Page 1

Fall 2014 | College of Information Sciences and Technology

Interactive social media app heightens Central Pennsylvania Festival of the Arts Experience


CONTENTS Fall 2014

iConnect, the magazine of the College of Information Sciences and Technology is published twice a year by the Office of Communications and Outreach.

4

Jack Carroll, distinguished professor of information sciences and technology (IST), is leading efforts at the Center for HumanComputer Interaction (HCI) to enable and empower communities through information and communications technologies.

Editor & Writer: Stephanie Koons Art Director: Kelly Bryan Photography: Emilee Spokus Alumni Relations: 814-863-7548 E-mail: alumni@ist.psu.edu All inquiries and comments should be sent to: iconnect@ist.psu.edu 814-867-1236

Penn State’s Center for Human-Center Interaction building an innovative community, one interaction at a time

14

IST connects students and takes learning beyond the classroom through engaged scholarship Rather than seeking typical undergraduate experiences, IST students Jules Dupont, Justin Roth and Cassie Juzefyk are broadening their educational horizons by gaining “real-world” experiences that add context to their studies and benefit the University as a whole.

Stay connected with IST: facebook.com/ISTatPennState twitter.com/ISTatPennState instagram.com/ISTatPennState

18

Ready for Cyber Combat: SRA students gain the tools needed to fight online terrorism and security attack Students enrolled in the Security and Risk Analysis (SRA) program at the College of IST are provided the tools, both inside and outside the classroom, to combat increasing privacy and security threats in the digital age.

The Pennsylvania State University is committed to the policy that all persons shall have equal access to programs, facilities, admission, and employment without regard to personal characteristics not related to ability, performance, or qualifications as determined by University policy or by state or federal authorities. It is the policy of the University to maintain an academic and work environment free of discrimination, including harassment. The Pennsylvania State University prohibits discrimination and harassment against any person because of age, ancestry, color, disability or handicap, national origin, race, religious creed, sex, sexual orientation, gender identity, or veteran status. Discrimination or harassment against faculty, staff, or students will not be tolerated at The Pennsylvania State University. Direct all inquiries regarding the nondiscrimination policy to the Affirmative Action Director, The Pennsylvania State University, 328 Boucke Building, University Park, PA 16802-5901; Tel 814-865-4700/V, 814-863-1150/TTY. U.Ed. IST 15-03

IN THIS ISSUE 12 Yellow fever epidemic presents 200-year-old lesson in crisis management 22 A good night’s rest leads to start-up success: IST alum Daehee Park aims to revolutionize the mattress industry

DEPARTMENTS 3 From the Dean 10 Research News 26 Faculty Publications


Transitions

Final thoughts from Dr. David Hall, dean 2009 - 2014

The past year at the College of Information

Institute for Cyber Science and the Huck

Sciences and Technology (IST) has

Institute of the Life Sciences to propose

been a very successful one marked by

a new Center for Big Data Analytics and

many transitions. Due to the efforts of

Discovery Informatics led by Dr. Vasant

our faculty and staff, we have completed

Honavar, and are participating in a new

our part of the Penn State For the

General Electric Center for Collaborative

Future: The Campaign for Penn State

Research in Intelligent Natural Gas

Students raising over $32 million in gifts

Systems (CCRNGS) center (with the

for scholarships and in-kind software and

Smeal College of Business, the College of

materials (achieving over 200 percent

Engineering, and the College of Earth and

of our goal); completed the first year of

Mineral Sciences. These are all exciting

a two-year strategic planning effort and

accomplishments and new opportunities

delivered our draft College Strategic

for the College.

Plan for incorporation in the University Strategic planning process; held another

Effective August 1, I transitioned from

very successful Start-up Week involving

my role as the Dean of IST to return to

over 40 speakers from start-up companies

the faculty ranks. I would like to take this

and well-established international

opportunity to congratulate Dr. Mary Beth

corporations to discuss innovation and

Rosson on her new role as the Interim

entrepreneurship; grown our online

Dean for the College of IST. I know she

education programs to include over 700

is excited to assist the College in our

undergraduate students and 300 graduate

transitional period. The College of IST is

students; and continued to achieve

well respected at the highest levels of the

success in our placement of students for

University, and we are on a great trajectory

internships and jobs. Our faculty members

for new opportunities in research, new

have achieved recognition in their research

educational programs, and continued

and teaching. We are joining with the

growth. Exciting times are ahead.

Fall 2014 College of Information Sciences and Technology

3


RESEARCH NEWS

4

College of Information Sciences and Technology Fall 2014


Penn State’s Center for HumanComputer Interaction Building an innovative community, one interaction at a time Throughout human history, “community” has been a foundational

The Center for HCI is an interdisciplinary organizational unit

yet evolving concept. Modern communities are not only defined

for human-computer interaction research, instruction, and

by spatial boundaries, as in traditional neighborhoods, but also

outreach within Penn State and beyond. The center, according

by shared interests, common affiliations, and mutual need. The

to its website, “uses existing partnerships with community

continuing expansion of the Internet and mobile technology has

organizations, foundations, and commercial organizations to help

introduced opportunities for people to not only form new networks,

facilitate change in society with respect to the potential utilization

but also foster growth and development in their communities.

of information technology.”

Jack Carroll, distinguished professor at Penn State’s College of Information Sciences and Technology (IST), along with his fellow

For the past 20 years, Carroll has focused his research on

researchers, is developing new technologies with the intention of

community informatics, an emerging field of investigation and

promoting an innovative, vibrant, socially engaged community in

practice that is concerned with information and communication

the State College, Pa. area.

technology (ICT) in relation to communities and their social, cultural, economic and service development, among other

“Community is still about developing identity, engagement, and

dimensions. Carroll, along with other researchers, post-doctoral

mutual support through association with other people,” said

scholars and graduate students at the Center for HCI, has

Carroll, a researcher in the field of human-computer interaction

directed several projects that

(HCI) for over 40 years. “But community can also be a place

are intended to promote

where innovation is cultivated.”

dialogue among community members, bring people who

Carroll, who has a doctorate in experimental psychology from

share common interests

Columbia University, is director of Penn State's Center for Human-

together, and set a path

Computer Interaction (HCI), and has courtesy appointments as

for State College, Pa.

professor of computer science and engineering, psychology, and

to become a pioneer in

learning, design and technology (in the College of Education). His

community informatics.

Thinkstockphotos

research interests include methods and theory in HCI, particularly as applied to Internet tools for collaborative learning and problem

For the past several years,

solving, and the design of interactive information systems.

Center for HCI researchers

Fall 2014 College of Information Sciences and Technology

5


have introduced a novel element into one of State College’s

In addition to accessing the

most revered traditions—the Central Pennsylvania Festival of

app, people who visited the

the Arts. The festival, which was founded in 1967 by the State

Center for HCI’s booth at the

College Chamber of Commerce and Penn State’s College of Arts

2014 Central Pennsylvania

and Architecture, brings over 100,000 people to downtown State

Festival of the Arts had

College and the University Park campus of Penn State each July

the opportunity to meet

to celebrate the arts.

like-minded festival goers. Visitors to the booth received

In 2008, as part of an effort to make the arts festival more

an identifying tag, worn as

interactive, Carroll and his associates developed the Central

a lanyard around the neck,

Pennsylvania Festival of the Arts web app. Using the app, which is

which indicated their personal

now available for both iPhone and Android smartphones, festival

interests at the festival, i.e.

goers can access the festival’s official website (which includes

food, musical acts and art exhibits. Those who participated in the

descriptions of all 300 artists who sell their works at the festival),

activity were able to connect with people who indicated that they

schedules of various music, dance and theatrical performances

have similar interests, with many of them sharing “selfies” through

and other festival activities. The app can display the locations

the app.

of artist booths and performance venues, and app users can determine the artists and performances that are in close proximity

“We want to get people to socialize and communicate with each

to their current location. Users can also create personal itineraries,

other at Arts Fest,” said Patrick Shih, a research associate at the

share photos and post comments about Festival events.

