Q&A: Privacy engineers could hold the key
By The Tribune-Review
Published: Saturday, Dec. 15, 2012, 9:22 p.m.
Lorrie Faith Cranor is an associate professor of computer science and of engineering and public policy at Carnegie Mellon University. She serves as the director of the CyLab Usable Privacy and Security Laboratory and co-director of CMU's new master of science program in information technology-privacy engineering, which begins next fall.
Cranor spoke to the Trib about the new program — the first of its kind in the world — which is intended for students seeking to play a significant role in building privacy into future products, services and processes.
Q: How did this program originate?
A: There are a group of faculty members at Carnegie Mellon who have been doing research in online privacy, and we've offered a number of courses related to privacy over the years (but) we haven't actually had a degree in privacy. And increasingly we've been hearing from companies who approach us and say they're trying to hire a privacy engineer and ask if we have any graduating students who are qualified. We decided we really needed to start a master's degree program focused on privacy engineering. There are no other privacy engineering degrees in existence anywhere.
Q: And what exactly is privacy engineering? Can you put that in layman's terms?
A: Take a social networking company, for example, that is building new tools that help people share their photos and their thoughts with friends. But it raises a lot of privacy issues. The simple privacy solution is to turn off a lot of sharing and don't let people do the fun things. But that is not what you want to do. You want to find solutions that give people the ability to control who can see their posts and who can't and allow them to control their own privacy but still get to do the things for the reasons why they signed up for the social network. A privacy engineer is someone who understands the engineering and the privacy sides and works out strategies that allows people to protect privacy without getting in the way of building cool things.
Q: What curriculum will the program have?
A: It includes courses (offering) a background in privacy law and regulation in the United States and throughout the world, courses in how to use technology to protect privacy, which gets into encryption algorithms and some of the really technical nuts and bolts. We have courses in software engineering and privacy, courses in how to factor in usability and human factors in dealing with privacy and secure systems.
Q: You're saying the program is multidisciplinary, so what type of undergraduate degrees should students have coming into it?
A: We want students who have a solid technical background, so computer science or engineering degrees are good, and then (they also should have) an interest in privacy or public policy issues.
Q: How much interest in the program has there been thus far?
A: We've had a lot of interest from companies that are saying, “When are you going to graduate your first students, we want to hire them,” which is fantastic. We haven't yet had as much interest from prospective students — so we're attempting to get the word out that we have this program and we think there will be some very good jobs for people after they graduate.
Eric Heyl is a staff writer for Trib Total Media. He can be reached at 412-320-7857 or firstname.lastname@example.org.
Show commenting policy
TribLive commenting policy
You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.
We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.
While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.
We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers.
We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.
We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.
We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.
We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.
- Kovacevic: Big Ben’s contract clock ticking
- Taillon among 6 Pirates send to minor league camp
- Parking tickets in Downtown Pittsburgh spark outrage
- Talented center Sutter is proving to be ‘pretty important’ for Penguins
- Western Pennsylvania engineer aboard missing Malaysia Airlines flight
- Democratic governor candidate Wagner remains confident amid skepticism
- Analysis: Kesler still on Pens’ radar as Shero aims to bring back ‘Big 3’
- Penn State’s Franklin cherishes memories of time spent in Pittsburgh
- Penguins notebook: Beau Bennett returns to practice
- Pitt looking to enhance profile at ACC tourney
- Starkey: Steelers know when to say goodbye