{"id":213,"date":"2021-04-13T14:43:38","date_gmt":"2021-04-13T18:43:38","guid":{"rendered":"https:\/\/cecas.clemson.edu\/ideas\/?p=213"},"modified":"2021-04-26T15:40:51","modified_gmt":"2021-04-26T19:40:51","slug":"cybersecurity-protecting-privacy-online","status":"publish","type":"post","link":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/","title":{"rendered":"Protecting privacy online"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-sticky-container\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:10px;--awb-padding-right:0px;--awb-padding-bottom:10px;--awb-padding-left:0px;--awb-background-color:#000000;--awb-sticky-background-color:#000000 !important;--awb-flex-wrap:wrap;\" data-transition-offset=\"0\" data-scroll-offset=\"400\" data-sticky-small-visibility=\"1\" data-sticky-medium-visibility=\"1\" data-sticky-large-visibility=\"1\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/cecas.clemson.edu\/ideas\/\" target=\"_self\" aria-label=\"IDEAS-Header-Logo-100px-White\"><img decoding=\"async\" width=\"100\" height=\"31\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/IDEAS-Header-Logo-100px-White.svg\" alt class=\"img-responsive wp-image-689\"\/><\/a><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility\" style=\"--awb-background-position:center top;--awb-border-sizes-bottom:0;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:25%;--awb-padding-bottom:0px;--awb-margin-bottom:0px;--awb-background-color:#000000;--awb-background-image:linear-gradient(360deg, rgba(255,255,255,0) 100%,#000000 100%),url(https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/iStock-1138332616.jpg);;--awb-background-size:cover;--awb-flex-wrap:wrap;\" id=\"protecting-privacy-online-hero\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-end fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-padding-bottom:0px;--awb-bg-image:linear-gradient(180deg, rgba(255,255,255,0) 0%,#000000 100%);--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#efdbb2;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:150PX;\"><h1 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto Condensed&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;line-height:0.75;\">PROTECTING PRIVACY ONLINE<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container hundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-background-position:center top;--awb-border-sizes-bottom:0;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-padding-top-small:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-background-color:#000000;--awb-background-image:linear-gradient(180deg, rgba(0,0,0,0.05) 50%,#000000 100%);--awb-flex-wrap:wrap;\" id=\"protecting-privacy-online-hero\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-padding-bottom:0px;--awb-padding-top-small:0px;--awb-padding-right-small:0px;--awb-padding-left-small:0px;--awb-bg-image:linear-gradient(180deg, rgba(255,255,255,0) 0%,#000000 100%);--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-right:0px;--awb-margin-bottom:20px;--awb-margin-left:0px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1000\" height=\"506\" title=\"privacy-mobile\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/privacy-mobile.jpg\" alt class=\"img-responsive wp-image-2653\" srcset=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/privacy-mobile-200x101.jpg 200w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/privacy-mobile-400x202.jpg 400w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/privacy-mobile-600x304.jpg 600w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/privacy-mobile-800x405.jpg 800w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/privacy-mobile.jpg 1000w\" sizes=\"(max-width: 800px) 100vw, 1000px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#efdbb2;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:63PX;\"><h1 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto Condensed&quot;;font-style:normal;font-weight:700;margin:0;font-size:1em;line-height:0.75;\">PROTECTING PRIVACY ONLINE<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container hundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#efdbb2;border-color:#efdbb2;border-top-width:40px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container hundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#efdbb2;border-color:#efdbb2;border-top-width:15px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-repeat:repeat-x;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:30px;--awb-padding-top-small:20px;--awb-padding-bottom-small:20px;--awb-margin-top-small:5px;--awb-background-image:url(&quot;https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/Purple-Seperator-Grid-Square-40x60-1.svg&quot;);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-sizes-top:0;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-top-small:15px;--awb-background-color:#000000;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-padding-top:0px;--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-font-size:13px;--awb-line-height:1;--awb-margin-top:0px;--awb-margin-bottom:15px;\"><div style=\"text-align: