2011 curriculum ist110
TRANSCRIPT
![Page 1: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/1.jpg)
The College of Information
Sciences and Technology
ist.psu.edu
![Page 2: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/2.jpg)
The College of IST mission is to
build knowledge and information
skills to meet the needs of the
Information Age.
![Page 3: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/3.jpg)
Information Sciences & Technology
Library Science
Information retrieval
Search methods
Information taxonomy and ontology
Other Areas
Physics
Mathematics
Political Science
Law
Medical school
Sociology
Social networking
Crime and Terrorism
Human terrain modeling
Psychology
Human subject experience design
Psychology of terrorism
Cognition in decision-making
Industrial Engineering
Ergonomics
Human System Interaction
Science of System Design
Computer Science and Engineering
Programming
Database
Algorithm development
Computer cyber security
Electrical Engineering
Signal processing
Image processing
Data fusion
Business
Enterprise architecture
Management of Information Systems
Decision theory
Economics of information systems
IST integrates multiple perspectives.
![Page 4: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/4.jpg)
What do you
study in the
College
of Information
Sciences and
Technology?
![Page 5: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/5.jpg)
The College of IST offers two majors.
IST Major
College of IST
SRA Major
![Page 6: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/6.jpg)
THAT’S IST
How can I design,
analyze, critique, or make
use of information
technologies to help
people do what they want
to do?
![Page 7: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/7.jpg)
Degrees in IST Major
B.S. in Information Sciences and Technology
B.A. in Information Sciences and Technology
![Page 8: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/8.jpg)
Freshman
Information, People, and Technology
Intro to Computing
Freshman/Sophomore
Organization of Data
Networking and Telecommunications
Discrete Math
Computer Languages
Junior
Information and Organizations
User and System Principles
Junior/Senior
(21 credits)
Option to Study Design and
Development
Option to Study Integration of Computing
Systems
Option to Study Context in Which
People Use Technology
Senior
Capstone
Internship
In IST, you will learn:
![Page 9: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/9.jpg)
IST Bachelor of Science (ISTBS)
9
Design
and
Development
Integration
and
Application
Information
Context
Intelligence Analysis and Modeling
Information and Cyber Security
Social Factors and Risk
Make Cool Stuff
Understand programming, database, human computer
interaction, knowledge representation, search
engines, characteristics of users.
Make Businesses’ Use of Information More Efficient
Understand information
acquisition, representation, dissemination, storage, retrieval, dis
play, and interpretation.
Make Sense of Impact of Information Systems
Understand the use and impact of IS at the
individual, group, organizational, national and international levels
(e.g., social networks, crowd sourcing, digital natives/digital
immigrants).
![Page 10: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/10.jpg)
Minors fit easily in IST, especially:
Security & Risk Analysis
Supply Chain (esp. with Integration & Applica.)
Telecommunication
Music Technology
Economics
Engineering Leadership
Language
![Page 11: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/11.jpg)
11
ISTBA combines your passions: IT + ?
![Page 12: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/12.jpg)
How can I help others
make informed decisions
when information or
people are at risk?
THAT’S SRA
![Page 13: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/13.jpg)
Degrees in SRA Major
B.S. in Security and Risk Analysis
![Page 14: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/14.jpg)
In SRA, you will learn:
Freshman
Introduction to Security and Risk
Analysis
Threat of Terrorism and Crime
Introduction to People, Information,
and Technology
Intro to Computing
Sophomore
Decision Theory and Analysis
Overview of Information Security
Junior
Risk Management: Assessment and
Mitigation
Legal, Ethical, and Regulatory Issues
Junior/ Senior
(21 credits)
Option to Study Intelligence
Analysis
Option to Study Cyber Security
Option to Study Policy and Risk
Senior
Capstone
Internship
![Page 15: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/15.jpg)
SRA Bachelor of Science (B.S.)
15
Information
and
Cyber Security
Intelligence
Analysis and
Modeling
Social Factors
and Risk
Intelligence Analysis and Modeling
Information and Cyber Security
Social Factors and Risk
Make Information Systems Secure
Understand how to deal with security and privacy concerns in all
types of organizations, ensure that computer systems and
products are secure and how to “police” cyberspace.
Make Risk Predictions
Understand how to calculate, evaluate, and predict risk in a
variety of fields including business and national security; students
learn how to protect vital infrastructure against subversive
attacks.
Make Sense of Contextual Elements surrounding Risk
Understand the psychological and sociological causes of
terrorism and crime and how information technology is
transforming each; understand privacy policies and government
regulation to ensure users that data are secure.
![Page 16: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/16.jpg)
Minors are trickier to plan for SRA.
Information Sciences & Technology
Political Science
Global Security
Language (if use all electives and take more than 15 credits per semester)
![Page 17: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/17.jpg)
College of IST is where
people, information, and technology
meet.
People
Information
Technology
IST
![Page 18: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/18.jpg)
People Technology
interact with
using
Information
IST / SRA
![Page 19: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/19.jpg)
Technology
protect
sharestore
access
modify
analyze
organize
using
create
Information
People
IST / SRA
![Page 20: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/20.jpg)
Technology
protect
sharestore
access
modify
analyze
organize
using
create
emergency
response teams
data on
wildfire activity
geospatial
mapping
Information
People
IST / SRA
![Page 21: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/21.jpg)
Technology
protect
sharestore
access
modify
analyze
organize
using
create
Black Eyed Peas
fans
digital music
new iPod
applicationsInformation
People
IST / SRA
![Page 22: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/22.jpg)
Technology
protect
sharestore
access
modify
analyze
organize
using
create
managers (in any
organization—
Wal-Mart,
Geico…)
financial and
manufacturing
data that exists in
different
databases
integrated
software
systems (that
enable data to
be accessed and
shared across
databases)
Information
People
IST / SRA
![Page 23: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/23.jpg)
Technology
protect
sharestore
access
modify
analyze
organize
using
create
Amazon.com
buyer history
privacy policies
that abide by
information
security
regulations
Information
People
IST / SRA
![Page 24: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/24.jpg)
Technology
protect
sharestore
access
modify
analyze
organize
using
create
corporations
communication,
documents, data
recommended
firewall, authent
ication, and
other security
technologiesInformation
People
IST / SRA
![Page 25: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/25.jpg)
IST is where people, information, and
technology meet.
![Page 26: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/26.jpg)
Questions?
ist.psu.edu
![Page 27: 2011 curriculum ist110](https://reader036.vdocuments.net/reader036/viewer/2022070323/5598aaf81a28abb43f8b4621/html5/thumbnails/27.jpg)
IST/SRA have exciting research opportunities.
http://prezi.com/29mzk7pqjjtz/accepted-students-program-college-of-ist