Privacy / en Smartphones and privacy: 福利姬自慰researchers on why we give access to apps /news/smartphones-and-privacy-u-t-researchers-why-we-give-access-apps <span class="field field--name-title field--type-string field--label-hidden">Smartphones and privacy: 福利姬自慰researchers on why we give access to apps</span> <div class="field field--name-field-featured-picture field--type-image field--label-hidden field__item"> <img loading="eager" srcset="/sites/default/files/styles/news_banner_370/public/2023-05/GettyImages-1231819878-crop.jpg?h=afdc3185&amp;itok=8gK1I3ys 370w, /sites/default/files/styles/news_banner_740/public/2023-05/GettyImages-1231819878-crop.jpg?h=afdc3185&amp;itok=JZaemn6t 740w, /sites/default/files/styles/news_banner_1110/public/2023-05/GettyImages-1231819878-crop.jpg?h=afdc3185&amp;itok=QVNHlKmE 1110w" sizes="(min-width:1200px) 1110px, (max-width: 1199px) 80vw, (max-width: 767px) 90vw, (max-width: 575px) 95vw" width="740" height="494" src="/sites/default/files/styles/news_banner_370/public/2023-05/GettyImages-1231819878-crop.jpg?h=afdc3185&amp;itok=8gK1I3ys" alt="iphone screen with different social media pps like instagram, twitter, and facebook"> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>lanthierj</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2021-08-16T14:13:43-04:00" title="Monday, August 16, 2021 - 14:13" class="datetime">Mon, 08/16/2021 - 14:13</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item"><p>(Photo Illustration by Rafael Henrique/SOPA Images/LightRocket via Getty Images)</p> </div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/matthew-tierney" hreflang="en">Matthew Tierney</a></div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/breaking-research" hreflang="en">Breaking Research</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/schwartz-reisman-institute-technology-and-society" hreflang="en">Schwartz Reisman Institute for Technology and Society</a></div> <div class="field__item"><a href="/news/tags/electrical-computer-engineering" hreflang="en">Electrical &amp; Computer Engineering</a></div> <div class="field__item"><a href="/news/tags/faculty-applied-science-engineering" hreflang="en">Faculty of Applied Science &amp; Engineering</a></div> <div class="field__item"><a href="/news/tags/faculty-law" hreflang="en">Faculty of Law</a></div> <div class="field__item"><a href="/news/tags/privacy" hreflang="en">Privacy</a></div> <div class="field__item"><a href="/news/tags/research-innovation" hreflang="en">Research &amp; Innovation</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>If you hesitate when an app on your phone asks to access your location you鈥檙e not alone.</p> <p>That鈥檚 according to a new study from University of Toronto researchers that was&nbsp;conducted in four languages and across five continents.</p> <p>In&nbsp;<a href="https://security.csl.toronto.edu/news/privadroid-paper-accepted-at-usenix-security-2021/" target="_blank">a paper presented at Usenix Security鈥檚 Symposium</a>&nbsp;last week, 福利姬自慰researchers examined why users choose to grant or deny permission when apps request access to contacts, calendars, microphones and more. The iPhone and Android operating systems give users control over data access when installing an app and during the app鈥檚 operation 鈥 a process known as a 鈥渞untime permission request.鈥</p> <p><b>David Lie</b>, a professor in&nbsp;the Edward S. Rogers Sr. department electrical and computer engineering (ECE) in the Faculty of Applied Science &amp; Engineering, says that when the team initially set out to determine which factors influence behaviour, they had no idea user expectations would be so significant.</p> <p>鈥淎n unexpected request is more than twice as likely to be denied,鈥 Lie says. 鈥淎lso, if there is some explanation for it 鈥 if the app conveys to the user why it needs access to something 鈥 then we see the denial rate cut in half.</p> <p>鈥淎pp developers and smartphone OS designers should give serious consideration to how they communicate and set expectations with their users, which is more important than previously thought.鈥</p> <p>The multidisciplinary team of researchers included&nbsp;<b>Lisa Austin</b>, a cross-appointed ECE professor who is also chair in law and technology in the Faculty of Law. Both Austin and Li are also affiliated with the&nbsp;Schwartz Reisman Institute for Technology and Society.</p> <p><img alt src="/sites/default/files/Lie%20and%20Austin-crop.jpg" style="width: 750px; height: 500px;"></p> <p><em>Professors Lisa Austin and David Lie, pictured here prior to the COVID-19 pandemic, are part of a multidisciplinary team behind a new global study that explores the privacy expectations and behaviour of smartphone users (photo by&nbsp;Jessica MacInnis)</em></p> <p>To gather data for the study, the team developed an Android app, named PrivaDroid, that runs in the background of each participant鈥檚 phone for 30 days. After each new app installation or runtime permission request, PrivaDroid asks participants whether they expected the request and their rationale behind either granting or denying it.</p> <p>Using online advertising, they&nbsp;recruited more than 1,700 participants from a variety of countries with contrasting privacy legislation and levels of economic development. Over several months ending in the spring of 2020, PrivaDroid observed more than 36,000 permission events.</p> <p>鈥淧revious studies were constrained to more artificial environments, where participants come into a lab or are set up with phone that鈥檚 not their own device,鈥 says Lie. 鈥淭his was first time someone has been able to do a global smartphone study 鈥榠n the wild.鈥欌</p> <p>Past research has shown that factors such as age, gender, country of residence and level of education can influence privacy behaviour.</p> <p>鈥淥ur study confirms this,鈥 says Lie. 鈥淔or example, women are more cautious about granting permissions than men, and young people grant permissions more often than older ones 鈥&nbsp;but not as much as you might think.鈥</p> <p>Another finding was that participants who were rated 鈥榩rivacy sensitive鈥 according to the international Internet Users鈥 Information&nbsp;Privacy&nbsp;Concerns privacy scale have highly variable deny rates 鈥&nbsp;and nearly 30 per cent of them grant permissions more frequently than average.</p> <p>鈥淭his gap between stated behaviour and actual behaviour is known as the 鈥榩rivacy paradox,鈥欌 says Lie. 鈥淭his gap would make sense with behaviour one wouldn鈥檛 be proud of, but it鈥檚 hard to see how that applies with privacy. It鈥檚 a puzzle.