College of IST and a member of the Center for HCI.

“The idea is to intensify the experience of the Arts Festival,” Carroll

The app, Carroll said, along with the icebreaker activity, were

said.

popular. There were about 1,400 users of the app, along with 150 game participants. In addition, about 100 people completed surveys about their experiences with the app. An additional benefit of the Arts Festival app, Shih said, is that users are able to access photos from past festivals, and thus view images of a given location throughout the festival’s history. “It’s all about promoting a sense of community through this digital curation effort,” Shih said. In addition to preserving history, one of the Center for HCI’s goals is to facilitate engagement in shaping the future of the community. The State College Borough is in the process of implementing the Downtown Master Plan, which provides a framework to guide growth and change in the community. The themes, according to the Borough’s website, “range from recommendations for

6

College of Information Sciences and Technology Fall 2014


Jess Kropczynski, a instructor and researcher at IST Center for HCI, said that the Future State College app divides the Downtown Master Plan into four sectors with 30 locations. The app has a “walking tour” feature that allows users to explore the plan independently. Users of the location-based app can view the proposed changes at a particular spot, leave comments and agree or disagree with a design or concept. The Future State College app, Kropczynski said, is the only app of its kind that currently exists. The app is in a trial phase, but the researchers hope to make the app available to the community in fall 2014. The app can eventually be adapted to different types of plans by other organizations, she added. The main benefit of the Future State College app, Carroll and Kropczynski said, is that it provides an outlet to voice opinions to citizens who cannot or do not attend municipal meetings. “The more you speak up, the more your taxpayer money goes to something you care about,” Kropczynski said. marketing and special activities to streetscape and traffic improvements to future development models and partnerships.”

In a similar way that people may be shifting away from formal

The Center for HCI developed the Future State College app,

government meetings, social media sites such as Twitter have

which allows people to review and comment on parts of the

become increasingly popular alternatives to traditional news

Downtown Master Plan’s proposed improvements to the

outlets for expressing opinions on current events. In 2013, HCI

community while they are standing at the downtown locations of

researchers released Local News Chatter (LNC), a smartphone

those improvements.

app that integrates local news articles and socially generated tweets from local residents. Their goal in developing the app is

“While the process of preparing the downtown plan engaged

to increase community awareness and engagement by enabling

many community stakeholders, the app provides another

users to access more dynamic community news information.

opportunity for reaching a broad audience to share the vision,” said Meagan Tuttle, who works in the Borough Planning

“We found that using Local News Chatter causes people to

Department.

experience their community as stronger, and identify with it more,” Carroll said.

“While community workshops and sketches during public meetings are a great way to provide a visual representation of an

The LNC app extracts a set of distinctive terms from articles

idea, having an app that allows the community to experience the

published in news outlets in the State College area—Centre Daily

ideas in the environment in which they’re proposed can help them

Times, Daily Collegian, www.statecollege.com and Penn State

come to life in a more tangible way,” Tuttle said.

News—and utilizes them to find associated tweets from local

Fall 2014 College of Information Sciences and Technology

7


Twitter accounts. The app displays those terms in a tag cloud and

While technology may be a driving force in social change, factors

presents related formal news articles and tweets in an integrated

such as economic conditions and human psychology can also

display. The researchers are interested in understanding how

spur technological advancements. Time banking, which refers

users experience aggregated community information while using

to community-based volunteering in which participants provide

the app, and in how the app helps people be more aware of local

and receive services valued by the amount of time they require

community news and activities.

to perform, is an example of the symbiotic relationship between culture and technology. Carroll and his associates are working

One variant of the app, which currently has about 40 to 50 active

on a project funded by the National Science Foundation (NSF)

users, now contains a sentiment analysis tool that displays a

that is intended to strengthen communities through a mobile time

“community affect meter” that indicates whether a topic is viewed

banking system.

positively or negatively. The researchers are interested in how codifying affect about community events can be appropriated as

Time banking is “quite radical and innovative,” Carroll said,

a resource for sense making and participation. Another variant of

because time is a much more personal and widely available

the app extracts crisis event terms, such as “fire,” to make such

resource than money.

8

College of Information Sciences and Technology Fall 2014

Thinkstockphotos

events more visible to the community.


“Everyone has the same amount of time,” he said. “It’s an

“People are looking for alternative ways of doing things at a lower

equitable way for citizens to exchange value.”

price,” Shih said. “It’s a paradigm shift in our workforce.”

In 2012, Carroll received an award of $497,553 from the NSF

Carroll and Shih cited Uber (a venture-funded startup and

to support his project, “Socio-technical Issues in Mobile Time

transportation network company based in San Francisco that

Banking.” The project, in partnership with Victoria Bellotti of

makes mobile apps that connect passengers with drivers of

the Palo Alto Research Center in Palo Alto, Calif., incorporates

vehicles for hire and ridesharing services) and Airbnb (a website

mobile computing and Web 2.0 services to carry out a design

that connects people with extra space with people seeking

research investigation of mobile time banking.

lodging), as examples of successful companies that capitalize on the notion of a peer-to-peer sharing economy.

Time banks originated in the 1980s with anti-poverty activist Edgar Cahn, as described in his book, No More Throw Away People. Cahn

Carroll and his associates are in the process of refining the time

developed “time dollars” as a new currency to provide a solution to

banking model and making it more efficient. As part of an effort to

cuts in government spending on social welfare. A typical time bank

make time banking a more immediate and less time-consuming

hosts a basic website, usually implemented on one of a few special

experience, the center has implemented IOS and Android apps for

purpose time banking or alternative currency exchange software

its time banking system. In addition, the center recently received

platforms. Websites typically display lists of service offers and

a $1.2 million award from the NSF for a joint project with Carnegie

requests from time bank members (e.g. electrical work, plumbing,

Mellon University and the Palo Alto Research Center that has

babysitting). For an hour of service such as dog-walking or house-

a goal of creating a software model of time bank user interests

painting, one time dollar is debited from the recipient and awarded

and experimenting with a “push” framework in which interaction

to the provider. The provider then uses the dollar to pay for service

opportunities would be suggested to the user based on his or her

from another, and the recipient can provide a service to anyone

preferences and current location.

else to earn back the debit. As a community informatics researcher, Carroll said, he is fortunate “People like the idea (of a time bank), but it’s something that

to live in a progressive community like State College that is open

communities have to get used to,” Shih said.

to experimenting with new technologies. Eventually, he hopes that the ideas that are generated at the Center for HCI will spread to a

While time banking may not yet be mainstream, it is catching on

wide variety of communities across the U.S. and the world.

quickly. According to Wikipedia, 26 countries currently have active time banks. In addition, there are 250 time banks active in the

“Community will always be about human development, but that

United Kingdom and over 276 time banks in the U.S. The time

includes innovation,” Carroll said. “There is a huge amount of

banking model took off around 2008, Shih said, in the middle of a

community innovation today; it’s exciting to be part of it.”

global economic recession.

