Big Board

Content Ideas
Result Content Idea Research
Result Content Idea Research
1 The dirty tricks of online shopping, designed to make you spend more
2 How should we tackle tech addiction?
3 Tread carefully, Robinhood day trading resembles casino gambling – Wall Street Journal
4 Does Robinhood Make It Too Easy to Trade? From Free Stocks to Confetti
5 Tricks Online Retailers Use to Get You to Spend More
6 When The Choice Is To Delete Facebook Or Buy A Loaf Of Bread
7 What will the next decade bring in science?
8 Is This An Ad? Help Us Identify Misleading Content On YouTube
9 'Dark patterns' trick you into spending more online
10 Buyer beware: Deceptive tactics digital retailers use on online shoppers
11 Buyer beware! These are the tricks online stores use to get you buying more stuff
12 Princeton Zoning Board nixes proposed duplex
13 Dark patterns: Research reveals the dirty tricks of online shopping
14 Why Is My Internet Slow?
15 How hackers could use Wi-Fi to track you inside your home
16 Buyer beware! These are the tricks online stores use to get you to buy more stuff
17 Improving Protections for Children's Privacy Online
18 Demystifying The Dark Web: Peeling Back the Layers of Tor's Onion Services
19 Most affiliate posts on YouTube and Pinterest don’t have any disclosure
20 User Perceptions of Smart Home Internet of Things (IoT) Privacy
21 Princeton study finds very few affiliate marketers make required disclosures on YouTube and Pinterest
22 YouTube and Pinterest Influencers Almost Never Disclose Marketing Relationships
23 Study scrutinizes hidden marketing relationships on social media
24 How the Contextual Integrity Framework Helps Explain Children's Understanding of Privacy and Security Online
25 When Terms of Service limit disclosure of affiliate marketing
26 Is affiliate marketing disclosed to consumers on social media?
27 How to constructively review a research paper
28 1 Year After Equifax Data Breach, Not Enough Has Changed | 90.1 FM WABE
29 User Experience Office helps campus technology fulfill its promise
30 Thanks to AI, These Cameras Will Know What They’re Seeing
31 This Chrome Extension Calls Out Sponsored YouTube Videos
32 GPT-3 Raises Complex Questions for Philosophy and Policy
33 Emergency Motion to Stop Internet Voting in NJ
34 Fair Elections During a Crisis
35 Democracy Live internet voting: unsurprisingly insecure, and surprisingly insecure
36 Parents, need to throttle Timmy's Xbox while you work from home?
37 Every move you make, I'll be watching you: Privacy implications of the Apple U1 chip and ultra-wideband
38 Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices
39 Deconstructing Google's excuses on tracking protection
40 The Trust Architecture of Blockchain: Kevin Werbach at CITP
41 Blockchain: What is it good for?
42 Thoughts on California's Proposed Connected Device Privacy Bill (SB-327)
43 Disaster Information Flows: A Privacy Disaster?
44 Florida is the Florida of ballot-design mistakes
45 Getting serious about research ethics: AI and machine learning
46 Securing the Vote — National Academies report
47 Breaking your bubble
48 Blockchains and voting
49 Four cents to deanonymize: Companies reverse hashed email addresses
50 Fast Web-based Attacks to Discover and Control IoT Devices
51 Concerned about Internet of Things security?
52 No boundaries for credentials: New password leaks to Mixpanel and Session Replay Companies
53 Bitcoin course available on Coursera; textbook is now official
54 Smart Contracts: Neither Smart nor Contracts?
55 The Princeton Bitcoin textbook is now freely available
56 My testimony before the House Subcommittee on IT
57 Artificial Intelligence and the Future of Online Content Moderation
58 Announcing IoT Inspector: Studying Smart Home IoT Device Behavior
59 NYC to Collect GPS Data on Car Service Passengers—Good Intentions Gone Awry or Something Else?
60 Ethics Education in Data Science
61 The future of ad blocking
62 What does it mean to ask for an “explainable” algorithm?
63 Mitigating the Increasing Risks of an Insecure Internet of Things
64 Oblivious DNS: Plugging the Internet's Biggest Privacy Hole
65 Brexit Exposes Old and Deepening Data Divide between EU and UK
66 A response to the National Association of Secretaries of State
67 Ethics Education in Data Science: Classroom Topics and Assignments
68 “Private blockchain” is just a confusing name for a shared database
69 Who Will Secure the Internet of Things?
70 Security against Election Hacking – Part 1: Software Independence
71 Can Facebook really make ads unblockable?
72 Pokémon Go and The Law: Privacy, Intellectual Property, and Other Legal Concerns
73 Apple, FBI, and Software Transparency
74 Gone In Six Characters: Short URLs Considered Harmful for Cloud Services
75 Election security as a national security issue
76 No boundaries for Facebook data: third-party trackers abuse Facebook Login
77 When coding style survives compilation: De-anonymizing programmers from executable binaries
78 Bitcoin faces a crossroads, needs an effective decision-making process
79 An analogy to understand the FBI's request of Apple
80 Decertifying the worst voting machine in the US
81 How is NSA breaking so much crypto?