SlideShare a Scribd company logo
The College of Information Sciences and Technology What is IST? What can I do with IST/SRA? Is this a good fit for me?
Mission Build knowledge  and information skills  to meet the needs  of the new Information Age.   2
Information Age: Need Coffee 3
Google Maps 4
Starbucks 5
Street View 6
IST enables: People Technology Information create organize share using store protect access analyze modify
IST enables: People Technology new iPod applications Information students create organize share using store protect access digital music analyze modify
IST enables: People Technology firewall, authentication, and other security technologies that will keep your information safe Information PSU academic and financial advisors create organize share store using protect access private information in your student files analyze modify
IST enables: People Technology integrated software systems (that allow the information to be accessed and coordinated across databases) managers (in any organization—Walmart, Geico, Proctor & Gamble…) Information create organize share store using financial and manufacturing information that exists in different databases protect access analyze modify
IST enables: People Technology Internet Information government create organize share store using well-informed laws about sharing private information protect access analyze modify
Information Sciences and Technology Information Sciences and Technology (IST) Major
IST Bachelor of Science (ISTBS)  Design, implementation, integration, and utilization of information systems (IS) Design  and  Development Integration  and  Application Information Context Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk   Make Cool Stuff Understand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users. Make Businesses’ Use of Information More Efficient Understand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation. Make Sense of Impact of Information Systems Understand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants). 13
What You Will Learn Internship 14
Companies Who Hire IST Graduates 15
IST Bachelor of Arts (ISTBA) 16
Security and Risk Analysis Security and Risk Analysis (SRA) Major
What is SRA? 18
Individual Threats 19
Business Threats 20
Threats to  our National Security 21
SRA Bachelor of Science (B.S.)  Design, implementation, integration and utilization of information systems (IS) Information and  Cyber Security Intelligence Analysis  and Modeling Social Factors and Risk Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk   Make Information Systems Secure Understand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace. Make Risk Predictions Understand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks. Make Sense of Contextual Elements surrounding Risk Understand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure.  22
What You Will Learn 23 Internship
Companies Who Hire SRA Graduates 24
What We Are Where information, people, and technology meet.  Where careers in information technologies abound. Where students understand the effects of information technology on themselves, other individuals, organizations, and society.  Where you will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis.  25
IST4Me 26 https://online.ist.psu.edu/110-ist4me/

More Related Content

What's hot

Infromation securiity
Infromation securiityInfromation securiity
Infromation securiity
Aamir Sohail
 
Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainability
Global Business Professor
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
university of education,Lahore
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
SidraAfreen
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
Ansgar Koene
 
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyer
Claude Gelinas
 
Cybersecurity jobs jb
Cybersecurity jobs jbCybersecurity jobs jb
Cybersecurity jobs jb
JenniferBraun16
 
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK Project
 
Challenges facing data protection in kenya
Challenges facing data protection in kenyaChallenges facing data protection in kenya
Challenges facing data protection in kenya
fillkay
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
Dhani Ahmad
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
INFOGAIN PUBLICATION
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
Harsh Bhanushali
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015
Anwar F.A. Dafa-Alla
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
Anax Fotopoulos
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
avinashkumar1912
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
Jeewanthi Fernando
 
IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515
A Krista Kivisild
 

What's hot (20)

Infromation securiity
Infromation securiityInfromation securiity
Infromation securiity
 
Ethical mobility policy development & sustainability
Ethical mobility policy development & sustainabilityEthical mobility policy development & sustainability
Ethical mobility policy development & sustainability
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyer
 
Cybersecurity jobs jb
Cybersecurity jobs jbCybersecurity jobs jb
Cybersecurity jobs jb
 
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
 
Challenges facing data protection in kenya
Challenges facing data protection in kenyaChallenges facing data protection in kenya
Challenges facing data protection in kenya
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015My Pres @ Red Sea_university 23-12-2015
My Pres @ Red Sea_university 23-12-2015
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-ThingsThe social aspect of Smart Wearable Systems in the era of Internet-of-Things
The social aspect of Smart Wearable Systems in the era of Internet-of-Things
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515IT-Security-Governance-Innovations_joa_Eng_0515
IT-Security-Governance-Innovations_joa_Eng_0515
 