center;\"><\/div>\n<p><strong><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-margin-right:10px;--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\" style=\"border-radius:50%;\"><img decoding=\"async\" width=\"100\" height=\"100\" title=\"paul-alongi\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/paul-alongi.jpg\" alt class=\"img-responsive wp-image-2198\" srcset=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/paul-alongi-66x66.jpg 66w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/paul-alongi.jpg 100w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/span><\/div><span style=\"color: #ffffff;\">By Paul Alongi,<\/span><\/strong><span style=\"color: #ffffff;\"> Clemson University<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#efdbb2;--awb-margin-top:20px;--awb-margin-bottom:30px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-margin-bottom-medium:15px;--awb-font-size:20px;\"><h3 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto&quot;;font-style:normal;font-weight:400;margin:0;font-size:1em;line-height:1.4;\"><p style=\"color: #8560b3; font-size: 26px; line-height: 1.2;\"><strong>Many social media users know the feeling.<\/strong><\/p>\n<p style=\"font-size: 18px; line-height: 1.2;\">You\u2019re scrolling through photos of family and friends when you suddenly see an ad for a product that you\u2019ve been thinking about buying. You haven\u2019t told a single soul you\u2019ve wanted this product, and you haven\u2019t even searched for it on Google or Amazon.<\/p>\n<p style=\"font-size: 18px; line-height: 1.2;\">Yet there it is, glowing up at you from your smartphone screen, and you can\u2019t help but wonder, \u201cHow did they know?\u201d<\/p><\/h3><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-font-size:16px;--awb-line-height:22.4px;\"><p><span class=\"fusion-dropcap dropcap\" style=\"--awb-color:#8560b3;\" id=\"protecting-privacy-drop-cap\">T<\/span>he privacy concerns that come with the lightning-fast immediacy and convenience of internet-connected life have become a central focus for <b>Bart Knijnenburg,<\/b> an assistant professor of human-centered computing at Clemson University.<\/p>\n<p>It\u2019s not practical for most people to simply go off the grid, totally disconnecting from all internet and social media activity, Knijnenburg said. But it is possible, he said, to find a trade-off between privacy and enjoying the benefits of online services.<\/p>\n<p>Knijnenburg is helping find a middle way with research that merges privacy, artificial intelligence and recommender systems.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-sizes-top:0;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-background-color:#000000;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"1000\" height=\"607\" title=\"bart\" src=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/bart.jpg\" alt class=\"img-responsive wp-image-1752\" srcset=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/bart-200x121.jpg 200w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/bart-400x243.jpg 400w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/bart-600x364.jpg 600w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/bart-800x486.jpg 800w, https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/04\/bart.jpg 1000w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-font-size:12px;--awb-text-color:#888b8d;--awb-margin-top:20px;--awb-margin-bottom:30px;\"><p style=\"text-align: center;\"><b>Bart Knijnenburg (Center), <\/b>Assistant Professor<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:16px;--awb-line-height:22.4px;\"><p>He has developed what he calls \u201cuser-tailored privacy\u201d that works on the same idea that Netflix uses to figure out your viewing preferences and then recommend shows you might like. A tailored privacy system tries to find out what your privacy preferences are and then give you the settings that fit those preferences.<\/p>\n<p>It helps offer alternatives to some common hurdles that users face when signing up for internet services. Many services ask users to agree to privacy policies that run several pages long, and many offer an overwhelming number of privacy settings.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling callout\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom-small:0px;--awb-background-color:#2e1a47;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:40px;--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-quote-left fas circle-no\" style=\"--awb-font-size:32px;--awb-align-self:center;--awb-margin-top:0px;--awb-margin-right:0px;--awb-margin-bottom:15px;--awb-margin-left:0px;\"><\/i><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two fusion-animated\" style=\"--awb-text-color:#ffffff;--awb-margin-top:0px;--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"0.5\" data-animationOffset=\"top-into-view\"><h2 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Merriweather&quot;;font-style:normal;font-weight:400;margin:0;\">With every online purchase and filled out survey and Facebook post, we are slowly but steadily chipping away at our privacy. You know, once this kind of information is out there, you can never get it back.