Big Board

Content Ideas
Result Content Idea Research
Result Content Idea Research
1 Student projects use computing to ensure technology serves society
2 How 'dark patterns' influence travel bookings
3 Tricks Online Retailers Use to Get You to Spend More
4 The Subtle Tricks Shopping Sites Use to Make You Spend More
5 The dirty tricks of online shopping, designed to make you spend more
6 Buyer beware: Deceptive tactics digital retailers use on online shoppers
7 Dark Patterns: the art of online deception – Science Weekly podcast
8 Dark patterns: Research reveals the dirty tricks of online shopping
9 Study scrutinizes hidden marketing relationships on social media
10 Is affiliate marketing disclosed to consumers on social media?
11 'Dark patterns' trick you into spending more online
12 How E-Commerce Sites Manipulate You Into Buying Things You May Not Want
13 Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices
14 These are the deceptive design tricks and dark patterns that steer your clicks each day
15 Finding dark patterns online: Chips with Everything podcast
16 Experts discuss Dark Patterns and deceptive UI designs: What are they? What do they do? How do we stop them?
17 When Terms of Service limit disclosure of affiliate marketing
18 Is This An Ad? Help Us Identify Misleading Content On YouTube
19 Most affiliate posts on YouTube and Pinterest don’t have any disclosure
20 Improving Protections for Children's Privacy Online
21 YouTube and Pinterest Influencers Almost Never Disclose Marketing Relationships
22 How Facebook and Google nudge users to make anti-privacy choices
23 Princeton study finds very few affiliate marketers make required disclosures on YouTube and Pinterest
24 Study: Most YouTube influencers still don't disclose sponsored deals
25 Internet of Things in Context: Discovering Privacy Norms with Scalable Surveys
26 YouTube Influencers Rarely Disclose Marketing Relationships: Study
27 Here's Why YouTube Influencers Rarely Disclose Their Marketing Relationships
28 This Chrome Extension Calls Out Sponsored YouTube Videos
29 Announcing the Princeton-Leuven Longitudinal Corpus of Privacy Policies
30 Fair Elections During a Crisis
31 GPT-3 Raises Complex Questions for Philosophy and Policy
32 Democracy Live internet voting: unsurprisingly insecure, and surprisingly insecure
33 'Deliberate Targeting of Young Women': 550 Activists, Groups Condemn Pinjra Tod Members' Arrests
34 Deconstructing Google's excuses on tracking protection
35 The Trust Architecture of Blockchain: Kevin Werbach at CITP
36 Blockchain: What is it good for?
37 Thoughts on California's Proposed Connected Device Privacy Bill (SB-327)
38 Florida is the Florida of ballot-design mistakes
39 Disaster Information Flows: A Privacy Disaster?
40 Breaking your bubble
41 Getting serious about research ethics: AI and machine learning
42 Securing the Vote — National Academies report
43 Four cents to deanonymize: Companies reverse hashed email addresses
44 Bitcoin course available on Coursera; textbook is now official
45 No boundaries for credentials: New password leaks to Mixpanel and Session Replay Companies
46 Blockchains and voting
47 The Princeton Bitcoin textbook is now freely available
48 The future of ad blocking
49 Smart Contracts: Neither Smart nor Contracts?
50 What does it mean to ask for an “explainable” algorithm?
51 Software-Defined Networking: What's New, and What's New For Tech Policy?
52 Artificial Intelligence and the Future of Online Content Moderation
53 Fast Web-based Attacks to Discover and Control IoT Devices
54 Concerned about Internet of Things security?
55 “Private blockchain” is just a confusing name for a shared database
56 My testimony before the House Subcommittee on IT
57 NYC to Collect GPS Data on Car Service Passengers—Good Intentions Gone Awry or Something Else?
58 Announcing IoT Inspector: Studying Smart Home IoT Device Behavior
59 A response to the National Association of Secretaries of State
60 Mitigating the Increasing Risks of an Insecure Internet of Things
61 Brexit Exposes Old and Deepening Data Divide between EU and UK
62 Can Facebook really make ads unblockable?
63 Security against Election Hacking – Part 1: Software Independence
64 Who Will Secure the Internet of Things?
65 Pokémon Go and The Law: Privacy, Intellectual Property, and Other Legal Concerns
66 Gone In Six Characters: Short URLs Considered Harmful for Cloud Services
67 Election security as a national security issue
68 Apple, FBI, and Software Transparency
69 When coding style survives compilation: De-anonymizing programmers from executable binaries
70 Apple, the FBI, and the San Bernadino iPhone
71 Bitcoin faces a crossroads, needs an effective decision-making process
72 Decertifying the worst voting machine in the US
73 No boundaries for Facebook data: third-party trackers abuse Facebook Login
74 An analogy to understand the FBI's request of Apple
75 How is NSA breaking so much crypto?
76 Uttar Pradesh Assembly Elections 2017: Full list of candidates who contested for phase 1
77 Gurgaon Class X student adopts a government school