鈥</p> <p>Are these people paying lip service to privacy concerns and then prioritizing their own convenience in the moment? The study reveals that this apparent contradictory behaviour is more nuanced.</p> <p>鈥淭he privacy-sensitive group who granted a lot of permissions said they expected them,鈥 says Lie. 鈥淚t鈥檚 possible they have a better understanding of how and why applications use permissions 鈥&nbsp;that they鈥檙e avoiding the 鈥榗reepy鈥 apps and installing the more transparent ones.鈥</p> <p>鈥淪o many complex technical and geopolitical issues converge around privacy,鈥 says Professor&nbsp;<b>Deepa Kundur</b>, chair of ECE. 鈥淭hey truly demand a multidisciplinary approach and a long runway. This smartphone privacy study may be a first in its size, scope and complexity, but hopefully it鈥檚 the first of many.鈥</p> <p>Though prudence might suggest people deny permissions, 鈥渢hat belies how they actually use their phones,鈥 says Lie. 鈥淚f you really didn鈥檛 want what the app provided, or you thought the developer was malicious, you鈥檇 just uninstall the app. Smartphone users are telling us that clearly communicating expectations builds trust, and trust plays an important role in granting permissions.鈥</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> Mon, 16 Aug 2021 18:13:43 +0000 lanthierj 170022 at From phishing scams to compromised passwords: 福利姬自慰cyber security expert on how to stay safe online /news/phishing-scams-compromised-passwords-u-t-cyber-security-expert-how-stay-safe-online <span class="field field--name-title field--type-string field--label-hidden">From phishing scams to compromised passwords: 福利姬自慰cyber security expert on how to stay safe online</span> <div class="field field--name-field-featured-picture field--type-image field--label-hidden field__item"> <img loading="eager" srcset="/sites/default/files/styles/news_banner_370/public/unsplash-data-privacy.jpg?h=afdc3185&amp;itok=sV5L8QR7 370w, /sites/default/files/styles/news_banner_740/public/unsplash-data-privacy.jpg?h=afdc3185&amp;itok=BGx6HXro 740w, /sites/default/files/styles/news_banner_1110/public/unsplash-data-privacy.jpg?h=afdc3185&amp;itok=uhjmDDaH 1110w" sizes="(min-width:1200px) 1110px, (max-width: 1199px) 80vw, (max-width: 767px) 90vw, (max-width: 575px) 95vw" width="740" height="494" src="/sites/default/files/styles/news_banner_370/public/unsplash-data-privacy.jpg?h=afdc3185&amp;itok=sV5L8QR7" alt="Photo of someone using smartphone"> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>Romi Levine</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2019-01-28T16:53:56-05:00" title="Monday, January 28, 2019 - 16:53" class="datetime">Mon, 01/28/2019 - 16:53</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">Whether you're browsing social media sites or checking your work email, there are ways to protect your data online (photo by rawpixel via Unsplash)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/romi-levine" hreflang="en">Romi Levine</a></div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/our-community" hreflang="en">Our Community</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/cyber-security-0" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/news/tags/privacy" hreflang="en">Privacy</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>The internet is everywhere 鈥 from smartphones to cars and fridges. While that means our apps and appliances are more sophisticated than ever before, so too are the hackers, scammers and phishers who&nbsp;are trying to access your personal information. &nbsp;</p> <p>Today, the University of Toronto is raising awareness about managing the risks&nbsp;of the digital world and providing resources to help the university community stay safe online with <a href="https://securitymatters.utoronto.ca/january-28th-is-data-privacy-day/">Data Privacy Day</a> events taking place on the downtown Toronto campus. There is also a wealth of information available at <a href="https://securitymatters.utoronto.ca/">securitymatters.utoronto.ca</a>, including tools like <a href="https://securityplanner.org/#/">Citizen Lab鈥檚 security planner</a>, which gives you a personalized online safety recommendation, and a series of video tutorials with online safety tips. &nbsp;</p> <p><strong>Isaac Straley,&nbsp;</strong>U of T鈥檚 first-ever chief information security officer, shared his tips with <em>福利姬自慰News</em> on how to put your online privacy first.</p> <h3>Protect your passwords</h3> <p>鈥淧assword management is one of the most important things for everybody to be paying attention to right now,鈥 says Straley.</p> <p>Compromised accounts are one of the primary ways that data breaches happen, but there are a number of ways to keep yours safe and secure. &nbsp;</p> <p>The first is using websites or applications with two-factor or multifactor authentication 鈥 where you are required to provide more than just a password when logging in.</p> <p>鈥淲hen you're using banking or other online tools, they might send you a code in addition to putting in your password or might have you push a button on your phone,鈥 says Straley. 鈥淲hat this does is make it harder for an attacker to just know your password because you have to have the other information to be able to log in.鈥</p> <p>The university is starting to roll out two-factor authentication for Office 365 for faculty and staff, he says.</p> <p><strong><a href="https://twofactorauth.org/">Protip: Check out twofactorauth.org to find out if a website uses two-factor authentication.</a></strong></p> <p>Straley also says to avoid reusing passwords, but recognizes that remembering them all can be a challenge.</p> <p>鈥淯sing a password manager is a really good tool,鈥 says Straley. Apps like Password Safe and KeePass allow you to generate and store multiple passwords in one safe place 鈥 and not in your head.</p> <p>But don鈥檛 put everything in your password manager, Straley warns. 鈥淭ake the logins that are the most sacred or most important 鈥 protect the highest risk information 鈥 and remember those. But put everything else in the password manager so you don't have to waste your valuable brain space on remembering half a dozen passwords.鈥</p> <h3>Don鈥檛 be bait for phishing scams</h3> <p>It鈥檚 getting harder to distinguish&nbsp;an email scam from a legitimate message, but there are a few red flags you should be aware of, says Straley.</p> <p>鈥淣umber one is almost always urgency,鈥 he says. 