<?xml version="1.0"?>
<News hasArchived="false" page="56" pageCount="221" pageSize="10" timestamp="Sun, 10 May 2026 12:09:55 -0400" url="https://dev.my.umbc.edu/groups/ieee/posts.xml?mode=pawpularity&amp;page=56">
  <NewsItem contentIssues="true" id="78103" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/78103">
    <Title>CMSC 201 Computer Science I for Non-CS Disciplines</Title>
    <Tagline>Special Section (Catalog #7838) for Fall 2018</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p>Gain a competitive advantage in your field! </p>
          
          
          
          <p>Programming and problem-solving skills are musts for today’s
          college graduates! </p>
          
          
          
          <p>Enroll in a <a href="https://www.csee.umbc.edu/2018/04/cmsc-201-computer-science-non-cs-disciplines-fall-2018/" rel="nofollow external" class="bo">special
          section of CMSC 201 Computer Science I</a> that emphasizes programming topics
          applicable to the social and biological sciences <strong>and other majors</strong>. Sample topics include statistical analysis,
          working with large data sets, and data visualization using the <strong>popular Python programming language</strong>. You will also receive
          more individual attention in this smaller CMSC 201 section!</p>
          
          
          
          <p>This section <strong>fulfills
          any major’s requirement for CMSC 201</strong> and is <strong>open to all non-CS, non-engineering majors</strong>.</p>
          
          
          
          <p><strong>No programming
          experience is required</strong>. Click <a href="https://www.csee.umbc.edu/2018/04/cmsc-201-computer-science-non-cs-disciplines-fall-2018/" rel="nofollow external" class="bo">here</a>
          for more details about this unique opportunity.</p>
          
