Computing Community Consortium Blog

The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.


Posts Tagged ‘Privacy by Design

 

NSF WATCH Talk- Crypto Wars: Plus ça Change, Plus c’est la Même Chose

April 18th, 2016 / in Announcements, NSF, Research News / by Helen Wright

The next WATCH talk, called Crypto Wars: Plus ça Change, Plus c’est la Même Chose is Thursday, April 21, 2016 from Noon-1pm EDT. The presenter will be Susan Landau, professor of Cybersecurity Policy in the Department of Social Science and Policy Studies at Worcester Polytechnic Institute. Landau works at the intersection of cybersecurity, national security, law, and policy. During the Crypto Wars of the 1990s, her insights on how government encryption policy skewed civil society and business needs for security helped win the argument for a relaxation of cryptographic export controls. Beginning in the early 2000s, Landau was an early voice in the argument that law-enforcement requirements for embedding surveillance within […]

Privacy by Design Workshop: Concepts and Connections

February 17th, 2015 / in CCC, workshop reports / by Helen Wright

The following guest blog post is contributed by Ph.D. students Nick Doty and Richmond Wong working with Deirdre Mulligan from the University of California Berkeley School of Information.  For years, lawmakers, advocates and engineers have touted the potential benefits of Privacy by Design, of integrating privacy throughout the technical design process rather than an after-the-fact. Nonetheless, we still struggle with how to practice Privacy by Design, whether it’s how to conceptualize privacy, how to build privacy in the engineering process, how to present those privacy designs to users or how to incentivize practice of and compliance with Privacy by Design. In order to identify a shared research vision to support these different facets of the practice of Privacy by […]