鈥淲hen someone is asking you to do something fast.鈥</p> <p>Emails warning you your account is about to be locked, or that you鈥檝e gone over a quota are likely coming from illegitimate sources.</p> <p>鈥淎nother one we鈥檙e starting to see more of are emails that look like they come from a supervisor or a manager or a colleague that say, 鈥楬ey, I'm really busy right now, can you help me out?鈥欌</p> <p>Don鈥檛 be fooled by these seemingly personal messages, says Straley. As soon as you agree to help, the scammer will ask you to do something for them, like buy a gift card.</p> <p>鈥淲hen you do, you end up spending your money and giving the gift cards to the attackers,鈥 he says.</p> <h3>Personalize your privacy settings</h3> <p>It doesn鈥檛 matter if you鈥檙e a technophobe or a social media addict, you need to decide what level of privacy you鈥檙e comfortable with online, says Straley.</p> <p>鈥淚'm surprised how often folks don't stop and think about what they expect from their online life. Most of the services are pretty open on their privacy settings,鈥 he says.</p> <p>With social media platforms like Twitter, Instagram and Facebook, Straley says to make sure that the sharing settings are restricted to the communities you are specifically looking to engage online.</p> <p>鈥淓specially if you install a lot of social media and tools that have applications on the phone or multiple devices, those tools will ask for a lot of permissions like 鈥榞ive us access to all your photos or your mic, camera, or your location settings,鈥欌 he says.</p> <p>Depending on the operating system you use, Straley says, you can choose to share your information with an application only when you're using it.</p> <h3>Cyber crime fighting at U of T</h3> <p>鈥淎 big portion of what we do is identifying different resources that would be attacked and making sure they are protected,鈥 says Straley of his information security team.</p> <p>鈥淲e鈥檝e got tools that allow us to detect attacks 鈥 in our jargon they're called intrusion prevention or detection systems 鈥 and we have other ways to look for bad activity,鈥 he says.</p> <p>福利姬自慰also co-ordinates with fellow higher education institutions, governments and other organizations so it knows what to look out for. &nbsp;</p> <p>鈥淥ne of our biggest challenges is just keeping up with the attackers,鈥 Straley says.</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> Mon, 28 Jan 2019 21:53:56 +0000 Romi Levine 151952 at Panel discussion to explore data privacy, social media in health care /news/panel-discussion-explore-data-privacy-social-media-health-care <span class="field field--name-title field--type-string field--label-hidden">Panel discussion to explore data privacy, social media in health care</span> <div class="field field--name-field-featured-picture field--type-image field--label-hidden field__item"> <img loading="eager" srcset="/sites/default/files/styles/news_banner_370/public/2018-05-15-hospital-resized.jpg?h=afdc3185&amp;itok=vjRll3Ro 370w, /sites/default/files/styles/news_banner_740/public/2018-05-15-hospital-resized.jpg?h=afdc3185&amp;itok=L_a1OhUO 740w, /sites/default/files/styles/news_banner_1110/public/2018-05-15-hospital-resized.jpg?h=afdc3185&amp;itok=ipnIeX3F 1110w" sizes="(min-width:1200px) 1110px, (max-width: 1199px) 80vw, (max-width: 767px) 90vw, (max-width: 575px) 95vw" width="740" height="494" src="/sites/default/files/styles/news_banner_370/public/2018-05-15-hospital-resized.jpg?h=afdc3185&amp;itok=vjRll3Ro" alt="Photo of a doctor's tools"> </div> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>noreen.rasbach</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2018-05-15T13:45:42-04:00" title="Tuesday, May 15, 2018 - 13:45" class="datetime">Tue, 05/15/2018 - 13:45</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">(photo by rawpixel via Unsplash)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/nicole-bodnar" hreflang="en">Nicole Bodnar</a></div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/city-culture" hreflang="en">City &amp; Culture</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/institute-health-policy-management-and-evaluation" hreflang="en">Institute of Health Policy Management and Evaluation</a></div> <div class="field__item"><a href="/news/tags/dalla-lana-school-public-health" hreflang="en">Dalla Lana School of Public Health</a></div> <div class="field__item"><a href="/news/tags/faculty-medicine" hreflang="en">Faculty of Medicine</a></div> <div class="field__item"><a href="/news/tags/health" hreflang="en">Health</a></div> <div class="field__item"><a href="/news/tags/privacy" hreflang="en">Privacy</a></div> </div> <div class="field field--name-field-subheadline field--type-string-long field--label-above"> <div class="field__label">Subheadline</div> <div class="field__item"> </div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Political views and voting patterns were allegedly compromised in Facebook鈥檚 Cambridge Analytica data breach, but what if personal health information was leaked as a result of poor public policy on data privacy?</p> <p>鈥淕ood data governance is the best way to mitigate risk and it鈥檚 absolutely critical when the public鈥檚 health is at stake,鈥 said <strong>Jennifer Gibson</strong>, director of the <a href="http://jcb.utoronto.ca/">University of Toronto Joint Centre for Bioethics</a> (JCB).</p> <p><img alt class="media-image attr__typeof__foaf:Image img__fid__8359 img__view_mode__media_large attr__format__media_large" src="/sites/default/files/2018-05-15-Jennifer%20Gibson-resized.jpg" style="width: 300px; height: 275px; margin: 10px; float: left;" typeof="foaf:Image">鈥淚f digital technologies are to realize their promise of improving health, ensuring public trust must be a primary goal. This means engaging potential ethical issues upfront and with intention,鈥 said Gibson&nbsp;(pictured left), also an associate professor at the Institute of Health Policy, Management and Evaluation.</p> <p>Digital technologies are increasingly prevalent in daily life and it鈥檚 commonplace to see a patient blogging about their health-care journey or a surgeon tweeting from the operating room. That鈥檚 why the JCB is hosting a panel discussion on <a href="https://www.eventbrite.ca/e/bioethics-for-health-in-a-digital-age-registration-44165171216?aff=efbeventtix">Bioethics for Health in a Digital Age</a>&nbsp;at Hart House on Wednesday to explore the urgent need for new bioethical parameters in a digital world.