch an Internet Startup, BSC
ELE 386/EGR 386 – Cyber Security, RTC
ENE 202/ARC 208/EGR 208/ENV 206 – Designing Sustainable Systems – Applying the Science of Sustainability to Address Global Change, BTC
ENV 316 – Climate Science and Communications, BSC
GHP 404 – Science, Society, and Health Policy, BSC
MAE 328/EGR 328/ENV 328/ENE 328 – Energy for a Greenhouse-Constrained World, BTC
MAE 354 – Unmaking the Bomb: The Science & Technology of Nuclear Nonproliferation, Disarmament, and Verification, BTC
NEU 537/MOL 537/PSY 517 – Computational Neuroscience and Computing Networks, BTC
ORF 350 – Analysis of Big Data, RTC
SOC 204 – Social Networks, RSC
WWS 351/SOC 353/COS 351 – Information Technology and Public Policy, RSC
WWS 402e – Cyber Security: Attacks and Consequences, RSC

Fall 2014

ARC 374 – Computational Design, BTC
CBE 228/EGR 228/ENE 228/MAE 228 – Energy Solutions for the Next Century, BTC
CBE 260/EGR 260 – Ethics and Technology: Engineering in the Real World, BTC
CEE 102A/EGR 102A/MAE 102A – Engineering in the Modern World, BSC
CEE 102B/EGR 102B/MAE 102B – Engineering in the Modern World, BTC
COS 109/EGR 109 – Computers in Our World, RTC
COS 126/EGR 126 – General Computer Science, RTC
COS 381 – Networks: Friends, Money and Bytes, RTC
COS 432 – Information Security, RTC
COS 455/MOL 455 – Introduction to Genomics and Computational Molecular Biology, RTC
COS 597E – Advanced Topics in Computer Science – Bitcoin and Cryptocurrency Technologies, RTC
ECO 326 – Economics of the Internet: The Digital Revolution, RSC
EGR 201 – Introduction to Entrepreneurship, BSC
EGR 491/ELE 491 – High-Tech Entrepreneurship, BSC
EGR 492 – Radical Innovation in Global Markets, RSC/BSC
EGR 495 – Special Topics in Entrepreneurship – Building and Financing Technical Ventures, BSC
ELE 206/COS 306 – Contemporary Logic Design, RTC
ELE 580 – Advanced Topics in Computer Engineering – Trustworthy Computing, RTC
ENV 304/ECO 328/EEB 304/ WWS 4555 – Disease Ecology, Economics, and Policy, BSC
FRS 159 – Science, Technology and Public Policy, RSC
HIS 391 – History of Contemporary Science, BSC
ORF 411 – Operations and Information Engineering, RTC
ORF 467 – Transportation Systems Analysis, RTC
POL 332 – Topics in American Statesmanship – Science, Technology and the American Way, RSC
SOC 596 – Computational Social Science, RSC
STC 349 – Science Journalism, BSC
WWS 354 – Modern Genetics and Public Policy, BSC
WWS 403(j) – The Social and Economic Effects of Current Technological Change, RSC

Spring 2014
ANT 344 – Science, Technology & Culture, BSC
COS 126/EGR 126 – General Computer Science, RTC
COS 445 – Networks, Economics and Computing, RTC
COS 448 – Innovating Across Technology, Business, and Marketplaces, RSC
COS 495/EGR 495/WWS 495 – Special Topics in Computer Science – Information Technology, Law and Policy, RSC
COS 496/HLS 496/ART 496 – Special Topics in Computer Science – Modeling the Past – Digital Tech, and Excavations in Polis, Cyprus, RSC
EGR 277/HIS 277/SOC 277 – Technology and Society, Core Course
EGR 392 – Creativity, Innovation, and Design, BSC
EGR 491/ELE 491 – High Tech Entrepreneurship, BSC
ELE 201 – Information and Signals, RTC
FRS 118 – Life on Mars – Or Maybe Not? BSC
ORF 401 – Electronic Commerce, RTC
SOC 357 – Sociology of Technology, RSC or BSC
MOL 205 – Genes, Health, and Society BTC
NEU 259A/PSY 259A – Introduction to Cognitive Neuroscience, BTC (Spring 2014 is the last time this course will count for this certificate.)
WWS 353/MAE 353 – Science and Global Security: From Nuclear Weapons to Cyberwarfare, BTC/RSC

Fall 2013
CEE 102A/EGR 102A/MAE 102A – Engineering in the Modern World, BSC
CEE 102B/EGR 102B/MAE 102B – Engineering in the Modern World, BTC
COS 109/EGR 109 – Computers in Our World, RTC
COS 126 – General Computer Science (may be taken instead of COS 109), RTC
COS 432 – Information Security, RTC
COS 597G – Advanced Topics in Computer Science – Surveillance and Countermeasures, RTC
ECO 326* – Economics of the Internet: The Digital Revolution (one time course, Fall 2013), RSC
ELE 381/COS 381 – Networks: Friends, Money, and Bytes, RTC
ELE 580/COS 580 – Advanced Topics in Computer Engineering: Trustworthy Computing, RTC
EGR 492* – Radical Innovation in Global Markets, RSC
EGR 495 – Special Topics in Entrepreneurship – Developing Commercially Viable Technologies, RSC/BSC
MAE 228/EGR 228/CBE 228 – Energy Solutions for the Next Century, BTC
MAE 345 – Robotics and Intelligent Systems, RTC
ORF 411 – Operations and Information Engineering, RTC
SOC 346* – Sociology of the Cubicle: Work, Technology, and Organization, RSC/BSC
WWS 351/SOC 353/COS 351 – Information Technology and Public Policy (formerly WWS 451), RSC

Spring 2013
CBE 260/EGR 260 – Ethics and Technology: Engineering in the Real World, BTC
COS 126 – General Computer Science (may be taken instead of COS 109), RTC
COS 448* – Innovating Across Technology, Business, & Markets, RSC
ELE 201 – Introduction to Signals and Systems (may be taken instead of ELE 222), RTC
ELE 386/EGR 386 – Cyber Security , RTC
MOL 205 – Genes, Health, and Society, BTC
NEU 259A/B – Introduction to Cognitive Neuroscience, BTC (Spring 2014 is the last time this course will count for this certificate.)
ORF 401 – Electronic Commerce, RTC
SOC 204 – Social Networks, RSC
SOC 356* – Sociology of Science, BSC
WRI 149/150 – Fans and Consumer Culture, RSC
WWS 334/SOC 313 – Media and Public Policy (formerly WWS 309). (This is the last semester this course is approved; in 2015 it has the same title but different content.), RSC
WWS 353/MAE/AST 353 – Science and Global Security: From Nuclear Weapons to Cyberwarefare, BTC/RSC

Fall 2012
CEE 102a/b/EGR 102a/b/MAE 102a/b – Engineering in the Modern World, BTC
COS 109/EGR 109 – Computers in Our World, RTC
COS 126 – General Computer Science (may be taken instead of COS 109), RTC
COS 432 – Information Security, RTC
COS 445 – Networks, Economics and Computing, RTC
COS 455/MOL 455 – Introduction to Genomics and Computational Molecular Biology, RTC
COS 597D – Advanced Topics in Computer Science – Information Privacy Technologies RTC
EGR 492* – Radical Innovation in Global Markets , RSC/BSC
EGR 495 – Special Topics in Entrepreneurship – The Lean LaunchPad, RSC/BSC
ELE 381/COS 381 – Networks: Friends, Money, and Bytes, RTC
EGR 491/ELE 491 – High-Tech Entrepreneurship , RSC/BSC
ELE 580/COS 580 – Advanced Topics in Computer Engineering: Trustworthy Computing, RTC
FRS 101* – Facebook: The Social Impact of Social Networks (one time course, Fall 2012), RSC
FRS 125 Friending, Following and Finding, RTC
FRS 163 – Science, Technology and Public Policy, RSC
MAE 228/EGR 228/CBE 228 – Energy Solutions for the Next Century , BTC
MAE 244*/EGR 244 – Introduction to Biomedical Innovation and Global Health , BTC
ORF 411 – Operations and Information Engineering, RTC
WRI 149/150 – Fans and Consumer Culture, RSC
WWS 334/SOC 313 – Media and Public Policy (formerly WWS 309), RSC
WWS 351/ SOC 353/COS 351 – Information Technology and Public Policy (formerly WWS 451), RSC
WWS 571B/NES 584 – Topics in Development – New Media & Social Movements: New Tools for an Old Game, RSC

Spring 2012
CBE/EGR 260 – Ethics and Technology: Engineering in the Real World, BTC
COS 126 – General Computer Science (may be taken instead of COS 109), RTC
COS 448 – Innovating Across Technology, Business, & Markets, RSC
COS 495/ART 495 – Special Topics in Computer Science – Modeling the Past – Technologies and Excavations in Polis, Cyprus, RSC
EGR/HIS/SOC 277 – Technology and Society (Core Course)
EGR/ELE 386 – Cyber Security, RTC
EGR/ELE 491 – High-Tech Entrepreneurship, BSC
EGR 495 – Special Topics in Entrepreneurship – Entrepreneurial Leadership, BSC
MOL 205 – Genes, Health, and Society, BTC
NES/ENV 266 – Oil, Energy and The Middle East, BSC
ORF 401 – Electronic Commerce, RTC
SOC 409 – Critical Approaches to Human Computer Interaction, RSC

Fall 2011
CBE/EGR/MAE 228 – Energy Solutions for the Next Century, BSC
CEE/EGR/MAE 102a/b – Engineering in the Modern World, BTC
COS/EGR 109 – Computers in Our World, RTC
COS 126 – General Computer Science (may be taken instead of COS 109), RTC
EGR/ELE/ORF 491 – High-Tech Entrepreneurship, BSC
EGR 492/WWS 493 – Radical Innovation in Global Markets, BSC
EGR 495 – Special Topics in Entrepreneurship – Ventures to Address Global Challenges, BSC
ELE 381 – Networks: Friend, Money, and Bytes, RTC
ITA 309 – Topics in Contemporary Italian Civilization – New Media, Social Network and Italy, RSC
SOC 357 – Sociology of Technology, RSC
WRI 149 – Fans and Consumer Culture, RSC
WWS 309/SOC 313 – Media and Public Policy, RSC

Spring 2011
EGR 495 – Special Topics in Entrepreneurship – Entrepreneurial New Product Development (NPD), BSC

Students interested in this certificate program should submit the Program Admission form.

