Privacy is an increasingly significant concern in our modern, connected society. We all share personal information on a daily basis with a wide range of organizations. Although at times such sharing can be intentional and beneficial for the user, other times information is shared against the user’s will, used for purposes that the user did not expect, revealed to entities other than those approved by the user, or used to infer additional information that the user did not intend to reveal.
In this course, students will learn to reason about what information is revealed through the use of computer systems. They will study several different scenarios in which information sharing is either unavoidable or (to some extent) desirable, and discuss the balance between the benefits and costs of sharing. Finally, students will learn about several privacy enhancing technologies (PETs), and how these can be put to use by software developers to defend the privacy of their users.
We will use Top Hat for lecture participation. Please see Lectures for instructions.
If you are sick, we appreciate you isolating to prevent spreading illness. Contact your instructor as soon as possible (and at least one hour in advance) to discuss accommodations. Note that this does not extend to elective travel or other personal conflicts.
If you are sick, please stay home.
The instructor will periodically post updates to the course website and Canvas page. It is each student’s responsibility to regularly monitor these updates.
The instructor and TA will periodically email enrolled students with announcements. Students must check their Pitt email at least once per day to ensure these announcements are received.
When contacting the course staff via email, messages must be addressed to (or CC) both the instructor and the TA. Email subject should be prefaced with “[1657]”.
Unless otherwise specified by your instructor, all submissions must be the sole work of each individual student. Students may not read or copy another student’s solutions or share their own solutions with other students. Students may not review solutions from students who have taken the course in previous years. Submissions that are substantively similar will be considered cheating by all students involved, and as such, students must be mindful not to post their work publicly. If an assignment explicitly permits the use of external resources, any such resources must be credited in submissions, and material may not be copied verbatim. Any use of electronics or other resources during a quiz or examination will be considered cheating.
Unless otherwise noted, external resources can be used to improve proficiency with general concepts but should not be used to search for solutions to assigned deliverables. For the purpose of this course, material created using “generative AI” or any other automation tool will be treated as an external resource, i.e., not the work of the student using the tool. As an example, students may not submit code generated by ChatGPT or Copilot for an assignment in which external code is not permitted, and these resources must be cited clearly if used for assignments in which external code is permitted.
If you have any doubts about whether a particular action may be construed as cheating, ask the instructor for clarification before taking such action. The instructor will make the final determination of what is considered cheating.
Cheating in this course will result in a report to the appropriate school and/or university authority. The instructor will impose a grade of F for the course, and additional sanctions may be imposed by school or university authorities.
Please read, understand, and abide by the Academic Integrity Policy for the School of Computing and Information.
Students are expected to attend all lectures, which frequently include material that is not directly taken from the text. If a student misses a lecture, they are still responsible for the material covered and are advised to acquire notes from a classmate.
This course may include open discussion or other interactions among students. To allow all participants to express their viewpoints, all discussion must remain civilized and respectful, and participants must avoid comments and behaviors that disparage others. A student who feels their viewpoints are not being respected is encouraged to contact the instructor, who will work to correct the situation without revealing the student’s specific concerns to the rest of the class. A student in this situation who does not feel comfortable contacting the instructor directly is encouraged to contact the TA, who will uphold the same degree of confidence in relaying the issue to the instructor.
The University of Pittsburgh does not tolerate any form of discrimination, harassment, or retaliation based on disability, race, color, religion, national origin, ancestry, genetic information, marital status, familial status, sex, age, sexual orientation, veteran status or gender identity or other factors as stated in the University’s Title IX policy. The University is committed to taking prompt action to end a hostile environment that interferes with the University’s mission. For more information about policies, procedures, and practices, see here.
I ask that everyone in the class strive to help ensure that their classmates can learn in a supportive and respectful environment. If you witness any instances of the aforementioned issues, please contact the Title IX Coordinator by calling 412-648-7860, emailing titleixcoordinator@pitt.edu, or filing a report online. You may also choose to report this to a faculty/staff member; they are required to communicate this to the University’s Office of Diversity and Inclusion. If you wish to maintain complete confidentiality, you may also contact the University Counseling Center at 412-648-7930.
To ensure the free and open discussion of ideas, students may not record lectures, discussion or other course activities without the advance written permission of the instructor. Any recording properly approved in advance can be used solely for the student’s own personal use.
All course material is subject to copyright, including notes, slides, assignments, exams, and solutions. Students are allowed to use the provided material only for personal use, and may not share the material with others, including posting the material on the Web or other file sharing venues.
We believe that students should be able to distinguish between helping one another understand the core concepts of the course material and cheating. We encourage students to discuss the content of the course in ways that will improve understanding without violating academic integrity, such as clarifying the objective of an assignment or discussing general solution tactics. Under no circumstances should students view one another’s partial or complete solutions nor share specific details of their solutions.