          </div>
      ]]>
    </Body>
    <Summary>Gain a competitive advantage in your field!       Programming and problem-solving skills are musts for today’s college graduates!       Enroll in a special section of CMSC 201 Computer Science I...</Summary>
    <Website>https://www.csee.umbc.edu/2018/04/cmsc-201-computer-science-non-cs-disciplines-fall-2018/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/78103/guest@my.umbc.edu/913fa3add82a32b2ac70d92e74cc44be/api/pixel</TrackingUrl>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/078/103/14c3eb8771891efffb837717ea96a8c9/xxlarge.jpg?1535052016</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/078/103/14c3eb8771891efffb837717ea96a8c9/xlarge.jpg?1535052016</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/078/103/14c3eb8771891efffb837717ea96a8c9/large.jpg?1535052016</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/078/103/14c3eb8771891efffb837717ea96a8c9/medium.jpg?1535052016</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/078/103/14c3eb8771891efffb837717ea96a8c9/small.jpg?1535052016</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/078/103/14c3eb8771891efffb837717ea96a8c9/xsmall.jpg?1535052016</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/078/103/14c3eb8771891efffb837717ea96a8c9/xxsmall.jpg?1535052016</ThumbnailUrl>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Thu, 23 Aug 2018 15:21:31 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="77868" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/77868">
    <Title>talk: Methods and Models: Data Science for Campus Parking, 11:15am Mon 8/13</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/08/parking.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/08/parking.png" alt="" style="max-width: 100%; height: auto;"></a></h1>
          <h1><strong>Methods and Models: Data Science for Campus Parking</strong></h1>
          <h3>
          <strong>Professor John Hoag</strong><br>
          Associate Professor, Ohio University<br>
          11:15-12:15pm Monday, 13 August 2018 in ITE 325B</h3>
          <p>How can data science improve the parking experience for students, faculty, and staff? Or are there other motives at work? This talk will define and approach this perennial campus problem from perspectives of telematics and modeling, starting with the “Smart Cities” life cycle of data collection and analysis – from best practices through optimization. Next, we will consider relevant probabilistic models and their implementations over a century of study. We will conclude by discussing unintended consequences such as LPRs and other outcomes.</p>
          <p><a href="https://itsohio.net/people/faculty/hoag/" rel="nofollow external" class="bo">Dr. John Hoag</a> is Associate Professor of Information and Telecommunication Systems at Ohio University in Athens, OH. He earned Ph.D. and M.S. Degrees in Operations Research from Ohio State University and holds a Bachelor’s degree in Computer Science. His current portfolio can be termed Smart Cities, which subsumes transportation, energy, finance, public health, and more, for which he is forming interdisciplinary public-private teams whose scope encompasses data collection, telemetry, storage, and analysis. The Smart Cities displaced work he started in bioinformatics and translational biomedical science, where his efforts focused on computational complexity and system performance. He maintains an adjunct appointment in EECS at Case Western Reserve University.</p>
          <p>Host: Dr. Richard Forno (*protected email*)</p>
          <p>The post <a href="https://www.csee.umbc.edu/2018/08/talk-methods-and-models-data-science-for-campus-parking-1115am-mon-8-13/" rel="nofollow external" class="bo">talk: Methods and Models: Data Science for Campus Parking, 11:15am Mon 8/13</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
          </div>
      ]]>
    </Body>
    <Summary>Methods and Models: Data Science for Campus Parking   Professor John Hoag  Associate Professor, Ohio University  11:15-12:15pm Monday, 13 August 2018 in ITE 325B   How can data science improve the...</Summary>
    <Website>https://www.csee.umbc.edu/2018/08/talk-methods-and-models-data-science-for-campus-parking-1115am-mon-8-13/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/77868/guest@my.umbc.edu/ee48da26e32074af2b2f4334a8b5e0b0/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>data-science</Tag>
    <Tag>news</Tag>
    <Tag>talks</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>4</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 10 Aug 2018 15:46:24 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="77859" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/77859">
  <Title>CMSC 201: Computer Science I for Non-CS Disciplines &#8211; Fall 2018</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/cmsc201_social_sciences.jpg" style="max-width: 100%; height: auto;"></p>
    <h2>
    <strong>CMSC 201 Computer Science I for Non-CS Disciplines – </strong><strong>Fall 2018</strong>
    </h2>
    <p>This fall, <strong>Dr. Susan Mitchell</strong> will teach a special section of <strong>CMSC 201 Computer Science I</strong> designed <u>for social and biological sciences *and other majors*</u>. The course will cover the same content and have the same rigor as the regular sections of CMSC 201 and prepare students to continue on to CMSC 202 if they wish.  As with other sections, it <strong>fulfills any major’s requirement for CMSC 201</strong>. The key difference will be that the assignments and projects will <strong>emphasize topics applicable to many non-CS disciplines</strong>, such as statistical analysis, working with large data sets, and data visualization. The catalog description is:</p>
    <p>An introduction to computer science through problem solving and computer programming. Programming techniques covered by this course include modularity, abstraction, top-down design, specifications documentation, debugging and testing. The core material for this course includes control structures, functions, lists, strings, abstract data types, file I/O, and recursion.</p>
    <p>The course will include a lecture from 2:30pm to 3:45pm on Mondays and Wednesdays (Section 36-LEC) and a one-hour lab on either Monday (Section 37-DIS) or Wednesday (Section 38-DIS) from 11:00-11:50am.</p>
    <p>Permission from the instructor is required to register for this section. <strong>No prior programming experience is required</strong>. The only prerequisite is that students must have completed MATH 150, 151 or 152 with a C or better; OR have MATH test placement into MATH 151; OR be concurrently enrolled in MATH 155 or completed it with a C or better.</p>
    <p>For permission or questions, email Dr. Susan Mitchell at *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/08/cmsc-201-computer-science-i-for-non-cs-disciplines-fall-2018/" rel="nofollow external" class="bo">CMSC 201: Computer Science I for Non-CS Disciplines – Fall 2018</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
    </div>
]]>
  </Body>
  <Summary>CMSC 201 Computer Science I for Non-CS Disciplines – Fall 2018   This fall, Dr. Susan Mitchell will teach a special section of CMSC 201 Computer Science I designed for social and biological...</Summary>
  <Website>https://www.csee.umbc.edu/2018/08/cmsc-201-computer-science-i-for-non-cs-disciplines-fall-2018/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/77859/guest@my.umbc.edu/052d2b83f6b11aa3ac69f256351cd1fc/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>education</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 10 Aug 2018 09:00:52 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="77831" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/77831">
    <Title>CMSC 201 Computer Science I for Non-CS Disciplines</Title>
    <Tagline>Special Section (Catalog #7838) for Fall 2018</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p>Gain a competitive advantage in your field! </p>
          
          
          
          <p>Programming and problem-solving skills are musts for today’s
          college graduates! </p>
          
          
          
