Issuu on Google+

College of Information Sciences and Technology

Fall/Winter 2013

Maitland explores geographic information systems in the West Bank How can information and communication technologies impact social and economic development?


Fall/Winter 2013 iConnect , the magazine of the College of Information Sciences and Technology is published twice a year by the Office of Communications and Outreach. Editors: Julie Coughlin and Jaime Lynch Art Director: Kelly Bryan Writer: Stephanie Koons Alumni Contributor: Paul Horn Photography: Emilee Spokus Alumni Relations: 814-863-7548 E-mail: alumni@ist.psu.edu All inquiries and comments should be sent to: iconnect@ist.psu.edu 814-867-1236 Stay connected with IST: facebook.com/ISTatPennState twitter.com/ISTatPennState instagram.com/ISTatPennState

4

16

Features Tapia strives to educate citizen scientists through beauty of auroras Dr. Andrea Tapia, associate professor of information sciences and technology, takes her research on the aurora borealis phenomenon into outer space, where she hopes it will capture the imaginations of citizen scientists around the globe. I 4

Undergraduate research experiences abound at IST The recent Undergraduate Research Symposium at IST celebrated the accomplishments of undergraduate student researchers who are making an impact at IST. I 8

Maitland explores geographic information systems in the West Bank Dr. Carleen Maitland, associate professor of information sciences and technology, undertook research in the West Bank to determine how information and communication technologies can impact social and economic development. I 12

Outsmarting hackers in the age of big data As director of both the Cyber Security Lab at IST and the Penn State Center for CyberSecurity, Information Privacy, and Trust (LIONS Center), Dr. Peng Liu conducts research that aims to combat malicious cyber attacks and protect sensitive data from being stolen. I 16

From the Dean Dean for a Day

I continue to be pleased by the achievements of our undergraduate

Our year in IST and at Penn State has been a very good one

students and alumni. We again enjoyed great success in the

due to the dedication of our faculty, staff, and students. During this

placement of our students for both internships and full-time jobs

year, our college has:

at excellent starting salaries. I routinely receive compliments from our Corporate Associates and other employers about how well

• Increased the size of the online undergraduate students to 500 students • Continued the development of our three online Master of Professional Studies (MPS) degree programs

prepared our students are. Our recruiting events are “standing room only” events. As we move into 2014 and the spring semester, many additional accomplishments and changes will occur for IST. By the end of June we will have completed the development of a new 5-year

• Increased the number of online graduate students to 250

strategic plan for the college, interviewed a number of excellent candidates for four new tenure track faculty positions, celebrated

• Implemented a new research center—the Center for Online Innovation in Learning (COIL)

the end of the For the Future Campaign, participated in THON, and conducted another successful Start-up Week.

• Raised funds for the Penn State For the Future Campaign,

Another activity occurring this spring is the search for a new Dean

achieving a total of $23M which is over 130% of the IST

of the College. At the end of June, I will be stepping down from

campaign goal

my “deanship” position and returning to the faculty ranks. I will take a sabbatical in the fall to perform research for a new book on

• Welcomed Dr. Vasant Honavar as our new chaired professor

The Pennsylvania State University is committed to the policy that all persons shall have equal access to programs, facilities, admission, and employment without regard to personal characteristics not related to ability, performance, or qualifications as determined by University policy or by state or federal authorities. It is the policy of the University to maintain an academic and work environment free of discrimination, including harassment. The Pennsylvania State University prohibits discrimination and harassment against any person because of age, ancestry, color, disability or handicap, national origin, race, religious creed, sex, sexual orientation, gender identity, or veteran status. Discrimination or harassment against faculty, staff, or students will not be tolerated at The Pennsylvania State University. Direct all inquiries regarding the nondiscrimination policy to the Affirmative Action Director, The Pennsylvania State University, 328 Boucke Building, University Park, PA 16802-5901; Tel 814-865-4700/V, 814-863-1150/TTY. U.Ed. IST 14-06

In This Issue

DepaRtments

IST online master’s program prepares future leaders in technology, security.

From the Dean | 3

Having recently marked its fifth anniversary, the IST online master’s program allows working professionals to obtain graduate degrees in areas such as information science (with a focus on cyber security and information assurance), homeland security and a new program in enterprise architecture. I 20

Penn State World Campus student rides to raise funds to fight childhood cancer IST student Tyler Knabb took on a 920-mile bicycle ride and visited 11 Penn State campuses this past fall in an effort to raise $3,000 for THON, while increasing awareness about conquering childhood cancer. I 22

David Hall to conclude IST deanship in June Appointed dean of the College of IST in September 2010, Dr. David Hall will be stepping down in June to return to the ranks of faculty and take a sabbatical in the fall of 2014. I 24

Research news | 6 Student news | 10 Alumni Profile:

Steve Garguilo (’09 IST), TEDxJNJ Curator, Johnson & Johnson | 26

Alumni news | 28

“Citizen Science” and to develop some new research proposals and courses for the College. It has been a great honor and pleasure

• Increased our corporate associates program to 18 members

to be the Dean of IST for the past four years. In future editions of my blog, Hall Pass, I will share some highlights of my Deanship

• Implemented new initiatives related to entrepreneurship including a new minor in entrepreneurship

and relate some of the very pleasant surprises of being the Dean of IST. I’m glad that I will remain a member of the College for the next few years and look forward to interacting with students,

• Initiated a new leadership program for IST undergraduate

alums, faculty, and staff in my new role.

students, the IST Diplomat Leadership Academy Dave Hall, Dean • Continued to excel in research and publications in topics

College of Information Sciences and Technology

ranging from citizen science to addressing technology needs of refugees, to methods to defeat cyber attackers, to research about online student collaboration and community

Cover:

engagement.

Dr. Carleen Maitland at the Western Wall, Israel

Follow my blog! http://deanhallpass.wordpress.com


RESEARCH NEWS

Tapia strives to educate citizen scientists through beauty of auroras Professional astronomers and amateur

various sources—including social media.

project won both the crowdsourced vote

stargazers alike are fascinated by the ma-

In addition to improving this online plat-

and the scientific evaluation portion of the

jestic beauty of the aurora borealis (North-

form, images of the northern and southern

contest.

ern Lights) and aurora australis (Southern

lights from the ISS can be used as data to

Lights), with many of them traveling thou-

improve space weather forecasting and to

“It went viral,” Tapia said, adding that her

sands of miles to see the brilliant light shows

better understand auroral behavior.

team got 5,000 votes in one afternoon af-

in the Earth’s atmosphere. Andrea Tapia,

Learn more about the Aurorasaurus project at htttp://www.aurorasaurus.org.

ter trailing by 2,500 votes. “And all that was

an associate professor at Penn State’s Col-

The auroras, both surrounding the north

because of the power of the Penn State

lege of Information Sciences and Technol-

magnetic pole (aurora borealis) and south

network.”

ogy (IST), is involved in a project that would

magnetic pole (aurora australis) occur

not only allow people to more easily track

when highly charged electrons from the so-

As part of the grand prize package, CA-

the northern and southern lights, but would

lar wind interact with particles in the earth’s

SIS is awarding the winners a check for

Aurorasaurus.org

also encourage everyday citizens to play a

magnetic field. Solar winds stream away

role in space weather prediction.

impact that has on being able to predict

While Aurorasaurus makes viewing the

observatories, and citizen observations.

rare events through crowdsourcing.”

Northern Lights a more communal and

The researchers can utilize information

convenient experience for many enthusi-

about aurora sightings that is directly

real-time

asts, Tapia said, the website was also de-

entered into the website, but can also

$10,000, a three-night, expense-paid trip to

Google map of auroral visibility from mul-

signed as a mechanism to predict space

integrate into the algorithm tweets about

from the sun at speeds of about 1 million

Orlando, Fla. to meet with CASIS officials,

tiple sources: user contributions, filtered

weather and as an early warning system.

auroras from people who aren’t aware of

miles per hour. When they reach the earth,

a one-day pass to Walt Disney World in Or-

social media tweets, weather, and auroral

On Oct. 24, 2011, a geomagnetic storm

the website.

“Our goal is not necessarily just to make it

some 93 hours after leaving the sun, they

lando, a special tour of the NASA John F.

oval predictions from the National Oceanic

raged across Europe and the U.S. Arrival

easier for people to see beauty,” Tapia said.

follow the lines of magnetic force generated

Kennedy Space Center, and a chance to

and Atmospheric Administration Space

forecasts were off by eight hours and pre-

“We can combine direct contributions,

“It’s a way to get them involved in science

by the earth’s core and flow through the

witness a CASIS payload launch to the In-

Weather Prediction Center’s space-based

dicted a much weaker storm. The National

indirect contributions, and scientific data to

and bigger ideas through beauty.”

magnetosphere, a teardrop-shaped area of

ternational Space Station.

data. The auroral oval is an oval-shaped re-

Research Council estimated that impacts

make a better prediction about whether a

gion centered on the earth’s magnetic pole

on major infrastructure can exceed $1 bil-

true storm is happening now,” Tapia said.

The Aurorasaurus website was originally

in which auroral emissions occur. The oval

lion in damage.

charged particles and magnetic fields. “Real-time Auroral Imaging on the Interna-

provides

a

tional Space Station (ISS),” an idea con-

The team’s idea to have a camera on the

built by MacDonald and her team a couple

moves in accordance with energy transmit-

ceived by Elizabeth MacDonald of the New

ISS to gather images and data came to

of years ago, Tapia said, and it is fully func-

ted from the sun, Tapia said.

Mexico Consortium (NMC) in collaboration

fruition when its members discovered the

tional, although not yet complete. MacDon-

with Tapia and Michelle Hall of Science

CASIS contest for ideas. CASIS is a non-

ald, Tapia, and Hall were recently awarded

Education Solutions, was recently named

profit organization that manages research

the grand prize winner in the crowdsourcing

onboard the ISS U.S. National Laboratory.

contest What Would You Send to the ISS?