All assignments specify a precise due date and time. Late assignments will not be accepted. Students must ensure they understand each assignment’s submission procedure in advance of its deadline to ensure that submission difficulties do not cause an assignment to be rejected.
All graded materials that a student receives should be saved until after the term has ended and the student receives and accepts their final grade. In this way, any grade discrepancies can be easily resolved.
An evaluation grade can be appealed up to two weeks after it has been returned. After this point, no appeals will be considered. The goal of a grade appeal is to ensure a fair and consistent score. Thus, a score will not be adjusted on an issue of partial credit if the awarded points are consistent with the grading policy adopted for the class as a whole.
When appealing a grade, first contact the grader. For grades returned on electronic platforms that have a “regrade request” feature, follow its instructions; otherwise, contact the grader directly using email (CC’ing the instructor) or office hours. If the grader does not find any mistakes made in the assigned grade, and is unable to clarify adequately the reasons for any assessed penalties, directly contact the instructor describing why you feel the assignment was graded unfairly. The entire assignment may be re-graded by the instructor, so the score may increase, remain the same, or even decrease.
Students must be present for all exams and quizzes. Make-up exams will be given only in the event of a documented medical or family emergency, in which case the instructor must be informed of the emergency in advance of the missed exam. Missing an exam or quiz under any other circumstances will result in a score of 0.
If you have a disability for which you are or may be requesting an accommodation, you are encouraged to contact both your instructor and Disability Resources and Services, 140 William Pitt Union, 412-648-7890, drsrecep@pitt.edu, as early as possible in the term. Disability Resources and Services will verify your disability and recommend reasonable accommodations for this course.
In order to accommodate the observance of religious holidays, students should inform the instructor (by email, within the first two weeks of the term) of any such days which conflict with scheduled class activities.
Top Hat is our primary platform for in-class participation questions. It can be accessed via Canvas or via the Top Hat mobile app. Students will be added to the Top Hat section prior to Week 2.
Opportunities will be given later in the semester to make up missed participation questions.
If you are sick, we appreciate you isolating to prevent spreading illness. Contact me as soon as possible (and at least one hour in advance) to discuss accommodations such as remote participation. Note that this does not extend to elective travel or other personal conflicts.
Students are responsible for reading assigned materials as additional context for the lectures. Note that, for some readings, only a subset of the material (certain pages or sections) is assigned. Readings are provided below.
This schedule is subject to change.
Topics | Readings |
---|---|
Course intro |
Slides [AGG01] |
Value of privacy |
[M13], [S08], [S06], [C12], [B13] |
[AGG01] Anish Athalye, Jon Gjengset, and Jose Javier Gonzalez Ortiz, Version Control, The Missing Semester of Your CS Education, Jan 2020.
[B13] Katy Glenn Bass, Chilling Effects: NSA Surveillance Drives US Writers to Self-Censor, PEN American Center, Nov 2013.
[C12] Julie E. Cohen, What Privacy in For, Harvard Law Review, Sections I–III, Nov 2012.
[M13] Moxie Marlinspike, We Should All Have Something To Hide, Jun 2013.
[S06] Bruce Schneier, The Value of Privacy, Schneier on Security, May 2006.
[S08] Daniel J. Solove, “I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy, San Diego Law Review, Feb 2008.
Expect 2 to 4 homeworks, each with a ~1-week deadline. Homework assignments will primarily be written, and may include structured journaling, analyzing readings, or applying lecture material to new scenarios. In your written submission, you will be responsible for discussing real-world privacy issues using our course topics and vocabulary as a critical lens.
Homework will be assigned and submitted via GitHub Classroom. Links will be provided via Canvas.
Expect 3 to 4 projects, each with a 2–3-week deadline. Each project will have programming and written components. In each project, you will be asked to investigate a open-ended privacy topic with a research mindset; that is, you’ll be writing code to help you answer specific questions of your own design. In a report, you will then describe your experiments and interpret the results, explaining what it teaches us about the topic and what is still unanswered. In your written submission, you will be responsible for demonstrating that you meaningfully engaged with the material and highlighting what you learned beyond our discussion in lecture.
Projects will be assigned and submitted via GitHub Classroom. Links will be provided via Canvas.
In lecture, we will discuss our goals for the course and collaboratively design an evaluation standard. Our full assessment matrix will be posted to Canvas.
Throughout the semester, you will write several reflections. The first will ask you to reflect on the goals we develop as a group and apply them by discussing your own individual goals. Later reflections will ask you to evaluate your performance, referring to your specific course goals, work you submitted, and feedback you received. You will be asked to grade your work in the course on the “letter grade” scale and support your suggested grade using concrete evidence from your portfolio of deliverables, alongside our assessment matrix. You will receive feedback on your preliminary reflections geared toward helping you continue to grow toward your course goals.
The Final Reflection will be the last submitted deliverable toward the end of the semester and will be used to assign a letter grade for your overall work in the course. The schedule for unreleased assignments is tentative; see Canvas for specific dates once assignments are released.