Fall 2014 College of Information Sciences and Technology

9


RESEARCH NEWS

People with higher job status may be more willing to compromise privacy for security reasons and also be more determined to carry out those decisions, according to researchers. This preoccupation with security may shape policy and decision-making in areas ranging from terrorism to investing, and perhaps cloud other options, said Jens Grossklags, assistant professor of information sciences and technology. In two separate experiments, the researchers examined how people with high-status job assignments evaluated security and privacy and how impulsive or patient they were in making decisions. The researchers found that participants who were randomly placed in charge of a project tended to become more concerned with security issues. In a follow-up experiment, people appointed as

supervisors also showed a more patient, long-term approach to decision-making, added Grossklags, who worked with Nigel J. Barradale, assistant professor of finance, at the Copenhagen Business School. The findings may explain why people who are in leadership roles tend to be more decisive about guarding security, often at the expense of privacy, according to the researchers. In the real world, high-status decisionmakers would include politicians and leaders of companies and groups. "Social status shapes how privacy and security issues are settled in the real world," said Grossklags. "Hopefully, by calling attention to these tendencies, decision makers can rebalance their priorities on security and privacy."

Health-related mobile technologies can help consumers make smarter choices Erika Poole recalls that her dad had his first heart attack in his 30s when he was walking on the beach. The second one happened when she was 9 or 10 years old. "I basically grew up watching him go into the hospital every single year," she says. "I remember visiting him in the cardiac ward. I particularly remember all the fruit baskets," she notes with a wry chuckle. The young girl who watched her father's health crises is now a Penn State researcher who wants to do something to help others like him. "He was basically a two-pack a day smoker, and every bad thing he could possibly do, he did. It's heartbreaking to see that, and to see how preventable it all could be by making slightly smarter choices." Poole, an assistant professor in the College of Information Sciences and Technology, has dedicated her career to helping people make those smarter choices. Her recent work includes a large study of adolescents and "exergaming," the use of video games that promote physical participation. Another study looked at the use of text messaging in smoking cessation programs. Currently, Poole is helping to develop guidelines for humancentered design of health technologies that make use of smart phones and other mobile devices. The latter is a cross-disciplinary project pulling together technology experts with health professionals, aimed at encouraging designs for health-related apps that people will want to use.

10 College of Information Sciences and Technology Fall 2014

IST lab receives software designed to mirror how humans think and act Cognitive modeling—an area of computer science that deals with simulating human problem solving and mental task processes in a computerized model—has been applied in a variety of areas such as military simulations, computer game and user interface design, and artificial intelligence (AI) applications. Such models, which often act as agents (selfcontained computational systems) in synthetic environments, can be used to simulate or predict human behavior or performance on tasks similar to the ones modeled. The Applied Cognitive Science Lab at Penn State’s College of Information Sciences and Technology (IST) recently was gifted copies of a commercial agent development software product that is designed to create more realistic models that reflect how emotion and physical factors affect human decision making and behavior. “If an opponent in a simulated environment always does the right thing and always does it immediately, it can be hard to learn how to respond to that opponent’s real-life counterpart,” said Frank Ritter, a professor at the College of IST and co-director of the Applied Cognitive Science Lab. “It’s useful in simulation to have a model that more accurately reflects how people really behave.” Agent Oriented Software (AOS) has given the Applied Cognitive Science Lab 20 copies of the commercial JACK (Java Agent Construction Kit V5.6) and CoJACK (Cognitive JACK) agent development software. AOS supplies products for building, running and integrating commercial-grade multi-agent systems, built on a logical foundation: Beliefs, Desires, Intentions (BDI). Thinkstockphotos

People in leadership positions may sacrifice privacy for security


IST professors help to d eve l o p t o o l s t o a c c e s s ‘scholarly’ big data

Doctoral student receives grant to develop technology for diagnosing dyslexia

Academic researchers and corporate managers often seek experts or collaborators in a particular field to enhance their knowledge or maximize the talents of their workforce. Harnessing that data, however, can be a challenge. Researchers at Penn State’s College of Information Sciences and Technology (IST) and the Department of Computer Science and Engineering (CSE) have devised recommendation systems for expert and collaborator discovery that enable users to access “scholarly big data.”

expert recommendation system based on CiteSeerX," at Amazon's first annual Ph.D. Symposium on "Building Scalable Systems" on Nov. 20, 2013 at Amazon headquarters in Seattle. He was supervised by C. Lee Giles, David Reese Professor of IST and Graduate Professor of CSE. In addition to Chen and Giles, the paper was co-written by Pucktada Treeratpituk, computer scientist at the Ministry of Science and Technology in the Thai government; and Prasenjit Mitra, associate professor at the College of IST.

Elizabeth Eikey, a doctoral candidate at Penn State’s College of Information Sciences and Technology (IST), is interested in how technology can be used to improve health outcomes. Eikey’s research goal, which is now being supported by the National Science Foundation (NSF), is to advance diagnostic technology that will help struggling children learn to read.

“Everyone talks about big data,” said Hung-Hsuan Chen, one of the researchers on the project. “But in academia, not many groups have this volume of data from CiteSeer. For data-driven research, we have a very good opportunity for big data research because we are one of the few groups that have such a large volume of data.”

In the paper, the researchers propose CSSeer, a free and publicly available keyphrase-based recommendation system for expert discovery based on the CiteSeerX digital library and Wikipedia as an auxiliary resource. CSSeer generates keyphrases from the title and the abstract of each document in CiteSeerX. Those keyphrases are then used to infer the authors’ expertise.

Thinkstockphotos

Chen, who received a doctorate degree from the Department of CSE in December 2013, was one of the two graduate students from Penn State among the 25 selected from over 250 applicants worldwide to present his research, "CSSeer: an

“The system automatically figures out who are the experts of a given area,” Chen said.

Dyslexia is “a developmental reading disorder that is characterized by difficulty with learning to read fluently and with accurate comprehension despite normal or aboveaverage intelligence,” according to Wikipedia, and “has profound effects that span across a lifetime,” Eikey wrote in her graduate research proposal. “By bringing dyslexia diagnostics into mainstream education, I can improve accessibility, reduce costs of diagnostics, create a better learning environment for every student (including those without dyslexia) and increase literacy in the U.S., which will foster a better society overall,” said Eikey, who graduated from Penn State with a bachelor’s degree in psychology in fall 2010 and entered the doctoral program at the College of IST in fall 2012. As a recipient of the NSF Graduate Research Fellowship, Eikey will now have an opportunity to explore learning disabilities technology in depth. The NSF Graduate Research Fellowship Program (GRFP), according to the NSF website, “recognizes and supports outstanding graduate students in NSF-supported science, technology, engineering and mathematics disciplines who are pursuing research-based master’s and doctoral degrees at accredited U.S. institutions.”

