News | College of Information Sciences and Technology
Close Open

Please Update Your Browser.

It is recommended that you update your browser to the latest version to view the website's full experience.

Dismiss

News

You are here

Gerry Santoro, senior lecturer in information sciences and technology (IST)
Image: Penn State

3/20/17

Gerry Santoro, senior lecturer in information sciences and technology (IST) and assistant professor of communications arts and sciences, will be presenting a lecture on strategies to protect your online identity. The event is free and open to the public.

The event, beginning at 7:45 p.m. on March 22 in Room 113 of the IST building, is called “Protecting Your Privacy Online: Some Practical Tips.” During his lecture, Santoro will cover the use of search engines, email programs, encryption disks and cloud computing in an effort to empower individuals to help protect their own data.

Retiring professor Michael McNeese on a recent trip to Hawaii.
Image: Michael McNe

3/17/17

 Michael McNeese, tenured professor of information sciences and technology (IST) and one of the College of IST’s founding faculty members, is tying up loose ends before his retirement from Penn State.

McNeese was hired in August 2000, just one year after the college was established in 1999.

Joe Oakes, senior instructor of information sciences and technology at Penn State Abington, in Chennai, India.
Image: Penn State

3/15/17

Two Penn State Abington faculty members spent spring break in Nepal and India on an exploratory trip to develop an information sciences and technology course that includes a required short-term study abroad component.  

 

The State College Municipal building in downtown State College.
Image: Jessica Sallurday

3/08/17

Today, technology touches almost every aspect of people’s lives. But outside of social media, it can often be difficult to translate this influence to a person’s civic life within their local community. “In a sense, we’re all facing this problem with government that people are less and less involved and empowered in local decision-making,” said Guoray Cai, assistant professor at the Penn State College of Information Sciences and Technology (IST).

Umer Farooq, user research manager at Facebook on the Messenger team.
Image: Penn State

3/03/17

“Fifty years ago, a notable technologist predicted three stages for humans and computers. First, human-computer interaction where computers are tools and extensions of the arm, eye and brain. Second, computer symbiosis, the coupling of humans and computers thinking together. Third, ultra-intelligent machines that dominate humans in analysis and tasks. Where are we now?

"When you asked why teens didn't talk to their parents, a lot of times they mention risky situations, which they didn't think were a big deal, but they add that if they told their parents, they would just freak out and make things worse,"
Image: © iStock Photo Highwaystarz-Photography

2/28/17

"When you asked why teens didn't talk to their parents, a lot of times they mention risky situations, which they didn't think were a big deal, but they add that if they told their parents, they would just freak out and make things worse," Wisniewski said.

To Keep Teens Safe Online, They Need To Learn To Manage Risk
Image: Jessica Sallurday

2/28/17

Parents of teens know how tricky it is to keep their kids physically safe while balancing their need for greater independence, but when it comes to keeping them safe online, it can be even trickier.

Horror stories of social media harassment and exposure to explicit content leading to teen suicide or even murder abound. With 91 percent of U.S. teens accessing the Internet via a mobile device that allows them to be online anywhere and at all times of day, parents are desperately looking for ways to protect teens from online predators, bullies, and their own poor decisionmaking.

In a study of 74 Android mobile apps designed to promote adolescent online safety, the researchers said that 89 percent of security features on the apps are focused on parental control, while about 11 percent supported teen self-regulation.
Image: © iStock Photo monkeybusinessimages

2/27/17

Mobile apps designed to keep teens safe online are overwhelmingly focused on parental control, which may be only a short-term solution that hinders a teen's ability to learn coping strategies in the long run, according to a team of researchers.

In a study of 74 Android mobile apps designed to promote adolescent online safety, the researchers said that 89 percent of security features on the apps are focused on parental control, while about 11 percent supported teen self-regulation.

Cybersecurity sector growing at record pace, IST grads ready for the challenge
Image: Kelly Bryan

2/24/17

According to recent statistics by the U.S. Department of Labor, jobs for information security analysts hit a record high in 2016. In fact, in the past year alone, the number has increased by 27 percent.

At Penn State’s College of Information Sciences and Technology (IST), the demand for security analysts is apparent. The college is preparing its graduates for these careers with a unique and relevant curriculum Nicklaus Giacobe, research associate and lecturer in IST, said of his students, “They’re able to take the education they get here and leverage it into many different ways in the future.”

Jennifer and Kelly Lee on their graduation day.
Image: Penn State

2/22/17

Nancy Lee passed more than a last name and a love of Penn State sports down to her twin daughters, Jennifer and Kelly. With a degree in computer science from the College of Engineering, she also instilled a love of technology in her daughters, inspiring them to pursue degrees from the College of Information Sciences and Technology (IST) and join Nancy as Penn State alumnae working in technology.

Nancy, a 1985 alumna, was delighted when both daughters chose to pursue degrees and careers in technology. Having started her career at RCA Missile and Defense Systems, later earning experience at Microsoft, and now serving as director and interim chief information officer at Alvarez & Marsal, she knew that a career in technology could offer long-term opportunities for Jennifer and Kelly. All three women agree that they benefit from the unique perspective and level of expertise each can offer.

Pages