I am not a Princeton undergraduate student. Can I still apply to the Program in Technology and Society, Information Technology Track?

No. You must be a Princeton undergraduate student to receive this certificate.

How does the TS certificate relate to the Program in Applications of Computing?

The TS certificate is for students from all backgrounds who want to study the intersection of computing and society. Applications of Computing is for non-CS majors who want to study computing—at another university it might be called a “minor in Computer Science”.

I am an incoming freshman, and although my major is undeclared/undecided, I am interested in the TS certificate. What is an optimal course map for the program?

The first course you should take is the core course required, EGR/HIS/SOC 277 Technology and Society.

Please see the Technology and Societal courses listed in the Course Requirements for other suggested courses. Two technology, two societal and one breadth courses are required to receive this certificate.

Can I substitute another course for one of the required courses?

Substitutions must be consistent with the goals and structure of the program. Any substitution must be approved in advance by the director of the Information Technology Track. Please email the request to the Information Technology Track Program Manager, Laura Cummings-Abdo, lcumming@princeton.edu.

Can I take any of the courses as PDF?

Yes, you may take one course out of the six required as a PDF course. All other courses must be taken for a letter grade.

What else is required to receive this certificate?

Along with the course work required, a semester of Independent Work and participation in the Annual Symposium are also required to receive the Technology and Society, Information Technology Track certificate upon graduation.

Do you need to be in a specific major to apply for the Technology and Society, Information Technology Track certificate?

No, as long as you fulfill all the certificate requirements you will receive the certificate upon graduation.

Can I get a Technology and Society, Information Technology Track certificate and another certificate at the same time?

Yes, as long as you meet the requirements for both.

What if I have more questions?

Please contact the program manager of the Information Technology Track, Laura Cummings-Abdo, lcumming@princeton.edu.

2018 Certificate Graduates

Adam Berman, COS (presented independent work as a junior)
Title of Project: A Computational Pathway for Identifying Metabolites Relevant to Cancer Development

This work describes a computational approach to identify “driver” metabolites and metabolic pathways that are most crucial to cancer development and growth based on pre-existing large-scale genomic databases of mutational and expressional cancer data. The implementation relies on the development of formulae to assign cancer associative scores to each of many biologically active metabolites from the publicly available cancer data. Thereafter, the metabolites can be ranked according to their scores, and the ranking can be cross-validated with a list of metabolites known to take part in cancerous metabolic pathways using machine learning techniques.

Given cancer’s known tendency to alter the body’s metabolism, we feel that this metabolite-first approach may bring to light previously overlooked metabolites that are crucial to cancer development.

Kelly Bojic, ECO
Title of Project: How to Save a Life” (and Maybe Money): The Effects of Information Technology on Health Spending During Economic Downturns

My paper investigates the effects of information technology on health care spending per capita during economic downturns. Information technology has the potential to create substantial savings to health care spending, especially during economic downturns, when private health care spending and capital investments decline and federal spending for health care rises. I distinguish between supplier- and consumer-facing information technology by looking at health information technology systems on the supplier side and iPhones on the consumer side. Among health information technology systems, I focus on Electronic Medical Records systems and Clinical Decision Support systems. I find that health information technology systems are associated with a 14.5% rise in health care spending per capita, reflecting an increase in costs to medical facilities. However, the rise in health spending associated with health information technology use falls 2.41% for every percentage point increase in the unemployment rate. I do not find a significant relationship between consumer-facing information technology and health care spending.

Luisa Goytia, COS
Title of Project: Amazona – A framework for mobile context-aware personal security

Personal security is a global concern that ignores race, gender, age, and socioeconomic status. It can be gravely compromised without warning in a dangerous location as well as in a perceived well-protected neighborhood. Calling 911 is the default emergency protocol but this might not be possible or feasible during many emergencies. In the case where contact can be established, emergency responders have very limited information to formulate an effective rescue protocol.

This thesis introduces Amazona, a context-aware mobile framework that discretely and rapidly distributes relevant system and user information upon activation in an emergency situation. The context-aware nature of the system allows the mobile device to gather information about its environment and to adapt its emergency protocol accordingly. Based on the selected protocol, Amazona sends an updated information package, containing location, video/images, among other data, to pre-selected emergency contacts upon the consecutive presses of the device’s power button. The package does not just reflect a snapshot of the user’s condition at the time of the emergency but also includes data from the past, creating a detailed timeline of the user’s activity before the alarm is activated. The system continues sending these packages with updated information, if available, until the alarm is deactivated without relying on any other input from the user.

This approach facilitates access to different emergency contacts, improves the likelihood of rescue and diminishes the risk a user has to take to reach out for help using traditional methods.

Sreela Kodali, ELE
Title of Project: Monitoring Mental Health with a Multimodal Sensor System and Low-power Specialized Hardware

This work presents a system that utilizes smartphone and wearable data to understand human behavior and facilitate mental health monitoring. Although mental disorders are exceedingly prevalent, their diagnostic methods are much more antiquated than their physical ailment counterparts. Mental health diagnosticians employ subjective surveys, professional observations, and patient recall to capture a patient’s changing behavior, but these approaches are severely limited. Mobile devices introduce a unique opportunity to quantify and unobtrusively record data on human behavior. Predictive classifiers and neural network (NN) models can interpret the data and yield meaningful behavior classifications. With the inclusion of specialized hardware, a secure and energy-efficient predictive system can be developed to identify worrying behavior and encourage users to seek medical help. In this work, multiple predictive models associated with worrisome mental health behaviors are developed with existing datasets, optimized for performance, and ported to hardware accelerators. Energy and power metrics for the models are estimated and used as design considerations for a realizable end-to-end system.

Marion Lewis, WWS
Title of Project: Understanding the Effects of High Jump:
A Study of One Chicago-Based Supplementary Academic Enrichment Program for Low-Income, High-Achieving Middle School Students on College Outcomes and Interest in STEM

This work analyzes the effects of High Jump. Located in urban Chicago, High Jump is a tuition-free supplementary academic enrichment program for highly motivated seventh and eighth grade students of limited financial means. Specifically, the objectives of this thesis are to assess the relationships between participation in High Jump and college outcomes, as well as participation in High Jump and STEM interest. I use an observational research design that compares students who applied and were selected for High Jump to those who applied and were not selected. With data collected from the National Student Clearinghouse on college enrollment, graduation, and declared major, I examine the association between High Jump and college outcomes. Using college major choice as a proxy for STEM aptitude and/or interest, my findings can then be applied more generally to draw conclusions about how well High Jump alumni will fare in the future digitized workforce and provide recommendations about how to modify education policy in developmental years so as to safeguard the human advantage that machines may begin to threaten. After running several OLS regressions of college graduation, type of college, and STEM major on High Jump completion status, my results indicate that High Jump completion is correlated with 0.112 (significant at the 0.01 level) increase in college enrollment, 0.229 (significant at the 0.01 level) increase in college graduation, 0.169 (significant at the 0.01 level) increase in enrollment at a selective college, 0.177 (significant at the 0.01 level) increase in enrollment at a four-year college, and 0.211 (significant at the 0.01 level) increase in enrollment at a private college. Furthermore, High Jump completion is correlated with 0.068 (significant at the 0.01 level) decrease in enrollment at a two-year college, 0.106 (significant at the 0.01 level) decrease in enrollment at a public college, and 0.114 (significant at the 0.01 level) decrease in pursuing a STEM major. I conclude with policy implications related to universal college access and STEM education.

Grace Miles, COS (junior, graduating 2019)
Title of Project: The Online World Versus the Physical World: An Analysis of College Students’ Social Networks

The purpose of the research is to understand how structurally similar, or isomorphic, Princeton student’s online social networks are in comparison to their physical social networks. This study surveys Princeton undergraduate students (n = 464) about the nature of their usage on three separate online social network platforms: Facebook, LinkedIn, and Instagram. Findings include an online social network structure that is greatly inflated compared to their real world counterparts including large numbers of stagnant ties. The implications of this study are increasingly relevant in defining the role of stagnant ties in our lives and what are the mental health and personal repercussions of these increasing online networks.

Sarah Muse, WWS
Title of Project: The Surprising Success of the European Union Member States’ Migration Policies: An Analysis of Greece, Italy, Spain and France’s Border Control

This paper attempts to discern how different Member States within the European Union were able to effectively restrict the number of illegal refugees entering their borders through the employment of various technologies and treaties. My paper specifically looks at Greece, Italy, Spain and France. Ultimately it demonstrates that the nations successfully controlled their borders from illegal migrants by erecting physical barriers and by creating and employing surveillance technologies to track and detain refugees attempting to cross the sea from North African into the southern border of the EU. The paper focuses specifically on Spain’s creation of unique and effective technologies including SIVE, or an Integrated External Vigilance System, that is capable of not only tracking migrant traffic across the Mediterranean but also alerting authorities in both African and European nations about these crossings to help them detain the illegal refugees.