Fall 2014 College of Information Sciences and Technology

11


Yellow fever epidemic presents 200-year-old lesson in crisis management Among natural and man-made disasters, there is perhaps nothing

type A outbreak will result in a rapid spread of infectious disease,

more baffling and terrifying than an infectious disease outbreak. In

overwhelming existing medical response infrastructures.” Each of

1793, a yellow fever epidemic in Philadelphia killed about 5,000

those organizations has published planning guides that call upon

people and altered the course of history. According to Ed Glantz,

local and community organizers to begin preparing for such an

a senior lecturer at Penn State’s College of Information Sciences

event. To establish insight and provide context for the organizers,

and Technology (IST), an outbreak could wreak similar havoc in

Glantz’s paper presents a case analysis of the Philadelphia yellow

modern times, and emergency response systems may not be much

fever outbreak of 1793.

better prepared than they were over 200 years ago. In 1793, Glantz wrote, Philadelphia was at its peak, serving as “I actually believe a lot of those terrible outcomes could happen

the capital of both Pennsylvania and the recently formed U.S.

today,” said Glantz, who teaches in the Security and Risk Analysis

government. With 50,000 residents, it was the largest metropolitan

(SRA) program at the College of IST.

area in the U.S., and its port handled one-fourth of the nation’s shipping. The city’s good fortune ended in July 1793, when a

A paper that Glantz wrote on the topic, “Community Crisis

cargo ship brought the female Aedes aegypti mosquito, along with

Management Lessons from Philadelphia’s 1793 Epidemic,” won

individuals currently infected with yellow fever. Confusion and panic

the Best Insight Paper Award at the 11th International Conference

quickly set in, as there was no medical direction on what would halt

on Information Systems for Crisis Response and Management

the escalating death rates, and most city, state and federal officials

(ISCRAM), which was held recently at the College of IST. The

and employees had already fled their posts. About 40 percent of

theme for ISCRAM2014 was empowering citizens and communities

residents, including most of the city’s wealthy, evacuated — even

through information systems for crisis response and management.

George Washington retired to Mount Vernon earlier than expected.

The conference focused on the local community, the individual and

The city’s government ceased to operate, resulting in crime,

the technologies that can be employed to improve crisis response

abandonment and people being left out in the streets to die.

at the local level. According to Glantz’s paper, public health organizations, including

wrote, when the temperature dropped and the frosts began. While

the Centers for Disease Control and Prevention (CDC), the World

the crisis may have subsided, the epidemic—along with the way

Health Organization and the U.S. Department of Health and

it was handled—had severely damaged Philadelphia’s standing in

Human Services, are “greatly concerned that a new influenza

public opinion.

12 College of Information Sciences and Technology Fall 2014

Thinkstockphotos

The death rate did not begin to decline until November, Glantz


“The crisis served as a basis for attack in subsequent recriminations

“The paper talks about non-traditional crises, such as infectious

and politicking,” he wrote. “In addition, Philadelphia had lost its

diseases, that include all of the horror of a natural disaster with

most favored city allure, along with any hope of remaining as

some exacerbating differences,” Glantz said.

capital of the United States.” The circumstances that typically surround an epidemic/pandemic, An epidemic occurs when new cases of a certain disease, in a given

he said, include fear, confusion, decimation of caregivers and lack

human population, and during a given period, substantially exceed

of support from neighboring communities. The SRA curriculum

what is expected based on recent experience. A pandemic, on the

can be tailored to counteract infectious disease outbreaks in a

other hand, is an outbreak of global proportions. It happens when

number of ways, Glantz said. Through intelligence analysis, people

a novel virus emerges among humans and causes serious illness,

could identify up-and-coming diseases as well as determine the

spreading easily from person-to-person. According to Glantz, there

appropriate community response and treatment. SRA students who

are many useful insights to assist modern crisis management from

are studying risk management learn to identify risks and develop

an analysis of Philadelphia’s 1793 epidemic.

controls to limit those risks, which could be useful when dealing with contagious outbreaks. The CDC has a rigorous two-year training

“We know we’re going to have two or three major pandemics each

program for public health officials, Glantz said. In the introductory

century,” Glantz said.

SRA class that he teaches, he introduces an intelligence analysis model that is based on a Legionnaires’ disease outbreak. The skills

The College of IST is taking a proactive approach in training future

he teaches in the class, he said, are based on the CDC training

leaders in emergency management, he said, by teaching skills that

model.

have wide applicability. The SRA major at the College of IST looks at how to design systems that are secure, how to measure risk

The Philadelphia yellow fever epidemic, Glantz said, along with

and how to ensure that proper levels of privacy are maintained

other infectious disease outbreaks throughout history, reveal the

for individual technology users, businesses, government and other

need for better community planning to handle the spike in people

organizations. The concepts that are taught in the SRA classes,

seeking medical treatment during an outbreak, and the need for

Glantz said, can also be applied to epidemiology. In his paper,

individuals who are willing to attend to the needs of the elderly,

he wrote that epidemics “merit further consideration for crisis

the poor and children. There is also an urgent need for families to

management, similar to the response and decision making of other

have information that would direct them on what steps to take in

natural disasters, such as hurricanes and earthquakes.”

the event of a pandemic. In addition, he wrote in the paper, there is a need to “balance communications between informing and enflaming the public.” “You can greatly minimize the outcome (of a pandemic) if you

PBS “The Great Fever” Yellow Fever 1793 Philadelphia Hospital

apply intelligent thought to it,” Glantz said.

Fall 2014 College of Information Sciences and Technology

13


IST connects students and takes learning beyond the classroom through engaged scholarship

At the College of Information Sciences and Technology (IST), several students—Jules Dupont, Justin Roth and Cassie Juzefyk— have been involved in projects that are aligned with Penn State’s goal to enhance undergraduate education through its Engaged Scholarship initiative. Those projects include taking an active role in high-level faculty research, resulting in an opportunity to travel abroad, and helping fellow IST students succeed in their studies by coordinating a peer tutoring program. In the past several years, Penn State has been actively encouraging undergraduate students to think beyond the classroom through its Engaged Scholarship initiative. Examples of engaged scholarship experiences include undergraduate research, study abroad, communitybased learning, service learning, and internships. 14 College of Information Sciences and Technology Fall 2014

Rather than seeing an undergraduate degree as a means to an end, Dupont, a sophomore at IST, seeks to gain the maximum benefit from his Penn State education by immersing himself in high-level research. The highlight of his freshman year was traveling to Seoul, South Korea, to present research on social network deviance at a prestigious international conference. “I wanted to take full advantage of everything at Penn State,” he said. “It’s a huge research university; I wanted to be part of that kind of effort.” Dupont, who is from Paoli, Pa., has been working with Anna Squicciarini, assistant professor of information sciences and technology, on a research project that focuses on abusive behavior in social networks. The pair was accepted to present their project at the 23rd International World Wide Web Conference (WWW2014), held April 7-11, 2014 in Seoul, Korea. The World Wide Web Conference is an annual international conference on the topics of the future direction of the World Wide Web.

“To our great delight, our demo was accepted,” Dupont said. “In early April, Dr. Squicciarini and I travelled to Seoul, where I presented the demo to other conference attendees.” “For the students, [undergraduate research] opens up a new perspective on what doing academic work means,” Squicciarini said. Research has been at the top of Dupont’s agenda since enrolling at the College of IST. At the beginning of his freshman year, he said, he asked his adviser, Lisa Lenze, director of undergraduate academic affairs for the college, about the possibility of doing undergraduate research. She put Dupont in touch with Squicciarini, who was working on a project that focused on abusive behavior in social networks, and Dupont signed on. “Malicious, abusive or otherwise inappropriate behavior is a huge problem in a variety of online forums,” he said. “The New York Times, for example, maintains a comment section around its online articles. However, due to problems with comment content, the newspaper must pay a human moderator to proofread each and every comment prior to online display. Human moderation is both costly and slow, neither of which are big selling points.”

Thinkstockphotos

While a college education is highly valued in society, it is often defined in practical and economic terms. Students typically choose a major, earn a degree, and then either enter the workforce or continue their education. In recent years, however, universities have placed an increasing emphasis on undergraduate students acquiring “real-world” experiences to add context to their studies and make them feel more connected to their academic environments.