The researchers’ motivation for developing According to Tapia, the scientific community

the

currently does not have a system to

stems from both a desire to help people

According to Tapia, solar activity ebbs and

accurately forecast space weather between

experience the beauty of the auroras, and

support by the Integrated NSF Support

flows on an 11-year cycle. If the state is in

the sun and the earth. During the solar

also to launch a citizen science project that

Promoting Interdisciplinary Research and

a solar minimum, the Northern Lights would

storm in 2011, thousands of tweets from as

could be of great benefit to society.

The contest was designed to stimulate pub-

Education (INSPIRE) program. The grant,

be visible so far north that no one would re-

far south as Alabama documented the real-

sponsored by the Center for Advancement

lic interest in the space station by soliciting

which amounts to about $1 million dollars

ally be able to see them. Since it is currently

time visible aurora, suggesting a new way

“People

of Science in Space (CASIS). The team’s

ideas from the public to innovatively use the

over two years, will be used to fully develop

a “solar maximum year,” she said, there is

to significantly improve aurora forecasting,

because they think the lights are beautiful,”

idea is to fly a geo-tagged video camera to

station’s National Lab for terrestrial benefit.

Aurorasaurus on both physical and mobile

“more auroral activity than years past or

while engaging the public in advancing

Tapia said. “If they learn about (space

the ISS to record the northern and southern

The contest, which ran from Aug. 19 through

platforms, and to expand the citizen sci-

years future for another 13 years.”

space weather science. The team behind

weather) along the way, we’ve won. If they

lights in real time. Captured images can be

Sept. 16, involved public participation in the

ence elements of the website. The team’s

Aurorasaurus, Tapia said, can develop

participate in an early warning system that

displayed on a website called Aurorasau-

voting process to determine winners along

goal, Tapia said, is to get people to try out

“We are in a period of time when the North-

an early warning system for solar activity

serves as a predictor of rare and possibly

rus, which includes a real-time map track-

with votes from the CASIS Science Adviso-

Aurorasaurus, integrate the website into

ern Lights are over places where people

that would draw data from many sources:

dangerous events, we’ve also won.”

ing of Earth observations of the auroras via

ry Board. The “Real-time Auroral Imaging”

classroom or field work, and to “see what

live,” Tapia said.

earthbound

4

College of Information Sciences and Technology

observatories,

Aurorasaurus

are

website,

motivated

to

she

said,

participate

satellite Fall/Winter 2013

5


RESEARCH NEWS

Yen, McNeese granted patent for system that fuses human and computer intelligence

Carroll, Rosson assist Microsoft with Xbox user-experience testing

Penn State-led team receives $10M NSF “Expeditions in Computing” award

IST researchers aim to increase community engagement through local news app

A Penn State-led team, including Dr.

The five-year award is for the proj-

Jack Carroll, Dr. Lee Giles, and Dr.

ect “Visual Cortex on Silicon” with

Mary Beth Rosson, all faculty members

Vijaykrishnan Narayanan, professor

of IST, has received a $10 million

of computer science and engineering

Expeditions in Computing award from

and electrical engineering, as the lead

the National Science Foundation's

principal investigator. The award is one

In recent years, Twitter and other social media

(NSF) Directorate for Computer and

of only two announced by the NSF.

sites have played an increasingly important

In complex crisis situations involving

developed by Yen and his students,

military situation awareness, homeland

and enhancing that with a recognition-

security, and other time-sensitive

primed decision (RPD) model,

scenarios, teams of experts must often

thereby enhancing analysis through

When developing entertainment and

Information Science and Engineering

role in reporting local news through personal

make difficult decisions within a narrow

linking and sharing information using

multimedia products, companies must

(CISE).

perspectives. Formal news articles that are

time frame. However, voluminous

knowledge and experience distributed

ensure that users will enjoy a positive

amounts of information and the

among team members. CAST is a

experience when interacting with their

complexity of distributed cognition can

team-oriented agent architecture that

services. Jack Carroll, a distinguished

hamper the quality and timeliness of

supports teamwork using a shared

professor of IST, and Mary Beth Rosson,

decision-making by human teams and

mental model among teammates.

a professor and associate dean for

lead to catastrophic consequences.

R-CAST is the first RPD-enabled agent

undergraduate studies at IST, have

architecture designed for supporting

teamed up with Microsoft for a project

At IST, as well as many other institutions of learning, an increasing number of

and engagement by enabling users to access

Two professors from IST, John Yen

team-wide collaborations (including

that applies their research on self-

classes are being conducted in a blended learning format. Blended courses are

more dynamic community news information.

and Michael McNeese, along with

human-agent and agent-agent

efficacy—a measure of the belief in one's

classes where a portion of the traditional face-to-face instruction is replaced

Xiacong Fan, an associate professor of

collaborations).

own ability to complete tasks and reach

by Web-based online learning. Marcela Borge, a senior research associate/

“I think that what’s clever about (the app) is that

goals—to develop better evaluation

instructor at IST, recently received a grant from the National Science Foundation

the content it needs is already there,” said Jack

computer science and engineering at

published by media organizations may be

Borge explores student online collaboration

more objective and authoritative but lack social context. Researchers at IST have devised a smartphone app that integrates local news articles and socially generated tweets, with a goal of increasing community awareness

Penn State Behrend, and Shuang Sun,

According to Yen, people draw on

techniques for Xbox, an entertainment

(NSF) that will enable her to explore the nuances of student online collaboration

Carroll. “It really integrates stakeholders in a

who received a doctorate from IST in

previous experiences when they need

and gaming system.

and develop learning models that can be adapted to different educational

news story in a way that doesn’t normally occur.”

2006 and is now a project manager

to make decisions in a time-stressed

at Attune Cytometric Software, have

situation. In addition, high-performing

“We were contacted to help (Microsoft

devised a system that merges human

teams exhibit some degree of a

researchers) work on tools and

and computer intelligence to support

shared mental model—people on the

techniques to assess what is called the

decision-making in crisis situations.

team have an understanding of the

‘user experience,’” said Carroll, who

They were recently awarded U.S.

respective roles of each team member

directs the Center for Human-Computer

patent number US 8,442,839, “Agent-

and who has what information. The

Interaction at the College of IST.

based Collaborative Recognition-

researchers’ invention situates the

Primed Decision Making”—a

RPD model in a team context, so that

Carroll and Rosson, who were awarded

new possibilities for scientific and social advancement. However, current research

collaborative intelligent agent

team members can infer what their

$50,000 by Microsoft to complete the

tools are not equipped to harness those vast pools of information. Honavar was

framework that, according to Yen,

teammates need in a proactive way.

project, are assisted by Jake Weidman,

recently honored by the National Science Foundation (NSF) for leading a program

an IST doctoral candidate. The Microsoft

that aims to foster scientific breakthroughs by maximizing the potential of big data.

“finds the sweet spot that combines

settings.

Honavar honored by NSF for leading big data program The massive amount of data that is now available in many domains, according to Vasant Honavar, a professor and the new Edward Frymoyer Chair of IST, has created

machine intelligence working in

“The RPD model acts as an intelligent

team that they are collaborating with

Honavar, who joined the College of IST in September 2013, was honored

tandem with human intelligence.”

team partner that is able to share

includes Umer Farooq, one of the

with the NSF Director’s Award for Superior Accomplishment for “exemplary

information without overloading

team leaders in the Xbox division, who

leadership in the implementation and execution of the Big Data Initiative

The patent application describes

people, and enhances the quality of

received his doctorate from IST in 2007

and related innovative interagency collaboration.” The award recognizes

the concept of using a framework,

information by sharing relevant facts,”

and studied under Carroll.

Honavar’s

Collaborative Agents for Simulating

Yen said.

leadership

of

the

NSF

“Core Techniques

for Advancing Big Data Science & Engineering

and Technologies

(BIGDATA)” program.

Teamwork (CAST), originally 6

College of Information Sciences and Technology

Fall/Winter 2013

7


STUDENT NEWS

Undergraduate research experiences abound at IST Conventional wisdom in academia holds that the undergraduate years are primarily for classroom-based learning, while graduate students engage in serious research. At IST, however, a growing number of undergraduate students are gaining skills and experience in research methodology by assisting faculty with highimpact projects. The IST Office of Undergraduate Studies hosted the first annual Undergraduate Research Symposium on Oct. 4, 2013 to celebrate the accomplishments of eight IST Undergraduate Student Research Fellowship recipients who worked with a faculty supervisor during the previous summer. The event was initiated by Dr. Mary Beth Rosson, who was appointed associate dean for undergraduate studies at IST in 2012, and has many years of experience in supervising undergraduate researchers. “When I came into this position, I was looking for ways to celebrate the opportunities (for undergraduate research) that were there as well as build on them,” she said.The students who presented their research at the symposium were Scott Cunningham (faculty supervisors: Marcela Borge and Jack Carroll), Tariq Ellis (faculty supervisor: Carleen Maitland), Charlise Harris (faculty supervisor: Heng Xu), Kathryn Lambert (faculty supervisor: Jens Grossklags), William Murphy (faculty 8

College of Information Sciences and Technology

supervisor: John Yen), Sujay Patel (faculty supervisor: Steven Haynes), Dominique Scott (faculty supervisor: Lynette Kvasny), and Diana Zhang (faculty supervisor: Patrick Shih). “I was very pleased with the quality of the presentations,” Rosson said. “[The symposium] raised the visibility and expectations of what it means to be an undergraduate researcher.” While IST receives money from the University for the Undergraduate Student Research Fellowship (SURF) program, Rosson said, the work of the participants in the program “hadn’t really been featured or organized.” It is quite common for individual IST professors to recruit undergraduate students to work in their labs, but those positions are not widely publicized. In an effort to expand students’ and other faculty members’ awareness of these research opportunities, the Office of Undergraduate Studies created a more structured application process and merged the SURF program with Penn State’s Undergraduate Discovery Summer Grants program, which was established by it’s Office of Undergraduate Education to help students take advantage of Penn State’s research environment. Supported by an endowment from the Penn State Alumni Association and funding from the Vice President and Dean for Undergraduate Education and several colleges, the

purpose of the grants is to promote faculty/undergraduate collaboration as students engage in original research, scholarship, and creative work during the summer under the direct supervision of a faculty member. Each Discovery grant is in the amount of $3,000 and may be used to cover living expenses and project costs. These projects are similar to other undergraduate research at IST, which is often funded by the National Science Foundation (NSF) through supplements to existing research grants (Research Experiences for Undergraduates). Faculty members who apply for these supplements, Rosson said, often win enough support for two to three undergraduate researchers to collaborate on their projects. Harris, a senior at IST, presented the research project “Understanding User Adaptation Strategies for the Launching of the Facebook Timeline” that she worked on with Xu, an associate professor at IST who is currently serving as program director for the Secure and Trustworthy Cyberspace Program with the NSF; Pam Wisniewski, a post-doctoral scholar at the College of IST; and Yunan Chen, a professor in the Donald Bren School of Information and Computer Sciences at the University of California Irvine. Harris said that she learned about the project, which examined how Facebook users reacted to the introduction of the Timeline

and interface changes, while enrolled in Xu’s “Integration of Privacy and Security” class. During the semester after Harris completed the class, she approached Xu about assisting her on the project. Xu agreed and nominated her for a Summer Undergraduate Research Fellowship (SURF).