</p> <p>The all-women panel includes a surgeon, a bioethicist and a privacy lawyer, all of whom are intimately aware of the benefits and pitfalls of delivering health care in an increasingly digital world where the speed of technological advancement far outpaces reflective public policy that addresses ethical dilemmas.</p> <p>鈥淭here aren鈥檛 enough conversations happening around the ethical challenges related to data power and governance,鈥 said Gibson. 鈥淚f we fail to put safeguards in place, important decisions will be made for us by corporations that don鈥檛 always have patients鈥 best interests in mind.鈥</p> <p>Dr. <strong>Karen Devon</strong>, assistant professor of surgery at U of T鈥檚 Faculty of Medicine, will discuss her personal journey with social media in the clinical setting.</p> <p>鈥淲e must be cognizant of the scope and permanence of anything posted online, which can be used for good or bad. Everyone needs to be very thoughtful before pressing the 鈥榩ost鈥 button and always consider all the potential impacts,鈥 said Devon, who is an endocrine surgeon at <a href="http://www.womenscollegehospital.ca/">Women鈥檚 College Hospital</a>.</p> <p>Devon will be joined by fellow panellists Ann Heesters, director of bioethics at the University Health Network, and <a href="https://www.fasken.com/en/rosario-cartagena#sort=%40fclosedate79734%20descending">Rosario G. Cartagena</a>, a senior associate at Fasken Martineau and an expert on privacy and risk management.</p> <p>The JCB is based at the <a href="http://www.dlsph.utoronto.ca/">Dalla Lana School of Public Health</a> and is home to the largest academic community of health-care ethicists in the world. As the first WHO Collaborating Centre for Bioethics, the JCB is an international leader in end-of-life care, resource allocation ethics, infectious disease ethics, and global health ethics.</p> <p><a href="https://www.eventbrite.ca/e/bioethics-for-health-in-a-digital-age-registration-44165171216?aff=efbeventtix">Bioethics for Health in a Digital Age</a> is open to the 福利姬自慰community on May 16. Registration is required. Doors open at 5 p.m. Opening remarks and panel discussion will take place from 5:30-7 p.m. with a cocktail reception to follow.</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> Tue, 15 May 2018 17:45:42 +0000 noreen.rasbach 135374 at U of T's Citizen Lab and Open Effect develop privacy watchdog tool for Canadian consumers /news/u-t-s-citizen-lab-and-open-effect-develop-privacy-watchdog-tool-canadian-consumers <span class="field field--name-title field--type-string field--label-hidden">U of T's Citizen Lab and Open Effect develop privacy watchdog tool for Canadian consumers </span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>lanthierj</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2016-06-24T16:40:10-04:00" title="Friday, June 24, 2016 - 16:40" class="datetime">Fri, 06/24/2016 - 16:40</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">(photo by uditha wickramanayaka via flickr)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/adrienne-harry" hreflang="en">Adrienne Harry</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Adrienne Harry</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/city-culture" hreflang="en">City &amp; Culture</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/citizen-lab" hreflang="en">Citizen Lab</a></div> <div class="field__item"><a href="/news/tags/privacy" hreflang="en">Privacy</a></div> <div class="field__item"><a href="/news/tags/political-science" hreflang="en">Political Science</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>You want to meet someone new or track how many steps you take in a day. But your dating and fitness apps might have other plans for your personal data. &nbsp;</p> <p>Enter <a href="https://accessmyinfo.org/#/">Access My Info</a>, an online tool developed by <a href="https://openeffect.ca/">Open Effect </a>and the University of Toronto鈥檚 <a href="http://citizenlab.org/">Citizen Lab,</a> at the Munk School of Global Affairs. This tool makes it easier for Canadians to keep track of how their personal information is being used.&nbsp;</p> <p>鈥淎ccess My Info empowers individual Canadians to easily exercise their legal right to understand what data is out there about them, whether that information is shared and, if so, with whom,鈥 said <strong>Andrew Hilts</strong>, executive director of Open Effect and researcher at the Citizen Lab.&nbsp;</p> <p>鈥淭his will help consumers make informed choices, and help companies assess whether their policies and practices are meeting the needs of their customers while also complying with the law.鈥</p> <h2><a href="http://www.ctvnews.ca/sci-tech/is-tinder-or-fitbit-using-your-personal-data-online-tool-shows-you-how-to-ask-1.2956721">See the CTV story</a></h2> <p>Under the Personal Information Protection and Electronic Documents Act, Canadians have the right to ask companies for a record of what personal data the company is keeping on them. But the process of doing so can be complicated, especially if you don鈥檛 know the right questions to ask.&nbsp;</p> <p>This is where Access My Info helps. In just a few minutes users can create a custom letter, crafted by policy experts from the Citizen Lab, that asks companies careful questions about how personal data is collected and used. &nbsp;The tool streamlines a potentially convoluted process, making it easier for the average Canadian to exercise their privacy rights.&nbsp;</p> <p>鈥淢ost Internet users are either ignorant of, or apathetic about, the data they give away and what companies and governments do with it. When faced with lengthy and confusing terms of service, most users simply click 鈥業 agree鈥,鈥 Professor <strong>Ronald Deibert</strong>, director of the Citizen Lab, says. &nbsp;</p> <p>鈥淭ools like Access My Info, in which consumers exercise their privacy rights to inquire how companies handle the data they collect on them, will help both bolster these rights and let companies and governments know we are watching.鈥&nbsp;</p> <p>Funded by the Canadian Internet Registration Authority (CIRA) through its Community Investment Program, the aim of the Access My Info tool is to build more honest online relationships between Canadian companies and consumers. David Fowler, CIRA鈥檚 director of marketing and communications, adds that it never hurts for consumers to be informed.</p> <p>鈥淛ust as we should do periodic checks of our own credit scores to ensure that our financial house is in order, it鈥檚 equally, if not more important to know what the companies we do business with are doing with the information we give them.