          <p>Enroll in a <a href="https://www.csee.umbc.edu/2018/04/cmsc-201-computer-science-non-cs-disciplines-fall-2018/" rel="nofollow external" class="bo">special
          section of CMSC 201 Computer Science I</a> that emphasizes programming topics
          applicable to the social and biological sciences <strong>and other majors</strong>. Sample topics include statistical analysis,
          working with large data sets, and data visualization using the <strong>popular Python programming language</strong>. You will also receive
          more individual attention in this smaller CMSC 201 section!</p>
          
          
          
          <p>This section <strong>fulfills
          any major’s requirement for CMSC 201</strong> and is <strong>open to all non-CS, non-engineering majors</strong>.</p>
          
          
          
          <p><strong>No programming
          experience is required</strong>. Click <a href="https://www.csee.umbc.edu/2018/04/cmsc-201-computer-science-non-cs-disciplines-fall-2018/" rel="nofollow external" class="bo">here</a>
          for more details about this unique opportunity.</p>
          
          </div>
      ]]>
    </Body>
    <Summary>Gain a competitive advantage in your field!       Programming and problem-solving skills are musts for today’s college graduates!       Enroll in a special section of CMSC 201 Computer Science I...</Summary>
    <Website>https://www.csee.umbc.edu/2018/04/cmsc-201-computer-science-non-cs-disciplines-fall-2018/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/77831/guest@my.umbc.edu/15ace2dbcb1ed80af418f50974ee1d8f/api/pixel</TrackingUrl>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/077/831/0505444168b5d9db738d31d2f66f5ab0/xxlarge.jpg?1533760916</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/077/831/0505444168b5d9db738d31d2f66f5ab0/xlarge.jpg?1533760916</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/077/831/0505444168b5d9db738d31d2f66f5ab0/large.jpg?1533760916</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/077/831/0505444168b5d9db738d31d2f66f5ab0/medium.jpg?1533760916</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/077/831/0505444168b5d9db738d31d2f66f5ab0/small.jpg?1533760916</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/077/831/0505444168b5d9db738d31d2f66f5ab0/xsmall.jpg?1533760916</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/077/831/0505444168b5d9db738d31d2f66f5ab0/xxsmall.jpg?1533760916</ThumbnailUrl>
    <PawCount>5</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Wed, 08 Aug 2018 16:43:25 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="77688" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/77688">
  <Title>Weaponized information seeks a new target in cyberspace: Users&#8217; minds</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/file-20180727-106514-17lwvm6.jpg" alt="" style="max-width: 100%; height: auto;">Cyberattacks target Americans’ thinking.<span> <a href="https://www.shutterstock.com/image-vector/young-man-grabs-his-hands-head-447182740" rel="nofollow external" class="bo">Fancy Tapis/Shutterstock.com</a></span><p> </p>
    <h1><strong>Weaponized information seeks a new target in cyberspace: Users’ minds</strong></h1>
    <h4>
    <a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em>
    </h4>
    <p>The Russian attacks on the 2016 U.S. presidential election and <a href="https://www.nytimes.com/interactive/2018/07/16/us/elections/russian-interference-statements-comments.html" rel="nofollow external" class="bo">the country’s continuing election-related hacking</a> have happened across all three dimensions of cyberspace – physical, informational and cognitive. The first two are well-known: For years, hackers have exploited hardware and software flaws to gain unauthorized access to computers and networks – and <a href="http://thehill.com/policy/cybersecurity/372816-russia-successfully-penetrated-voter-rolls-in-some-states-report" rel="nofollow external" class="bo">stolen information</a> they’ve found. The third dimension, however, is a newer target – and a more concerning one.</p>
    <p>This <a href="http://ctnsp.dodlive.mil/files/2014/03/Cyberpower-I-Chap-02.pdf" rel="nofollow external" class="bo">three-dimensional view of cyberspace</a> comes from my late mentor, Professor Dan Kuehl of the National Defense University, who expressed concern about traditional hacking activities and what they meant for national security. But he also foresaw the potential – now clear to the public at large – that those tools could be used to <a href="http://comprop.oii.ox.ac.uk/research/cybertroops2018/" rel="nofollow external" class="bo">target people’s perceptions and thought processes,</a> too. That’s what the Russians allegedly did, according to federal indictments issued in February and July, laying out evidence that <a href="https://www.justice.gov/file/1035477/download" rel="nofollow external" class="bo">Russian civilians</a> and <a href="https://www.justice.gov/file/1080281/download" rel="nofollow external" class="bo">military personnel</a> used online tools to <a href="https://www.newyorker.com/news/news-desk/what-muellers-indictment-reveals-about-russias-internet-research-agency" rel="nofollow external" class="bo">influence Americans’ political views</a> – and, potentially, their votes. They may be <a href="https://www.thedailybeast.com/russian-hackers-new-target-a-vulnerable-democratic-senator" rel="nofollow external" class="bo">setting up to do it again</a> for the <a href="https://www.npr.org/2018/07/28/633056819/russian-hackers-targeted-the-most-vulnerable-part-of-u-s-elections-again" rel="nofollow external" class="bo">2018 midterm elections</a>.</p>