Harris, who is thinking about joining the U.S. Foreign Service after completing graduate studies, said that one of the major benefits she gained from working on the project was “being able to not only look at data, but draw conclusions from it and being able to collect and synthesize data.”

Harris’ role on the project, she said, involved transferring into Excel the 1,400 comments that were posted on Facebook’s blog after the introduction of the Timeline and coding them before assisting in analysis. The researchers’ findings were that most Facebook users viewed the interface changes to be “stressful” and felt a sense of loss of privacy and control of old features. However, overall sense of control was very important. When users felt that they were generally in control of the change, they were more likely to view it as a challenge and engage in adaptive behaviors like learning about the interface and customizing it to meet their needs. When they didn’t feel in control of the change, they tended to view it as a threat, and engaged in maladaptive behaviors like complaining or threatening to leave Facebook.

When Harris first started working on the project, she said, she had to overcome the jitters she felt from working with experienced researchers such as Xu, Wisniewski and Chen. After settling into a groove, though, she recognized the worth of her contributions. “The challenge for me, in the beginning, was kind of finding my voice,” she said. “(Eventually), I realized my opinion was valuable.” Murphy, a senior at the College of IST who is also pursuing a master’s degree in IST through the integrated program, has also been proactive about seeking out research opportunities. At the Undergraduate Research Symposium, he presented his work on a project with IST professors Dr. John Yen and Dr. Prasenjit Mitra, along with Dr. Michelle Newman, a professor in Penn State’s Department of Psychology. The goal of the project is to use machine learning to classify the online journal entries of cancer survivors into different emotional categories. The machine learning system that the researchers developed predicts the mood or sentiment of the entries without actually reading them. Murphy’s role in the project was to write up the results of the machine learning experiments. A paper describing the researchers’ work, “Supervised Machine Learning Classification of Journal Entries about Emotional Personal Experiences,” was presented at the American Medical Informatics Association (AMIA) 2013 Annual Symposium that was held in November in Washington, D.C. “Bill has done very interesting work on analyzing tweets related to cancer as well as on classifying journal entries about personal experiences, collected by a study conducted by Professor Michelle Newman and her team, into emotion states (e.g., fear, happy, and sad),” Yen said. “He

combined two approaches developed in two communities (one from psychology, the other from information retrieval) to demonstrate the synergy in combining them.” Murphy, who has been involved in Yen’s and Mitra’s research as part of his master’s program, received an undergraduate research grant from Penn State over the summer to continue work on the cancer survivors project. He said that Yen approached him in the spring 2013 semester about assisting in the research, and that he thought it was a good opportunity to gain hands-on experience with the machine learning concepts he had learned in his classes. Murphy, who aspires to enter the machine learning/data mining field after graduation, said he would advise undergraduate IST students who are interested in gaining research experience to reach out to their professors and “ask them what their research is about.” Rosson echoed Murphy’s statements that research experience is a feather in the cap for undergraduate students, and that they should actively seek out those opportunities. Her advice to students is to “keep their eyes and ears open” for faculty research talks and to read faculty research pages to gain a sense of which professors might be a good fit for their own interests or aspirations. Students can also make arrangements to do an independent study and use this option to create custom research projects that they complete for credit. Finally, they can also arrange to work in a research lab as part of fulfilling their IST internship requirement. Gaining research experience as an undergraduate offers many benefits, Rosson said, whether he or she chooses to continue on to graduate school or enter the private sector. “Even for students going into industry, being able to talk about research projects demonstrates a whole new set of problemsolving talents and skills,” she said.

Fall/Winter 2013

9


STUDENT NEWS

PSU mHealth Pitch C o mpet i t i on The College of IST and the Department of Biobehavioral Health (BBH) in the College of Health and Human Development, held the first cross-college PSU mHealth Challenge in support of Global Entrepreneurship Week on

Google

New option in IST online master's program prepares students to counter cyber-attacks

Challenge

course at IST nurtures talent, supports businesses

November 19, 2013. In today’s interconnected society, information More than 200 people gathered in the Cybertorium to watch six cross-

systems are vulnerable to a myriad of threats

college teams pitch their mHealth apps to a panel of judges.

such as unwanted intrusions, illicit insider corruption or dissemination of data, and

“Pie Your Professor” raised $300 for THON

In Dr. Jim Jansen’s Google Online Marketing Challenge class in IST, students create online marketing campaigns in order to learn keyword advertising and gain the chance to place

First place was awarded to SmartDrinker, whose focus is to increase

unexpected losses from natural or man-

campus community awareness and knowledge on binge drinking among

made disaster. As a result, government and

the Penn State student body, while providing personalized support.

industry need to hire individuals who have

Cameron Ceschini, an IST student, was part of the winning team. This

the knowledge and training to combat the

app is designed to allow students to keep track of their drinking habits

onslaught of cyber-attacks. To meet that

and hopefully reduce the prevalence of binge drinking. SmartDrinker

demand, IST has created a new option within

demonstrated to the judges that they have identified a well-defined target

its online Master of Professional Studies in

population for the app and that the app will feature a tight integration of

Information Sciences (MPS in IS) program

“This course really set the students on a path to a great job

health behavior with app functionality.

that is designed to prepare graduates to work

in a growing and dynamic field,” said Jansen, an associate

in the areas of cybersecurity and information

professor at the College of IST.

Global Entrepreneurship Week strives to encourage individual potential,

assurance in the federal government or

build networking opportunities for students and local businesses, and spark

private sector.

in Google’s international competition. The success that the student teams have had in recent years, along with the class’s

Thanks to our faculty and staff for participating: Julie Coughlin, Rosalie Ocker, Gerry Santoro, Marc Friedenberg, Lisa Lenze, Nick Giacobe, David Reitter, and Leslie Meyer.

involvement with Pennsylvania businesses, have increased the students’ viability in the workforce in addition to furthering Penn State’s mission of supporting businesses across the Commonwealth.

Two students from the College of IST, along with a student from the College of Communications, recently placed in the Global

creativity. Through the week’s activities, students were connected to six continents and over 130 countries to explore global entrepreneurship. This

“This option reflects the college’s academic

Final 15 of the 2013 Google Online Marketing Challenge by

initiative is also the world’s largest celebration of job creators and business

expertise in cybersecurity and information

devising an advertising campaign for a Pennsylvania youth

start-ups.

assurance and focuses on the cybersecurity

camp.

principles of maintaining the confidentiality, integrity, and accessibility of information,” said Peter Forster, assistant dean for online programs and professional education at the College of IST. The Cybersecurity and Information Assurance (CIA) option became available to students Jan. 1, 2014. The new program will focus on the broad threats and vulnerabilities (L to R): Maritza Zavala (HHD), Natalie Torreti (HHD), Sean Brown (HHD) and Cameron Ceschini (IST).

Valley Magazine, posted 11/14/2013 by Erica Kasan

10 College of Information Sciences and Technology

to information systems, and will teach approaches and skills that are applicable to the business, medical, and industrial sectors as well as government.

IST 110 student Emily Spicher uses a “free hugs” campaign to capture data and the hearts of passersby for a team project focusing on data collection and visualization.

(L to R) Dani Cohen (ADVPR), Wil Wilinson (IST), Shawn Warrender (SRA ) Fall/Winter 2013

11


involved in improving the quality of life for individuals, both in the U.S. and around the world. During the summer and fall of 2013, she traveled to the West Bank, where she examined the impact of ICTs on humanitarian projects and political divisions; and to South Africa, where she facilitated a dialogue on developing technologies for improving living conditions for refugees.