鈥</p> <p>(<a href="https://www.flickr.com/photos/126915310@N08/16981803257/in/photolist-rSCbtk-rvXQso-ssekqA-ryZUEe-5xuJuw-8kLCKi-rszwxL-4GcnSN-qC7idw-sb6am4-sBDC4d-crZJPC-oVGPG5-p1DE2x-nJMbfu-cqgqk5-rxBwdE-dU8Sg2-eGZDMF-rfUHEe-s4nuWg-ryfkqZ-rQ7PA3-nLzC8A-hxa7sJ-qim216-nr21vh-roYEVr-w3vLFh-rqA2Le-paujMX-p7dEzG-pZL2Qf-sHZvcb-pfM3vV-brXyci-s4m2Ux-pZSTe5-kBxhP2-sqWx8n-6akRDL-dgqxf3-rdTaJa-qHhyMV-ry9qTv-e6fbBH-fcEmHq-r5ovPJ-4r33wX-AB4xbP">visit flickr to see the original of the photo used above</a>)</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> Fri, 24 Jun 2016 20:40:10 +0000 lanthierj 14458 at Digital Hygiene website aims to make the Internet a little less scary /news/digital-hygiene-website-aims-make-internet-little-less-scary <span class="field field--name-title field--type-string field--label-hidden">Digital Hygiene website aims to make the Internet a little less scary</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2016-03-01T06:13:46-05:00" title="Tuesday, March 1, 2016 - 06:13" class="datetime">Tue, 03/01/2016 - 06:13</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item"> 鈥淚t's like the Wild West online鈥 (photo by Enko Koceku)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/terry-lavender" hreflang="en">Terry Lavender</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Terry Lavender</div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/more-news" hreflang="en">More News</a></div> <div class="field__item"><a href="/news/tags/privacy" hreflang="en">Privacy</a></div> <div class="field__item"><a href="/news/tags/munk-school-global-affairs-public-policy" hreflang="en">Munk School of Global Affairs &amp; Public Policy</a></div> </div> <div class="field field--name-field-subheadline field--type-string-long field--label-above"> <div class="field__label">Subheadline</div> <div class="field__item">Munk School project offers advice on online risks</div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><em>鈥淵ou鈥檙e less incognito than you think.鈥</em></p> <p>That鈥檚 the blunt message that greets visitors to the recently created <a href="https://hygiene.digitalpublicsquare.com/" target="_blank">Hygiene in the Digital Public Square website</a>, a joint project of U of T鈥檚 Munk School of Global Affairs and online security specialists eQualit.ie.</p> <p><em>鈥淢alicious apps, theft, spam, cyber stalking, censorship, surveillance. There are no foolproof answers to risk online,鈥 </em>the website continues. 鈥<em>But there is advice to help</em>.鈥</p> <p>Hygiene in the Digital Public Square was created to give that advice. It offers guidelines on email, social networks, computers, data, identity and location, phones and more. For example, if a user clicks on 鈥淎ccess to the web鈥 they see a brief introduction to security issues with websites and then can choose between three specific scenarios 鈥 connecting to a website anonymously, figuring out why a website is unreachable, or connecting to a website securely. Choosing one of the options brings up advice on how to achieve the goal and links to online tools that might help.</p> <p><strong>Sean Willett</strong>, creative director for the project, is one of the founders of the site. He spoke to 福利姬自慰News about Hygiene in the Digital Public Square recently.</p> <p><strong>The Hygiene site is an offshoot of the Munk School鈥檚 Digital Public Square project, which is designed to increase digital communications access for people who face repression in countries worldwide. Is the Hygiene site just for people in authoritarian countries?</strong></p> <p>The Hygiene site is for everyone. Yes, it鈥檚 helpful for people under authoritarian regimes, but the Internet in general is sensitive digital space, and there are many actors in that space who can be malicious. It runs the gamut from an authoritarian government that鈥檚 punishing bloggers worldwide for writing what they want to write, to ISIS targeting internet cafes in Raqqa, to hackers who might be out for a bit of fun or something more malicious.</p> <p>It鈥檚 like the Wild West online. There鈥檚 such a gap between what you鈥檙e experiencing on a computer and what鈥檚 actually happening to you. People don鈥檛 realize how much they鈥檙e being tracked. Even when you move in between websites 鈥 from Google to Facebook to your favourite news site, ad trackers in the background are monitoring you and your identity. With three points of data on a Google Map 鈥 where you go to work, where you shop, and your home 鈥 Google knows enough about you to identify you as unique. It knows what you鈥檙e shopping for; can guess your rough level of income; and a lot more. Some days you might be okay with that, some days you may not be. This site helps on may-not-be days.</p> <p><strong>How did you develop the site?</strong></p> <p>I approached the founder of eQualit.ie, Dmitri Vitaliev, saying I鈥檇 love to build something that鈥檚 natural language for users connecting to our websites. Something that offers no-nonsense answers about what it really means to have 鈥済reat digital hygiene鈥 online. He said what he鈥檇 love to do is develop a process that takes people through an interview, a 鈥淨 and A鈥 process. That was just right. The design, the development, user experience was managed by Munk鈥檚 Digital Public Square team, and eQualit.ie mapped the question and answer framework.</p> <p><strong>Can you give an example of how people might use the site?</strong></p> <p>Ever worried about deleting a file permanently? You must have at some point. An email, or maybe a picture, that you鈥檙e really embarrassed about. So you delete it 鈥 but when you delete a file, you never really delete it off the computer. To really get rid of something so no one can recover it is a process that involves a few smart steps. That鈥檚 an example of the kind of thing this site explains how to do.</p> <p>When you land on our site, we assume that the user may or may not know where they want to start to become a bit safer online. Hopefully, the process helps them uncover information not only about the thing that they鈥檙e looking for, but also the kinds of tools and how-to鈥檚 that they need in order to be cleaner, protect their identity, stop getting viruses or avoid surveillance in dangerous environments. This way beginners and advanced users are able to find something useful in the project.</p> <p><strong>Does the Hygiene site itself protect users鈥 identities?