{"581801":{"#nid":"581801","#data":{"type":"news","title":"Colliding Privacy, Democracy and Technology?","body":[{"value":"\u003Cp\u003EGeorgia Tech\u0026rsquo;s 2017 \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/sites\/default\/files\/documents\/2017_threats_report_finalblu-web.pdf\u0022\u003EEmerging Cyber Threats, Trends and Technologies\u003C\/a\u003E report highlights concerns about global manipulation of information, health care fraud, data encryption and other issues likely to affect society in the year ahead. The report, produced annually, is an expert-driven review of recent cybersecurity trends, developing research and threat considerations.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAmong the findings:\u003C\/p\u003E\r\n\r\n\u003Cul\u003E\r\n\t\u003Cli\u003EGlobal information manipulation by nation-states is now widespread, causing western nations to curtail free speech and news consumers to view information cautiously.\u003C\/li\u003E\r\n\t\u003Cli\u003EHealth care fraud is taking off in the absence of good defenses, as the value of personal data far surpasses that of stolen credit cards.\u003C\/li\u003E\r\n\t\u003Cli\u003ECultural differences and unresolved approaches to data encryption continue to mire companies and business leaders with uncertainty and risk in North America and Europe.\u003C\/li\u003E\r\n\t\u003Cli\u003ECrowdsourced and open-source solutions hold promise for addressing insecure, aging electronic voting systems.\u003C\/li\u003E\r\n\t\u003Cli\u003EPublic proof of who is behind cyberattacks remains elusive.\u003C\/li\u003E\r\n\t\u003Cli\u003EInterest is growing in computer science education, suggesting a changing tide in the nation\u0026rsquo;s shortfall of information technology workers.\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;Cyberattacks today are flourishing because almost every organization conducts some portion of its business online \u0026mdash; putting even digitally cautious consumers at risk when it is not sufficiently protected,\u0026rdquo; said Wenke Lee, co-director of the Institute for Information Security and Privacy (IISP) and professor of computer science at Georgia Tech. \u0026ldquo;There is widespread reluctance to share threat information, and there\u0026rsquo;s a lack of public attribution about who is responsible, making it nearly impossible for the public to defend themselves.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EGeorgia Tech\u0026rsquo;s broad understanding of cybersecurity issues can be used to develop strategies to address a range of threats, noted Bo Rotoloni, co-director of IISP.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;Under this unique combination, Georgia Tech can help foretell how the \u0026lsquo;white hats\u0026rsquo; should prepare because we continually witness how the \u0026lsquo;black hats\u0026rsquo; adapt,\u0026rdquo; said Rotoloni, director of the Information and Cyber Sciences Directorate at the Georgia Tech Research Institute, the university\u0026rsquo;s applied research arm.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EGeorgia Tech issues the Threat Report each fall in conjunction with its annual \u003Ca href=\u0022http:\/\/iisp.gatech.edu\/2016-cyber-security-summit\u0022\u003ECyber Security Summit\u003C\/a\u003E, which is taking place today in Tech Square. The summit brings together government, industry and academia for objective conversation about the challenges of securing information and cyber-connected systems.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E-- Written by\u0026nbsp;Tara La Bouff\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Institute for Information Security and Privacy at Georgia Tech examines emerging cyber threats for 2017. The expert-driven annual review was released at the annual Cyber Security Summit, which has become the Atlanta IT community\u0026rsquo;s foremost event on cybersecurity.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"The Institute for Information Security and Privacy at Georgia Tech examines emerging cyber threats for 2017. "}],"uid":"27918","created_gmt":"2016-09-28 12:43:53","changed_gmt":"2016-09-28 14:03:46","author":"Laura Diamond","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-09-28T00:00:00-04:00","iso_date":"2016-09-28T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"512011":{"id":"512011","type":"image","title":"GA Tech Tower","body":null,"created":"1458923712","gmt_created":"2016-03-25 16:35:12","changed":"1475895275","gmt_changed":"2016-10-08 02:54:35","alt":"GA Tech Tower","file":{"fid":"204997","name":"techtower_2.jpg","image_path":"\/sites\/default\/files\/images\/techtower_2_0.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/techtower_2_0.jpg","mime":"image\/jpeg","size":2516795,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/techtower_2_0.jpg?itok=1KDjG89g"}}},"media_ids":["512011"],"related_links":[{"url":"http:\/\/www.iisp.gatech.edu","title":"Institute for Information Security \u0026 Privacy"},{"url":"http:\/\/www.iisp.gatech.edu\/sites\/default\/files\/documents\/2017_threats_report_finalblu-web.pdf","title":"2017 Emerging Cyber Threats Report"}],"groups":[{"id":"1214","name":"News Room"}],"categories":[{"id":"129","name":"Institute and Campus"},{"id":"133","name":"Special Events and Guest Speakers"},{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"145981","name":"IISP"},{"id":"9641","name":"Cyber Threats"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39481","name":"National Security"}],"news_room_topics":[{"id":"106361","name":"Business and Economic Development"},{"id":"71871","name":"Campus and Community"},{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ELaura Diamond\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EInstitute Communications\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E404-894-6016\u003C\/p\u003E\r\n\r\n\u003Cp\u003E@LauraRDiamond\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["laura.diamond@gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}