Education Projects currently underway in Israel

Maitland explores geographic information systems in the West Bank Sectarian and regional conflict in the Middle East and sub-Saharan Africa, natural disasters, political unrest—all of these issues create complex and multi-faceted effects for people living in their midst, with no clear-cut means of supporting those affected. Dr. Carleen Maitland, an associate professor at IST, says she recognizes that while information and communication technologies (ICTs) aren’t foolproof means of support, they present remarkable potential to supported affected populations, thereby fostering social and economic development. “I want the outcomes of my research to benefit the most vulnerable people,” Maitland said. “Those experiencing political unrest or displaced from their homes need support and ICTs can play an important role. However,

12 College of Information Sciences and Technology

developing the technologies is not enough. We need to understand how international development and humanitarian organizations can make better use of technologies, but also how they might make these technologies directly available to those affected. When affected populations have direct access to information, they regain a sense of independence and control and can better help themselves.” Maitland, who received a doctorate in the economics of infrastructure from Delft University of Technology, the Netherlands, researches both critical and practical analyses of international, sectoral, and organizational contexts where ICTs are used to benefit international development. Her work has been

carried out in the U.S., Europe, Africa and the Middle East, while working with diverse organizations such as the United Nations Conference on Trade and Development (UNCTAD), the UN Office for Coordination of Humanitarian Affairs (UN OCHA), Save the Children, and the U.S. State Department. From 2010 to 2012, she served as a program officer for the National Science Foundation (NSF), both in the Office of International Science and Engineering and the Office of Cyberinfrastructure. According to Maitland, the fast pace of innovation in information and communication technologies creates new opportunities and challenges for economic and social development. Those opportunities include enhanced support for people

“Both projects involve international development and humanitarian organizations, one focusing exclusively on organizational use and the other seeking to understand how these organizations can foster access to ICTs for beneficiaries,” Maitland said. “ It would be similar to understanding how our hospitals in the U.S. foster ICT use for doctors versus making ICTs directly available to patients.” Businesses, governments, and educators are increasingly turning to geographic information systems (GIS) to solve problems and improve processes. GIS integrates hardware, software, and data for capturing, managing, analyzing, and displaying all forms of geographically referenced information. During Maitland’s trip to Jerusalem and the West Bank in July, she conducted preliminary research that examined the impact of GIS on humanitarian aid and economic development in the region.

“In the West Bank, land is extremely political and very important,” Maitland said. “It naturally lends itself to the use of GIS.” Maitland, along with Anthony Robinson, a research associate in the GeoVISTA Center and Dutton e-Education Institute in the Penn State Department of Geography, received a grant from the Social Science Research Institute (SSRI) at Penn State. The trip to Jerusalem and the West Bank was part of a project that Maitland and Robinson are

conducting on geographic information use by international development organizations. While in the Middle East, Maitland collaborated with the U.S. Agency for International Development (USAID), a federal agency primarily responsible for administering civilian foreign aid. Maitland said that she asked USAID leaders about what particular mission was heavily reliant on GIS, and they advised her and Robinson to look at the mission for the West Bank, which has been using GIS since 2002. The West Bank is a landlocked territory, bordered by Israel on the north, south and west, and Jordan on the east, forming the bulk of the Palestinian Territories. In June 1967, the West Bank and East Jerusalem were captured by Israel as a result of the Six-Day War. The 1993 Oslo Accords declared the final status of the West Bank to be subject to a forthcoming settlement between Israel and the Palestinian leadership. Following these interim accords, Israel withdrew its military rule from some parts of the West Bank, which was divided into three administrative divisions of the Oslo Accords: Area A (about 11 percent of the population), which is under Palestinian civil and security control; Area B (about 28 percent), which is subject to Israeli military control and Palestinian civil control; and Area C (about 61 percent), which is under full Israeli control. An important impetus for the adoption of GIS in the West Bank, Maitland said, arose out of the Second Intifada—a period of intensified Palestinian-Israeli violence, which began in late September 2000 and ended in 2005 and had a death toll of about 3,000 Palestinians, 1,000 Israelis and 64 foreigners. Due to the clash, USAID leaders were concerned about sending staff members to do field checks on projects and possibly subjecting them to skirmishes, stonethrowing, and bombs. Eventually, the leaders discovered that GIS could be useful not only for enhancing security,

but also for coordinating projects such as building schools. “It seems like what started out as a security concern from USAID’s perspective has helped Palestinians develop skills in locating and planning projects,” Maitland said. USAID developed its own GIS to collect data from its implementation partners—organizations that collaborate with USAID on economic development and humanitarian efforts—so that USAID leaders have precise knowledge of the locations of the projects. For example, Maitland said, if an implementation partner asks USAID for a grant to build a school, the agency could use GIS to determine precisely where the school could be built. USAID maintains a project database that implementation partners use to report data to the agency on their projects, such as how much money was spent and how many people benefitted from the project, e.g. a certain number of jobs that were created to build a school. In addition to its own GIS system, USAID and some of its implementation partners also use Esri’s ArcGIS, a system for working with maps and geographic information. The system provides an infrastructure for making maps and geographic information available throughout an organization, across a community, and openly on the Web. While in Jerusalem, Maitland said, she met with people working in international development or using GIS in the West Bank to learn more about the growth of GIS use in the area. Several United Nations agencies that are active in international development have been using GIS, including the Office for the Coordination of Humanitarian Affairs (OCHA), the part of the UN Secretariat responsible for bringing together humanitarian actors to ensure a coherent response to emergencies. USAID has required the use of GIS for more than 10 years, Maitland said, so she was interested

Fall/Winter 2013

13


to know whether this requirement was burdensome or if implementation partners had begun to use GIS independent of this requirement. She also talked to aid workers in Ramallah, a Palestinian city in the central West Bank, to inquire about their use of GIS. One of the major issues that Maitland encountered on her trip, she said, was data sharing. As the humanitarian agencies become aware of their counterparts’ data sets, it would be beneficial for all agencies to “share data more freely with one another so better and more complex analyses can be conducted.” The research conducted on her Middle East trip, Maitland said, was funded by SSRI as a seed grant and unearthed “more questions than conclusions.” The findings will be used as preliminary evidence as they “dig deeper into the story of GIS use in the West Bank.” A possible area of further investigation is the Israeli West Bank Barrier, a security and separation barrier that is under construction by the State of Israel along and within the West Bank. Israel argues that the barrier is necessary to protect Israeli civilians from Palestinian terrorism, including the suicide bombing attacks that increased significantly during the Second Intifada. Maitland said that she would also like to investigate USAID missions in Jordan and Iraq and help determine if GIS systems developed for the West Bank could be transferred to those locations.

“Geographic issues are very sensitive,” she said. “I’m interested in studying whether public perceptions expressed via social media could be integrated with GIS and compare what’s happening on the West Bank with other locations.” While traveling in the West Bank, Maitland said, she gained a lot of knowledge about the culture beyond her formal research. The trip took 14 College of Information Sciences and Technology

place during Ramadan—the ninth month of the Islamic lunar calendar during which Muslims all over the world abstain from food, drink, and other physical needs during the daylight hours. While conducting her research, she said, she had to be sensitive to the fact that many of the people she interviewed might be edgy or have difficulty answering questions due to hunger. Maitland said that she herself also had to be conscientious about not eating in public during fasting hours. Maitland’s experience in the West Bank also gave her an opportunity to observe how GIS systems are being used to deal with security concerns and the “political realities” of the region. People living in the area use maps to understand movement restrictions—Israel enforces restrictions on the freedom of movement of Palestinians in the West Bank by employing a system of permanent, temporary, and random manned checkpoints, the West Bank Barrier, and by forbidding the usage of roads by Palestinians. Israeli citizens are restricted from travelling through regions controlled by the Palestinian Authority, which amount to 18 percent of the West Bank. As a result, Maitland said, she received inquiries from Israelis about the restricted areas. “I think (the barriers) enhance security, but on the other hand, the Israelis are being prohibited from seeing the development that’s going on in Palestine,” she said. While new technologies can impact development and relief operations, they are often not accessible to people who are forced to leave their homes due to unforeseen circumstances. Natural disasters such as Typhoon Haiyan and armed conflicts like the one in Syria cause people to flee from their homes. This displacement—being torn from precious possessions, familiar surroundings and community—creates needs for connectivity, communication, and connectedness. To address these needs, Maitland organized a workshop

that was held in December 2013 in South Africa, home to thousands of refugees displaced by Africa’s civil conflicts. “The goal of the workshop was to create a research agenda for information communication technologies for refugees,” Maitland said. The “Workshop on Robust Sociotechnical Architectures in Support of Displaced Persons,” sponsored by the NSF, was held on Dec. 4-5 at the University of Cape Town, Cape Town, South Africa. The workshop was attended by scholars from computer, information, and organization science, as well as communication, anthropology, geography/geographic information systems, and migration studies, together with practitioners serving refugee communities. Weaving together interdisciplinary and international perspectives, and leveraging existing research on wireless and grid architectures, and specialized applications and interfaces, the workshop’s goal was to identify parameters for social theories and new technologies, ranging from innovative network architectures to applications supporting displaced people’s self-organization and information access. “We need the practitioners to give our research agenda a realistic grounding,” she said. “On the other hand, the researchers can help the practitioners understand what’s coming down the pike.” Maitland’s motivation for organizing the workshop, she said, originated from her experience in the Peace Corps while situated at the border between Malawi and Mozambique. During her assignment, she lived among 10,000 Mozambican refugees housed in camps operated by the UN High Commissioner for Refugees (UNHCR). “I got to understand the whole refugee camp system,” she said.

Another impetus for the workshop, Maitland said, is the ongoing civil strife in Somalia that has caused an estimated 1 million Somalis to flee to Kenya, 400,000 of them in the Dadaab refugee camps. Recently, the World Food Programme, in the midst of a budget crisis, took the unprecedented step of cutting back 30 percent of the food rations that it distributes twice a month to the refugees living in the camps. In November, the governments of Kenya, Somalia, and the United Nations Refugee Agency signed a tripartite agreement for the repatriation of Somali refugees. Essentially, that means that many Somali refugees will be returning to a war-torn country because life in the camps is intolerable.

charged with their care, as opposed to serving the refugees themselves. For example, Turkish camps, which hold many Syrian refugees, employ iris recognition technology—an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of the irises of an individual’s eyes, whose complex random patterns are unique and can be seen from some distance—to keep records of refugees. ICTs are also used to help the UNHCR to maintain resource control in camps and for logistical purposes.

