<node id="492471">
  <nid>492471</nid>
  <type>news</type>
  <uid>
    <user id="27490"><![CDATA[27490]]></user>
  </uid>
  <created>1454000204</created>
  <changed>1475896831</changed>
  <title><![CDATA[Protecting Privacy Takes Many Forms]]></title>
  <body><![CDATA[<h5>What is the true price of free and how much data are you willing to trade for convenience or security?</h5><p>These are the looming questions that the <a href="https://staysafeonline.org/" target="_blank">National Cyber Security Alliance</a> sought to address this week during its 8<sup>th</sup> Annual “<a href="https://staysafeonline.org/data-privacy-day/landing/" target="_blank">National Data Privacy Day</a>,” supported by the Georgia Institute of Technology School of Interactive Computing.&nbsp; Professors <strong>Annie Anton</strong> (IC) and <strong>Peter Swire</strong> (Scheller College of Business) serve on the National Cyber Security Alliance advisory board.</p><p>“Most Americans are giving up a lot more data on a daily basis than they might think,” says&nbsp;<strong>Andrew Howard</strong>, director of the <a href="http://www.gtri.gatech.edu/ctisl" target="_blank">Cyber Technologies &amp; Information Security Lab</a> at the Georgia Tech Research Institute. “Between their cell phones, security cameras, and Internet browsers, the average person is trackable throughout most of their day.”</p><p>Despite the prevalence of hacks or fears of overzealous surveillance, Swire, who is the Huang Professor of Law &amp; Ethics at the Scheller College of Business, argues that the U.S. is still one of the safest places in the world with stringent safeguards of individual privacy.</p><p>“The 4<sup>th</sup> Amendment applies to all wiretaps – it’s a legal structure for any intercept of communication or information,” Swire says, who served as the top privacy official under the Clinton administration and on Obama’s cybersecurity review group. “If you violate the 4<sup>th</sup> Amendment, you cannot use the evidence in court… What other countries have a legal order that is the same as the U.S.? Who in the world has a longer and stronger tradition of protecting fundamental rights than the U.S.?”</p><p>This week, Swire was in Brussels to debate European privacy activist Max Schrems, who has alleged that American companies too liberally trade personal data between the U.S. and Europe.</p><p>But despite protections like the 4<sup>th</sup> Amendment, Swire and others at Georgia Tech agree – current technology allows such a new breadth of data collection that individuals should be concerned about collection until that data is proven necessary and useful. We asked faculty, scientists and research engineers for their thoughts during National Data Privacy Day:</p><p>&nbsp;</p><h6><strong><em>What do too few Americans know about data privacy but should?</em></strong></h6><p>“Data brokers know much more about you than you can imagine, and there are few regulations for this industry. Data brokers <a href="https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf" target="_blank">collect personal information about consumers</a> from a wide range of sources and provide it for a variety of purposes, mostly marketing and people search as documented by the Federal Trade Commission… Inferences these brokers data aggregators make include potentially sensitive things like ‘expecting mother’ or ‘diabetes patient.’ [Their] products can be used to facilitate harassment, or even stalking, and may expose domestic&nbsp;violence victims,&nbsp;law enforcement officers, prosecutors, public officials, or other individuals to&nbsp;retaliation or other harm.”<br /> -- <strong>Michael Farrell</strong>, <em>associate director, Institute for Information Security &amp; Privacy</em></p><p>&nbsp;</p><h6><strong><em>What should every individual do at minimum to protect their data?</em></strong></h6><p>“Think twice before in-putting data into different applications or giving online applications broad access to your online accounts through services such as Facebook, Twitter, or Google Mail. &nbsp;Asking yourself a few quick questions before sharing data can go a long way towards avoiding problems: Is this a trustworthy service?&nbsp;Who will have access to my data?”<br /> -- <strong>Andrew Howard</strong>, <em>director, Cyber Technologies &amp; Information Security Lab</em></p><p>“Right now by default you will be tracked and you have to manually switch on the options to block your tracking (in Internet browsers, for example). Product developers should be focused on flipping that option so that by default you are not tracked. For most sites that we visit, we do not need to be tracked.”&nbsp;<br /> -- <strong>Wenke Lee</strong>, <em>professor of computer science and co-director of the Institute for Information Security &amp; Privacy</em></p><p>&nbsp;</p><h6><strong><em>Who can best lead the development of new solutions for cybersecurity — government, industry or academia?&nbsp;</em></strong></h6><p>&nbsp;“It’s academia and industry working together. Our research is based on understanding what is going in the real world and the threats that are there. We call it ‘ground truth driven research.’ A lot of the data that enables this form of research is there in industry, so academic and industry working together is important, as well as the government supporting forward-looking, longer-term goals.”<br /> -- <strong>Mustaque Ahamad</strong>, <em>professor of computer science and director of educational outreach, Institute for Information Security &amp; Privacy</em></p><p>“Industry is best positioned to lead the way due to the market pressures placed on them; however, without academic research and government support, they are unlikely to succeed. &nbsp;Like most hard problems, solutions will require a partnership.”<br /> -- <strong>Andrew Howard</strong>, <em>director, Cyber Technologies &amp; Information Security Lab</em></p><p>&nbsp;</p><h6><strong><em>What are you most excited about that could advance cybersecurity?</em></strong></h6><p>“I am excited that debate is in the public sphere at this time, and that people are talking about cybersecurity.”<br /> -- <strong>Peter Swire</strong>, <em>Huang Professor of Law &amp; Ethics, Scheller College of Business</em></p><p>“Many open-source <a href="http://www.iisp.gatech.edu/available-tools" target="_blank">solutions are being created here</a> at Georgia Tech, which anyone can use to create more secure systems, software and hardware. Our projects like <a href="http://wenke.gtisc.gatech.edu/papers/ucognito.pdf" target="_blank">UCOGNITO</a> can help people truly browse privately. Other research is exposing new places where information is being leaked, for example, between mobile app developers and ad networks. We need to educate consumers to apply pressure to overzealous businesses, and as researchers we can focus on creating the tools that enable customers to protect themselves.”<br /> -- <strong>Wenke Lee</strong>, <em>professor of computer science and co-director of the Institute for Information Security &amp; Privacy</em></p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2016-01-28T00:00:00-05:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[January 28th was recognized as “National Data Privacy Day” and supported by the Georgia Institute of Technology School of Interactive Computing.  Professors, researchers and scientists and Georgia Tech comment on data collection and privacy concerns.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="451391">
            <nid>451391</nid>
            <type>image</type>
            <title><![CDATA[IISP logo]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>203339</fid>
                  <filename><![CDATA[instituteforinformationsecurityprivacy-outline-black874.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/instituteforinformationsecurityprivacy-outline-black874_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[IISP logo]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="492481">
            <nid>492481</nid>
            <type>image</type>
            <title><![CDATA[IISP - identity art]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>204486</fid>
                  <filename><![CDATA[identity_for_web.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/identity_for_web_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/identity_for_web_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[IISP - identity art]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="492491">
            <nid>492491</nid>
            <type>image</type>
            <title><![CDATA[IISP - required security poster]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>205850</fid>
                  <filename><![CDATA[required_security.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/required_security.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/required_security.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[IISP - required security poster]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="447071">
            <nid>447071</nid>
            <type>image</type>
            <title><![CDATA[Dr. Wenke Lee, IISP]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>203234</fid>
                  <filename><![CDATA[lee_iisp_sm.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/lee_iisp_sm_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/lee_iisp_sm_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Dr. Wenke Lee, IISP]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="40339">
            <nid>40339</nid>
            <type>image</type>
            <title><![CDATA[Mustaque Ahamad]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid></fid>
                  <filename><![CDATA[]]></filename>
                  <filepath><![CDATA[]]></filepath>
                  <file_full_path><![CDATA[]]></file_full_path>
                  <filemime></filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[tlabouff@cc.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Tara La Bouff, Marketing Communications Manager</p><p>404.769.5408</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>416</tid>
        <value><![CDATA[GTRI]]></value>
      </item>
          <item>
        <tid>167089</tid>
        <value><![CDATA[Scheller College of Business]]></value>
      </item>
          <item>
        <tid>166848</tid>
        <value><![CDATA[School of Interactive Computing]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
