7. IST enables: People Technology Information create organize share using store protect access analyze modify
8. IST enables: People Technology new iPod applications Information students create organize share using store protect access digital music analyze modify
9. IST enables: People Technology firewall, authentication, and other security technologies that will keep your information safe Information PSU academic and financial advisors create organize share store using protect access private information in your student files analyze modify
10. IST enables: People Technology integrated software systems (that allow the information to be accessed and coordinated across databases) managers (in any organization—Walmart, Geico, Proctor & Gamble…) Information create organize share store using financial and manufacturing information that exists in different databases protect access analyze modify
11. IST enables: People Technology Internet Information government create organize share store using well-informed laws about sharing private information protect access analyze modify
13. IST Bachelor of Science (ISTBS) Design, implementation, integration, and utilization of information systems (IS) Design and Development Integration and Application Information Context Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk Make Cool Stuff Understand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users. Make Businesses’ Use of Information More Efficient Understand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation. Make Sense of Impact of Information Systems Understand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants). 13
22. SRA Bachelor of Science (B.S.) Design, implementation, integration and utilization of information systems (IS) Information and Cyber Security Intelligence Analysis and Modeling Social Factors and Risk Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk Make Information Systems Secure Understand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace. Make Risk Predictions Understand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks. Make Sense of Contextual Elements surrounding Risk Understand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure. 22
25. What We Are Where information, people, and technology meet. Where careers in information technologies abound. Where students understand the effects of information technology on themselves, other individuals, organizations, and society. Where you will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis. 25
Well, here is our mission…What is the “Information Age”? Take a minute to think about Information all around you. What information have you produced, come in contact with, or ignored in the last 10 minutes?(Bar code on card you handed in, iPod, mobile phone, PPT slide)Think about your life, day-in, day-out. Information is all around you—and we increasingly rely on it to make our lives work.STORY: Steve asking me a question and none of us knew the answer in the meeting. What did we do? What would we have done 5 years ago? 10 years ago? Parents—30 years ago?This IS the information age; and this College was created to pioneer research, education, and forward thinking in this new era.Here is a quick example…
Have you ever done this—”Where is the closest Starbucks?” (If you don’t drink coffee now, you just might when you get to college…)
First you search for Penn State area
Then you search for Starbucks near Penn State. College Avenue appears. Sounds close!!
Then you look at the street view--ah-ha!! This is what we drove by this morning!! Think about all the things involved in this quick interaction with your information technology device.You, the person, want something (coffee). You need information (location of Starbucks).You turn to the technology in your hand to get the information (iPod).Someone who works for Google anticipated this need. The Google Maps Vehicle driver drove through town and collected videos of street views. Someone organized, labeled, and stored them.Someone wrote a program to deliver that image over the Internet.You made use of all this: the information, the information databases where the info was stored, the networks through which the data was passed, and the programs that someone wrote to get the information to you.And then you drank your coffee.THIS is the information age. And there is much more…
Let’s go back to what our website said: IST is about the interaction of people, tech, and info. Let’s put a few more words around this interaction to make more sense of this statement.THEN (after all animations):Can you give one example people who use information technologies? (How about people searching for a college???)What information might those people want or need?What might they want to do with the information?What technologies might they use?Let’s look at some other examples.
Let’s look at some examples…How do we enable this to happen? We teach students what they need to know to be able to:develop applications for iPods
How about another example…How do we enable this to happen? We teach students what they need to know to be able to:Protect an organization’s private information
Here’s an example from our most popular area of study…How do we enable this to happen? We teach students what they need to know to be able to:Consult with corporations that need help making their various systems of information “talk” to each other more efficiently
And if you are interested in policy-related aspects of information technology use, how about this example…How do we enable this to happen? We teach students what they need to know to be able to:Advise on policy-making regarding the internet regulations and lawsDOES THIS HELP GIVE YOU A SENSE OF WHAT WE ARE CONCERNED WITH IN THIS COLLEGE??? (Please ask now if you have questions…)
Let’s take a closer look at the degrees we offer—first the B.S. in IST. Here is where it can get confusing—we have a major with the same name as the College. But I will try to be specific in referring to one or the other.