“We hope to provide support to people during these multiple displacements– from war, to refuge, and back again. Clearly, the time was right (for the workshop),” Maitland said. In addition to organizing the workshop, Maitland also involved her students in planning the agenda. Students in her “Information Technology in the International Context” class, as their semester project, created “use cases” to be used in the workshop. The use cases center around refugee information needs, one directly suggested by UNHCR. Two cases relevant for camp-based refugees address the need for portable medical records and the need to track individuals in a camp to ensure against human trafficking. A third use case, relevant for urban refugees such as the thousands located in Cairo, Egypt, addresses the need to find UNHCR-approved clinics. Each use case describes the information need and proposes a solution based on appropriate technology. “During the workshop, the use cases were discussed by interdisciplinary teams as a means of grounding the participants in current and real-world problems,” Maitland said. According to Maitland, much of the effort to support information access in displacement favors the organizations

developing systems that meet the refugees’ needs, she said, include the sense of temporary existence and rapidly changing conditions in camps. “The systems and social theories we develop are going to have to be dynamic,” Maitland said. The overall goal of the workshop, she said, was to “create a critical mass of researchers who have an interest in this topic,” leading to subsequent research projects that would examine those issues in more detail. Refugees create an “extreme use case” for technological development, she added, due to issues of mobility and the physical context of their surroundings. “If we can create technology that meets their needs, it can have very broad applicability,” Maitland said. Going forward, she said, workshop participants will be pursuing projects together, expanding their network of service providers and carrying out projects directly with them. They expect some projects will be carried out in refugee camps, like the Zataari camp in Jordan, or with urban refugee populations, like those in Cape Town.

Despite the fact that service providers are utilizing new technologies, Maitland said, the provision of network and information access remains a vexing problem for the displaced persons themselves. The conditions of refugee camps and disaster sites provide challenging use cases for wireless networks, applications, and devices. Displacement also creates extreme resource scarcity, dependency, geographic change, and conflicts between individuals and organizations. Some of the most urgent technological needs of refugees include technologies to enhance emergency response, social media/ Internet connectivity, and access to mobile phones. The barriers to

“In both contexts, security is an important issue and we hope to develop and deploy ICT systems that can help provide a secure and stable environment for those who have already lost so much,” Maitland said. “Improvements will require coordination not only between computer and social scientists but by the diverse organizations and community leaders trying to improve conditions for refugees.”

Fall/Winter 2013

15


Outsmarting hackers in the age of big data

graduate students and post-docs. The majority of the lab’s funding

as a zombie army) is a large number of Internet computers that,

is provided by the National Science Foundation and the U.S.

although their owners are unaware of it, have been set up to send

Department of Defense, and the papers that are produced by staff

messages and requests (including malicious payloads) to other

members are consistently published in prestigious conferences

computers on the Internet. Any such computer is referred to as

and journals. In addition, Liu said, the students who work in the

a zombie - in effect, a computer "robot" or "bot" that serves the

lab are “very competitive in the job market and highly sought after.”

wishes of a master (e.g., a criminal organization).

“Our research contributions are readily recognized in the (cyber

“Today’s cyber attacks are not isolated, they’re not individual,” Liu said. “They’re very sophisticated; they are coordinated, and are organized by a remote attacker. They are persistent. They can create an ‘apartment’ in your laptop, live comfortably on your disk.”

security) community,” he said. Currently, Liu said, the Cyber Security Lab has four foci: Adaptive Cyber Defense (ACD)—a new class of technologies that is aimed at forcing adversaries to continually re-assess, re-engineer and relaunch their cyber attacks; cyber situational awareness; systems security in cloud computing; and holistic security of smartphone systems. One fundamental reason why today’s computer networks and security systems are facing an increasing number of cyber attacks, Liu said, is a matter of information asymmetry—attackers know much more about their targets than vice versa. With the aid of a major grant from the Army Research Office (ARO), Cyber Security

As the world becomes more connected through systems and

Lab researchers are undertaking an initiative to outsmart cyber

networks, cyber attacks by hackers, nation states, and terrorists

attackers at their own game by developing technologies that will

pose an increasing threat to U.S. security. While security analysts

level out the playing field.

have been trying to decipher cyber threats for the past 10 to 20 years, Liu said, cyber situation awareness has only recently

In recent years, technological advances have brought numerous

uncertainty, and enhance predictability and trust; produce leading

“Through this interdisciplinary approach, our primary goal is to

emerged as a research area. Currently, security analysts work in

advantages to individuals and organizations, but have also

scholars in interdisciplinary cyber security research; and become a

develop the scientific foundations for Adaptive Cyber Defense,” Liu

large teams that utilize different tools for detecting cyber attacks.

introduced new threats to security and privacy. In the past 10

national leader in information assurance education.

said.

Senior analysts integrate suspicious actions to “build a big picture,”

years, cloud computing has taken off and the number of mobile

he said, but there is no standardized system. As cyber attacks

apps has skyrocketed, creating new opportunities for hacking,

The Lions Center includes four different labs/facilities, including

Liu and his fellow researchers at Penn State, along with Sushil

have become more sophisticated in recent years, human judgment

identity theft, and other malicious activities. As director of both the

the Cyber Security Lab, RFID Lab, Privacy Assurance Laboratory,

Jajodia, a professor at George Mason University and the principal

alone is not sufficient in combating those threats.

Cyber Security Lab at IST and the Penn State Center for Cyber-

and PIKE (Penn State Information, Knowledge, and Web) group.

investigator on the project, and researchers at Dartmouth

Security, Information Privacy, and Trust (LIONS Center), Dr. Peng

The Cyber Security Lab performs original research on a variety of

University and the University of Michigan, were recently awarded

Liu conducts research that aims to combat malicious cyber attacks

topics, including self-healing systems, trusted recovery, malware,

a grant totaling $6,244,194 over a five-year period to support the

and protect sensitive data from being stolen.

intrusion detection and prevention systems, privacy protection in

project “Adversarial and Uncertain Reasoning for Adaptive Cyber

To meet that challenge, Liu and Dr. John Yen, another IST professor,

healthcare, network security, adversary models and game theory,

Defense: Building the Scientific Foundations.” The first increment

have spearheaded a research initiative, funded by the U.S. Army

and cyber defense situation awareness.

of $700,000 was distributed in early fall 2013. The project’s aim

Research Office, to determine how the experiences of human

is to develop ACD technologies, which present adversaries with

analysts can be leveraged to improve cyber situation awareness.

“This research field is very dynamic,” said Liu, who has been at IST since 2002.

“There is a very urgent need to do this job better,” Liu said.

The Cyber Security Lab, Liu said, takes an interdisciplinary approach

optimized dynamically changing attack surfaces and system

A paper that they co-wrote, which proposes a knowledge-based

The LIONS Center is a University-level research center with a vision

to cyber security and works on critical, emerging problems with

configurations, thereby significantly increasing the attacker’s

cyber intrusion detection model, was recognized last year at an

of being synonymous with seminal works in interdisciplinary cyber

potential for “high-impact” research. In addition to Liu, the lab’s staff

workloads and decreasing their probabilities for success.

international conference. “Experience-Based Cyber Situation

security research. The Center was established in 2003 to serve

includes IST professors Anna Squicciarini, Dinghao Wu, and Heng

four main purposes: conduct research to detect and remove threats

Xu; Sencun Zhu, a professor in computer science and engineering

Computer networks face increasing threats from a variety of

Best Paper Award at the 2012 IEEE International Multi-Disciplinary

of information misuse to the human society; mitigate risk, reduce

(CSE) and IST; and a number of “ambitious, creative” IST and CSE

sources, Liu said, particularly from botnets. A botnet (also known

Conference on Cognitive Methods in Situation Awareness and

16 College of Information Sciences and Technology

Recognition Using Relaxable Logic Patterns” was selected for the

Fall/Winter 2013

17


Decision Support (CogSIMA 2012), which was held in New

having local servers or personal devices to handle applications. A

Orleans. The paper was written by Yen, director of Strategic

risk that currently exists with cloud computing services, Liu said,

Research Initiatives at the College of IST; Liu; Po-Chun Chen, who

is that “disgruntled” cloud administrators have the ability to steal

received his Ph.D. from Penn State’s CSE department in 2011; and

or modify data. His lab is developing new virtualization technology

Tracy Mullen, a former assistant professor at IST who now works

that will allow cloud administrators to perform their assigned duties

in software development at Restek Corporation in Bellefonte, Pa.

but will prevent them from overstepping their boundaries.

The paper, which is one of the first research papers on experiencebased cyber situation awareness, is part of the Multidisciplinary

The ubiquity of smartphones in today’s society, Liu said, has led to

University Research Initiative (MURI), a tri-service Department of

increased risks of virus/malware attacks and hacking. The Cyber

Defense program that supports research teams whose research

Security Lab is in the early stages of research into smartphone

efforts intersect more than one traditional science and engineering

security that examines both apps and operating systems.

discipline. “We view the whole phone as one system,” he said. “We do holistic In their research paper, Liu, Yen, and their collaborators “present a

research on how to make a smartphone more secure.”

systematic approach to leverage experiences of security analysts to enhance cyber situation recognition and detect cyber attacks

The stealthy nature of advanced cyber attacks, Liu said, along

before they develop into catastrophic events.” Currently, intrusion

with technological advances, creates the need for agility and

detection systems use signatures and normal behavior patterns

adaptability in the research community. Today’s cyber threats are

(or profiles), but do not use human experiences. In the prototype

much more diverse than they were in the past, he added, and it’s

that the professors are developing, when an intrusion detection

“not obvious which ones are dominant.” While individual hackers

tool generates a new alert sequence, an analyst can match the

may have posed the most serious security threats in past years, an

sequence with the stored experiences, consisting of a sequence

increasing number of nation states are launching cyber attacks that

of alerts and other data, to find similar situations from the past.

threaten national security, personal safety and financial stability.

In order to be able to connect a limited number of experiences

All of those factors require a coordinated effort by government,

to broader situations, the researchers introduce the concept of

research institutions, and corporations to stay one step ahead of

experience relaxation. After the important parts of an experience

cyber criminals.

are established in the system, certain portions of the experience that are too specific are trimmed to create additional experiences that have a broader range of applicability.

“We must elevate our defense to the next level,” Liu said.