When Dupont joined the project, he said, there was already a structure in place that he could build on. Ruyan Chen, who was then an undergraduate student who spent the summer of 2013 at the College of IST working with Squicciarini, devised a three-part algorithm for identifying abusive behavior online. After implementing her algorithm, Dupont created a set of animated visualizations that traced the growth of problematic behavior throughout an online community.

However, he added, constructive criticism from other researchers “definitely helps with weeding out bad ideas.”

“The idea of our project is to identify the comments (in an online forum) that are likely to be abusive or likely to be safe to replace the human moderator so comments can be posted in real time,” Dupont said.

“On a personal level, the trip was also fantastic,” he said. “I had never been to Asia, so staying in Seoul gave me the opportunity to see a vastly different culture.”

“Jules started writing code, and then he actually exceeded my expectations,” Squicciarini said. The visualizations that Dupont constructed, she said, illustrate the interactions between users of an online forum and deviant activity such as propaganda and incendiary comments. Through her research, she found that controversial topics such as politics and religion are most likely to trigger abusive behavior. “That’s where sometimes a network can quickly decay,” Squicciarini said. While creating the animated visualizations of online network deviance may have been challenging for Dupont, presenting his work at the WWW2014 conference turned out to be a hugely beneficial learning experience. He said he was surprised at the amount of discussion sparked by the project, although on the whole it was well received. “The feedback you get at a conference is much more intense than what you would receive in the classroom or in other settings,” he said.

The trip to Seoul for the WWW2014 conference was an “exceptional opportunity” in several ways, Dupont said. He was able to attend presentations on a variety of topics and met “several prominent individuals, including a few Penn State alumni who now work at Microsoft Labs.”

While research is a challenging and rewarding aspect of the college experience, classroom learning is the foundation of undergraduate education. Many students, however, require additional guidance beyond what is taught in the classroom to comprehend the material. Justin Roth and Cassie Juzefyk, seniors at the College of IST, have responded to that need by coordinating a tutoring program at the College of IST that not only enables them to help their peers with their studies, but has also opened doors for themselves. “I really like to help people,” said Juzefyk, who is from Reading, Pa. “It’s satisfying when you can help somebody understand something, and it just feels good.” Roth and Juzefyk are the co-coordinators of the IST Peer Tutoring Program, a centralized academic support resource for students in the College of IST. The tutoring

initiative is a student-managed program funded by the college, which provides oneon-one coaching to help students practice and reinforce concepts in IST and security and risk analysis (SRA) courses. “We offer another avenue for students to find support,” said Roth, who is from Washington, D.C. “The core support service that we offer is student-to-student tutoring.” The IST Peer Tutoring Program was founded about a year-and-a-half ago by Lenze and Mary Beth Rosson, interim dean for the College of IST, in response to a growing need among students for additional support beyond the classroom. In the past, requests for tutoring were taken care of by the IST Honors Society (Gamma Tau Phi) Volunteer Tutoring Program. “As our programming course offerings have grown and more students are requesting assistance, the Honors Society couldn’t keep up with the demand,” Lenze said. “They had done a great job for a number of years, but it was time for the college to step in and support students’ learning.” The IST Peer Tutoring Program, Lenze said, “exists to help students do the work of learning.” The program’s objective is to create a supportive environment where trained, experienced student “coaches” can prompt learners to work through problems step by step, debunk common misunderstandings and explain concepts that learners don’t understand. “We help [students] and we guide them to the answer,” Juzefyk said. “That way, when

Fall 2014 College of Information Sciences and Technology

15


they move on with other aspects of the class, they will remember what they did and will eventually be able to teach themselves.” While the IST Peer Tutoring Program was initially managed by a graduate student, Lenze said, she felt that it would be beneficial to everyone involved if undergraduates took over the role. About a year ago, she recruited Roth to coordinate the program, who in turn asked Juzefyk to assist him. “They have completely organized this new program—doing everything from defining goals, writing guidelines, triaging with faculty, and organizing tutors,” Lenze said. One of the first problems that Roth and Juzefyk had to solve, she said, was figuring out how to staff tutoring hours. The college pays four tutors, but the program has a “much greater need for tutors than four people can meet.” The solution that Roth and Juzefyk devised was for the College of IST’s teaching assistants (TAs) and learning assistants (LAs) to hold office hours during the common tutoring session hours, enabling a “full room of support for a variety of courses.” Learning assistants are undergraduate students who serve as learning coaches and mentors for students, while supporting instructors with teaching-related tasks. In addition, Roth and Juzefyk both actively tutor during tutoring hours. “All of our tutors are really awesome and passionate about this,” Roth said. In addition to helping their fellow students succeed in their courses, Roth and Juzefyk said, coordinating the IST Peer Tutoring Program has assisted in their own personal and professional development. Juzefyk, who interned over the summer at Becton Dickinson, a medical technology company in East Rutherford, N.J., said that her tutoring experience corresponds to assisting clients as an information technology (IT) professional.

16 College of Information Sciences and Technology Fall 2014

“Students who attend the tutoring sessions are coached towards the solution of the problem to force them to call upon previous knowledge to solve the problem,” she said. “I use this aspect of tutoring at my internship because I am only working there for three months, so when I leave my team needs to know how to continue the work that I have completed over the summer. Therefore, a knowledge transfer needs to take place, and to do this I hold meetings with my team to coach them through the processes so they can learn how to perform the task and make it more efficient based off of their working styles.” Roth, who participated in a summer internship at Lockheed Martin, a global aerospace, defense, security and advanced technology company headquartered in the Washington, D.C. area, said that his role in the tutoring program has given him the opportunity to provide input on the IST curriculum and “interface with my fellow students in a way I wouldn’t otherwise.” In addition, he developed a personal interest in instructional theory. “Now that I know what it means to help others take responsibility for their learning, I am able to recognize and appreciate the behaviors of leaders at my company who strive to create a culture of learning among their teams,” Roth said. “This summer, my manager designed meaningful and challenging assignments for me that required me to think and learn on my own, and I want to continue helping my peers feel the same sense of accomplishment I felt when I proved to myself that I could learn and apply new skills.” Roth’s and Juzefyk’s involvement with the IST Peer Tutoring Program, Lenze said, fits the University’s definition of engaged scholarship on several different levels. In addition to developing leadership skills, Roth and Juzefyk, along with the other tutors, are “complementing their own in-classroom learning of the subject matter in IST and SRA courses.” “Regardless of which hat they are wearing for the tutoring program, they are engaging themselves and the other tutors (and the LAs) in scholarship that benefits their peers in the College of IST,” Lenze said.


For the Future: The Campaign for Penn State Students Closing Celebration Mt. Nittany Inn April 11, 2014

2. 3.

1.

5.

8.

4.

7.

6.

9.

10.

11.

12. 1. Scholarship recipient Joshua Buitrago SRA ’14 2. Music performed by “Chuck and Matt” 3. IST Advisory Board Member Antonio Pensa and wife Carol 4. IST Advisory Board Member Robert Bardusch 5. IST Advisory Board Member Donald Haile and wife Mary 6. Scholarship recipient Cierra Freeman IST ’12 7. IST Advisory Board Member Jordan Rednor and wife Elizabeth 8. Weebly founders Dan Veltri ‘07, David Rusenko IST ’07, Chris Fanini IST ’12 9. Scholarship recipient Corey Lee SRA ‘12 10. Gary and Anna Cesnik 11. Nick and Melinda Berardi with daughters Besty and Abby 12. IST Advisory Board Member Bob Morgan and wife Tammy and son Andrew

Fall 2014 College of Information Sciences and Technology

17


READY FOR

CYBER COMBAT SRA students gain the tools needed to fight online terrorism and security attacks In today’s rapidly changing digital world, individuals and organizations face an increasing

number of privacy and security threats. Students who enroll in the Security and Risk Analysis (SRA) program at Penn State’s College of Information Sciences and Technology (IST) are provided the tools to combat those risks.