We offer 3 options—see slide--Design next iPhone application…--Help PSU move from archaic system of student information to a newer one that allows people with appropriate access to view financial, medical, academic, payroll info from one system--Determine how to disseminate information about the next earthquake to rural villages in developing countries
ALL students in the IST-B.S. major learn…
On screen are companies that hire IST graduates.Here are some job titles:Applications DeveloperIT ConsultantAssistant Project ManagerIT Infrastructure AnalystBusiness Systems AnalystIT Solutions ArchitectChange Management AnalystIT Systems EngineerData AnalystImplementation specialistDesign EngineerMultimedia Specialist Forensics and Analysis ConsultantTechnology Support SpecialistWeb Developer
New this past year: Craft your own degree by integrating different disciplines and your personal passions with ISTUnderstand potential applications AthleticsArtBusinessScienceHistoryMedical-informatics Legal-informatics Bio-informatics Enviro-informatics Business-informatics ChemometricsEnterprise informatics
Our SECOND B.S. is in “Security and Risk Analysis.”
The Security and Risk Analysis major focuses on how to design systems that are secure (while still allowing people to work), how to measure risk, and how to make decisions to ensure that proper levels of privacy are maintained for individual technology users, businesses, government, and other organizations. The SRA major promotes an understanding of information system design and operation, and of the legal and cultural issues surrounding privacy, intelligence, and security.Students learn about:Computer securityNetwork securityCyber crime The politics and “business” of terrorism Offensive and defensive use of computer and information networksDecision theoryPrivacy and legal/regulatory issues Implications of digital social networking Let’s take a look at a few examples of what our SRA students are prepared to face…
Students help protect individuals from phishing –where someone seeks personal information under false pretense—e.g., Hallmark cards and Google jobs
Students help prevent and investigate Business threatsFirst article, network breach: Federal Fire Department workers are being asked to look for unusual activity on bank accounts because an employee wrongfully accessed their information.Second article: privacy at risk: potential Chinese hackers at Google
Students help protect national security interests…We see plenty of articles in the news about Government-industry partnership to targets cyber security threats.
We offer three options:ICS—IF INTERESTED IN MAKING SYSTEMS SECURE, THINK ICS --- Students do VIRTUAL LABS where…IAM—IF MORE INTERESTED IN PREDICTION AND RISK ANALYSIS, CONSIDER IAM -- Students work for 3-letter agencies (CIA, and so forth) Teaches students how to calculate, evaluate, and predict risk in a variety of fields, including business and national security. SFR IF MORE INTERESTED IN WHAT MAKES PEOPLE TICK, CONSIDER SFR – Leading faculty in the field of terrorism and privacy, and sociology of crime!!In this option, students explore the psychological and sociological causes of terrorism and crime, and how information technology is transforming each. In the classroom, students work on teams in which they role-play both terrorists and criminals and the intelligence and security officers combating them. This option also examines the privacy policies and legal regulations within companies and the government. Students learn to critically read privacy policies and understand government regulation so they can help improve their own privacy policies and ensure users that the data they provide is secure.
ALL students in the SRA-B.S. major learn…
On screen are companies that hire SRA graduates.Here are some job titles:Catastrophe Risk AnalystIT AnalystComputer System Security AnalystsIT Consulting ManagerCyber AnalystIT Strategy ArchitectCyber Network Security EngineerNetwork Intel AnalystsData Security AdministratorNetwork Security Engineer Enterprise ArchitectSystems AdministrationInformation Assurance AnalystsSystems Enterprise Architect Information Assurance RemediationSystems Integration AnalystsInformation Assurance/Security EngineersSecurity Project ManagerIntel AnalystsSystems Integration EngineerIntrusion Detection AnalystWeb Security & Privacy Specialist
In Summary… We are the College where…information, people, and technology meetcareers in information technologies aboundstudents to understand the effects of information technology on themselves, other individuals, organizations, and societyyou will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis
Now, YOU can take a look at IST—with this website created just for first-year students…Be sure to check out:--Which option is for me Quiz--Descriptions of majors and options--videos of former students--resources in IST for students--and more!