6.30.14 Time is running out to show your support through a gift to For the Future: The Campaign for Penn State Students. This University-wide effort is directed toward a shared vision of Penn State as the most comprehensive, studentcentered research university in America. Our alumni and friends are becoming our partners in achieving six key objectives: • ensuring student access and opportunity • enhancing honors education • enriching the student experience • building faculty strength and capacity • fostering discovery and creativity • sustaining the University’s tradition of quality With your gift, you can help us to reach our goal of creating a better, stronger Penn State for future generations. To donate, visit:

http:ist.psu.edu/supportIST

Recently, Liu said, the Cyber Security Lab undertook an initiative to research secure cloud computing. Cloud computing is a type of computing that relies on sharing computing resources rather than

18 College of Information Sciences and Technology

Fall/Winter 2013

19


intelligence community. The programs also

education, said that while the lack of

“I really wanted to know more in-depth

attract many people who work in the private

face-to-face contact is a drawback of

about how to stop the ‘bad guys,’ so to

sector and need to expand their knowledge

online learning, he tries to create a more

speak,” she said.

about security issues.

intimate learning environment by posting instructional videos on his course websites.

Finkboner, whose classes are focused on

A goal of the MPS program, Hall and

“The

is

network security, said that she has found the

Forster said, is to provide its students

communication,” he said. “The videos make

MPS instructors to be very accommodating.

with the same opportunities as resident

students feel (like they are) part of the Penn

The knowledge about security issues that

students. Many of the instructors in the

State community.”

she is gaining from the classes, she added,

key

to

distance

education

program, including Hall, teach both online and resident courses.

will be instrumental in writing policies in the The flexibility of the program to working

future.

professionals who live in various locations “We work very hard to ensure that the

and don’t want to give up their paychecks

Christopher Harm, a 2011 MPS graduate

experiences that online students have, from

to go back to school full-time, Forster said,

who works as a software engineer at

interactions with other students, interaction

is a major selling point of the MPS program.

Raytheon in State College, Pa., also

with instructors, access to library and

IST online master's program prepares future leaders in technology, security

said that the program’s flexibility and

‘virtual’ laboratory facilities, are equivalent

“I think the greatest advantage of (the

comprehensiveness

to the experiences obtained by resident

program) is its flexibility,” he said. “It’s

furthering his education while working full-

students,” Hall said.

accessible wherever you are and whenever

time. He said the program matched a lot

you want to take it.”

of his interests, particularly the information

For example, he added, in IST’s resident

were

helpful

in

assurance aspect.

teaching of cyber security, the instructors

For Crystal Finkboner, of Rochelle, Ill.,

provide access to physical “cyber security

who is currently enrolled in the MPS in

“I like to consider myself someone who

laboratories,” which allow students to

Homeland Security - Information Security

likes to continually learn,” Harm said.

understand issues of cyber-attacks and

and

defense.

along with the comprehensiveness of

According to Forster, distance learners

the program, was a major draw for her.

such as Finkboner and Harm tend to feel

Forensics

Option,

that

flexibility,

In today’s digital age, individuals who are

online programs benefit not only working

education at IST. “[Alumni] who have come

“In order for online students to have similar

Finkboner, who runs her own IT services

a stronger affiliation with Penn State. For

looking to advance their careers are often

professionals and active duty military

back have said, ‘It’s really done a lot of

experiences, we have developed ‘virtual’

company, said that she hopes to expand

example, more World Campus graduates

required to obtain specialized knowledge in

personnel, but also provide synergy with

wonderful things for me.’”

cyber security laboratory exercises,” Hall

into security consulting and enrolled in the

join the Penn State Alumni Association

areas such as cyber security, intelligence

our resident programs.”

said. “The development of such simulations

MPS program last fall because she found

than students who come out of resident undergraduate and graduate programs.

analysis, and security policy development.

The MPS program has grown substantially

and virtual laboratories improves our

that it suited her needs, both professionally

At IST, the online master of professional

The

working

since its inception in 2009. In 2009-10, there

resident instruction as well as our online

and personally. She had previously worked

studies (MPS) degree program, which

professionals to obtain graduate degrees

were five courses offered in the program,

instruction.”

as a network administrator, and while she

marked its fifth anniversary in fall 2013, is

in areas such as information science (with

with 25 students enrolled. Currently, the

preparing professionals and organizational

a focus on cyber security and information

MPS program has nearly 400 degree-

leaders to take on greater responsibilities,

assurance),

(as

seeking students, with an additional 30

without disrupting their careers or requiring

part of Penn State’s intercollege MPS

students working toward online graduate

them to relocate.

program), and a new program in enterprise

certificates. There are 42 planned courses

architecture.

in 2013-14. In addition, 21 tenure or fixed-

big data, and agriculture are also areas of

term faculty members and four affiliate

future growth for the program, Forster said,

“The

online

programs

through

MPS

program

homeland

allows

security

Penn

State World Campus provide working

“The goal of an MPS program is really to

professionals

to

provide educational programs for people

address

with

rapidly

the

opportunity

changing

and

faculty members teach in the MPS program.

Hall and Forster said that they anticipate continued growth of the MPS program.

“I think the greatest advantage of (the program) is its flexibility. It’s accessible wherever you are and whenever you want to take it.” Gerry Santoro, a senior lecturer in the

was able to identify cyber-attacks, she

College of IST who has been teaching

needed to fill in some gaps in her education in order to obtain government contracts.

There are talks about starting a graduate program in analytics within the next year, as well as discussions about a medical informatics option. Information intelligence,

which reflects IST’s interdisciplinary nature.

new

who are often looking for promotions in the

Graduates of the MPS program, he

security management and cyber forensics

information technology areas,” said David

workforce,” said Peter Forster, assistant

added, are working in the Department of

in the MPS program for the past three

college does,” he said. “People need to use

Hall, dean of the College of IST. “The

dean for online programs and professional

Defense, as defense contractors and in the

years and was formerly director of online

information in everything they do.”

20 College of Information Sciences and Technology

“Online education is a mirror of what the

Fall/Winter 2013

21


SRA World Campus student rides to raise funds to fight childhood cancer

Image: Penn State

During Penn State World Campus student

135-mile run into a marathon cycling event.

the Army National Guard. He would like to

Tyler

“eight-centuries-in-eight-

A “century” in cycling is 100 miles. The

work in the health care consulting field.

days” Hope Express cycling event, which

Hope Express raises funds to help families

His preparations for the cycling marathon

took place October 22, he rode and collect-

with children being treated for cancer at the

included increasing his weekly runs to 70—

ed donations for the Penn State IFC/Pan-

Milton S. Hershey Medical Center. The goal

80 miles and riding three days a week at

hellenic Dance Marathon, affectionately

remains the same for both events: to raise

various intensities and climbing hills.

known as THON. Knabb’s inspirations for

funds for THON, a year-round fundraising

this 920-mile, heart-shaped route through

event that benefits The Four Diamonds

Knabb’s route took him to 11 campuses:

Pennsylvania were his mother Carol, who

Fund. THON 2014 will take place Feb. 21–

Penn State York, Milton S. Hershey Medi-

died from a rare form of cancer, and friend

23 at the Bryce Jordan Center.

cal Center Children’s Hospital, Schuylkill,

Knabb’s

Michael Chobot, who recently lost his battle

Hazleton, Wilkes-Barre, University Park,

with leukemia. Along the way, Knabb vis-

Knabb’s family and friends joined him on

DuBois, New Kensington, Greater Allegh-

The College of Information Sciences & Technology

will advance these discussions as the organization

ited 11 Penn State campuses in an effort

specific legs of the ride. The Penn State

eny, Fayette and Mont Alto.

will be hosting the 11th annual Information

positions itself to take a leadership role to reframe

to raise $3,000 for THON, while increasing

Cycling Club accompanied him through

awareness about conquering childhood

State College.

Systems for Crisis Response and Management

information systems for emergency response and

classes, Knabb expected to keep up with

(ISCRAM) conference May 18-21, 2014. ISCRAM

crisis management scenarios.

“The biggest challenge was definitely the

his World Campus classwork during the

is a premier international conference, attracting

“The point of this ride is to best exemplify

elevation and crossing the Appalachians

ride. “World Campus faculty are tremen-

the challenges and hardships those faced

twice within a few days. It was hard, but

dous human beings and flexible with stu-

leading knowledge experts in the field of Disaster/

For more information or to register, visit

with cancer go through day-in and day-

fun,” added Knabb, who grew up in Read-

dents’ needs,” said Knabb, whose fundrais-

Emergency Management and Response to explore

http://www.iscram2014.org.

out,” said Knabb, who is enrolled part time

ing, Pa. For the last three years, he has

ing ride ended in Baltimore Oct. 30.

in the bachelor of science in security and

also run in the THON 5K.

cancer.

risk analysis program offered by IST and

Because of the convenience of online

the importance that technology plays in solving these frequently complex issues.

sponsoring some portion of this event, contact David

By Deborah Benedetti, Penn State Outreach

delivered online by the World Campus.

Knabb, 24, is enrolled simultaneously at

“Cancer patients don’t ask for such trials,

Johns Hopkins University (JHU), where he

but despite them, they press forward. And,

is a full-time cognitive neuroscience major,

Germany, headlined topics focused on holistic crisis

because of them, I can—and I will—do the

and the World Campus. He plans to gradu-

management as well as the need to close the gap

same.”

ate from JHU next May and from Penn State

between scientists and practitioners. ISCRAM 2014

next December. To help with his education Knabb modified the annual Hope Express

22 College of Information Sciences and Technology

http://www.cyclingforthekids.com

If your company has an interest in either exhibiting or

Last year’s ISCRAM conference in Baden-Baden,

Jordan at djordan@ist.psu.edu.

expenses, he joined ROTC and enlisted in

Fall/Winter 2013

23


David Hall to conclude IST deanship in May David Hall, dean of IST, has announced he

information available today and to make

He has more than 35 years of experience

will be concluding his deanship at the end

it useful for decision-making at all levels.

in research, research management, and

of the academic year in June 2014.