18 College of Information Sciences and Technology Fall 2014


Rather than relying solely on lessons learned in the classroom,

The SRA Club gives students a place to expand their knowledge

SRA students are exposed to “real-world” experiences that

and expertise in the field of security and risk analysis. While

enhance their knowledge of complex issues such as terrorism and

housed in the College of IST, the SRA Club reaches out to

cybersecurity. In the past year, SRA students have been able to

students University-wide.

acquire firsthand knowledge in those areas through activities such as a cybersecurity competition sponsored by an influential think

The IA Club is designed to supplement and extend the information

tank, numerous extracurricular activities that enable SRA students

security concepts discussed in the IST and SRA majors. Through

to apply the concepts they learn in the classroom to competitive

talks, demonstrations, interactive seminars, competitions, and

scenarios, and a special presentation by a former high-ranking

guest speakers, the club seeks to keep members informed of

government official, the highest-level government speaker to

cutting-edge concepts and explore the challenges of the future.

present at IST thus far.

The club also invites corporations to speak about current issues facing the industry, as well as provide networking opportunities

“One of the biggest lessons we’ve learned is that our SRA

and information sessions for club members.

students need to know more than just the technology and the law,” said Gerry Santoro, a senior lecturer in the SRA program.

The students who participated in the Cyber 9/12 Student

“They need to know policy.”

Challenge included John Kissell (the current SRA Club president), Trevor Fisk (formerly the SRA Club president, who graduated with

Several SRA students who are members of the SRA Club and the

an SRA degree in May 2014), Brady Ripka, and Jarred Rittle. The

Information Assurance (IA) Club had an opportunity to flex those

team had an advantage, Santoro said, since all of the members

skills when they visited the Atlantic Council, a major bipartisan

had taken classes in cybersecurity, technology, and cyber law.

think tank in Washington, D.C. on Feb. 8-9, 2014, to participate in the Cyber 9/12 Student Challenge. The Atlantic Council promotes constructive leadership and engagement in international affairs

“Our team was the most technical of any of the teams,” he said.

based on the Atlantic Community's central role in meeting global

The scenario that the SRA team tackled, Santoro said,

challenges.

involved a major denial-of-service (DOS) attack launched against major U.S. institutions, “essentially halting all trading.” A week

The 2014 competition marked the third year of the Cyber 9/12

later, it is discovered that targeted malware designed to wipe

Student Challenge, said Santoro, who coached the SRA team,

out all the systems it infects caused the attack, and North Korea

and the first time that the College of IST was invited to participate.

claims responsibility. One of the judges’ criticisms of the SRA

The Cyber 9/12 Student Challenge is designed to offer

team, Santoro said, was that the team was “too conservative” in

students, across a wide range of academic disciplines, a better

its response to North Korea’s “confession.” However, the team

understanding of the policy challenges associated with cyber

was vindicated when new information revealed that the attacks

conflict. Part interactive learning experience and part competitive

actually came from China, not North Korea, and that the malware

scenario exercise, the event gives students interested in cyber

was stolen from a U.S. Department of Defense lab.

conflict policy an opportunity to interact with expert mentors, judges, and cyber professionals while developing skills in policy

Kissell, a senior SRA major, said that his participation in the

analysis and presentation. Student teams are challenged to

Cyber 9/12 Student Challenge enabled him to develop a better

respond to an evolving scenario involving a major cyber-attack

understanding of the policy challenges associated with cyber

and to analyze the threat it poses to state, military, and private-

conflict.

Courtesy Gerry Santaro

sector interests. Teams are judged based on the quality of their policy responses, their decision-making processes, and their oral

“Coming from the College of IST, we are primarily focused on

presentation to a panel of judges.

the technical aspects of cyber conflict, security, and incident response,” he said. “While we have a course in policy (IST 456),

Fall 2014 College of Information Sciences and Technology

19


the policy approach in [the Cyber 9/12 Student Challenge] is more in the sense of major political steps to take after a major event has happened.” “This allowed myself to see that the two worlds can be very different, the people with technical knowledge operate in one sphere and the policy experts operate in another, and if one is able to bring knowledge that creates an overlap there becomes great potential for creating information and responses that incorporate the best of both processes,” Kissell concluded. In addition to the Cyber 9/12 Student Challenge, members of the IA Club have had other opportunities to practice the lessons they’ve learned in classes in a more dynamic environment. Each year, the club travels to Washington, D.C. to participate in ShmooCon, an annual East Coast hacker convention which, according to its website, is “hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical information security issues.” “This is also a great opportunity for students to network with some

Gerald Santoro Senior Lecturer and Security and Risk Analysis Club Advisor

of the biggest names in the information security industry,” said Chase Miller, former president of the IA Club who graduated from

points to a company’s network so that legitimate users can’t

the College of IST in May with an SRA degree.

access the system.

Miller, who is currently pursuing a Master of Science in

Dealing with such formidable adversaries requires cybersecurity

Information Technology degree at Carnegie Mellon University,

professionals who are up-to-date on the latest threats,

said that the IA Club also participates in a variety of cyber

technologies, and policies. To help meet that demand, Santoro

“capture the flag” competitions. Hosted by schools including New

is currently working with Pete Forster, associate dean for online

York University Polytechnic School of Engineering; University of

and professional education and information technology at IST,

California, Santa Barbara; and Carnegie Mellon; the events are

in developing a course that deals with “cyber-crime and cyber-

a “great opportunity for students to apply the tactics, techniques,

warfare methods and policies.”

and procedures learned in the classroom and club meetings, to real-world cyber security challenges.”

“The human component is really what drives the SRA curriculum,” Santoro said. “The cybersecurity profession requires a mixture of

According to Santoro, cyber-warfare and cyber-espionage are relatively new areas for which the “rules of engagement”

people smarts and technological expertise.”

have not yet been written. There is tension between industry

One of the challenges of the SRA program is

and government over regulation of home computers that are

responding to evolving technologies that have transformed the

becoming increasingly infected by bots – software applications

way warfare is conducted. In recent years, terrorist groups have

that run automated tasks over the Internet, sometimes for

been using the Internet to spread propaganda, share information,

malicious purposes. In addition, DOS attacks flood the entry

coordinate attacks, and recruit new members. Don Shemanski,

20 College of Information Sciences and Technology Fall 2014


a professor of practice at the College of IST, addresses those issues in his class, “SRA 211: Threat of Terrorism and Crime.” On Feb. 26, 2014, Shemanski and his students had the benefit of hearing firsthand the insights of Admiral Dennis Blair, a distinguished military veteran and intelligence expert. Blair, who served as Director of National Intelligence from January 2009 to May 2010, delivered a presentation, “Conducting Intelligence Operations in a Cyber Connected Democracy,” to Shemanski’s class. Blair, who currently serves as a member of the Energy Security Leadership Council of Securing America’s Future Energy (SAFE), talked about the history and structure of the intelligence community, the evolution of the National Security Agency (NSA), electronic Internet surveillance, the role of intelligence in homeland security and counter-terrorism, and the need to share information across agencies. “Our students are always interested in hearing real-world experiences,” Shemanski said. As Director of National Intelligence, Blair was the President’s

Jarred Rittle (standing left), John Kissell (right) Brady Ripka (seated left), Trevor Fisk (right).

principal advisor on intelligence issues and led the federal government’s 16 intelligence agencies. He retired from the U.S. Navy in 2002 after 34 years of service, and has been awarded

especially since his current internship involves intelligence

four Defense Distinguished Service medals and three National

gathering, manipulation, and application.