Viewers also liked

110sadvising
110sadvising110sadvising
110sadvising
Melissa Hicks
 
IST 110s: Library Skills
IST 110s: Library SkillsIST 110s: Library Skills
IST 110s: Library Skills
Melissa Hicks
 
Ist110sacademicintegrity 13
Ist110sacademicintegrity 13Ist110sacademicintegrity 13
Ist110sacademicintegrity 13
Melissa Hicks
 
Advising FAQs
Advising FAQsAdvising FAQs
Advising FAQs
Melissa Hicks
 
Advising
AdvisingAdvising
Advising
Melissa Hicks
 
Library Lesson Plan
Library Lesson PlanLibrary Lesson Plan
Library Lesson Plan
Melissa Hicks
 
The Language of Drupal
The Language of DrupalThe Language of Drupal
The Language of Drupal
Melissa Hicks
 
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
Tobias Zander
 

Viewers also liked (8)

110sadvising
110sadvising110sadvising
110sadvising
 
IST 110s: Library Skills
IST 110s: Library SkillsIST 110s: Library Skills
IST 110s: Library Skills
 
Ist110sacademicintegrity 13
Ist110sacademicintegrity 13Ist110sacademicintegrity 13
Ist110sacademicintegrity 13
 
Advising FAQs
Advising FAQsAdvising FAQs
Advising FAQs
 
Advising
AdvisingAdvising
Advising
 
Library Lesson Plan
Library Lesson PlanLibrary Lesson Plan
Library Lesson Plan
 
The Language of Drupal
The Language of DrupalThe Language of Drupal
The Language of Drupal
 
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
"Turbo boost your website" aka BigPipe at Webinale 2014 in Berlin
 

Similar to Ist curriculum

Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
Enow Eyong
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
todd521
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
ijtsrd
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
Hansa Edirisinghe
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
Numaan Huq
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
Eliahu (Eli) Assif (Amar)
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
Infosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
Infosectrain3
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
IJCI JOURNAL
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
daniahendric
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
April Dillard
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
ijtsrd
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
honey690131
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
CHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docxCHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docx
keturahhazelhurst
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
Julius Clark, CISSP, CISA
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
vishal dineshkumar soni
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
Finni Rice
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security Awareness
Digit Oktavianto
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
ijtsrd
 

Similar to Ist curriculum (20)

Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
CHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docxCHAPTER 15HRIS Privacy and Security1.docx
CHAPTER 15HRIS Privacy and Security1.docx
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security Awareness
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 

Recently uploaded (20)

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 

Ist curriculum

  • 1. The College of Information Sciences and Technology What is IST? What can I do with IST/SRA? Is this a good fit for me?
  • 2. Mission Build knowledge and information skills to meet the needs of the new Information Age. 2
  • 7. IST enables: People Technology Information create organize share using store protect access analyze modify
  • 8. IST enables: People Technology new iPod applications Information students create organize share using store protect access digital music analyze modify
  • 9. IST enables: People Technology firewall, authentication, and other security technologies that will keep your information safe Information PSU academic and financial advisors create organize share store using protect access private information in your student files analyze modify
  • 10. IST enables: People Technology integrated software systems (that allow the information to be accessed and coordinated across databases) managers (in any organization—Walmart, Geico, Proctor & Gamble…) Information create organize share store using financial and manufacturing information that exists in different databases protect access analyze modify
  • 11. IST enables: People Technology Internet Information government create organize share store using well-informed laws about sharing private information protect access analyze modify
  • 12. Information Sciences and Technology Information Sciences and Technology (IST) Major
  • 13. IST Bachelor of Science (ISTBS) Design, implementation, integration, and utilization of information systems (IS) Design and Development Integration and Application Information Context Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk Make Cool Stuff Understand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users. Make Businesses’ Use of Information More Efficient Understand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation. Make Sense of Impact of Information Systems Understand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants). 13
  • 14. What You Will Learn Internship 14
  • 15. Companies Who Hire IST Graduates 15
  • 16. IST Bachelor of Arts (ISTBA) 16
  • 17. Security and Risk Analysis Security and Risk Analysis (SRA) Major
  • 21. Threats to our National Security 21
  • 22. SRA Bachelor of Science (B.S.) Design, implementation, integration and utilization of information systems (IS) Information and Cyber Security Intelligence Analysis and Modeling Social Factors and Risk Intelligence Analysis and Modeling Information and Cyber Security Social Factors and Risk Make Information Systems Secure Understand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace. Make Risk Predictions Understand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks. Make Sense of Contextual Elements surrounding Risk Understand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure. 22
  • 23. What You Will Learn 23 Internship
  • 24. Companies Who Hire SRA Graduates 24
  • 25. What We Are Where information, people, and technology meet. Where careers in information technologies abound. Where students understand the effects of information technology on themselves, other individuals, organizations, and society. Where you will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis. 25