</strong></p> <p>It鈥檚 an anonymous process on the site. We do our best to automatically scrub any information that could identify a visiting user. I can鈥檛 say it enough 鈥 most people do not realize how identifiable they are when just browsing the web regularly.</p> <p>When you land on our page you can immediately sift through the questions that interest, and importantly, tell us if it was useful without revealing your identity. And we hope users do. Each answer gives them a chance to say, 鈥淚 think it was really helpful鈥 or 鈥渋t wasn鈥檛 helpful鈥 鈥 with the support of crowdsourcing, we can make this project better.&nbsp;</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/Willett_3 (2).jpg</div> </div> Tue, 01 Mar 2016 11:13:46 +0000 sgupta 7689 at Fitness tracker flaws exposed by U of T's Citizen Lab and Open Effect /news/fitness-tracker-flaws-exposed-u-ts-citizen-lab-and-open-effect <span class="field field--name-title field--type-string field--label-hidden">Fitness tracker flaws exposed by U of T's Citizen Lab and Open Effect</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2016-02-02T02:02:40-05:00" title="Tuesday, February 2, 2016 - 02:02" class="datetime">Tue, 02/02/2016 - 02:02</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">The Apple Watch was the only device tested that had no issues, researchers said (photo by LWYang via flickr)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/alex-gillis" hreflang="en">Alex Gillis</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Alex Gillis</div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/top-stories" hreflang="en">Top Stories</a></div> <div class="field__item"><a href="/news/tags/surveillance" hreflang="en">Surveillance</a></div> <div class="field__item"><a href="/news/tags/sports" hreflang="en">Sports</a></div> <div class="field__item"><a href="/news/tags/sport" hreflang="en">Sport</a></div> <div class="field__item"><a href="/news/tags/privacy" hreflang="en">Privacy</a></div> <div class="field__item"><a href="/news/tags/munk-school-global-affairs-public-policy" hreflang="en">Munk School of Global Affairs &amp; Public Policy</a></div> <div class="field__item"><a href="/news/tags/fitness" hreflang="en">Fitness</a></div> <div class="field__item"><a href="/news/tags/citizen-lab" hreflang="en">Citizen Lab</a></div> </div> <div class="field field--name-field-subheadline field--type-string-long field--label-above"> <div class="field__label">Subheadline</div> <div class="field__item"> Research backed by Office of the Privacy Commissioner of Canada鈥檚 Contributions Program </div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Barb Gormley didn鈥檛 know that strangers could track her fitness tracker. Or that anyone could rip off personal data leaking from the device.</p> <p>The personal trainer and her clients use the exercise-boosting devices to record steps taken, calories burned and other data about their progress when working out.</p> <p>鈥淧eople are hooked on them,鈥 she said. 鈥淚 feel like I have a training assistant.鈥</p> <p>But the machines also leak personal information 鈥&nbsp;such as name, age and gender 鈥&nbsp;communicated via wifi.</p> <p>Researchers at the University of Toronto released a new report on Feb. 2 that revealed major security and privacy issues in devices made by Basis, Fitbit, Garmin, Jawbone, Mio, Withings and Xiaomi. The research involved analyzing data transmissions between the Internet and apps for the fitness trackers. The story is already making headlines. (<a href="http://www.cbc.ca/news/technology/fitness-trackers-monitoring-users-1.3428817">Read the CBC coverage</a>.)</p> <p>The report, <a href="https://openeffect.ca/reports/Every_Step_You_Fake.pdf">Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security</a>, shows that Bluetooth on seven fitness trackers studied leak personal data that enable anyone near a device to track a user鈥檚 location over time. Researchers also found that certain devices by Garmin and Withings transmit information without encryption, leaking other personal data to anyone with the know-how to collect the leaks.&nbsp;</p> <p>The researchers also analyzed the Apple Watch and found no issues.</p> <h2><a href="https://openeffect.ca/reports/Every_Step_You_Fake.pdf">Read the complete report</a></h2> <p>The report is a collaborative effort between Open Effect, a non-profit applied research group focusing on digital privacy and security, and the Citizen Lab at the Munk School of Global Affairs at U of T. Open Effect previously published research on the security of ad tracking cookies. It also developed Access My Info, an application that makes it easy for Canadians to file legal requests for access to their personal information.</p> <p>鈥淚 hadn鈥檛 thought about the issues too much,鈥 said Gormley, 鈥渢hat somebody could find me using my watch.鈥</p> <p>鈥淭he upside is they鈥檙e so great,鈥 she said. She uses a Garmin device. 鈥淚 guess we鈥檙e maybe a bit blind that there could be a downside.鈥</p> <p>The downside, said <strong>Andrew Hilts</strong>, one of the report鈥檚 authors, stems from the fact that each device has a unique identifier emitted constantly via Bluetooth, even after users think they鈥檝e stopped using it.</p> <p>Hilts, the executive director of Open Effect and a research fellow with the Citizen Lab at the Munk School, said that means anyone 鈥&nbsp;from savvy analytics firms or just someone in a coffee shop 鈥&nbsp;could collect that unique identifier and, in some cases, collect your location and a whole lot more.</p> <p>鈥淭he perception might be, 鈥極kay, I鈥檓 done with this. I鈥檓 turning off Bluetooth,鈥 but your tracker is still emitting this unique identifier, even if your phone has Bluetooth turned off,鈥 Hilts explained.</p> <p>鈥淭here is a Bluetooth privacy standard in place that provides specifications on how device manufacturers can protect the privacy of their users,鈥 Hilts said. 鈥淲e鈥檙e trying to encourage fitness tracking companies to adopt this standard.鈥 Most devices mentioned in the report do not implement Bluetooth privacy, leaving users vulnerable to location-based surveillance.&nbsp;</p> <p>鈥淲e hope our findings will help consumers make more informed decisions about how they use fitness trackers, help companies improve the privacy and security of their offerings, and help regulators understand the current landscape of wearable products.鈥</p> <p>Their findings come on the heels of a report by Professor&nbsp;<strong>Guy Faulkner</strong>&nbsp;and master's student <strong>Krystn Orr </strong>of U of T's&nbsp;Faculty of Kinesiology &amp; Physical Education that examined the reliability of smartphone pedometer applications.