Chelsea Ng, ECO (junior, graduating 2019)
Title of Project: Amazon Takeover: Ubiquity of Technology

The undergraduate certificate program in T&S emphasizes how any aspect of society today is influenced by evolving technology in a significant way. A perfect platform that shows exactly this is Amazon, which has in recent years risen to become a global behemoth, alongside the rise of online marketplaces. E-commerce interestingly intersects technology with society. Amazon serves as an interesting ecosystem that seamlessly integrates key players—sellers and buyers—that affect one another to determine algorithmic pricing on Amazon.

My economics Junior Independent Work focuses on exploring price-setting of homogenous goods (such as books), in online markets. I am specifically looking into the effect of seller heterogeneity (i.e. different retailer characteristics/retail differences such as channel types, star rating, feedback rating), on the price levels set by firms online. According to the Bertrand competition, the rise of the Internet should promote the “Law of One Price”, where prices for a certain good should be similar due to lower search costs, increase in competition, and removal of purchasing barriers that come with technological changes. However, the paradox here is that despite technological changes, price dispersion still exists in society—firms set prices that vary from ~$10 to $70, even if the good is exactly the same with no qualitative characteristic differences. How technology, or Amazon’s market place, affect society, in terms of pricing of goods that are homogenous and the price variation that it causes, is an exploration that is worth considering. Perhaps, the study could also be extended to focusing on dynamic pricing on Amazon, and how interactions within society affect supply & demand that is further affected by technology.

Julie Novick-Lederer, COS
Title of Project: Using Sentiment Analysis to Detect Gender Bias in Course Evaluations for Professors at Princeton University

This project assesses whether gender bias exists in Princeton University’s course evaluations using a combination of natural language processing techniques. Gender gaps and discriminatory practices in the workplace and in the hiring process are issues that have been frequently brought to the table, and the world of academia has not escaped scrutiny. We seek to understand whether male professors and female professors are being evaluated differently by students and analyze how the possible existence of gender bias may affect the demographic of both students and professors in a variety of fields and departments at Princeton. In order to conduct a meaningful study, we analyze the evaluations written anonymously by students from Princeton’s registrar for a chosen set of departments and courses. Using Princeton evaluations as the dataset provides a unique lens through which we can assess how ratings, sentiment, and language used differs between female and male professors. We discovered that while the overall sentiment and ratings of courses taught by female professors were not consistently more negative than that of their male colleagues, the language used in the evaluations is definitely gendered. Moreover, the discrepancy between the number of women and men in academia still remains a problem both at Princeton and at universities across the nation. This study incorporates the use of technology, specifically large data manipulation and sentiment analyses, to understand a very topical societal issue. We hope that this project can be extended further to see whether there is a connection between the fields where employees are evaluated and the number of women in that area of work. This project assesses gender gaps in Princeton’s faculty from an interesting angle and sheds light on the issue of the lack of women working in academia.

Luke Petruzzi, COS (presented independent work as a junior)
Title of Project: Virtual Reality for Nuclear Arms Control: Prototyping New Verification Processes

Nuclear disarmament has come a long way since the detonation of the first nuclear weapon. International treaties and efforts pursuing non-proliferation, bans on testing, and dismantlement of deployment vehicles including aircraft and missiles are ongoing. However, there are no treaties to dismantle nuclear warheads themselves. Convincing nuclear weapon states to come to a consensus on the scope of a treaty to dismantle warheads is extremely difficult. Currently, in-person walkthroughs of proposed treaties, inspections, and verification processes are performed by multiple nations to gauge treaty effectiveness and capacity for adoption. This process is very expensive, time consuming, and introduces intrinsic security and safety risks. This project addresses these problems by employing a networked Virtual Reality application in which international parties can perform confirmation walkthroughs and rapidly prototype new verification processes for treaties. Our approach was analyzed on Princeton students and has already shown positive results that provide insights on a potential verification process for mapping the location of warheads within a facility. This project also created an open source template for multi-user virtual reality developed on the Unity engine: a resource that did not previously exist.

Maya Phillips, COS
Title of Project: A Metadata API for the Fragile Families and Child Wellbeing Study

The Fragile Families and Child Wellbeing Study is a longitudinal study of children from ages birth-15. The data from this study is currently being used by social scientists and data scientists to combine predictive modeling with other tools to predict key outcomes in the lives of young children. This data includes information about the children, their parents, their schools, and their larger environments. The recently collected year-15 data helps us to understand how these factors are predictors of success. Researchers at Princeton are now constructing better metadata to support the raw dataset of survey responses in order to make predictive modeling easier, and to make the models themselves more predictive. My project is an API that manipulates and partitions this metadata along lines that will allow researchers easier access to the information. In both an online version and an embedded code version, this interface will allow the for the widest use of the metadata, and that will eventually give us better insight into the predictive nature of the data.

Tyler Sullivan. ECO
Title of Project: Contrasting Technological Development’s Effect on Labor Share and Industrial Concentration in
U.S. Manufacturing and Information Industries

The rise of the digital economy has had an undeniable impact on industrial dynamics in the United States. The productivity gains resulting from technological development are manifesting themselves differently throughout the economy, and this study specifically contrasts the U.S. manufacturing and information industries in order to forecast changing industry dynamics. Two central dynamics are studied: changing labor share and changing industrial concentration. While productivity gains derived from increased digitalization have been leading to generally falling employee labor share and increasing “superstar” firm concentration, this study shows that the results are heavily nuanced by industry. Using data from the U.S. Census Bureau and the U.S. Bureau of Labor Statistics, this study indicates a technological “rebalancing,” where older, less digitally-native industries like manufacturing are beginning to act more like newer, digitally-native industries in an effort to mature into the digital economy. This study finds a positive long-term effect on labor share, but a negative long-term effect on industrial competition. With the rise of advanced artificial intelligence and technological unemployment, monitoring changing productivity’s effect on key industry dynamics will continue to be a crucial study with significant economic and public policy impacts.

Rebecca Weng, SOC
Title of Project: Negotiating Twitter as a Space for Digital Activism: A Case Study of #MeToo

Currently we are seeing a variety of everyday interactions that used to be exclusively offline being forced online in one way or another—from professional correspondence to advertisements to teaching and learning. But there has been particular skepticism around online activism both in everyday and scholarly discussion. This study focused on the case of #MeToo on Twitter. From October 15, 2017 to March 31, 2018, I gathered more than 6,000,000 tweets that used the hashtag, as well as tweets that used related hashtags about women’s rights. I used these tweets to form a sampling frame, which I used to contact research subjects over Twitter. This study offers insights with regard to recruiting research subjects on sites like Twitter. Through 10 in-depth interviews, this study shows how Twitter users are mapping between the traditionally offline activity of protest and online hashtag activism. In this case, Hollywood, the 2016 Presidential election, and the utilization of social media by news outlets to spread information all play crucial roles.

Natalie Wertz, COS
Title of Project: LeadHERship: An Analysis of Gendered Portrayals in the Media

Over the past decade, people from all over the world have become increasingly reliant on online sources to read the news and keep up with current events. Although news articles are meant to be unbiased sources of information, they often contain the same problematic biases that humans exhibit in everyday life. As the popularity of online news continues to increase, it is necessary to uncover the gender biases within these articles in order to counteract inequalities present in society today. The aim of this study is to analyze the many axes in which gender bias is present within news articles in order to generate new ideas on how to mitigate, and eventually eliminate, such biases.

2017 Certificate Graduates

Elinor (Nora) Buck, PSY
Title of Project: Books Judged by their Covers: Revealing the Hidden Gender Biases in Impressions of Competence

Many of the inequalities in the world today are the result of incorrect, biased perceptions based on appearance during a first impression. This study shows that certain faces are perceived as less competent than others because of their feminine properties. With a statistical face model (Oosterhof & Todorov, 2008; Todorov et al., 2013), we uncover this implicit bias that indicates women are perceived as less competent than men through trait judgments after exposure to faces manipulated on a scale of competence. Experiment 1 re-validates the Competence Model, an existing model of this social dimension (Todorov et al., 2013), as well as tests for the relationship between this model and trait judgments of attractiveness. This allows us to create a new model, a Difference Model, for Experiment 2, which looks to validate a [competence – attractiveness] model, as well as perform additional trait judgments of confidence and masculinity. Finally, Experiment 3 uses both the Competence and Difference Models for a gender classification test, providing strong evidence in favor of the hypothesis. The trait judgment of competence for both the Competence and Difference models demonstrated that the models were accurate in their representations, as the mean ratings increased steadily from the lowest to the highest SD. In addition, the gender classifications yielded results very similar to the competence judgments, with the proportion of faces rated as “Male” rising steadily from the lowest to the highest SD of competence. Most notably, the Difference Model, having removed the effects of attractiveness, shows an even stronger effect from each SD to the next. Therefore, we can conclude that perceptions of competence are highly correlated with gender bias against women – a troubling outcome for society.

Does technology aid this effect or detract from it? While the internet has served as an incubator and amplifier for many social phenomena, it may present an opportunity for women especially to be judged primarily on demonstrated competence instead of perceived competence.

