Scott Seidenberger
PhD in Data Science and Analytics from the University of Oklahoma and Future of Work Fellow at the Cornell ILR School. My research program spans decentralized systems security, employer brand equity, human-AI work design, and workforce technology governance.
Emerging technologies are reshaping how organizations understand employers, evaluate talent systems, and secure critical infrastructure. My work turns those changes into evidence that is valid, accountable, and usable in real decisions.
Research News & Events
A quick pulse on newly published outputs and upcoming talks.
Upcoming Talks
Talks archive-
Charting the Future: GenAI & HR
CAHRS In-Person Working Group ยท New York, NY
Research Pillars
Core themes organize the research so each project connects to a larger program of evidence.
Decentralized Systems Security
Security, resilience, and adversarial measurement for web3, P2P networks, and distributed infrastructure.
See projects → // pillarEmployer Brand Equity
How job seekers interpret employer signals across LLMs, online word-of-mouth, and recruitment channels.
See projects → // pillarHuman-AI Work Design
Human-AI interaction quality, prompt behavior, and implications for work design and decision performance.
See projects → // pillarWorkforce Technology Governance
Validity, privacy, accountability, and policy-operational controls for workforce technologies.
See projects →Featured Work
Selected outputs include representative methods, findings, and implications across domains.
Why You've Got Mail: Evaluating Inbox Privacy Implications of Email Marketing Practices in Online Apps and Services
We audit large companies' privacy and data sharing practices through email marketing. The study reveals systematic data sharing with third parties and evaluates implications for user privacy.
EtherBee: A Global Dataset of Ethereum Node Performance Measurements Coupled with Honeypot Interactions and Full Network Sessions
Presents EtherBee, a global-scale dataset coupling Ethereum node performance measurements with honeypot interactions and full network sessions. Enables research on blockchain infrastructure security and performance.
A Picture is Worth a Thousand Prompts? Efficacy of Iterative Human-Driven Prompt Refinement in Image Regeneration Tasks
Evaluates the efficacy of iterative human-driven prompt refinement in AI image regeneration tasks. Findings reveal both the potential and limits of human ability to reverse-engineer prompts from generated images.
NinjaDoH: A Censorship-Resistant Moving Target DoH Server Using Hyperscalers and IPNS
Presents NinjaDoH, a moving-target DNS-over-HTTPS architecture that combines hyperscaler deployment with IPNS-based endpoint agility to improve censorship resistance and availability.
Stake Your Claim: Zero-Trust Validator Deployment Leveraging NFTs and Smart Contracts in Proof-of-Stake Networks
We propose a zero-trust validator deployment mechanism for proof-of-stake networks using NFTs and smart contracts. The approach enables programmable, transferable validator identity without trusting central authorities.
A New Role for Human Resource Managers - Social Engineering Defense
HR managers have a critical but underrecognized role in defending organizations against social engineering. This article argues that HR's people-facing position makes them essential for awareness, training, and policy.
Academic Affiliations
Current institutional and community affiliations.