<\/h2><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:#dbdbdb;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;--awb-font-size:16px;\"><h3 class=\"fusion-title-heading title-heading-center\" style=\"font-family:&quot;Roboto&quot;;font-style:normal;font-weight:500;margin:0;font-size:1em;\"><b><\/b><\/p>\n<p>Bart Knijnenburg, Assistant Professor<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-sizes-top:0;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:40px;--awb-padding-bottom:20px;--awb-padding-bottom-small:0px;--awb-background-color:#000000;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\" style=\"--awb-font-size:16px;--awb-line-height:22.4px;\"><p>\u201cCompanies are giving people outrageous options of sharing their information so they get biased toward sharing more,\u201d Knijnenburg said. \u201cIt shows that people are not very capable of dealing with that deluge of privacy settings.\u201d<\/p>\n<p>In one study Knijnenburg led, he and his team showed participants more than 1,000 different ways a smart home could use and share data. Participants were asked if they would allow each scenario or not.<\/p>\n<p>The team did data analysis on those decisions and then clustered people into different groups. The team ended up with a set of privacy profiles it could offer users.<\/p>\n<p>\u201cWhat we essentially did is we used machine learning to translate people\u2019s privacy preferences into settings,\u201d he said. \u201cSo rather than you having to figure out what your preferences are and then set every single setting manually, now what you have to do is figure out which kind of person are you and click one button and make one choice about those preferences. Then every setting in the system gets tweaked automatically based on that analysis we did.\u201d<\/p>\n<p>The resulting paper, <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3241378\">\u201cA Data-Driven Approach to Designing for Privacy in Household IoT,\u201d<\/a> was published in ACM Transactions on Interactive Intelligent Systems.<\/p>\n<p>Part of what makes Knijnenburg optimistic about the future is that his work is being funded not only by government agencies, including the National Science Foundation, but also some of the companies that could use the technology he is developing.<\/p>\n<p>\u201cI think that gives an idea that many of them increasingly realize that the current situation is not a viable path forward,\u201d he said. \u201cIn the end, people will vote with their feet.\u201d<\/p>\n<p>Knijnenburg outlined his research in a TEDx Talk at the University of California, Irvine. <span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">Hear about the solution in <a href=\"https:\/\/www.youtube.com\/watch?v=B0caMgxkMzE&amp;t=184s\">the full talk.<\/a>\u00a0 <i class=\"fb-icon-element-2 fb-icon-element fontawesome-icon fa-th fas circle-no fusion-text-flow\" style=\"--awb-iconcolor:#D2ADFF;--awb-iconcolor-hover:#D2ADFF;--awb-font-size:12px;--awb-margin-right:6px;\"><\/i><\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A system created at Clemson University aims to help people enjoy the benefits of online services without sacrificing their privacy.<\/p>\n","protected":false},"author":10,"featured_media":544,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,24,19],"tags":[],"class_list":["post-213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-research","category-spring-2021"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting privacy online - IDEAS Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting privacy online - IDEAS Magazine\" \/>\n<meta property=\"og:description\" content=\"A system created at Clemson University aims to help people enjoy the benefits of online services without sacrificing their privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/\" \/>\n<meta property=\"og:site_name\" content=\"IDEAS Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ClemsonCECAS\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T18:43:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-26T19:40:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Lee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Lee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"36 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/\"},\"author\":{\"name\":\"David Lee\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#\\\/schema\\\/person\\\/91743b9570d9b165ba222f4c693fb8a6\"},\"headline\":\"Protecting privacy online\",\"datePublished\":\"2021-04-13T18:43:38+00:00\",\"dateModified\":\"2021-04-26T19:40:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/\"},\"wordCount\":7246,\"image\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/bkatted.jpg\",\"articleSection\":[\"Cybersecurity\",\"Research\",\"Spring 2021\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/\",\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/\",\"name\":\"Protecting privacy online - IDEAS Magazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/bkatted.jpg\",\"datePublished\":\"2021-04-13T18:43:38+00:00\",\"dateModified\":\"2021-04-26T19:40:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#\\\/schema\\\/person\\\/91743b9570d9b165ba222f4c693fb8a6\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/bkatted.jpg\",\"contentUrl\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/bkatted.jpg\",\"width\":1000,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/cybersecurity-protecting-privacy-online\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting privacy online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#website\",\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/\",\"name\":\"IDEAS Magazine\",\"description\":\"The flagship Publication of the Clemson College of Engineering, Computing and Applied Sciences\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/#\\\/schema\\\/person\\\/91743b9570d9b165ba222f4c693fb8a6\",\"name\":\"David Lee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g\",\"caption\":\"David Lee\"},\"url\":\"https:\\\/\\\/cecas.clemson.edu\\\/ideas\\\/author\\\/daveroblee\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting privacy online - IDEAS Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/","og_locale":"en_US","og_type":"article","og_title":"Protecting privacy online - IDEAS Magazine","og_description":"A system created at Clemson University aims to help people enjoy the benefits of online services without sacrificing their privacy.","og_url":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/","og_site_name":"IDEAS Magazine","article_publisher":"https:\/\/www.facebook.com\/ClemsonCECAS","article_published_time":"2021-04-13T18:43:38+00:00","article_modified_time":"2021-04-26T19:40:51+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted.jpg","type":"image\/jpeg"}],"author":"David Lee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Lee","Est. reading time":"36 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/#article","isPartOf":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/"},"author":{"name":"David Lee","@id":"https:\/\/cecas.clemson.edu\/ideas\/#\/schema\/person\/91743b9570d9b165ba222f4c693fb8a6"},"headline":"Protecting privacy online","datePublished":"2021-04-13T18:43:38+00:00","dateModified":"2021-04-26T19:40:51+00:00","mainEntityOfPage":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/"},"wordCount":7246,"image":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/#primaryimage"},"thumbnailUrl":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted.jpg","articleSection":["Cybersecurity","Research","Spring 2021"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/","url":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/","name":"Protecting privacy online - IDEAS Magazine","isPartOf":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/#primaryimage"},"image":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/#primaryimage"},"thumbnailUrl":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted.jpg","datePublished":"2021-04-13T18:43:38+00:00","dateModified":"2021-04-26T19:40:51+00:00","author":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/#\/schema\/person\/91743b9570d9b165ba222f4c693fb8a6"},"breadcrumb":{"@id":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/#primaryimage","url":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted.jpg","contentUrl":"https:\/\/cecas.clemson.edu\/ideas\/wp-content\/uploads\/2021\/03\/bkatted.jpg","width":1000,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/cecas.clemson.edu\/ideas\/cybersecurity-protecting-privacy-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cecas.clemson.edu\/ideas\/"},{"@type":"ListItem","position":2,"name":"Protecting privacy online"}]},{"@type":"WebSite","@id":"https:\/\/cecas.clemson.edu\/ideas\/#website","url":"https:\/\/cecas.clemson.edu\/ideas\/","name":"IDEAS Magazine","description":"The flagship Publication of the Clemson College of Engineering, Computing and Applied Sciences","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cecas.clemson.edu\/ideas\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cecas.clemson.edu\/ideas\/#\/schema\/person\/91743b9570d9b165ba222f4c693fb8a6","name":"David Lee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/90e9fc370e8f189ae110711194bda57cefd5896cbfcee1bcf05abdf33bf0f96a?s=96&d=mm&r=g","caption":"David Lee"},"url":"https:\/\/cecas.clemson.edu\/ideas\/author\/daveroblee\/"}]}},"_links":{"self":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts\/213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/comments?post=213"}],"version-history":[{"count":86,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts\/213\/revisions"}],"predecessor-version":[{"id":1822,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/posts\/213\/revisions\/1822"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/media\/544"}],"wp:attachment":[{"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/media?parent=213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/categories?post=213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cecas.clemson.edu\/ideas\/wp-json\/wp\/v2\/tags?post=213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}