Intelligence Distinguished Service medals. “During the presentation, Admiral Blair talked a bit about the “This is the highest-level speaker that we have managed to bring

recent debates over governmental ‘spying,’” Kohler said. “I

into one of our classes,” said Shemanski, who joined the faculty

particularly found that interesting, because based on the way

of the College of IST in 2008, after serving for 23 years as a

our media system is set up, we get a very biased view against

diplomat with the U.S. Foreign Service.

anything the government does, and to hear the other side and hear the justifications was a very nice change of pace.”

Fisk, who attended the presentation, said Blair focused on a few ideas during his talk, “one of the main ones being how information

Kissell, who was also in attendance for Blair’s talk, said that his

has transformed warfare.”

“take-home message” would be that the cybersecurity field is constantly evolving and professionals who enter the field must be

With all this new data, comes a new battle space and new

able to adapt to the shifting landscape.

tactics,” Fisk said. “Blair spoke about how even with all this technology, no single machine can solve a problem by itself, and

“Additionally, there will always be a need for people who

we need to integrate past methods with future technology to solve

understand technology and the technical aspect of intelligence,

complex problems.”

as every day we progress further into our reliance and use of technology,” Kissell said. “SRA prepares us for effectively

Ryan Kohler, currently a sophomore SRA major, who also

understanding how this technology works, how to use it to our

attended Blair’s presentation, said that he enjoyed getting

advantage and to another's disadvantage.”

a firsthand account of the intelligence analysis profession, Fall 2014 College of Information Sciences and Technology

21


A good night’s rest leads to start-up success:

IST alum Daehee Park aims to revolutionize the mattress industry For some aspiring entrepreneurs, the idea of building a business without outside funding may seem like too much of a risk. However for Daehee Park, a 2009 graduate of the College of Information Sciences and Technology (IST), and his business partner, John-Thomas Marino, founding the online mattress company Tuft & Needle with only $6,000 of their personal savings was a risk well worth taking.

a $3,300 memory foam mattress that “didn’t meet our comfort expectations” and described the experience as “worse than shopping for a car.” “At the time, I was working together with Daehee—my good friend from college—at a company (Mulu) in Palo Alto,” Marino wrote on the website. “Shortly after this long ordeal of finding a mattress, I shared a few of my frustrations with Daehee to discover that this had happened to him, too. We realized that there needed to be a

Driven by a vision of providing customers with a quality mattress

fix.”

at a reasonable price, the pair have succeeded through a combination of ingenuity, ambition, and perhaps most importantly,

“Mass-market mattresses from big brands are overpriced not

a customer-focused mentality.

only because of greed but also because they are inefficient,” Park said. “The product passes through many hands to get to the

“We figured we can fix the experience but also the pricing for

customer—the manufacturer, their salesperson, the distributor,

mattresses,” said Park, who has a bachelor of science degree in

the retail store, the salesperson on commission, then the delivery

security and risk analysis.

men.”

Park and his friend, Marino, who studied computer science and

“When we launched, we were able to keep our overhead low by

math at Penn State from 2006 to 2009, founded Tuft & Needle

launching with an online storefront and keeping our team pretty

out of the personal frustration Marino experienced when trying

lean,” Park said. “The key to our low prices while creating a

to purchase a quality mattress. On the company’s website,

quality product was cutting out the middlemen in the distribution

Marino said that when he got married, he and his wife purchased

chain and putting our customers first before our profits. We were

22 College of Information Sciences and Technology Fall 2014


confident that by leading with a great customer experience, the money would follow.” Tuft & Needle’s mattresses range in price from $200 to $600, and are available in five-inch and 10-inch models made out of foam. According to the website, the company sources all the raw materials—everything from the threads to the zippers. Since the company uses high-quality materials, the website states, the mattresses should last for seven to 10 years. As Tuft & Needle mattresses are not sold in brick-and-mortar stores, one of the company’s biggest challenges is convincing potential customers to purchase a mattress without seeing it or trying it out first. To help allay any concerns, Tuft & Needle offers a customer-friendly return policy in which buyers have 30 days to return a mattress, and the company will pick up the returns at no cost. “Contrast this to the typical model of mattress manufacturers selling wholesale to retailers, which are reminiscent of car dealerships,” Park said. “We were able to become the top-rated mattress on Amazon.com because we constantly tweaked our product and experience until people really loved it.” According to published reports, Tuft & Needle had $1 million in sales in 2013 and followed that with $500,000 in the first two months of 2014. Their mattresses, which are sold directly to consumers from their website and on Amazon, have soared to the top ranks on Amazon.com. Tuft & Needle’s products are not only the highest-rated mattresses sold on Amazon, but also the highest-rated products in the online retailer’s giant furniture category overall. In addition to shaking up the mattress industry, Tuft & Needle has a philanthropic mission. The company’s objective is to provide high-quality, easily transportable beds to foster children across the country without beds to call their own. Fundraising and delivery Courtesy Daehee Park

began with a pilot program in the Phoenix area in January 2013,

Fall 2014 College of Information Sciences and Technology

23


and the company has since expanded its charity efforts to the

In a few years, Park said, he would like to dedicate more

national level.

time to mentoring aspiring entrepreneurs and helping others “craft and achieve their visions.” As a company that started

“The focus on our local region was a good start to testing

out with little capital and hasn’t done any advertising (relying

the model when we first launched, and as we’ve grown as

instead on referrals), Tuft & Needle has overcome numerous

a national brand we saw the opportunity to reach many

obstacles to get to where it is today. If there is one message

more people,” Park said. “We now donate new or gently

that Park would like to convey to people who are following a

used mattresses to people in need around the U.S. by

similar path, it is the importance of persistence.

collaborating with non-profits like Salvation Army and Habitat for Humanity.”

Park and Marino had the opportunity to talk at length about tenacity and share their insights on building successful

Park’s entrepreneurial spirit has been evident since his days

companies in a presentation entitled “Bootstrapping a

at the College of IST, where he was involved in research,

successful start-up without venture capital,” which they gave

served as a teaching assistant for a number of courses, and

during IST Start-up Week 2014, held at the College of IST

led a team of students to a winning slot in the worldwide

April 7-11. Since its inception in 2012, Start-up Week, a

Google Online Marketing Challenge. Prior to co-founding Tuft

week-long showcase of innovation and entrepreneurship,

& Needle, Park led the monetization and analytics initiatives

has drawn dozens of speakers from around the country,

at Mulu, a celebrity-supported social platform that raises

including many IST alumni, who have created well-respected

money for charities; and was a marketing strategy consultant

and valued businesses and products in today’s technology

at Acxiom, a global interactive marketing company.

market.

While Tuft & Needle has made remarkable gains in the past

“I wanted to contribute back to the students here,” Park

couple of years, Park says that neither he nor the company

said. “IST has a great reputation for building student

as a whole has any intention of falling into complacency.

entrepreneurs. There’s still a lot of work ahead of us, including additional products that complement the mattress.”

“We’re working really hard on growing a mattress company that people love,” he said.

24 College of Information Sciences and Technology Fall 2014


Start-up Week April 7-11, 2014 1.

2.