&nbsp;</p> <p>Released at the end of 2015, that research found an 鈥渦nacceptable error percentage鈥&nbsp;in all apps compared with actual pedometers and urged 鈥渃aution in their promotion to the public for self-monitoring physical activity and in their use as tools for assessing physical activity in research trials鈥.</p> <h2><a href="http://news.utoronto.ca/stuck-traffic-these-pedometer-apps-think-youre-walking">Read:&nbsp;Stuck in traffic? These apps think you're walking</a></h2> <p>The Citizen Lab and Open Effect researchers sought contact with the seven fitness tracker companies whose products exhibited security vulnerabilities. Fitbit, Intel (Basis), and Mio responded and engaged the researchers in a dialogue. Fitbit further expressed interest in exploring the topic of implementing Bluetooth privacy features in its communications with the researchers. Out of the devices studied, only the Apple Watch adopted the Bluetooth privacy standard.</p> <p>The report鈥檚 authors, Hilts, <strong>Christopher Parsons</strong> and <strong>Jeffrey Knockel</strong>, reveal a third issue that arose in the Withings and Jawbone devices: users can falsify their own activity levels. The findings cast doubt on the reliability of data for insurance or other purposes.</p> <p>鈥淢aybe I鈥檓 na茂ve,鈥&nbsp;Gormley said. 鈥淢aybe an insurance company is conducting top-secret research on me and decide they don鈥檛 want to give me insurance?鈥</p> <p>鈥淪hould I be worried?鈥&nbsp;</p> <p>(<a href="https://www.flickr.com/photos/lwy/16893674013/in/photolist-rJQuHB-zijWKT-rx29be-zUuUgC-rgC2Z9-uws237-zsuCpS-zhSKji-ChVb2s-tsVfd1-tKBFJM-sNujMo-tsUEqj-sNujTq-tt41Qc-tKBERK-sNEFuK-rgBZfw-san4Ex-tKvqd2-tHaHbU-tKbDso-tsVfJS-tsUES1-tHaHd7-tKvpEi-tKBFcp-tHaHdC-tsVf2u-tKBEVx-tsVfzU-tHaHwd-tt42e8-tKBFzP-tKBEVT-tKBFhz-tKvpwT-tsUEs3-tsVfom-sNujHq-tHaJ21-tKBFLF-tKvpLR-sNujGo-tsUEiq-sNEFzp-tsVfW5-tKbCKG-tKBF1x-tKbCKw">Visit flickr to see the original of the photo used above</a>)</p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2016-02-02-apple-watch-1.jpg</div> </div> Tue, 02 Feb 2016 07:02:40 +0000 sgupta 7624 at NSA whistleblower Thomas Drake at U of T /news/nsa-whistleblower-thomas-drake-u-t <span class="field field--name-title field--type-string field--label-hidden">NSA whistleblower Thomas Drake at U of T</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2013-12-09T04:49:09-05:00" title="Monday, December 9, 2013 - 04:49" class="datetime">Mon, 12/09/2013 - 04:49</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">Thomas Drake, whistleblower and former senior NSA official speaks at the 福利姬自慰iSchool. (photo by Johnny Guatto)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/kathleen-o-brien" hreflang="en">Kathleen O'Brien</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Kathleen O'Brien</div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/more-news" hreflang="en">More News</a></div> <div class="field__item"><a href="/news/tags/surveillance" hreflang="en">Surveillance</a></div> <div class="field__item"><a href="/news/tags/privacy" hreflang="en">Privacy</a></div> <div class="field__item"><a href="/news/tags/ischool" hreflang="en">iSchool</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>Thomas Drake, whistleblower and former senior National Security Agency (NSA) official, began his talk at the University of Toronto by telling the audience that he was&nbsp;told at the airport that&nbsp;his American passport was not enough to get into the country.</p> <p>He had to&nbsp;provide papers showing he was invited to give a lecture at U of T's&nbsp;Faculty of Information (iSchool).</p> <p>Drake cited this&nbsp;as an example of what鈥檚 at stake for democracy and liberty as he began his talk, "Secret NSA/CSEC Surveillance versus Democracy: What's at Stake for the US &amp; Canada?"</p> <p>With interested followers from around the world watching a live feed,&nbsp;Drake explained how, after working at the NSA for six-and-a-half years, he was investigated and charged with espionage for allegedly disclosing secret information. The charges were dropped and since then&nbsp;Drake has devoted his life to helping citizens become more aware.</p> <p>鈥淲hen you see what I went through for five plus years, at the receiving end of a surveillance state in the US, you gain a better appreciation for what truly is at stake," Drake said. "I鈥檝e already lived in a surveillance state. And I don鈥檛 want anyone else to live it with me, and don鈥檛 want the future to be owned by a surveillance state.</p> <p>"We are individuals, human beings, we have rights. That makes us sovereign."</p> <p>Professor <strong>Andrew Clement </strong>invited Mr. Drake to speak after recent explosive disclosures made by another former NSA contractor, Edward Snowden, that have challenged notions of privacy and democracy.</p> <p>鈥淭he little we know about these surveillance agencies comes not through our usual institutions of democratic oversight, but because of a few very brave whistle blowers who have worked on the inside, and who have not been able to tolerate what they see, and who at great personal risk, expose the information to let us, the public, be much better informed, to what we have a right to,鈥 Clement said in his introduction.</p> <p>As listeners expected, Drake didn鈥檛 hold back, discussing how in a post-911 era, he feels the government has gone far beyond investigating legitimate threats.</p> <p><iframe allowfullscreen frameborder="0" height="315" src="//www.youtube.com/embed/xgg8K26dcXs" width="560"></iframe></p> <p>鈥淣ational security, an extremely overloaded phrase, is now the state religion in many democracies, including in the US, now increasingly in Canada. When you invoke the label of national security, you are exempt from all inquiries, from all queries, from oversight, and you do not question the high priests of secrecy,鈥&nbsp;Drake said.</p> <p>Master of Information student <strong>Greg Hughes</strong> said he thought the December 5&nbsp;talk was riveting. 鈥淚t was like hearing all the thoughts you've buried or put to the back of your mind about the truth of the surveillance state come to light."</p> <p>Drake urged the crowd to stand up for the truth, and support their right to freedom.</p> <p>"I will never forsake my sovereignty for the sake of the State."</p> <p>iSchool alumna <strong>Christina Darvasi</strong> watched the lecture from Mexico City and tweeted, 鈥淪o jealous I'm no longer at the iSchool to see it live.