{"463491":{"#nid":"463491","#data":{"type":"external_news","title":"Forging an Intellectual Firewall","body":[{"value":"\u003Cp\u003EThe Internet is essential to everyday life. But, almost constant attacks by cyber agitators threaten everyone who dares to go online and even the Internet itself. At a time when cyber threats are becoming more persistent and sophisticated, the Georgia Institute of Technology is fighting back with the new\u0026nbsp;\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E\u0026nbsp;(IISP) -- Georgia Tech\u2019s eleventh interdisciplinary research institute and the first dedicated to\u0026nbsp;cybersecurity.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"28124","created_gmt":"2015-10-28 10:34:07","changed_gmt":"2016-10-08 02:27:46","author":"Tyler Sharp","boilerplate_text":"","field_publication":"","publication":"wireless health monitoring","field_article_url":"","publication_url":"http:\/\/www.cc.gatech.edu\/features\/iisp","dateline":{"date":"2015-10-28T00:00:00-04:00","iso_date":"2015-10-28T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"463481":{"id":"463481","type":"image","title":"IISP control room","body":null,"created":"1449256385","gmt_created":"2015-12-04 19:13:05","changed":"1475895209","gmt_changed":"2016-10-08 02:53:29","alt":"IISP control room","file":{"fid":"203666","name":"imgp1180_v2-min.jpg","image_path":"\/sites\/default\/files\/images\/imgp1180_v2-min_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/imgp1180_v2-min_0.jpg","mime":"image\/jpeg","size":73853,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/imgp1180_v2-min_0.jpg?itok=5DGEADWI"}}},"media_ids":["463481"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[{"id":"145971","name":"Bo Rotoloni"},{"id":"10567","name":"Georgia Tech Information Security Center"},{"id":"415","name":"Georgia Tech Research Institute"},{"id":"11002","name":"Gregory Abowd"},{"id":"2254","name":"gtisc"},{"id":"416","name":"GTRI"},{"id":"145981","name":"IISP"},{"id":"141341","name":"Institute for Information Security \u0026 Privacy"},{"id":"11017","name":"Mustaque Ahamad"},{"id":"166941","name":"School of Computer Science"},{"id":"10893","name":"wenke lee"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}