{"68092":{"#nid":"68092","#data":{"type":"news","title":"Symantec Sponsors Student Competition for Usable Security at College of Computing at Georgia Tech","body":[{"value":"\u003Ch2\u003EIndustry Leader in Security Technology Supports Innovative Academic Effort to Design Real-World Security Solutions\u003C\/h2\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cbr \/\u003EATLANTA (September 1, 2006)\u003C\/strong\u003E - The College of Computing at Georgia Tech, a national leader in the creation of real-world computing breakthroughs that drive social and scientific progress, today announced that Symantec Corp. is sponsoring the second annual Tiger Teams Student Design Competition in Usable Security Research. The competition is designed to foster research in creating secure systems that are both usable and useful to everyday computer users.\u003C\/p\u003E\u003Cp\u003EThe Tiger Teams competition, which runs throughout the entire school year, is in its second year and is hosted by the College of Computing at Georgia Tech, the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Graphics, Visualization and Usability Center (GVU).\u003C\/p\u003E\u003Cp\u003E\u0026quot;Recent high-profile cases, as well as a rise in media exposure of online identity fraud, have increased the demand for security solutions that are intuitive for the everyday computer user,\u0026quot; said Keith Edwards, associate professor at the College of Computing. \u0026quot;The Tiger Teams competition allows the academic world to unite with industry leaders such as Symantec in an effort to create the next generation of security solutions that will impact the future of computing for everyday users.\u0026quot;\u003C\/p\u003E\u003Cp\u003EAcknowledging the need to help restore consumers\u0027 confidence online, Edwards developed The Tiger Teams Student Design Competition in Usable Security Research in 2005 to spur grassroots research in the area of usable security. Starting in August 2006, students with expertise in security, human-computer interaction (HCI) and design will form two-person teams and prepare project proposals that address the challenges of creating security technologies that are intuitive to the everyday computer user. At the end of the semester, a faculty and industry panel will review and judge each of the proposals, with the winning team or teams receiving funding to further develop their proposals into solutions during the following year. For this year\u0027s competition, Symantec, as an industry sponsor, will provide insight into the current and future challenges facing information security and mentor the students throughout each phase of the competition.\u003C\/p\u003E\u003Cp\u003E\u0026quot;As the world\u0027s leader in information security, Symantec is committed to fostering innovation and supporting promising new technologies that provide consumers the freedom to safely enjoy their favorite online activities,\u0026quot; said Darren Shou, senior manager, University Research, Symantec Research Labs. \u0026quot;Our support of the Tiger Teams Competition and the College of Computing at Georgia Tech underscores this commitment as these highly creative and skilled technologists apply their ingenuity and passion to the advancement of real-world computing research and education.\u0026quot;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAbout the College of Computing at Georgia Tech\u003C\/strong\u003E\u003Cbr \/\u003EThe College of Computing at Georgia Tech is a national leader in the creation of real-world computing breakthroughs that drive social and scientific progress. With its graduate program ranked 11th nationally by U.S. News and World Report, the College\u0027s unconventional approach to education is defining the new face of computing by expanding the horizons of traditional computer science students through interdisciplinary collaboration and a focus on human centered solutions. For more information about the College of Computing at Georgia Tech, its academic divisions and research centers, please visit \u003Ca href=\u0022\/\/www.cc.gatech.edu\u0026quot;\u0022\u003Ewww.cc.gatech.edu\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EUseful Links\u003C\/strong\u003E\u003Cbr \/\u003ETiger Team: \u003Ca href=\u0022\/\/www.cc.gatech.edu\/program\/tiger-teams\u0026quot;\u0022 target=\u0022\u0026quot;_blank\u0026quot;\u0022\u003Ehttp:\/\/www.cc.gatech.edu\/program\/tiger-teams\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EFor more information, contact:\u003C\/strong\u003E\u003Cbr \/\u003EStefany Wilson\u003Cbr \/\u003ECollege of Computing at Georgia Tech\u003Cbr \/\u003E404.894.7253\u003Cbr \/\u003E\u003Ca href=\u0022mailto:stefany@cc.gatech.edu\u0022\u003Estefany@cc.gatech.edu\u003C\/a\u003E\u003Cbr \/\u003E\u003Ca href=\u0022\/\/www.cc.gatech.edu\u0026quot;\u0022\u003Ewww.cc.gatech.edu\u003C\/a\u003E  \u003Cbr \/\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe College of Computing receives support from the industry leader in security technology for its innovative academic effort to design real-world security solutions.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":"","uid":"27154","created_gmt":"2011-06-20 17:12:58","changed_gmt":"2016-10-08 03:09:18","author":"Louise Russo","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2006-09-01T00:00:00-04:00","iso_date":"2006-09-01T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}