Caroline Congdon, COS
Title of Project: Finding An Effective E-Waste Solution

As we move further and further into the technological age, production of electronic devices of varying purpose, size, and composition continues to expand rapidly. This growth has enabled numerous advancements in several areas, and this progress is a concept that has come to define the current era. Although growing use of technology has made an enormous positive impact, significant pitfalls have also emerged. One such hazard is the sizable increase in the production of electronic waste, also known as e-waste. Discarded televisions, personal computers, refrigerators, tablets, and mobile phones don’t follow a clear path to recycling, salvage, or disposal. Instead, they sit in storage or in landfills, often without protections to keep them from making a toxic environmental impact. Over three and a half million tons of e-waste was generated in 2012, almost double the amount from fifteen years prior. This number continues to grow at an alarming rate, while the recycling rate has stayed relatively low. A solution is necessary in order to combat the realities of this trend, which include dangerous environmental impacts, especially in developing nations. Such a solution will require logistic work, legal justification, and funding. This paper explores some of the proposed solutions, and synthesizes their best elements, via the lens of planned obsolescence.

Aleksandra Czulak, ECO
Title of Project: An Analysis of the Effects of School Closings and Openings on Crime in Chicago

In 2013, the Chicago Public School District closed almost 50 underutilized elementary schools and opened over 40 new schools of which over 30 were new charter schools that were mostly high schools. Two key issues continue to plague Chicago: access to high quality public schools and crime. These shocks to public schools are occurring in most major cities across the United States and it is essential for there to be more research on the effects of school changes on neighborhoods and communities. I analyze the effect of new school openings and school closures, beyond the classroom, on crime in Chicago community areas. The crime categories that I analyze are homicides, violent crime, index crime, and non-index crime and I use quarterly data on crime, changes in schools, and demographic data for Chicago from 2010-2016. Access to publicly available data by cities and the use of big data by cities and police departments offer new ways of looking at issues, like crime, which may result in best practices that may be adopted by other cities; however, it also requires a deeper understanding of the communities and the potential consequences of such initiatives.

Carole Touma, COS
Title of Project: The Racial Education Gap: A Look Beyond AP Exam Scores

This paper intends to provide an overview of the different ways AP exam data have been visualized during this semester’s independent work with respect to race, gender, particular AP exam, and year. The two main visualization methods implemented and discussed in the paper are line graphs plotting AP scores and participant volumes for various demographics over time, as well as an interactive map of the United States where race, gender, AP exam, state, and year can be modified.

Daphne Weinstein, COS
Title of Project: Creating a Decentralized Marketplace for Sensitive Data

Recent experience has taught us that centralized data storage is prone to attacks and surveillance. As more IoT devices come online, there will be consumer demand for a better model. We propose a system for decentralized storage and sale of user data. We build a decentralized data storage system using an existing blockchain and peer-to-peer file sharing system. This is the first system of its kind to take advantage of the affordances of smart contracts to sell data automatically upon conditions delineated by users. We propose the development of a rich vocabulary to describe and automatically ‘compile’ user preferences into smart contracts through which data items or streams of data can be automatically sold. In this way, our system empowers users to take control of their own data: selling it or storing it with exclusive access themselves.

Samantha Weissman, COS
Title of Project: You Are What You Eat: An Analysis of Manhattan Restaurant Health Inspections

Restaurant health inspection scores are an important factor in consumer decision making. My project analyzes Manhattan restaurant health inspection scores, as made publicly available through the New York City Open Data portal, with respect to income and demographic information in order to glean insights into the relationships between restaurants and their corresponding neighborhoods. The research project integrates income statistics and neighborhood composition to recognize and interpret trends in the restaurant inspection data. The project concludes that relevant trends do exist between restaurant health inspection scores and income and demographics; notably, a positive correlation was found between median household income and distributions of inspection scores, connections were made between concentrations of cuisine types and ethnic neighborhoods, and relationships were drawn between temporary restaurant closures and health inspection results.

Jeremy Zullow, WWS
Title of Project: Parking and Traffic in Urban Areas: Harnessing Technology to Drive Market-Based Solutions

Until recently, city governments relied on outdated policies that created surplus demand for parking spaces and, as a result, increased traffic. This was due primarily to the embedded belief that on-street parking should be kept free. However, solutions were also impeded by limited technological means to develop pricing and enforcement systems that could effectively manage parking availability. New technological systems facilitate real-time data curation and enable policymakers to change parking prices in response to consumer changes, and vary prices in areas of high and low parking demand to increase revenue and reach an optimal level of demand, given the fixed supply of parking spaces. In the process, they are also changing motorists’ behaviors and reducing traffic congestion. Available case studies from Seattle, San Francisco, and Redwood City indicate that technology-driven parking policies can be substantially more effective at reducing parking over saturation and traffic in large cities, while small cities may not need to adopt complex technology infrastructure to have a similar impact.

2016 Certificate Graduates

Louis (Britt) Colcolough, ENG
Title of Project: Technology and Princeton: What the Education Giant Has Yet to Learn

American higher education is about go through a period of radical change. With an explosion of educational innovations like massive open online courses (or MOOCs) and flipped classrooms, college is beginning to look more and more different. These new ways to learn coincide with a widespread public outcry for colleges to reform themselves in the face of rising student debt and seeming undergraduate incompetency. The result, as Andrew Delbanco puts it in his book College: What it Was, Is, and Should Be, is that it would be “foolish to doubt that higher education is on the verge of upheaval.”

My work focuses on how Princeton has reacted and continues to react in this climate, specifically in the humanities departments. As technological innovation marches forward, what has a Princeton liberal arts education done to adapt? What are the intersections between technology and the humanities here, and do the two even complement one another in a meaningful sense? My research suggests that Princeton has a lot to learn.

Benjamin Dobkin, SOC
Title of Project: To Catch a Redditor: Studying the Identity of Anonymous Users on Reddit, Online and Offline

Anonymous users of online networks deal with the conundrum of needing to create a new identity to participate as individuals in a network. An anonymous identity is paradoxical as the two terms directly oppose each other. However, users who desire to benefit in their network, must create an identity to maximize their online presence and social capital. In the offline world, a separate social capital exists, as users shun their online identity to better achive physical benefits. The social news site Reddit presents this difference between the online and offline, and allows us to view user histories, conduct in depth interviews with users, and observe offline meetups. Although the research focuses on the offline and online realm separately, it emphasizes the connection and overlap as all users participate in both worlds. This work aims to analyze the backwards progression of online to offline interaction among Reddit users.

Caroline Haas, COS
Tite of Project: Bidding for Healthcare: A Two-Sided Market Exploration

America’s healthcare system is broken. The cost of care is rising and consumers are faced with limited choice and minimal pricing data. In this study, I present the idea of a novel healthcare marketplace where physicians bid for patients’ business. The marketplace would provide pricing insights, quality metrics, and discovery opportunities to patients and doctors, thereby injecting competition into this broken healthcare system. To test the feasibility of such a marketplace, I composed market research surveys. Through the research firm Qualtrics, I administered the surveys to 50 recent (past 3 years) patients of Lasik eye surgery and 10 current physicians of Lasik. Lasik patients and physicians were chosen because the specialty is non-insured, the price is highly variable, and the procedure is relatively high-volume in the US. The results indicate that patients are eager for shoppable healthcare and like the proposed marketplace, but that physicians are more resistant to technology and to direct competition. For both patients and physicians, it is clear that for the proposed marketplace to achieve success, the design and marketing must be careful to cater to both consumers’ and physicians’ psychologies.

Jack Hudson, COS
Title of Project: TigerTreat: An Exploration of Technology and Generosity Integration and Student Venture Policy at Princeton University

Recently, many universities have been rigorously promoting innovation on their campuses. Although universities are building resources to enable innovation, many have policies that restrict student innovation in order to protect their non-profit and tax-exempt status. This paper explores a treat delivery service called TigerTreat, its integration with the Princeton University campus, and the university policy hurdles it encountered. By reviewing Princeton University’s policies towards revenue-generating student activities and comparing Princeton University’s policies to those of other universities, this paper proposes three recommendations for Princeton University policy changes: (1) create an official document detailing Student Agency regulations, (2) create a separate set of regulations for profit-generating activities, and (3) establish an objective administration approval and oversight structure.

Samuel Jordan, COS
Title of Project: Bad Choices made by Brilliant People: Explaining the lack of transport-level security on the modern Internet

The Internet, as it exists today, is one of the most successful tools for communication that humans have ever built. A recent major concern about the Internet, greatly fueled by Edward Snowden’s release of documents detailing the NSA’s broad and pervasive Internet eavesdropping capabilities, has been the absence of encryption. Despite some clear architectural advantages for this approach, there is no widely adapted protocol for network-level encryption. Using a great variety of sources ranging from technical protocol specifications (RFCs), academic journals, and email archives, it becomes clear that the underlying causes for the lack of encryption are threefold: the technological momentum of a design focus on reliable rather than secure communication, hardware (and software) limitations, and externally imposed restrictions on communication between key designers. Analyzing a host of frequently ignored sources to examine the little-studied topic allows us to better understand how we arrived at the current state of network-level encryption, and create an explanatory framework for why things like the NSA surveillance revealed in the Snowden leaks are still possible on today’s Internet.

Rishi Kaneriya, COS
Title of Project: MyLight: The “One Stop Shop” for the Average Philanthropist

MyLight is a web application designed to serve as the “one stop shop” for the average philanthropist looking to donate to non-profit organizations online. It recommends charities to users based on their personal charitable interests, visualizes data about them in an easy-to-understand way that inspires action, integrates current events about charities in the news, and contains social functionality to help users stay connected to fellow donors.