He spearheaded the efforts for NC2IF

systems development. He is the author of

to gain University center status and win

more than 200 journal articles and papers,

“I very much appreciate the support and

funding from the Department of Defense,

reports, books, and book chapters, and

encouragement I have received during the

the Department of Homeland Security, the

he has lectured internationally on multi-

past four years that I have served as dean,”

Defense Threat Reduction Agency, and

sensor data fusion, artificial intelligence,

Hall said. “In the next few months, we have

other sources.

and research management and technology

a number of tasks remaining, and I look

forecasting.

forward to working with my colleagues in

Hall joined the College of IST in 2001. He

the College of IST on these endeavors.”

first served as associate dean for research

Hall

and graduate programs. In that capacity, he

including directing independent research

A professor of information sciences and

was responsible for overseeing the college’s

and development, leading a software signal

technology, Hall will return to the faculty

doctoral and master’s degree programs, as

processing group at Raytheon Corporation

ranks and take a sabbatical in the fall of

well as research grant administration and

(HRB Division), managing the navigation

2014. He will return in a full-time faculty role

leadership of faculty research efforts.

analysis section at the Computer Sciences

through the end of the 2015-16 academic year.

also

has

industrial

experience

Corporation, and serving as a staff scientist During his tenure as dean, the College

at MIT Lincoln Laboratory.

of IST has significantly grown its online Hall was named interim dean in November

education program, reaching a current

Prior to joining the College of IST, he served

2009 and appointed dean of the college in

level of 500 degree-seeking students

as associate director and senior scientist at

September 2010.

for the online undergraduate majors in

Penn State’s Applied Research Laboratory,

Information

Technology

where he oversaw an interdisciplinary

“During the past few months in getting to

(IST) and Security and Risk Analysis

team of 175 scientists and engineers in

know Dave, I’ve come to realize the depth

(SRA) and nearly 400 graduate students

conducting research in information science,

of his commitment to the advancement of

pursuing master of professional studies

navigation research, systems automation,

the faculty, staff, and students,” said Penn

in cybersecurity, homeland security, and

and communications science.

State Vice President and Provost Nicholas

enterprise architecture. The college also

P. Jones.

added new tenure-track faculty, increased

Hall received his bachelor’s degree in math

the size of the resident graduate doctoral

and physics from the University of Iowa

Hall is founding director of Penn State’s

program and recruited a new chaired

and his master’s degree and doctorate in

Center for Network-Centric Cognition and

professor focused on big data and medical

astronomy from Penn State.

Information Fusion (NC2IF), which focuses

informatics. His other accomplishments

on the gap between the collection of data in

as dean include the creation of the new

computer systems and the knowledge and

research Center for Online Innovation

decisions in the minds of computer users.

in Learning (COIL) in collaboration with

Sciences

and

By Heather Hottle, University Relations

the College of Education and the World Hall created the center to harness what

Campus.

he called the overwhelming flood of 24 College of Information Sciences and Technology

Fall/Winter 2013

25


Alumni Profile

STEVE Garguilo (’09 IST) Johnson & Johnson

For example, while distribution of products

University.” They created TEDxPSU, and

“The last two years have been an exciting

is a challenge in those types of areas,

following their inaugural event on Oct. 10,

journey,” he said. “We have become a

“there’s a bottle of Coca-Cola within arm’s

2010, launched a student organization to

model pioneer for how to use the TED

reach of every person on the planet.” While

pass the project off to Penn State students.

format within a corporation… and we’re

in Switzerland, his team designed pods in

The program fosters dialogue between

really just getting started.”

which basic consumer healthcare products

different groups who might not otherwise

could be stored. The team partnered with

engage in conversation, Garguilo said,

The

Coca-Cola to fit the pods between Coke

with Penn State students, faculty, staff, and

speakers who are working to create

bottles in crates, utilizing the “wasted

community members participating in the

meaningful change in society, Garguilo

space.”

talks.

said. For example, one speaker gave a

Garguilo’s

international

work

stemmed directly from his experiences

TEDxJNJ

program

has

hosted

presentation about an artificial pancreas

in India, Kenya, Morocco, and Hungary

“There’s tremendous value in people

with the hopes of getting the product

as part of the Engineering Leadership

coming together across disciplines to

to

Development Minor and the Humanitarian

discuss issues,” he said. “There can also be

presenter gave a talk with the intention of

Engineering and Social Entrepreneurship

incredible impact for the speakers in terms

helping people eat healthier, and that talk

programs at Penn State.

of new connections and new opportunities

“has inspired eight employee gardens in

after their talks.”

different J&J locations worldwide.” The

market

sooner.

Another

TEDxJNJ

Steve Garguilo, a 2009 graduate of IST,

a conference bringing together people from

world, such as Disney, Google, Intuit, and

Born in Connecticut and having gone to high

says he uses the power of technology to

three domains: technology, entertainment,

Samsung as a new way to fuel growth and

school in Altoona, Pa., Garguilo says he

In October 2010, Garguilo said, Penn

behind a new telemedicine solution that is

“bring people together to share ideas and

and design. The annual TED Conference

drive employee engagement.

came to IST as someone who simply “had

State sociology professor Sam Richards

being considered for Colombia.

promote authentic dialogue about our

invites the world’s most notable visionaries

an interest in technology and an interest

delivered a talk titled “A Radical Experiment

shared future.” As the founder of TEDxPSU,

to speak for three to eighteen minutes.

In 2012, Garguilo was named as one of

in problem solving,” but didn’t necessarily

in Empathy” that has now been viewed

“It’s great to lead people and see people’s

an independently organized event now

Their talks are then made available, free,

the “Faces of Penn State.” The program

know where those interests would lead him.

more than a million times. The talk has

perspectives and attitudes change,” he

in its fourth iteration at Penn State, he

at TED.com. Since its inception, the

showcases the personal accomplishments,

led to additional press for the “World in

said.

created a forum for important ideas and

program’s scope has broadened to include

public contributions, and pioneering spirit

During his years at IST, Garguilo quickly got

Conversation Project” and led to him being

helped amplify the impact of accomplished

science, business, the arts and other global

resulting from the Penn State experience,

involved and took advantage of leadership

interviewed on MSNBC. In addition, Ali Carr-

What advice would Garguilo give to current

Penn State researchers. Currently, as the

issues. Based on the incredible popularity

education, and community. Garguilo has

opportunities. He served as executive

Chellman, department head and professor

IST students who are also interested in

founder of TEDxJNJ at Johnson & Johnson,

of TED, the organization launched TEDx to

been actively involved with the Penn State

director of the IST Learning Assistant

of learning and performance systems at

using their skills to foster social change?

the first global TEDx program of its kind,

allow for local, self-organized events that

community since graduation. In addition

program from 2006 to 2009, as president

Penn State, gave a TEDxPSU talk titled

Garguilo has taken the skills he developed

bring people together to share a TED-like

to his international projects at Johnson &

of the IST Student Government from 2007

“Bring Back the Boys,” which examines

“Keep learning. Keep reading. Constantly

leading TEDxPSU to create meaningful

experience.

Johnson, he is working with Michael Pilato,

to 2008, and as president of the Penn State

ways in which video gaming may be used

challenge your perspectives,” he said.

an artist in State College, Pa., to establish

Blue Band from 2008 to 2009.

to re-engage boys in their elementary level

“Question

education. As a result of her talk, she was

everything, be skeptical about everything,

engagement on a global scale.

TEDxJNJ program was also the impetus

everything,

push

back

on

As the founding curator of the TEDxJNJ

the World Mural project, an effort to “amplify

“The real power of TED is sharing ideas

program at Johnson & Johnson, Garguilo

the impact of inspirational people across

“The opportunity to work with teams, to lead

invited to join the commission to establish a

and work tenaciously and unapologetically

that flip a switch in people’s brains,” said

leads a team of more than 300 associates

communities worldwide, from State College

teams, to execute projects that make a real

White House Council for Boys to Men.

to pursue what you believe is right and

Garguilo, who has worked at Johnson &

worldwide to drive innovation across the

to places like Norway, Myanmar, and the

impact--those are the types of experiences

Johnson for the past five years. “The best

company’s global employee network. He is

Congo.”

that have been proven to be really valuable

After seeing the impact of TEDxPSU,

TED Talks help you think about something

working to evolve the corporate culture into

and have accelerated my ability to lead in

Garguilo said he started thinking about the

in a way you’ve never considered before. At

one that actively promotes and embraces

Garguilo spent the past two-and-half years

post-college life,” he said.

role that TEDx could play in an international

J&J, we create a space for people to step

creative ideas. Since 2011, the team has

living in Switzerland designing creative

back from their day-to-day work and be

executed TEDxJNJ events in twenty-three

technology

developing

It was in early 2010, Garguilo said, that he

a grassroots, volunteer effort in 2011

exposed to new things.”

countries around the world and has created

countries throughout Eastern Europe, the

talked to his fellow IST alums Ryan Dickson

while his primary responsibilities were in

an interactive community for associates.

Middle East, and sub-Saharan Africa. Those

(’10), Mark Poblete (’07), Andrew Brown

information technology. Since August 2013,

TED, a nonprofit organization devoted to

The model that Garguilo created is now

solutions, he said, help increase access to

(’07), Zach Zimbler (’12) and Rich McMillen

a new department was created under his

“ideas worth spreading,” started in 1984 as

being replicated in companies around the

healthcare products in rural communities.

(’10) about the idea of TEDxPSU, viewing

leadership, and his official title at Johnson &

it as “a compelling way to give back to the

Johnson is now TEDxJNJ Curator.

26 College of Information Sciences and Technology

solutions

for

where you can make an impact.”

corporation.