    <p>Some observers suggest that using internet tools for espionage and as fuel for disinformation campaigns is a new form of “<a href="https://www.bbc.com/news/world-europe-29903395" rel="nofollow external" class="bo">hybrid warfare</a>.” Their idea is that the lines are blurring between the traditional kinetic warfare of bombs, missiles and guns, and the unconventional, stealthy warfare long practiced against foreigners’ “<a href="https://www.jpost.com/Israel-News/Winning-over-hearts-and-minds-The-benefits-of-Israeli-aid-to-Syria-561191" rel="nofollow external" class="bo">hearts and minds</a>” by intelligence and special forces capabilities.</p>
    <p>However, I believe this isn’t a new form of war at all: Rather, it is the same old strategies <a href="https://freebeacon.com/national-security/americas-adversaries-weaponizing-information-nsa-director-warns/" rel="nofollow external" class="bo">taking advantage of the latest available technologies</a>. Just as online marketing companies use sponsored content and search engine manipulation to distribute biased information to the public, governments are using internet-based tools to pursue their agendas. In other words, they’re hacking a different kind of system through <a href="https://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411" rel="nofollow external" class="bo">social engineering</a> on a grand scale.</p>
    <p> </p>
    <a href="https://images.theconversation.com/files/229635/original/file-20180727-106502-1xisbgf.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip" rel="nofollow external" class="bo"><img src="https://images.theconversation.com/files/229635/original/file-20180727-106502-1xisbgf.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" alt="" style="max-width: 100%; height: auto;"></a><span>Americans are used to seeing Russian propaganda that looks like this.</span> <span><a href="http://www.apimages.com/metadata/Index/APTOPIX-Britain-Russian-Art-Exhibition/72e17ee8492c4a6da4588bd1d7fa1a29/123/0" rel="nofollow external" class="bo">AP Photo/Kirsty Wigglesworth</a></span><p> </p>
    <h2>Old goals, new techniques</h2>
    <p>More than 2,400 years ago, the Chinese military strategist and philosopher Sun Tzu made it an axiom of war that it’s best to “<a href="https://en.wikiquote.org/wiki/Sun_Tzu#Chapter_III_%C2%B7_Strategic_Attack" rel="nofollow external" class="bo">subdue the enemy without fighting</a>.” Using information – or disinformation, or propaganda – as a weapon can be one way to destabilize a population and disable the target country. In 1984 a former KGB agent who defected to the West discussed this as a long-term process and <a href="https://bigthink.com/paul-ratner/34-years-ago-a-kgb-defector-described-america-today.amp" rel="nofollow external" class="bo">more or less predicted</a> what’s <a href="https://securingdemocracy.gmfus.org/so-what-did-we-learn-looking-back-on-four-years-of-russias-cyber-enabled-active-measures/" rel="nofollow external" class="bo">happening in the U.S.</a> now.</p>
    <p>The Russians created false social media accounts to simulate political activists – such as <a href="https://www.cnn.com/2018/02/16/politics/who-is-ten-gop/index.html" rel="nofollow external" class="bo">@TEN_GOP</a>, which purported to be associated with the Tennessee Republican Party. Just that one account attracted more than 100,000 followers. The goal was to distribute propaganda, such as captioned photos, posters or short animated graphics, purposely designed to enrage and engage these accounts’ followers. Those people would then <a href="https://www.technologyreview.com/s/611332/this-is-where-internet-memes-come-from/" rel="nofollow external" class="bo">pass the information along</a> through their own personal social networks.</p>
    <p>Starting from seeds planted by Russian fakers, including some who claimed to be U.S. citizens, those ideas grew and flourished through amplification by real people. Unfortunately, whether originating from Russia or elsewhere, fake information and conspiracy theories can <a href="https://www.vox.com/world/2018/6/6/17433876/trump-spygate-fox-twitter" rel="nofollow external" class="bo">form the basis for discussion</a> at major partisan media outlets.</p>