This paper discusses related charity-finding products before detailing the ways in which MyLight differentiates itself as a truly integrated solution. It also discusses the technical implementation of the application, as well as ways in which it was evaluated, before culminating in a discussion of potential improvements that could refine MyLight’s ability to empower everyday philanthropists in the future.

Gabriela Leichnitz, COS
Title of Project: A Princeton On-Demand Transportation Platform and Its Implications on Policy, Safety, and Accessibility

Current On-Demand transportation networks, as implemented at Princeton University and at other schools across the country, are inherently outdated and inefficient, as they rely solely on phone calls for information sharing. This paper addresses the ways in which an On-Demand transportation platform can use technology to simplify the process and ease the exchange of information for all parties. Furthermore, it delves into the policy implications of such a platform, specifically as it relates to overall effectiveness, efficiency, and safety. It then details a prototype developed using MEAN.JS. This preliminary system consists of a web application, used on desktop for dispatchers but designed for mobile responsiveness for riders. The semester project produced a working prototype intended to address the most glaring policy and use problems, but future potential lies in its integration with Princeton’s network and a complete implementation with more complex features and the direct involvement of the bus driver.

Stephanie Marani, COS
Title of Project: InfraShare Mobile: Crowdsourcing Plant Health Using Near-Infrared Photography

As trees and other vegetation are crucial in regulating and maintaining our ecosystem, monitoring their health is an important task. This job often falls to those who work for environment-related institutions; however this does not have to be the case. Many organizations have begun to use crowdsourcing and volunteer recruitment to help collect environmental data, which allows for ecosystem monitoring to be increasingly efficient. This thesis introduces InfraShare Mobile, an open source mobile application framework that provides a simple, easy process for plant health data to be obtained and analyzed. It allows anyone to use commercial-off-the-shelf devices, including webcams and digital cameras, to take near-infrared photos of vegetation and then analyze these photos on their mobile devices. These photos are then uploaded to a companion web application where they can be viewed along with their location and other information. After using three different cameras to evaluate InfraShare Mobile, it is clear that the application allows for detailed data on plant health to be collected on a wide scale, low cost basis, and that it will allow environmentalists to have access to more information about the current state of the natural environment.

Tess Marchant, COS
Title of Project: What Does Facebook Know: Behavioral Targeting for Personalized Ads

This project is aimed highlighting the importance of increasing public awareness and education regarding web privacy. New forms of web tracking are explained and discussed, the specific information being collected by popular social networking sites is disclosed, and the methodology of a new web app that will inform and empower the public to change their browser preferences to reflect their personal beliefs is introduced. This application was inspired by previous research indicating a disconnect between fears people have regarding privacy online and the actions they take to ensure that their online behaviors are, in fact, private. Its ultimate goal is to help connect those fears and actions, and to continue the web privacy discussion in general.

Alec Jacob (A.J.) Ranzato, SOC
Title of Project: I-Robot to We-Robot: Exploring the Effects of Team Structure on Team Dynamics, Decision Making, and Performance, when Working with a Remote Robot

In this study I gave teams of five a team structure, condition or hierarchy, and tasked them with controlling a remote robot through an experimental space with the goal of maximizing exploration and exploitation. They were given 90 minutes, and within that 90 minutes had a series of (max) 10-minute windows to send a series of commands to their robot in bulk consisting of movement and pictures, which were used to help in following planning sessions. Ultimately, three groups emerged, tightly coupled hierarchical and consensus ones, and loosely coupled versions of both. Loosely coupled teams proved to be best suited for the task as they could maintain brief social order centered around their robot teammate where their team structure provided little. They could then neutralize the advantages of their given structure and adopt the advantages of the other.

Paarth Shah, WWS
Title of Project: Redefining the Smart City: An Analysis of the 100 Largest Cities in America

This paper studies the emergence of Smart Cities in the United States. These are not new constructions of cities but rather retrofitting of existing metropolitan areas. 89 of the 100 largest cities in America have used the terms “smart city”, “smart growth”, or “smart technology” in their government documentation. The motive of the paper is to both analyze and refine the definition of a smart city, given its vagueness in the literature. After an analysis of definitions proposed by various stakeholders, it is suggested that a smart city ought to have high levels of information and communication technology, social capital, infrastructure and education. I then use proxy variables for each of these metrics and regress these variables against well-being and satisfaction within a city for the 100 largest cities in America, since the underlying goal of a city is to ultimately increase the level of well-being and quality of life for its citizens. The paper concludes with 4 dyadic case studies which look at pairs of cities which are close to each other in geography and population but perform very differently on the Smart City Index, a weighted average for the 4 variables mentioned above. These dyadic pairs are analyzed to offer some insights into why certain cities have performed better on the Smart City Index relative to others, pointing out key investments made by particular cities in technology, education, infrastructure and social capital which have resulted in higher levels of well-being.

Edward S. Walker, Jr., ORFE
Title of Project: A Method of Pose Estimation Using April Tags for the Picking and Stowing Problems

This paper introduces a new approach to pose estimation for the picking and stowing problems. The approach uses April tags attached to an item to estimate its pose with a single image. In testing, the approach has a root mean square error of 4.5mm against a SIFT and RANSAC method on items used in the 2015 Amazon Picking Challenge. This approach could be valuable for placing items on and off warehouse shelves and for other applications.

2015 Certificate Graduates

Aditya Agarwalla, COS (presented with 2015)
Title of Project: Kisan Network (Hindi for ‘Kisan Network’)

Stakeholders in the agricultural ecosystem in India lack awareness about resources available beyond their immediate local community. As a result, farmers suffer from fair price deprivation for their crops and poor accessibility for labor and other agricultural resources like equipment and transportation. However, since the influx of inexpensive Android smartphones and 2G / 3G data services, it has become possible for people to get information at their fingertips at low costs. This paper looks at Kisan Network, an Android application in English and other Indian regional languages, that takes advantage of these developments by connecting all the stakeholders in the ecosystem to form a marketplace to buy, sell and rent agricultural produce and resources.

Gabriel Ambruso, COS
Title of Project: Finding Computer Time: Load-Balancing of Public Terminals

Ease of access to public terminals is a concern for the 77 million Americans that use them. These individuals rely on these terminals for the Internet connectivity and productivity tools they provide. Factors that hinder access to public terminals include heavy competition for their use and an inability to determine what time is best to attend a locale with such terminals.

This paper outlines a framework for load-balancing public terminals. This framework focuses on load-balancing terminals at a location by providing users with information on the expected number of available terminals at any given time and the peak usage hours on any given day. Using this information, users can align their trips with non-peak hours and lessen the amount of competition for public terminals by spreading out their visits. Once this framework is deployed at multiple locations with terminals in a single area, its data can be used to direct users to the location with the most available terminals and increase the efficiency with which these terminals are used.

Green Choi, COS
Title of Project: An Automated Approach to Ad Tracker Detection and Classification

In this paper we propose an automated system for detecting, categorizing, and verifying ad trackers on the web. We base this system on the OpenWPM platform developed by Englehardt et al., which we leverage to create an “aggressive” attempt at maximizing tracker coverage while minimizing the potential negative impact on functionality. We explored the suitability of structural “A/B” DOM tree variations in fitting supervised learning models. In doing so, we observe potential advanced tracking methods like cookie syncing in the wild and attempt to explain the limitations of relying on patterns in DOM structural data in classification. Finally, we propose next steps towards the improvement of tracker detection and classification in hopes of overcoming the observed limitations of DOM structural features in generalizing to the diverse content found across the web.

Cara de Freitas Bart, COS
Title of Project: Safety is Our Priority: The Legal Issues with Autonomous Vehicles

Vehicles are now computers on wheels as increasing amounts of software assist drivers to safely navigate the roads. Autonomous vehicles, for which humans will not have to physically drive the cars, will be ready for production in the next few years. To safeguard humans’ safety on the roads, policymakers must write the necessary legislation to ensure the safe testing, development, and integration of autonomous vehicle technology before it is released to the public.

But is the United States ready for this leap in technology? This research focuses on the development of autonomous vehicles in the United States and the legal issues that must be addressed. Through a combination of legal documents, laws, academic research papers, and interviews with industry experts, an evaluation of autonomous vehicle technology and legislation that prioritizes road safety is presented. Politicians and government officials, who usually lack a strong technical background, are the intended audience because they must address the legislative challenges of autonomous vehicles.

Stephanie Goldberg, ELE
Title of Project: A Comprehensive Survey of the Security of the Internet of Things

With an estimation of 50 billion smart devices utilized across the world by 2020, there is an imperative growing need for security across these devices. The Internet of Things (IoT) is a term referring to smart devices, or those atypical devices and household items that are connected to the Internet, which provides a global communication network. These devices range in use, size and power, but all ultimately provide a more technologically advanced and intuitive environment. These devices, composed of sensors, computing devices, controllers and actuators, take in information about their environment (ex. person, building or vehicle) and utilize their own communication network protocols to connect to the Internet, where they send data, interpret the meaning of the data and then actuate on the environment accordingly.

Unfortunately, these devices today are largely insecure and are quite vulnerable to attacks of all types. By identifying commonalities across all types of smart devices that make up the Internet of Things, this paper will provide a device framework for security that can be applied to make a secure “thing”. This paper will offer a comprehensive set of recommendations on security fixes and protocols that together will form a security backbone for IoT. Additionally, this article will explore policy concerns based around privacy and security issues exploited by these devices.

