Post on 23-Dec-2015
The College of Information Sciences and Technology
ist.psu.edu
The College of IST mission is to build knowledge and information skills to meet the needs of the Information Age.
Information Sciences & Technology
Library ScienceInformation retrieval
Search methodsInformation taxonomy
and ontology
Other AreasPhysics
MathematicsPolitical Science
LawMedical school
SociologySocial networking
Crime and TerrorismHuman terrain
modeling
PsychologyHuman subject
experience designPsychology of
terrorismCognition in decision-
making
Industrial Engineering
ErgonomicsHuman System
InteractionScience of System
Design
Computer Science and Engineering
ProgrammingDatabase
Algorithm developmentComputer cyber
security
Electrical Engineering
Signal processingImage processing
Data fusion
BusinessEnterprise architecture
Management of Information Systems
Decision theoryEconomics of
information systems
IST integrates multiple perspectives.
What do you study in the College of Information Sciences and Technology?
The College of IST offers 2 majors, 2 minors.
IST Major
College of IST
SRA Major
IST Minor SRA Minor
THAT’S IST
How can I design, analyze, critique, or make use of
information technologies to help people do what
they want to do?
Degrees in IST Major
B.S. in Information Sciences and Technology
B.A. in Information Sciences and Technology
Freshman
Information, People, and Technology
Intro to Computing
Freshman/Sophomore
Organization of Data
Networking and Telecommunications
Discrete Math
Computer Languages
Junior
Information and Organizations
User and System Principles
Junior/Senior(21 credits)
Option to Study Design and
Development
Option to Study Integration of
Computing Systems
Option to Study Context in Which
People Use Technology
Senior
Capstone
Internship
In IST, you will learn:
IST Bachelor of Science (ISTBS)
9
Design and Development
Integration and Application
Information Context
Intelligence Analysis and Modeling
Information and Cyber Security
Social Factors and Risk
Make Cool StuffUnderstand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users.
Make Businesses’ Use of Information More EfficientUnderstand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation.
Make Sense of Impact of Information SystemsUnderstand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants).
Minors fit easily in IST, especially:
Security & Risk Analysis
Supply Chain (esp. with Integration & Applica.)
Telecommunication
Music Technology
Economics
Engineering Leadership
Language
11
ISTBA combines your passions: IT + ?
Coming Soon in IST:
Web and Mobile (Minor)
New Courses in IST: Enterprise Architecture (Support of Option)
Digital Entrepreneurship and Innovation (Minor)
City Planning Enterprise Architecture
Scope Entire city Entire organization
Stakeholders City leaders Business leaders
Requirements Visionary Strategic
Value Incremental and continuous Incremental and continuous
Lifespan Evolves with the life of the city
Evolves with the life of the organization
Key Challenge Managing continuous change Managing continuous change
Enterprise Architecture
Digital Entrepreneurship and Innovation Minor
How can I help others make informed decisions
when information or people are at risk?
THAT’S SRA
Degrees in SRA Major
B.S. in Security and Risk Analysis
In SRA, you will learn:Freshman
Introduction to People, Information,
& Technology
Introduction to Security and Risk
Analysis
Introduction to Computing
Threat of Terrorism and Crime
Sophomore
Organization
of Data
Overview of Information
Security
Decision Theory
& Analysis
Junior
Risk Management: Assessment and
Mitigation
Legal, Ethical, and Regulatory Issues
Junior/ Senior
(21 credits)
Option to Study Intelligence
Analysis
Option to Study Cyber Security
Option to Study Policy and Risk
Senior
Capstone
Internship
SRA Bachelor of Science (B.S.)
18
Information and Cyber Security
Intelligence Analysis and Modeling
Social Factors and Risk
Intelligence Analysis and Modeling
Information and Cyber Security
Social Factors and Risk
Make Information Systems SecureUnderstand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace.
Make Risk PredictionsUnderstand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks.
Make Sense of Contextual Elements surrounding RiskUnderstand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure.
Minors are trickier to plan for SRA.
Information Sciences & Technology
Political Science
Global Security
Language (if use all electives and take more than 15 credits per semester)
College of IST is where people, information, and technology meet.
People
Information
TechnologyIST
People Technology
interact with
using
Information
IST / SRA
Technology
protect
sharestore
access
modifyanalyze
organize
using
create
Information
People
IST / SRA
Technology
protect
sharestore
access
modifyanalyze
organize
using
create
emergency response teams
data onwildfire activity
geospatial mapping
Information
People
IST / SRA
Technology
protect
sharestore
access
modifyanalyze
organize
using
create
Black Eyed Peas fans
digital music
new iPod applications
Information
People
IST / SRA
Technology
protect
sharestore
access
modifyanalyze
organize
using
create
managers (in any organization—
Wal-Mart, Geico…)
financial and manufacturing
data that exists in different
databases
integrated software
systems (that enable data to
be accessed and shared across
databases)
Information
People
IST / SRA
Technology
protect
sharestore
access
modifyanalyze
organize
using
create
Amazon.com
buyer history
privacy policies that abide by information
security regulations
Information
People
IST / SRA
Technology
protect
sharestore
access
modifyanalyze
organize
using
create
corporations
email communication, documents, data
recommended firewall,
authentication, and other security
technologies
Information
People
IST / SRA
IST is where people, information, and technology meet.
Questions?
ist.psu.edu
IST/SRA have exciting research opportunities.
http://prezi.com/29mzk7pqjjtz/accepted-students-program-college-of-ist