    <p>As ideas with niche online beginnings moved into the traditional mass media landscape, they serve to keep controversies alive by sustaining divisive arguments on both sides. For instance, one Russian troll factory had its online personas host <a href="https://www.nationalreview.com/2018/03/mueller-investigation-indictments-russian-organized-rallies-not-influential" rel="nofollow external" class="bo">rallies both for and against each of the major candidates</a> in the 2016 presidential election. Though the rallies never took place, the online buzz about them helped inflame divisions in society.</p>
    <p>The trolls also set up Twitter accounts purportedly representing local news organizations – including defunct ones – to take advantage of <a href="https://medium.com/trust-media-and-democracy/local-news-is-a-building-block-to-rebuild-trust-fab8752f3659" rel="nofollow external" class="bo">Americans’ greater trust of local news sources</a> than national ones. These accounts operated for several years – <a href="https://www.npr.org/2018/07/12/628085238/russian-influence-campaign-sought-to-exploit-americans-trust-in-local-news" rel="nofollow external" class="bo">one for the Chicago Daily News</a>, closed since 1978, was created in May 2014 and collected 20,000 followers – passing along legitimate local news stories, likely seeking to win followers’ trust ahead of future disinformation campaigns. Shut down before they could fulfill that end, these accounts cleverly aimed to exploit the fact that many Americans’ political views <a href="http://www.journalism.org/2018/06/18/distinguishing-between-factual-and-opinion-statements-in-the-news/" rel="nofollow external" class="bo">cloud their ability to separate fact from opinion</a> in the news.</p>
    <p>These sorts of activities are functions of traditional espionage: Foment discord and then sit back while the target population becomes distracted arguing among themselves.</p>
    <h2>Fighting digital disinformation is hard</h2>
    <p>Analyzing, let alone countering, this type of provocative behavior can be difficult. Russia isn’t alone, either: The U.S. tries to influence foreign audiences and global opinions, including through <a href="https://www.voanews.com/" rel="nofollow external" class="bo">Voice of America online and radio services</a> and intelligence services’ activities. And it’s not just governments that get involved. Companies, advocacy groups and others also can conduct disinformation campaigns.</p>
    <p>Unfortunately, laws and regulations are ineffective remedies. Further, social media companies have been fairly slow to respond to this phenomenon. Twitter reportedly <a href="https://www.reuters.com/article/us-twitter-inc-suspensions/twitter-suspends-over-70-million-accounts-in-two-months-washington-post-idUSKBN1JW2XN" rel="nofollow external" class="bo">suspended more than 70 million fake accounts</a> earlier this summer. That included <a href="https://www.npr.org/2018/07/12/628085238/russian-influence-campaign-sought-to-exploit-americans-trust-in-local-news" rel="nofollow external" class="bo">nearly 50 social media accounts</a> like the fake Chicago Daily News one.</p>
    <p>Facebook, too, says it is <a href="https://www.cnet.com/news/facebook-says-misinformation-is-a-problem-but-wont-say-how-big/" rel="nofollow external" class="bo">working to reduce the spread of “fake news” on its platform</a>. Yet both companies make their money from users’ activity on their sites – so they are conflicted, trying to <a href="https://www.theguardian.com/commentisfree/2018/jul/20/facebook-pledge-to-eliminate-false-information-is-itself-fake-news" rel="nofollow external" class="bo">stifle misleading content while also boosting users’ involvement</a>.</p>
    <h2>Real defense happens in the brain</h2>
    <p>The best protection against threats to the cognitive dimension of cyberspace depends on users’ own actions and knowledge. <a href="https://www.gutenberg.org/files/852/852-h/852-h.htm" rel="nofollow external" class="bo">Objectively educated, rational citizens</a> should serve as the foundation of a strong democratic society. But that defense fails if people don’t have the skills – or worse, don’t use them – to <a href="https://theconversation.com/here-are-some-more-reasons-why-liberal-arts-matter-49638" rel="nofollow external" class="bo">think critically about what they’re seeing</a> and examine claims of fact before accepting them as true.</p>
    <p>American voters <a href="https://www.cnn.com/2018/07/25/politics/russia-interference-poll/index.html" rel="nofollow external" class="bo">expect ongoing Russian interference in U.S. elections</a>. In fact, it <a href="https://www.npr.org/2018/07/28/633056819/russian-hackers-targeted-the-most-vulnerable-part-of-u-s-elections-again" rel="nofollow external" class="bo">appears to have</a> <a href="https://www.thedailybeast.com/russian-hackers-new-target-a-vulnerable-democratic-senator" rel="nofollow external" class="bo">already begun</a>. To help combat that influence, the U.S. Justice Department <a href="http://time.com/5343817/justice-department-election-meddling-plan/" rel="nofollow external" class="bo">plans to alert the public</a> when its investigations discover foreign espionage, hacking and disinformation relating to the upcoming 2018 midterm elections. And the National Security Agency has created a <a href="https://www.bloomberg.com/news/articles/2018-07-22/u-s-cyber-commander-tackles-russian-threat-with-new-task-force" rel="nofollow external" class="bo">task force to counter Russian hacking</a> of election systems and major political parties’ computer networks.</p>