Elisse Hill, COS
Title of Project: Incentivizing IPv6 Deployment by Improving Transit Performance with the Teredo Protocol

IPv6 is the Internet addressing system that has been slated to replace the existing protocol, IPv4, since the inception of IPv6 in 1998. This replacement is necessary because the number of IPv4 addresses does not satisfy the current demand based on population and the fact that people have multiple Internet-connected devices. IPv6, on the other hand, offers 7.9*10^8 times more addresses than IPv4. Thus, IPv6 adoption is an important step in the future advancements of the Internet. The slow deployment of IPv6 is due to many reasons, but we must hasten deployment.

One solution to do this is to use the Teredo protocol, which encapsulates IPv6 packets in IPv4 packets. This method is the primary method I used in my methodology. However, it is important that adopting Teredo maintains that the system depends on IPv4, when it should use IPv6 exclusively. Therefore, there must be strong methods to encourage IPv6 adoption. One of the methods that I suggest in my paper is to use federal regulation in order to encourage the deployment of this technology and thus help our society solve some of its pending technological issues.

Judy Jansen, ENG
Title of Project: A Web of Non-Sense: Pale Fire as Precaution to Hypertext Literature

When Vannevar Bush envisioned his “memex” machine in the 1945 Atlantic Monthly article “As We May Think,” he anticipated many of the forthcoming changes for literature within the Digital Age. Bush imagined a device that would gather all of literature into a connected system akin to the associational networks of the mind. Although Bush only conjectured this concept, information technology scholar Ted Nelson began to build one of the first hypertext systems, called Project Xanadu, five years later. This ambitious endeavor never achieved its aim of compiling all of literature, but the attempt at a physical manifestation of Bush’s ideas inspired the myriad of hypertext systems to come. After Bush’s publication, many computer scientists and writers alike both conceptualized and criticized hypertext literature: readers could link any writing to any other, breaking down the traditional process of reading a linear narrative.

Vladimir Nabokov explored the idea of hypertext in his illustrious 1962 book Pale Fire. The fictional madman Charles Kinbote narrates the book’s foreword, commentary, and index, which all cite and refer back to a 999-line poem written by Kinbote’s neighbor, John Shade. The commentary surrounding the poem unravels into a convoluted story of its own. Critics have noted briefly the book’s foreshadowing of hypertext literature; Nelson even planned to use Pale Fire for his demo of Project Xanadu in 1969. However, this paper focuses on how Nabokov anticipates hypertext literature and what he believes this means for future literary agency. Through a complex cyclical and linear structure, distorted perspectives, and multivalent language, Nabokov’s Pale Fire warns readers of the danger of losing direction, authority, and clarity in an age of abundantly accessible writing. With the rise of hypertext, Nabokov reminds readers that we must slow down and close read in order to make sense of the truth embedded in webs of information.

Michael Katz, EAS
Title of Project: Bridging Zhongguancun and Silicon Valley: How the Chinese Government Is Constructing a Technology Ecosystem That Conforms to Western Standards of Innovation

China’s post-reform economic development, bolstered by rapid industrial growth, has allowed China to become to world’s largest economy. However, the threats of stagnant growth and the “middle-income trap” due to shifting labor trends have provoked action from the top levels of the state government. With the introduction of the 2006 Medium- to Long-Term Plan for the Development of Science and Technology (MLP), Party officials began to increase rhetoric surrounding an “innovative” China, implementing numerous policies to promote a vibrant innovation ecosystem. However, rather than embrace the qualities that have characterized the success China’s recent tech giants like Alibaba and Baidu, the Chinese government is seeking to conform to a more Western standard of innovation. This paper present a conception of innovation that differs from the traditional, Silicon-Valley-centric view, and critically questions the means by which the Chinese government is politically influencing the direction of Chinese technological development. By financially incentivizing patent generation, as well as selectively funding R&D-focused companies and university departments, Chinese leaders have emphasized a paradigm of “innovation” that is more recognizable for critics who might otherwise dismiss China’s past technological accomplishments. The paper uses Chinese primary sources to closely examine the common themes and discrepancies in Chinese rhetoric surrounding “innovation,” and looks to elucidate the preconceptions that we hold in assessing innovation.

Oscar Li, COS
Title of Project: RAPTor: Routing Attacks Against Privacy in Tor

Tor is an anonymity system that protects its millions of daily users from Internet surveillance. Its users include journalists, law enforcement, activists, businesses, and ordinary citizens concerned with online privacy. Nonetheless, Tor is not completely secure. If an autonomous system (AS) can observe traffic between the Tor client and guard relay and also between the exit relay and destination, the AS can correlate packet timings and sizes to deanonymize the Tor user. This renders Tor useless.

Prior research has investigated this threat but largely in the context of symmetric and static Internet paths. In reality, Internet paths are dynamic and asymmetric. Hence, we present RAPTor – a new set of attacks on Tor that leverage the dynamic and asymmetric nature of Internet paths to deanonymize even more Tor users than previously thought possible. We have built a Tor Path Simulation System that quantifies the impact of RAPTor on Tor security and a Traceroute Monitoring Framework that detects and analyzes RAPTor. On a whole, our work calls attention to the dangers of abstracting network routing in analyzing the security of anonymity systems.

Adam Suczewski, COS
Title of Project: Real-time, Multi-User Facial Detection with Applications

This is a three-part project with an emphasis on implementation and applications. The first part consists of extending the open-source CLMtrackr face detection library to support tracking of multiple users per image or video frame rather than a single user. The second part explores applications made possible by multi-user face detection, with an emphasis on facial recognition. The third part explores societal implications of new facial recognition technologies.

Raymond Zhong, COS

Title of Project: Analysis of the Bitcoin Blockchain

Bitcoin is a virtual currency maintained by a decentralized network of participants, who are able to broadcast cryptographically signed transactions in order to move balances between accounts. The full history of Bitcoin transactions is available to anyone connected to the network; this project involved implementing a set of analytical tools for efficiently indexing and querying up to the full set of transactions. A data store was developed using a key-value database and optimized to achieve significantly higher read/write performance than existing SQL-based blockchain databases. Indexing and query infrastructure were implemented, including functionality for traversing over the graph of transactions and aggregating and generating views of data. Finally, the different parts of this project were integrated in a single application that watches for and processes new blocks as they are broadcast, and serves generated statistics through a web interface.

2014 Certificate Graduates

Daniel Chyan, COS
Title of Project: Investigating Censorship through Detecting Modified Content

This paper details the process of creation of a tool to monitor and detect censorship among a
large set of URLs and its application on a popular Chinese news site. The creation of this tool stemmed from an earlier effort to identify potentially censored keywords based off of lexical relations. Development issues from the censored keyword identification system prompted a shift in strategy from a lexical approach to a crawling and monitoring approach. Results from the censorship detection tool has revealed some amount of content modification to the monitored URLs and further exploration is necessary to realize the full potential of this tool. Future application of this tool can lead to better censored keyword detectors and provide, in a timely manner, stronger insight into topics being censored.

Vladimir Costescu, COS
Title of Project: Interviewing with Glass: Investigating a Potential Application of Wearable Technology

In recent years, rapid technological advances have increasingly enabled the miniaturization of computing devices, leading to the proliferation of powerful smartphones, TV streaming dongles such as the Chromecast, and a new array of wearable computers embedded in objects such as watches and glasses. In this paper, I am studying the potential impact of Google Glass in the corporate world, specifically considering the usability of the device as an aid to human resources personnel in the process of conducting interviews with job applicants. To this end, I met with a number of employees at a software company that fulfills US government contracts and pitched the idea of a Glass app that would help streamline the interview process. In the course of discussing the potential functionality of such an app, I gained valuable feedback from key personnel inside the company, including tech leads, human resources personnel, and even the COO and CTO of the company about features they would like to see in an interview app and also about the usability of the device in general.

Owen Gaffney, POL
Title of Project: Uncharted Waters: Re-evaluating the Ethics of Extraterratorial Surveillance

In response to a recent movement – catalyzed by Edward Snowdon’s NSA leaks – in support for an international right to privacy (and corresponding international laws) this thesis does a historical review of the circumstances, causes and purposes around which the West formed its collective ethical framework in relation to the concept of “Just Intelligence.” After establishing this framework a number of changes in the world, brought around by politics and technological advances, are reviewed. The framework is then reevaluated in the context of this changed world and the evolving nature of threats to national security and is shown to fall short in several areas. Ultimately, the NSA’s continuing surveillance of foreign citizens is supported under this new framework of “Just Intelligence.”

Lucas Ho, COS
Title of Project: Meaningful Use Attestation and Hospital Acquired Infections

Research has shown that hospital acquired infections (HAIs) cost our healthcare system $10 billion a year. Furthermore, up to half of these infections can be prevented. Motivated by these facts, recent literature has suggested that increasing electronic health record (EHR) usage can significantly reduce HAIs similar to how checklists improve safety and quality control. Small-scale pilot studies have confirmed this hypothesis, but are these isolated incidents or do they point towards a larger trend? This project seeks to analyze open government data, courtesy of Data.gov, on national EHR adoption (represented in this project as meaningful use attestation) and HAI rates. I will use a JavaScript data visualization library to create a state-by-state visualization of the current relationship between the two factors in order to seek an answer to the question posed above.