Editor's Notes

  1. INTRO SELF AND WELCOME TO COLLEGE OF IST
  2. Well, here is our mission…What is the “Information Age”? Take a minute to think about Information all around you. What information have you produced, come in contact with, or ignored in the last 10 minutes?(Bar code on card you handed in, iPod, mobile phone, PPT slide)Think about your life, day-in, day-out. Information is all around you—and we increasingly rely on it to make our lives work.STORY: Steve asking me a question and none of us knew the answer in the meeting. What did we do? What would we have done 5 years ago? 10 years ago? Parents—30 years ago?This IS the information age; and this College was created to pioneer research, education, and forward thinking in this new era.Here is a quick example…
  3. Have you ever done this—”Where is the closest Starbucks?” (If you don’t drink coffee now, you just might when you get to college…)
  4. First you search for Penn State area
  5. Then you search for Starbucks near Penn State. College Avenue appears. Sounds close!!
  6. Then you look at the street view--ah-ha!! This is what we drove by this morning!! Think about all the things involved in this quick interaction with your information technology device.You, the person, want something (coffee). You need information (location of Starbucks).You turn to the technology in your hand to get the information (iPod).Someone who works for Google anticipated this need. The Google Maps Vehicle driver drove through town and collected videos of street views. Someone organized, labeled, and stored them.Someone wrote a program to deliver that image over the Internet.You made use of all this: the information, the information databases where the info was stored, the networks through which the data was passed, and the programs that someone wrote to get the information to you.And then you drank your coffee.THIS is the information age. And there is much more…
  7. Let’s go back to what our website said: IST is about the interaction of people, tech, and info. Let’s put a few more words around this interaction to make more sense of this statement.THEN (after all animations):Can you give one example people who use information technologies? (How about people searching for a college???)What information might those people want or need?What might they want to do with the information?What technologies might they use?Let’s look at some other examples.
  8. Let’s look at some examples…How do we enable this to happen? We teach students what they need to know to be able to:develop applications for iPods
  9. How about another example…How do we enable this to happen? We teach students what they need to know to be able to:Protect an organization’s private information
  10. Here’s an example from our most popular area of study…How do we enable this to happen? We teach students what they need to know to be able to:Consult with corporations that need help making their various systems of information “talk” to each other more efficiently
  11. And if you are interested in policy-related aspects of information technology use, how about this example…How do we enable this to happen? We teach students what they need to know to be able to:Advise on policy-making regarding the internet regulations and lawsDOES THIS HELP GIVE YOU A SENSE OF WHAT WE ARE CONCERNED WITH IN THIS COLLEGE??? (Please ask now if you have questions…)
  12. Let’s take a closer look at the degrees we offer—first the B.S. in IST. Here is where it can get confusing—we have a major with the same name as the College. But I will try to be specific in referring to one or the other.
  13. We offer 3 options—see slide--Design next iPhone application…--Help PSU move from archaic system of student information to a newer one that allows people with appropriate access to view financial, medical, academic, payroll info from one system--Determine how to disseminate information about the next earthquake to rural villages in developing countries
  14. ALL students in the IST-B.S. major learn…
  15. On screen are companies that hire IST graduates.Here are some job titles:Applications DeveloperIT ConsultantAssistant Project ManagerIT Infrastructure AnalystBusiness Systems AnalystIT Solutions ArchitectChange Management AnalystIT Systems EngineerData AnalystImplementation specialistDesign EngineerMultimedia Specialist Forensics and Analysis ConsultantTechnology Support SpecialistWeb Developer