    <p>These efforts are a good start, but the real solution will begin when people start realizing they’re being subjected to this sort of cognitive attack and that it’s not <a href="http://thehill.com/business-a-lobbying/398285-trump-obama-didnt-warn-about-russia-before-election-because-its-a-hoax" rel="nofollow external" class="bo">all just a hoax</a>.</p>
    <hr>
    <p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article was originally published on <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a>. Read the <a href="https://theconversation.com/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds-100069" rel="nofollow external" class="bo">original article</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds/" rel="nofollow external" class="bo">Weaponized information seeks a new target in cyberspace: Users’ minds</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
    </div>
]]>
  </Body>
  <Summary>Cyberattacks target Americans’ thinking. Fancy Tapis/Shutterstock.com     Weaponized information seeks a new target in cyberspace: Users’ minds   Richard Forno, University of Maryland, Baltimore...</Summary>
  <Website>https://www.csee.umbc.edu/2018/07/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/77688/guest@my.umbc.edu/7d92d247c93e19804dabc704d5f4e317/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>7</PawCount>
  <CommentCount>1</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 30 Jul 2018 08:47:53 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="77650" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/77650">
    <Title>UMBC&#8217;s Sherman receives $5.4m in funding for&#160;cybersecurity research and scholarships</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/07/umbc_icew_2014.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/umbc_icew_2014-1024x536.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
          <h1>UMBC receives $5.4m in funding for new cybersecurity projects</h1>
          <h3><strong>NSF and NSA Fund Three Cybersecurity Projects by Prof. Alan Sherman </strong></h3>
          <p>Professor <a href="https://www.csee.umbc.edu/~sherman/" rel="nofollow external" class="bo">Alan Sherman</a> and colleagues were recently awarded more than $5.4 million dollars in three new grants to support cybersecurity research and education at UMBC, including two from the National Science Foundation (NSF) and one from the National Security Agency (NSA).  Dr. Sherman leads UMBC’s <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">Center for Information Security and Assurance</a> which was responsible for UMBC’s designation as a National Center of Academic Excellence in Cybersecurity Research and Education.</p>
          <div><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/SFS-CyberCorps-copy.jpg" alt="" style="max-width: 100%; height: auto;"></div>
          <p>This summer, NSF funded Sherman’s second <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1241576&amp;HistoricalAwards=false" rel="nofollow external" class="bo">CyberCorps Scholarship for Service</a> (SFS) grant (<a href="https://cybersecurity.umbc.edu/richard-forno/" rel="nofollow external" class="bo">Richard Forno</a>, CoPI) that will fund 34 cybersecurity scholars over five years and support research at UMBC and in the Cyber Defense Lab (CDL). The $5 million award supports scholarships for BS, MS, MPS, and PhD students to study cybersecurity through UMBC degree programs in computer science, computer engineering, cyber, or information systems. SFS scholars receive tuition, books, health benefits, professional expenses, and an annual stipend ($22,500 for undergraduates, $34,000 for graduate students). In return, each scholar must engage in a summer internship and work for government (federal, state, local, or tribal) for one year for each year of support. The program is highly competitive and many of the graduates now work for the NSA.</p>
          <p>A novel aspect of UMBC’s SFS program is that it builds connections with two nearby community colleges—Montgomery College (MC) and Prince Georges Community College (PGCC). Each year, one student from each of these schools is selected for a scholarship. Upon graduation from community college, the student transfers to UMBC to complete their four-year degree. In doing so, UMBC taps into a significant pool of talent and increases the number of cybersecurity professionals who will enter government service. Each January, all SFS scholars from UMBC, MC, and PGCC engage in a one-week research study. Working collaboratively, they analyze a targeted aspect of the security of the UMBC computer system. The students enjoy the hands-on experience while helping to improve UMBC’s computer security. Students interested in applying for an SFS scholarship should consult the <a href="https://cisa.umbc.edu/sfs/" rel="nofollow external" class="bo">CISA SFS page</a> and contact <a href="https://www.csee.umbc.edu/~sherman/" rel="nofollow external" class="bo">Professor Sherman</a>. The next application deadline is November 15.</p>