Anna Kornfeld Simpson
Title of Project: History Independent File System on an Insecure Flash Device

Keeping data on a hard drive safe is of critical importance for consumers and advances in file system and computer security have struggled to keep pace with powerful adversarial capabilities. Solid state drives (SSDs) provide new challenges for disk security because of their wear levelling properties: the disk controller maps between physical and virtual memory blocks in order to keep the disk from being worn out too quickly, which means that the operating system cannot guarantee that a particular block is erased or overwritten on the disk. This thesis presents a method for securing file-system history from an adversary with forensic access to such a disk by extending previous work on secure deletion on SSDs.

As well as addressing the technical problems of encryption and systems-building, the design of this project and other security technologies must consider the adversarial scenarios where this technology may be used in order to ensure that the design captures the correct metaphors for secure use. Who are the potential users of the technology? What capabilities will their adversaries have? How will existing policy regimes and social norms affect the adoption of the technology? This talk will describe the technical insights of my thesis project and then focus on the choice of threat model and the impact of the above considerations on the design.

Sing Sing Ma, REL
Title of Project: 140 Character Limits: A Study on Change, Responses to Pope Francis, and the Impact of Digital Media

When the Vatican adopted Twitter as a communication method, the conflict between technology and tradition converged onto one social media account. Scholars predicted a decline of religious belief when the Internet allowed everyone a voice, undermining the authority of a pulpit. This paper investigates the question of change and the papacy, using the lenses of influence on media, religious participation, and authority. The primary focus is on the favorites, re-tweets, and mentions of Pope Francis and his tweets.

Carmina Mancenon, ORFE
Title of Project: The Startup Spring: Leveraging Public Policy to Increase Capital Pools for Technology Startups in Turkey and Jordan

Money is an indispensable component of bringing a vision to life in the entrepreneurship space. Indeed, 90% of startups fail primarily due to a lack of sufficient funding, according to the United States Small Business Administration. To this end, governments have the potential to influence the capital pool available to startups through financial policies such as tax incentives and grants. This paper proposes a framework for governments to understand the health of their country from an entrepreneurship perspective, specifically in the technology sector, and enact tailored policies to create an ecosystem conducive to innovation and creation substantiated by comparatively increased financial means. We apply this model to technology startups in Turkey and Jordan.

The methodology used to create this model involves regression and applied time series analyses to deduce the funding crunch area and financial policy priorities. This data is collected from publicly available investment tables on Crunchbase, press releases, and news articles, as well as results from surveys conducted by the Global Entrepreneurship Monitor. These are supplemented by qualitative data based on 30+ interviews conducted with both investors and entrepreneurs in Turkey and Jordan through collaboration with Endeavor Global. Ultimately, we present a systematic, ‘plug-and-chug’ framework for governments to customize in order to begin taking action.

Dillon Reisman, COS
Title of Project: Cookie Crumbs and Unwelcome Javascript: Evaluating the hidden privacy threats posed by the “mashed-up” web

Many modern websites are built on a “mash-up” of numerous web technologies and libraries. This combined with the ubiquity of third-party web tracking can open up a user to an increasingly large array of threats to her privacy from many angles. Our paper is a comprehensive evaluation of how the structure of the web can enable new forms of privacy violation and measures these new threats’ severity.

In this paper, we first define a novel form of passive network surveillance we term “cookie linking.” Through this method an eavesdropper observing a user’s HTTP tracking cookies on a network can transitively link shared unique cookies to reconstruct that user’s web browsing history, even if IP varies across time. Using simulated browsing profiles we find that for a typical user over 90% of web sites with embedded trackers are located in the large component of visited sites created through cookie linking. The privacy implications of cookie linking are made more acute by the prevalence of identity leakage. In a survey of top web sites we find that over half of those sites leak the identity of logged-in users to an eavesdropper in unencrypted traffic. The eavesdropper thus both identifies a user and uncovers a majority of her web history through passive means.

Second, we evaluate how the third-party Javascript-handling practices of popular sites further exposes users to potential privacy violations. We employ a man-in-the-middle attack to model what information malicious Javascript put in the place of approved third-party Javascript can exfiltrate to a malicious server. We find that third-party Javascript is very often permitted to execute in unsupervised environments, where it is free to collect everything from user cookies to keystrokes. Compromised third-party Javascript presents a significant privacy threat against users that many sites help enable.

We ultimately conclude that the most effective method of preventing the above privacy violations is through blocking third-parties on websites, often done via a browser plug-in. These may limit a site’s functionality, however, leaving users without a satisfactory option to protect themselves.

Rosemary Wang, ELE
Title of project: A Study of Mobile Video Power Consumption over HetNets

Given that user consumption of data over mobile technologies and the number of applications requiring higher data rates are increasing, the next generation of mobile technology needs to handle demand for more reliable, higher quality data. In particular, the amount of traffic from video is a growing concern for wired and wireless traffic management. One solution to this problem to distribute the traffic without compromising user experience would be to use heterogeneous networks (HetNets) to switch between technologies or utilize them simultaneously to improve the reliability, quality, and throughput of data. These multiple radio access technologies (multi-RATs) can be used to improve Quality of Experience (QoE) with video at the cost of increased power consumption for the user’s mobile device. This study analyzed video traffic at the packet-level and its impact on device power consumption, determined differences between mobile technologies and wired technologies in both power consumption and packet interactions, and determined the factors that indicate the need to switch to a different technology. Furthermore, these findings apply to the existing policy surrounding net neutrality and the importance of reasonable network management. The usage of multi-RAT implementations raise questions regarding an individual network’s ability to handle video traffic, the increased convergence in technology today, and the differing net neutrality standards for wired and wireless technologies. The conclusions regarding packet-level interactions for video, one of the most bandwidth-heavy applications today, provide a framework for evaluating network neutrality in order to maintain user QoE.

Harvest Zhang, COS
Title of project: Efficient Packet Traceback in Software-Defined Networks

This paper presents an efficient method for performing packet traceback in software-defined networks. While previous work explores tracing packets forward from their point of entry, the problem of packet traceback is to determine, given a packet that has arrived at a switch in the network, all possible paths it could have taken to get there from its point of ingress. Packet traceback is useful for tracing attacks, network debugging, monitoring performance, and so on; multiple autonomous systems may also collaborate to enable packet tracebacks across domains. Given a network policy consisting of functions that define how packets are handled at each switch, we compute a traceback policy that we use to reconstruct the flagged packet’s possible paths through the network. This traceback is performed entirely by the controller without incurring any overhead on the data plane, and no additional flow rules need to be installed at the switch level.

2013 Certificate Graduates

Raymond Auduong, ARC
Title of project: ALMOST HUMAN: Robots in Architecture and the Narrative of Control

In the 21st century, robots are increasingly capable and common in everyday life. As robotic technologies continue to develop, humans like to believe that they are in complete control of technology, but to what extent might robotic technologies exert an influence of their own?

The thesis seeks to explore how humans, robots, and architecture are influencing each other today. The approach for this thesis exploits the natural analogy between humans and robots: Essentially, both sense, “think,” and act, but the mechanisms used are very different. The technological, spatial, and visual consequences of these differences are considered as important indicators of how these three subjects interact today.

The scope of the project encompasses two radically different environments: industrial and domestic. Through case studies of non-humanoid and humanoid robots (Kiva Systems, Baxter, Roomba, and ASIMO), it is shown that human-robot-architecture interactions are very context specific. In industrial case studies, robots have a strong influence over architectural design and the role of the human worker; but in the domestic setting, robot designs are adapted to existing patterns of residential architecture and human behaviors. The interchange between robots, humans, and architecture is multidirectional and multimodal.

Daniel Feinberg, WWS
Title of project: International Regimes of the Internet and Aviation: Structure, Preferences, and Technology

The Internet Corporation for Assigned Names and Numbers (ICANN) has, since its inception, provided scholars with a compelling puzzle: how did a private corporation come into a position of authority over the Internet and what keeps it in control? To address these key questions about ICANN, this thesis seeks to create a cohesive model of technological regimes in order to understand ICANN’s current position as well as its prospects for change. To build such a model, this thesis looks at the case of international aviation in the post-World War II era, studying both the similarities and differences between the two cases. By combining these cases, a model of technological change in complex interdependence can be constructed, providing a theoretical framework that can be utilized to assess ICANN.

Michael Franklin, COS
Title of project: A Statistical Approach to the Detection of Behavioral Tracking on the Web

Online Behavioral Targeting is a controversial practice for which rigorous detection and analysis is challenging. The capacity to make strong claims about Behavioral Targeting in “the wild” would be valuable for policy makers. In this paper we present a conception of browser-server interactions and a novel statistical approach to detecting Behavioral Targeting that leverages this formulation. This approach allows us to make precise claims about Behavioral Targeting and achieve valuable automation of analysis.

Marianne Jullian, COS
Title of project: Visualizing Expression: A Visual Analysis of Literary Works and Nonliteral Copying in the Context of Copyright Infringement

In the domain of copyright law that deals with fictional works, issues of nonliteral copying have been quite contentious. The focus has been on how to protect the public domain against monopolies of ideas that serve as fodder for creative writings, while also providing adequate protection for authors’ expressions of ideas in order to incentivize future work. Several judges have developed tests that can be applied to fictional works, however they are rather abstract and rely on the discretion of those involved in individual court cases.

With this in mind, I sought out to develop an automated method that seeks to identify unique expressions of ideas in literary works. Drawing from discussions of nonliteral copying in the context of copyright infringement, expressions are hereafter defined as patterns composed of the following literary components: writing style, character development, plot themes, parallelism of incidents, and relationships between characters. The method I propose as a tool for detecting nonliteral copying is a data visualization. This method relies on computational linguistics and also on the power of data visualization to uncover otherwise obscured patterns of expression through the use of color, layers, and small multiples.