  16. New this past year: Craft your own degree by integrating different disciplines and your personal passions with ISTUnderstand potential applications AthleticsArtBusinessScienceHistoryMedical-informatics Legal-informatics Bio-informatics Enviro-informatics Business-informatics ChemometricsEnterprise informatics
  17. Our SECOND B.S. is in “Security and Risk Analysis.”
  18. The Security and Risk Analysis major focuses on how to design systems that are secure (while still allowing people to work), how to measure risk, and how to make decisions to ensure that proper levels of privacy are maintained for individual technology users, businesses, government, and other organizations. The SRA major promotes an understanding of information system design and operation, and of the legal and cultural issues surrounding privacy, intelligence, and security.Students learn about:Computer securityNetwork securityCyber crime The politics and “business” of terrorism Offensive and defensive use of computer and information networksDecision theoryPrivacy and legal/regulatory issues Implications of digital social networking Let’s take a look at a few examples of what our SRA students are prepared to face…
  19. Students help protect individuals from phishing –where someone seeks personal information under false pretense—e.g., Hallmark cards and Google jobs
  20. Students help prevent and investigate Business threatsFirst article, network breach: Federal Fire Department workers are being asked to look for unusual activity on bank accounts because an employee wrongfully accessed their information.Second article: privacy at risk: potential Chinese hackers at Google
  21. Students help protect national security interests…We see plenty of articles in the news about Government-industry partnership to targets cyber security threats.
  22. We offer three options:ICS—IF INTERESTED IN MAKING SYSTEMS SECURE, THINK ICS --- Students do VIRTUAL LABS where…IAM—IF MORE INTERESTED IN PREDICTION AND RISK ANALYSIS, CONSIDER IAM -- Students work for 3-letter agencies (CIA, and so forth) Teaches students how to calculate, evaluate, and predict risk in a variety of fields, including business and national security. SFR IF MORE INTERESTED IN WHAT MAKES PEOPLE TICK, CONSIDER SFR – Leading faculty in the field of terrorism and privacy, and sociology of crime!!In this option, students explore the psychological and sociological causes of terrorism and crime, and how information technology is transforming each. In the classroom, students work on teams in which they role-play both terrorists and criminals and the intelligence and security officers combating them. This option also examines the privacy policies and legal regulations within companies and the government. Students learn to critically read privacy policies and understand government regulation so they can help improve their own privacy policies and ensure users that the data they provide is secure.
  23. ALL students in the SRA-B.S. major learn…
  24. On screen are companies that hire SRA graduates.Here are some job titles:Catastrophe Risk AnalystIT AnalystComputer System Security AnalystsIT Consulting ManagerCyber AnalystIT Strategy ArchitectCyber Network Security EngineerNetwork Intel AnalystsData Security AdministratorNetwork Security Engineer Enterprise ArchitectSystems AdministrationInformation Assurance AnalystsSystems Enterprise Architect Information Assurance RemediationSystems Integration AnalystsInformation Assurance/Security EngineersSecurity Project ManagerIntel AnalystsSystems Integration EngineerIntrusion Detection AnalystWeb Security & Privacy Specialist
  25. In Summary… We are the College where…information, people, and technology meetcareers in information technologies aboundstudents to understand the effects of information technology on themselves, other individuals, organizations, and societyyou will find a broad range of topics from software development to social media to business applications for technology to information security and risk analysis
  26. Now, YOU can take a look at IST—with this website created just for first-year students…Be sure to check out:--Which option is for me Quiz--Descriptions of majors and options--videos of former students--resources in IST for students--and more!