He

started

TEDxJNJ

as

Fall/Winter 2013

27


Alumni News

ISTFTK Through the Years

Reminiscing

By Colleen Cwenar (SRA ’12) and Russ Beck (SRA ’11) In the midst of all of this is our greatest accomplishment by

IST has been fundraising for the Penn State

far. With the help of alums and friends of IST, we successfully

Dance Marathon (THON) officially since 2002.

generated enough financial support to create the first-ever IST

Now known as "IST For the Kids (ISTFTK),"

Alumni Society Scholarship, a Trustee Endowed Matching

IST's THON organization has grown to more

Scholarship. What this means is that our endowed scholarship

than 50 active members and 4 dancers. Since

now goes twice as far, helping IST students in need of financial

its inception, ISTFTK has raised more than

support. This scholarship will have real impact, and will continue

$100,000 dollars for the cause. Some of the

to give back to IST students, a role that every IST alum has

organization’s most popular fundraisers consist of

experienced.

a Date Auction, Pie your Professor (conveniently

Programs like this scholarship will ensure the

longevity of the College of IST, and allow brilliant students to

held right before finals week), and a Kickball

complete their degree, joining us all as successful young alumni.

Tournament. Even the alumni have continued to play an active role with ISTFTK by hosting one of the three canning weekends during the year.

While I have been reminiscing about my time as your president, I can’t help but think about how much has changed over the past

After a brief hiatus, the organization was re-

two years. Our university community as been through a lot, and

established in the Fall of 2010 under the leadership

we have become stronger because of it.

For me personally

of Russ Beck (SRA ‘11) raising $21,000. The torch

two years ago, little did I know, I was just six months away from

was passed to executive chair Colleen Cwenar

experiencing a job change, where I work at HP. Just a year ago,

(SRA ‘12) in 2011, who raised $37,207.75 and

my wife and I found out that we were pregnant with twins, and

helped the IST family grow by participating in

just a few short months ago in September 2013, gave birth to a

the adopt-a-family program, allowing ISTFTK to

baby boy and baby girl. As you can see in this photo, they are

“adopt” the David Murphy Family (Dad, Ed; Mom,

already going to be life-long Penn Staters! Think about your own

Donna; David; and brother, Sean). On February

situation. How have the last two years been for you? I hope you

14, 2011, David was diagnosed with a form of

have experienced some positive changes in your life, whether it

leukemia and this spring (April 2014), he will

be in your career or your personal life. Just imagine where we’ll

finish treatment! Last year, executive chair Adam

all be in another two years!

Krempasky (IST ‘13) helped the organization raise

My fellow alumni, it has been an honor and a privilege to serve

that a tailgate near the stadium for Blue & White weekend was

as your president for the last two years. As I take a look back on

key to your attendance. We held the best-attended tailgate in the

my term as the president of the IST Alumni Society, I see all of the

history of the Society last April, using a catering service near the

I’m looking forward to seeing you all at our annual Blue & White

2013 student organizations. With THON 2014 just

incredible things we have done. We made great strides to cater to

BJC, under a big tent. We also listened when you requested a

Weekend Tailgate on April 12, 2014. Thank you again for the

around the corner, February 21-23, 2014, current

the interests of our alumni, and listened when you said you would

better online presence for our society, and while we have made

opportunity to be the president of your Alumni Society. Here’s to

executive chair Brittany Hetzell (SRA ‘14) is

like more local events near you. We created the IST Alumni Society

great strides to date by transitioning our web presence across our

the next two years!

working hard to prepare ISTFTK for the weekend

Regional Champion program to enlist the support of an individual

social media platforms, as well as to the University web platform,

alum, in hosting and coordinating local networking events. These

we are continuing to come up with new ideas to be implemented

Paul Horn (IST ‘04)

events have taken place in Philadelphia, Washington, D.C., and

shortly that will further enhance our presence online and keep you

President, IST Alumni Society

Pittsburgh. We expect to hold events in these cities again as well

informed about our Society’s activities.

$56,512.79, placing 9th in donation totals for THON

and coordinating a last-minute fundraising push before the dancing commences. To make a donation, visit http://thon.ist.psu.edu.

as adding New York City to the list. We listened when you said

28 College of Information Sciences and Technology

Fall/Winter 2013

29


Alumni News

IST alumni scholarship “pays it forward” to future ranks of IST students

social media blitz to drive contributions to the scholarship, we ended up with a final total of over $65,000.” The social media blitz occurred over a multi-day period of time, Horn said, with planned social media posts going out at intervals. The IST Alumni Society also had postings targeted at different

At IST, students in difficult financial situations are being aided in

to the college, we felt that it was the right thing to do, to set up this

their pursuit of a college education through the generosity of IST

scholarship.”

alumni. In 2012, the College established the IST Alumni Society

audiences. “While we have a really great alumni base with IST, everyone has

Trustee Scholarship, which supports students who otherwise

The IST Alumni Society Trustee Scholarship is part of Penn State’s

unique backgrounds, and different reasons for giving back to their

couldn’t afford a college education or would be saddled with loan

Trustee Matching Scholarship program, which makes donors

alma mater,” he said. “The combination of these key components

debt. In the fall of 2013, the scholarship supported two students,

partners with the University in supporting students. Through the

helped us to achieve the success that we had.”

Troy Bynum and Alexis Davis, who say that the scholarship has

Trustee Matching Scholarship program, scholarship endowments

lightened their financial burdens and enabled them to continue

will have their average payout matched, in perpetuity, from the

Bynum, who grew up in Philadelphia and is the middle child of three

their educations.

University’s operating budget. New scholarship endowments of

children, said that his family circumstances made it somewhat

$50,000 or more are eligible for the program.

difficult for him to pursue a college education.

Let us know and we will spread the word among our IST alumni. Stay connected: iconnect@ist.psu.edu

twitter.com/ISTatPennState instagram.com/ISTatPennState IST Alumni Society

Scholarship,” Bynum said. “This scholarship is allowing me to

An additional advantage of the IST Alumni Society Trustee

“Both my mother and father worked hard to give us everything

achieve my goal of graduating from the Pennsylvania State

Scholarship is that it is permanent. Since the IST Alumni Society

we needed, but with two of us in college and one going into high

University with a major in IST and a minor is Security and Risk

raised more than $50,000, it has an endowed scholarship, which

school, sometimes that is not always enough,” he said.

Analysis (SRA).”

means a portion (about 4.5 percent) is used to support students while the principle continuously grows. In addition, the University

Having worked with computers in high school and acquiring a few

“As many people know, times are tough where people like me

matches the amount given to students each year (an additional 5

certifications, Bynum said that after graduation he already knew

are finding it hard to just go to college,” Davis said. “With this

percent).

he wanted to be a military defense contractor. With a degree from

scholarship, it has given me the peace of mind, by having the rest

In Memoriam

Penn State, he thought his “options would be limitless.” According to Horn, the establishment of the scholarship was largely a result of an innovative fundraising strategy. When the IST Alumni

“With that decision already made, IST was the degree for me, and

According to Paul Horn (IST ’04), president of the IST Alumni

Society was founded in 2003, he said, “in addition to mapping our

all that I had to accomplish was four years of studying,” he said. “I

Society, the IST Alumni Society Trustee Scholarship was

responsibilities into the plans for the college, we saw the potential

approached my college career with the mindset that I get out what

established to serve needs that nearly everyone who has attended

to raise money for an alumni-funded scholarship for current IST

I put in, and so far I have gotten a lot.”

college can relate to.

students.” From 2003 to 2012, the society tried to raise money at various events, coming up with about $15,000 to $20,000. In 2012,

That type of drive and determination to succeed, Horn said, is the

“As IST alumni, we have all been in the shoes of an IST or SRA

Horn said, the members decided to to move fundraising efforts to

cornerstone of the IST Alumni Society Trustee Scholarship.

student,” said Horn, who is the Americas Microsoft Private Cloud

social media.

Sales Business Development Manager at Hewlett-Packard. “We

Grayson Vogtman Dinsmore ’12 SRA, December 4, 2013 Anthony J. Kasalavage, ’03 IST November 2, 2013 Vincent G. Paglione, ’09 IST July 18, 2013

“We are providing a chance for students to be able to stay in school

have felt the financial challenge that college causes, whether it's

“We kicked off a social media blitz just over a year ago, to drive the

and finish their degree,” he said. “Our impact is measured by what

tuition, room and board, textbooks, or just trying to figure out where

scholarship to $50K or more, meaning it could become an official

they do when they graduate and become alumni, and leverage the

your next meal will come from. Like so many other gracious donors

Trustee Matching scholarship,” said Horn, “In the time we ran the

full value of their degree in their next steps in life.”

30 College of Information Sciences and Technology

Engaged? Marriage/Union? New Job or Promotion?

facebook.com/ISTatPennState

“I am honored to be a recipient of the IST Alumni Society Trustee

of my tuition paid and giving me the ability to afford my books.”

Keep In Touch

Fall/Winter 2013

31


Save the Date! Start-up Week April 5 -11, 2014

Produced by the College of Information Sciences and Technology Office of Communications and Outreach.

The Pennsylvania State University Information Sciences and Technology Building University Park, PA 16803-6822 http://ist.psu.edu The Pennsylvania State University is committed to the policy that all persons shall have equal access to programs, facilities, admission, and employment without regard to personal characteristics not related to ability, performance, or qualifications as determined by University policy or by state or federal authorities. It is the policy of the University to maintain an academic and work environment free of discrimination, including harassment. The Pennsylvania State University prohibits discrimination and harassment against any person because of age, ancestry, color, disability or handicap, national origin, race, religious creed, sex, sexual orientation, gender identity, or veteran status. Discrimination or harassment against faculty, staff, or students will not be tolerated at The Pennsylvania State University. Direct all inquiries regarding the nondiscrimination policy to the Affirmative Action Director, The Pennsylvania State University, 328 Boucke Building, University Park, PA 16802-5901; Tel 814-865-4700/V, 814-863-1150/TTY. U.Ed. IST 14-06


iConnect Magazine Fall/Winter 2013