The efficacy of the linguistic analysis and data visualization is judged by its ability to accurately identify important characters, concepts, and plot developments on works in isolation. Additionally, the efficacy of the data visualization as a tool for identifying nonliteral copying is analyzed using works written by the same author and the comparison of its application to a work and its parody.

Emma Lawless, ANT
Title of project: Trusting Paper, Trusting People: The Role of Documentation for Trustworthy Conditions in Spacecraft Work

My project developed out of six weeks of qualitative fieldwork at two space science laboratories in Boulder, CO. It explores the crucial roles that regimes of documentation played in creating trustworthy working conditions for team members on several NASA missions working out of these labs. In working with technological tools from simple spreadsheet programs to more customized spacecraft visualization tools, my interlocutors employed a variety of low-tech, paper documentation practices which were instrumental in allowing the team members to achieve confidence in their working conditions and the products they were generating. Essentially, far from being empty bureaucratic requirements, paper documents functioned to infuse reliability into the work processes of my interlocutors, contributing to a sense of “trust-in-familiar-form” which characterized the work I observed.

Shreya Murthy, POL
Title of project: A Theory of Privacy

This paper presents a theoretical account of the right to privacy. It discusses the problems that are typically encountered when one attempts to define or defend privacy and explains the need for a conceptually distinct and clearly articulated concept of privacy. It then examines in detail the perspectives on privacy that have been offered by philosophers and legal scholars thus far and then presents a new conception of privacy. Informed by a thorough understanding of the problems of privacy and the shortcomings of the major perspectives, the theory of privacy presented in this paper provides a valuable grounding for both legal and technological approaches to privacy protection.

Eleanor (Nora) Taranto, HOS
Title of project: Too Fast, Too Soon? The Privacy Implications of Electronic-Medical-Record System Adoption

The privacy rights of medical patients are expansive, especially in the United States since the passage of HIPAA in 1996. Since then, medical institutions have also begun to implement electronic medical record (EMR) and electronic health record (EHR) systems at a fast rate. These systems provide some practical benefits for the medical community, but also raise serious privacy concerns—worries in particular about how well such systems protect against confidentiality breaches. The vast number of privacy breaches in these new EMR systems, even with protective mechanisms in place, leads me to make four recommendations that may be useful in preventing more data breaches: 1) strengthening of access control; 2) encryption of stored data as well as data in transit; 3) better use of data logs through the development of anomaly-detection algorithms; and 4) caution on the part of medical institutions and policymakers in adopting only those EMR/EHR systems with adequate protective mechanisms.

2012 Certificate Graduates

Jasika Bawa, ELE
Title of project: TUBE – Time-dependent Usage-based Broadband price Engineering

TUBE (Time-dependent Usage-based Broadband price Engineering) is a system that aims to bridge the digital divide by computing and delivering pricing incentives for wireless usage. It is anticipated that this, in turn, will enable wireless providers to make wireless data available to a wider audience.

The notion behind being able to deliver pricing incentives is that charging users different prices for Internet access at different times of the day will incentivize them to spread their demand for bandwidth across various different times of the day. This is also a viable way of maximizing the use of capacity of a wireless spectrum. With the high rate of penetration by smartphones, tablets and other Internet-capable mobile devices, wireless Internet usage has been increasing at an extremely fast pace, with more users consuming larger amounts of data. However, ordinarily, heavy usage is concentrated during a few peak hours of the day which forces ISPs to overprovision in order to handle such concentrated heavy usage. Thus, pricing by timing is advantageous not only for end users (particularly those affected by the digital divide) but also for wireless providers. Finally, although congestion pricing has been implemented, ISPs are increasingly finding that the traditional models are insufficient to meet the challenge of growing demand for bandwidth.

In the fall semester, I helped design and develop an Android application to enable users to control their budget for mobile broadband in an informed manner. This involved providing rich information regarding overall data use, app-specific data use, budget expenditure per day and the like, providing notifications regarding good and bad times to launch data-hungry applications (such as YouTube) and providing the user with a way to schedule applications.

This semester I am working on data analysis to help provide the TUBE team with information regarding user preferences. From a set of surveys filled out by Princeton students, I have had the chance to work on quantifying delay sensitivity to Internet applications. From a second data set of survey participants from India, I will have the opportunity to further quantify socio-economic demographics’ price and delay sensitivity to the same.

Andrew Bristow
Title of project: Cruelty in the Digital Age – Adolescents and Online Bullying

In the everyday social interactions of adolescents, a number of cruel behaviors associated with bullying have expanded online, sometimes shifting in the process. Existing research shows that the nature of online space allows bullying to be even more damaging than its offline counterpart. Online bullying can have many, if not more, of the same negative consequences of the offline variant.

The current study provides a framework to study online bullying. In particular, this study presents a way to gather information on adolescents’ perspective on this phenomenon and to identify the components of their support network. This study seeks to understand parental involvement in online space and to contribute to a body of literature that claims online and offline spaces have become intertwined in such a way that distinctions between the “real” and “virtual” world are no longer appropriate. I apply this framework to newly collected data from middle school students in the greater Mercer County area. Results of this implementation are discussed at length herein, along with implications for parents, school personnel, and policymakers.

Rebecca Lee, WWS
Title of project: Contested Control: European Data Privacy Regulations and the Assertion of Jurisdiction over American Businesses

In the European Union, a comprehensive data privacy law called the Data Protection Directive governs the collection, use, storage, and dissemination of European personal data. Any data controller – regardless of its geographical location – that accesses and collects European personal data must comply with Directive. However, the Directive was adopted in 1995 and has since become out of date. On January 25, 2012, the European Commission published its proposal for a new comprehensive data privacy law, the Data Protection Regulation.

This thesis examines the Data Protection Regulation and its potential effects on American businesses, consumers, and society. Specifically, I analyze the mechanisms through which European policymakers attempt to secure the compliance of American businesses and the substantive requirements for compliance. I illustrate how data privacy provisions such as the explicit consent requirements and the right to be forgotten conflict with American business practices, political values, and legal principles. I conclude by suggesting that American policymakers may want to take a more active role in influencing the final shape of the Data Protection Regulation.

Jay Parikh, WWS
Title of project: Evading Government Censorship: the Labor Movement’s Use of the Internet

In China, rapid Internet growth had given hope to a renewed civil society movement focused on improving human rights, labor conditions, environmental concerns, and addressing a number of other issues. This hope, however, was tempered with the reality of comprehensive government censorship of information technology.

This paper seeks to clarify the aggregate effect of Internet censorship on the development of domestic civil society institutions in China by focusing on the labor movement and workers’ rights issues. The labor movement serves as an effective vehicle to examine the broader civic sector for two reasons. First, the government is particularly concerned with the effect of organized labor on political reform; therefore, censorship of these movements is pervasive. Second, the labor movement has been adept at harnessing technology since it is the only way they can effectively compete with widespread communication networks possessed by the state and marketplace.

This paper is organized into five parts: first, I present the theoretical argument underlying the power of the Internet in shaping civil society and the Internet’s rise in China. I then examine how the labor movement has used different aspects of information technology to advance its interests and goals. The next section evaluates how the Chinese state uses technical restrictions to monitor and censor CSOs. Once this is established, I analyze the benefits in eliminating these restrictions on both Chinese CSOs and US companies. The paper closes with specific policy recommendations for the Congressional-Executive Commission on China on how the government can partner with technology companies to help labor CSOs.

2011 Certificate Graduates

Jennifer King, COS
Title of project: Software Support for Software-Independent Auditing

(published as Software Support for Software-Independent Auditing — Short Paper. Gabrielle A. Gianelli, Jennifer D. King, Edward W. Felten, and William P. Zeller. EVT/WOTE’09, Proceedings of the 2009 Conference on Electronic Voting Technology / Workshop on Trustworthy Elections)

Thomas Lowenthal, POL
Title of project: BitTorrent Research

Copyrighted material is often shared without the permission of the copyright holder. Peer-to-peer (P2P) systems — including BitTorrent — are a common vector for such sharing. Some copyright holders wish to detect such unauthorized sharing when it occurs, and to discourage it. Several companies offer services designed to detect this sort of unauthorized distribution. These companies typically use proprietary detection techniques, and often boast about the reliability of their particular methods. However, previous research has indicated that these services may not be as reliable as claimed.

We performed a study to investigate the accuracy rates — specifically: to establish an estimated lower bound on the false-positive rates — of various techniques for identifying those who share copyrighted material via BitTorrent without the authorization of the copyright holder. We implemented a selection of detection and verification techniques, ran them against the live BitTorrent ecosystem, and compared the suspect lists they produced against a reliable control technique. This allowed us to estimate the rate at which each of these techniques turns up false positives.

TS Certificate Director

Margaret Martonosi

Information Technology Track Director

Ed Felten

Executive Committee

Andrew Appel, Computer Science
Elizabeth M. Armstrong, Sociology, Woodrow Wilson School
Angela Creager, History
Nick Feamster, Computer Science
Edward W. Felten, Computer Science, Woodrow Wilson School
Michael Gordin, History
Andrea LaPaugh, Computer Science
Sharad Malik, Electrical Engineering
Margaret Martonosi, Computer Science
Arvind Narayanan, Computer Science
Matthew Salganik, Sociology

Program Manager

Laura Cummings-Abdo