270 likes | 385 Vues
The College of Information Sciences and Technology. ist.psu.edu. The College of IST mission is to build knowledge and information skills to meet the needs of the Information Age. IST integrates multiple perspectives.
E N D
The College of Information Sciences and Technology ist.psu.edu
The College of IST mission is to build knowledge and information skills to meet the needs of the Information Age.
What do you study in the College of Information Sciences and Technology?
The College of IST offers two majors. College of IST IST Major SRA Major
THAT’S IST How can I design, analyze, critique, or make use of information technologies to help people do what they want to do?
Degrees in IST Major • B.S. in Information Sciences and Technology • B.A. in Information Sciences and Technology
In IST, you will learn: Internship
IST Bachelor of Science (ISTBS) Design and Development Integration and Application Information Context • Intelligence Analysis and Modeling • Information and Cyber Security • Social Factors and Risk • Make Cool Stuff • Understand programming, database, human computer interaction, knowledge representation, search engines, characteristics of users. • Make Businesses’ Use of Information More Efficient • Understand information acquisition, representation, dissemination, storage, retrieval, display, and interpretation. • Make Sense of Impact of Information Systems • Understand the use and impact of IS at the individual, group, organizational, national and international levels (e.g., social networks, crowd sourcing, digital natives/digital immigrants).
Minors fit easily in IST, especially: • Security & Risk Analysis • Supply Chain (esp. with Integration & Applica.) • Telecommunication • Music Technology • Economics • Engineering Leadership • Language
How can I help others make informed decisions when information or people are at risk? THAT’S SRA
Degrees in SRA Major B.S. in Security and Risk Analysis
In SRA, you will learn: Internship
SRA Bachelor of Science (B.S.) Information and Cyber Security Intelligence Analysis and Modeling Social Factors and Risk • Intelligence Analysis and Modeling • Information and Cyber Security • Social Factors and Risk • Make Information Systems Secure • Understand how to deal with security and privacy concerns in all types of organizations, ensure that computer systems and products are secure and how to “police” cyberspace. • Make Risk Predictions • Understand how to calculate, evaluate, and predict risk in a variety of fields including business and national security; students learn how to protect vital infrastructure against subversive attacks. • Make Sense of Contextual Elements surrounding Risk • Understand the psychological and sociological causes of terrorism and crime and how information technology is transforming each; understand privacy policies and government regulation to ensure users that data are secure.
Minors are trickier to plan for SRA. • Information Sciences & Technology • Political Science • Global Security • Language (if use all electives and take more than 15 credits per semester)
College of IST is where people, information, and technology meet. People Technology Information IST
People Technology IST / SRA Information interact with using
People Technology IST / SRA Information create organize share using store protect access analyze modify
People Technology IST / SRA geospatial mapping emergency response teams Information create organize share store using protect access data on wildfire activity analyze modify
People Technology IST / SRA new iPod applications Black Eyed Peas fans Information create organize share using store protect access digital music analyze modify
People Technology IST / SRA integrated software systems (that enable data to be accessed and shared across databases) managers (in any organization—Wal-Mart, Geico…) Information create organize share store financial and manufacturing data that exists in different databases using protect access analyze modify
People Technology IST / SRA privacy policies that abide by information security regulations Amazon.com Information create organize share store using protect access buyer history analyze modify
People Technology IST / SRA recommended firewall, authentication, and other security technologies corporations Information create organize share store using protect access email communication, documents, data analyze modify
Questions? ist.psu.edu
IST/SRA have exciting research opportunities. http://prezi.com/29mzk7pqjjtz/accepted-students-program-college-of-ist