3.

5.

4.

6.

10.

11.

7. 8.

9.

14.

12.

13.

15.

1. Tikhon Bernstam, Scribd, Parse 2. mHealth Challenge Participants 3. Steve Huffman, Reddit, Hipmunk 4. Daehee Park IST ‘09 Tuft & Needle 5. Pamela Sorensen ‘94, Pamela’s Punch 6. Start-up Week Reception at Pegula Ice Arena

7. Ryan Glynn, SRA ’12, mhoto, CinemaRama

8. IST Advisory Board Member Rod Murchison ‘91, Tripwire

9. David Rusenko IST ‘07, Weebly 10. Paul Cianciolo ’07, FirstMark Capital 11. Jayme Goldberg ’92, SilverLine

16.

12. Matt Miller ‘01, CyberCoders, CareerBliss

13. Start-up Week (Cybertorium) 14. Start-up Week panel 15. Dan Mead ‘75g, Verizon Wireless 16. IST IdeaMaker Challenge winners

Athletics Fall 2014 College of Information Sciences and Technology

25


Faculty Publications

M urder, intrigue, an historical backdrop and romance—all of those elements can be found in “His Lordship’s Legacy,” the debut novel of Don Shemanski, a professor of practice at the College of Information Sciences and Technology (IST). To write the book, he drew upon his experiences with the United States Foreign Service, where he served for 23 years as a diplomat, as well as his love of detective literature.

“I wanted to try my hand at a novel,” said Shemanski, who joined the faculty of the College of IST in 2008 and teaches in the Security and Risk Analysis (SRA) program. “I was a huge fan of the Sherlock Holmes stories when I was younger.” Shemanski’s book, “His Lordship’s Legacy,” was published at the end of June 2014 by Amazon and is available in both paperback and Kindle. Shemanski’s literary agents, Folio Literary Management of New York City, arranged the deal with Amazon, which has a special publishing program for books by agented authors. The story, which is set in 1898 in Washington, D.C., on the eve of the Spanish-American War, revolves around the murder of Lord Arthur Llewellyn-Dornay, a wealthy British Ambassador who is found stabbed through the heart after a glitzy soiree. It is up to two detectives -- Washington, D.C. Police Inspector John Decker, and Scotland Yard’s Colonel Robert Pierce MacGregor -- to unravel the mystery and uncover the truth. As far as having insider knowledge of embassy culture, Shemanski has a wealth of experience to draw from. Immediately prior to joining the College of IST, he served as Counselor for Global Affairs at the U.S. Embassy in Berlin, directing the office responsible for high-priority policy issues such as counter-terrorism, nuclear nonproliferation, climate change, and international judicial assistance. He has had a number of postings in

26 College of Information Sciences and Technology Fall 2014

Washington and abroad, including tours in Italy, Pakistan, Cyprus, and Germany. His assignments have included serving as coordinator for State Department refugee assistance programs for the former Yugoslavia, delegate to the U.S. Delegation to the Vienna CSCE Follow-up Meeting, Deputy Special Envoy to the Afghan Mujahedin, and Alternate U.S. Delegate to the foundation, “Remembrance, Responsibility, and the Future,” which administered payments to former World War II-era forced and slave laborers of the Nazi regime. Rather than setting his novel in the present day, Shemanski said, he chose an historical setting to avoid problems in possibly having to obtain clearance from the government, and also because he has an interest in the late Victorian era. He made sure that the historical and technical references in the book were correct, he said, such as how fast a car could be driven in 1898, and how long it took to cross the Atlantic Ocean by steamship. Writing mystery novels isn’t the only way that Shemanski puts his creative skills to use—he also conducts multi-week simulations of a terrorist plot in several of his SRA classes. In both endeavors, he has to hit the “sweet spot” of giving the reader or student the correct amount of information so that they can solve the mystery. The obstacles in writing a novel, he said, include “remembering as you are writing it which characters know what as well as what the reader should know, and keeping all the moving parts organized.” “It was a goal that I wanted to see if I could accomplish,” he said. Shemanski, who is currently working on a second novel that deals with espionage, said that writing has been a lifelong passion. “I love the element of being able to create your own universe,” he said.


1. Media, Meaning, & the Legitimation Problem from the Eradication of the Meta Narrative to the Present Paperback by Gregory O'Toole

1

2

The late Jean-Francois Lyotard wrote that metanarratives, that is, the big stories we live by, legitimate our lives both as individuals and collectively, living within societal groups. Lyotard also explained that the metanarrative has been eradicated from Western culture and that efficiency (i.e. a fast-track to profit) is the only model left which leaves the current state of legitimation in a curious position. In order to understand the process leading to legitimation, “Media, Meaning, and the Legitimation Problem” works to establish the necessary workflow toward the metanarrative: the flow of the message from knowledge, to establishing meaning, to legitimation.

2. A Student Guide To Success At Penn State by Edward Glantz

3

5

4

U.S. News and World Report ranks Penn State among the top 15 public universities nationally. Penn State enrolls over 70,000 undergraduates in 20 campuses, including 15,000 first-year students that begin each year. “A Student Guide to Success at Penn State” transitions new students to success in the competitive Penn State classrooms, including note taking and time management skills, as well as student activities and support resources. Students are also provided career entrance strategies, including interview and resume preparation suggestions.

3. Innovative Practices in Teaching Information Sciences and Technology: Experience Reports and Reflections by Jack Carroll (Ed.)

Innovative Practices in Teaching Information Sciences and Technology: Experience Reports and Reflections” describes a set of innovative teaching practices from the faculty of Penn State’s College of Information Sciences and Technology. Each chapter is a personal essay describing practices, implemented by one or two faculty, that challenge assumptions, and push beyond standard practice at the individual faculty and classroom level. These are innovations that instructors elsewhere may find directly accessible and adaptable.

4. “Secure Cloud Computing, Advances in Information Security Series”, pages 303-324. Springer, 2014. in Software Cruising: A New Technology for Building Concurrent Software Monitor by Dinghao Wu, Peng Liu, Qiang Zeng, and Donghai Tian. In Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, and Cliff Wang (Eds.)

Cloud computing continues to experience a rapid proliferation because of its potential advantages with respect to ease of deploying required computing capacity as needed and at a much lower cost than running an owned computing infrastructure. However, the lack of ownership brings in myriad security and privacy challenges that are quite difficult to resolve. The purpose of this book is to provide a state-of-the-art coverage of the techniques to address these issues at all levels of the stack ranging from hardware mechanisms to application level techniques.

5. Foundations for designing usercentered systems: What system designers need to know about people

by Frank Ritter, Gordon D. Baxter, and Elizabeth F. Churchill

Foundations for Designing User-Centered Systems” introduces the fundamental human capabilities and characteristics that influence how people use interactive technologies. Organized into four main areas—anthropometrics, behaviour, cognition and social factors—it covers basic research and considers the practical implications of that research on system design. The authors have deliberately developed “Foundations for Designing User-Centered Systems” to appeal to system designers and developers, as well as to students who are taking courses in system design and human-computer interaction (HCI). The book reflects the authors’ backgrounds in computer science, cognitive science, psychology and human factors.

Fall 2014 College of Information Sciences and Technology

27


Produced by the College of Information Sciences and Technology Office of Communications and Outreach The Pennsylvania State University Information Sciences and Technology Building University Park, PA 16803-6822 http://ist.psu.edu

Fall 2014 iConnect  

Alumni magazine of the College of Information Sciences and Technology

Read more
Read more
Similar to
Popular now
Just for you