鈥</p> <p><em>Kathleen O'Brien is a writer with the iSchool at the University of Toronto.</em></p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2013-12-05-Thomas-Drake.jpg</div> </div> Mon, 09 Dec 2013 09:49:09 +0000 sgupta 5770 at New algorithm finds you, even in an untagged photo /news/new-algorithm-finds-you-even-untagged-photo <span class="field field--name-title field--type-string field--label-hidden">New algorithm finds you, even in an untagged photo</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><span>sgupta</span></span> <span class="field field--name-created field--type-created field--label-hidden"><time datetime="2013-12-03T07:35:52-05:00" title="Tuesday, December 3, 2013 - 07:35" class="datetime">Tue, 12/03/2013 - 07:35</time> </span> <div class="clearfix text-formatted field field--name-field-cutline-long field--type-text-long field--label-above"> <div class="field__label">Cutline</div> <div class="field__item">Working with his student, Professor Parham Aarabi developed a search tool that quantifies relationships between people even when they are not tagged in a photo (photo by Johnny Guatto)</div> </div> <div class="field field--name-field-author-reporters field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/authors-reporters/marit-mitchell" hreflang="en">Marit Mitchell</a></div> </div> <div class="field field--name-field-author-legacy field--type-string field--label-above"> <div class="field__label">Author legacy</div> <div class="field__item">Marit Mitchell</div> </div> <div class="field field--name-field-topic field--type-entity-reference field--label-above"> <div class="field__label">Topic</div> <div class="field__item"><a href="/news/topics/breaking-research" hreflang="en">Breaking Research</a></div> </div> <div class="field field--name-field-story-tags field--type-entity-reference field--label-hidden field__items"> <div class="field__item"><a href="/news/tags/top-stories" hreflang="en">Top Stories</a></div> <div class="field__item"><a href="/news/tags/social-media" hreflang="en">Social Media</a></div> <div class="field__item"><a href="/news/tags/privacy" hreflang="en">Privacy</a></div> <div class="field__item"><a href="/news/tags/nserc" hreflang="en">NSERC</a></div> <div class="field__item"><a href="/news/tags/engineering" hreflang="en">Engineering</a></div> <div class="field__item"><a href="/news/tags/research" hreflang="en">Research</a></div> <div class="field__item"><a href="/news/tags/global" hreflang="en">Global</a></div> </div> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>A new algorithm designed at the University of Toronto has the power to profoundly change the way we find photos among the billions on social media sites such as Facebook and Flickr.&nbsp;</p> <p>And, this month, the United States Patent and Trademark Office will issue a patent on this technology.</p> <p>Developed by <strong>Parham Aarabi</strong>, a professor in The Edward S. Rogers Sr. Department of Electrical &amp; Computer Engineering, and his former master鈥檚 student <strong>Ron Appel</strong>, the search tool uses tag locations to quantify relationships between individuals, even those not tagged in any given photo.</p> <p>Imagine you and your mother are pictured together, building a sandcastle at the beach. You鈥檙e both tagged in the photo quite close together. In the next photo, you and your father are eating watermelon. You鈥檙e both tagged.</p> <p>Thanks to your close 鈥榯agging鈥 relationship with both your mother in the first picture and your father in the second, the algorithm can determine that a relationship exists between those two and quantify how strong it may be. In a third photo, you fly a kite with both parents, but only your mother is tagged. Given the strength of your 鈥榯agging鈥 relationship with your parents, when you search for photos of your father the algorithm can return the untagged photo because of the very high likelihood he鈥檚 pictured.</p> <p>鈥淭wo things are happening: we understand relationships, and we can search images better,鈥 says Professor Aarabi.</p> <p>The nimble algorithm, called relational social image search, achieves high reliability without using computationally-intensive object-recognition or facial-recognition software.</p> <p><img alt src="/sites/default/files/algorithm-infographic-13-12-03.jpg" style="margin: 15px 10px; width: 655px; height: 491px">鈥淚f you want to search a trillion photos, normally that takes at least a trillion operations. It鈥檚 based on the number of photos you have,鈥 says Aarabi. 鈥淔acebook has almost half a trillion photos, but a billion users 鈥 it鈥檚 almost a 500 order of magnitude difference. Our algorithm is simply based on the number of tags, not on the number of photos, which makes it more efficient to search than standard approaches.鈥</p> <p>Work on this project began in 2005 in Aarabi鈥檚 Mobile Applications Lab, Canada鈥檚 first lab space for mobile application development.</p> <p>Currently the algorithm鈥檚 interface is primarily for research, but Aarabi aims to see it incorporated on the back end of large image databases or social networks.</p> <p>鈥淚 envision the interface would be exactly like you use Facebook search 鈥 for users, nothing would change. They would just get better results,鈥 says Aarabi.</p> <p>While testing the algorithm, Aarabi and Appel discovered an unforeseen application: a new way to generate maps. They tagged a few photographs of buildings around the University of Toronto and ran them through the system with a bunch of untagged campus photos.</p> <p>鈥淭he result we got was of almost a pseudo-map of the campus from all these photos we had taken, which was very interesting,鈥 says Aarabi.</p> <p>This work received support from the National Science and Engineering Research Council of Canada. It will be presented at the IEEE International Symposium on Multimedia December 10.</p> <p><em>Marit Mitchell is a writer with the Faculty of Applied Science &amp; Engineering</em></p> </div> <div class="field field--name-field-news-home-page-banner field--type-boolean field--label-above"> <div class="field__label">News home page banner</div> <div class="field__item">Off</div> </div> <div class="field field--name-field-picpath field--type-string field--label-above"> <div class="field__label">picpath</div> <div class="field__item">sites/default/files/2013-11-29--Parham-Aarabi-(10).jpg</div> </div> Tue, 03 Dec 2013 12:35:52 +0000 sgupta 5756 at