          <p>With $310,000 of support from NSF, Sherman and his CoPIs, Drs. <a href="https://cybersecurity.umbc.edu/training/faculty/dhananjay-phatak/" rel="nofollow external" class="bo">Dhananjay Phatak</a> and <a href="https://userpages.umbc.edu/~oliva/" rel="nofollow external" class="bo">Linda Oliva</a>, are developing educational <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1819521" rel="nofollow external" class="bo">Cybersecurity Assessment Tools (CATS)</a> to measure student understanding of cybersecurity concepts. In particular, they are developing and validating two concept inventories: one for any first course in cybersecurity, and one for college graduates beginning a career in cybersecurity. These inventories will provide science-based criteria by which different approaches to cybersecurity education can be assessed (e.g., competition, gaming, hands-on exercises, and traditional classroom). This project is collaborative with the University of Illinois at Urbana-Champaign.</p>
          <p>With $97,000 of support from NSA, Sherman is developing a virtual <em>Protocol Analysis Lab</em> that uses state-of-the-art tools to analyze cryptographic protocols for structural weaknesses. Protocols are the structured communications that take place when computers interact with each other, as for example happens when a browser visits a web page. Experience has shown that protocols are so complicated to analyze that there is tremendous value in studying them using formal methods. Sherman and his graduate students are making it easier to use existing tools including CPSA, Maude NPA, and Tamerin, applying them to analyze particular protocols, and developing associated educational materials.</p>
          <p>The post <a href="https://www.csee.umbc.edu/2018/07/nsf-and-nsa-fund-three-cybersecurity-projects-by-prof-alan-sherman/" rel="nofollow external" class="bo">UMBC’s Sherman receives $5.4m in funding for cybersecurity research and scholarships</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
          </div>
      ]]>
    </Body>
    <Summary>UMBC receives $5.4m in funding for new cybersecurity projects   NSF and NSA Fund Three Cybersecurity Projects by Prof. Alan Sherman    Professor Alan Sherman and colleagues were recently awarded...</Summary>
    <Website>https://www.csee.umbc.edu/2018/07/nsf-and-nsa-fund-three-cybersecurity-projects-by-prof-alan-sherman/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/77650/guest@my.umbc.edu/b291f995e8ceb362547ad3489392aee6/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>news</Tag>
    <Tag>research</Tag>
    <Tag>students</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>5</PawCount>
    <CommentCount>1</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 25 Jul 2018 22:15:49 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="77605" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/77605">
  <Title>talk: Robot Governance &#8211; Institutions and Issues, 10:30 Tue 7/24, ITR346</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/toy-robot-1024x461.jpg" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h1><strong>Robot Governance – Institutions and Issues</strong></h1>
    <p> </p>
    <h3>Dr. Aaron Mannes, ISHPI Information Technologies</h3>
    <h3>10:30-11:30 Tuesday, 24 July 2018, ITE 346</h3>
    <p> </p>
    <p>Inexpensive sensors and information storage and processing have enabled the large-scale production of robots: autonomous systems capable of acting on the world. These systems represent an enormous technological and economic opportunity that will change society in countless and unpredictable ways. They will also bring new policy challenges. This presentation examines the missions the government will need to undertake to address the challenges raised by this new technology, identifies critical gaps the government faces in carrying out these missions, and discusses institutional options to address these gaps.</p>
    <p> </p>
    <hr>
    <p> </p>
    <p>Dr. Aaron Mannes is the Senior Policy Advisor at ISHPI Information Technologies, where he supports the Apex Data Analytics Engine (DA-E) at the Department of Homeland Security Science and Technology Directorate. In supporting DA-E, Dr. Mannes collaborates on big data projects that support the Homeland Security Enterprise and researches technology policy. He started at DHS as an American Association for the Advancement of Science Policy Fellow in September 2015. From 2004 to 2015, Dr. Mannes was a researcher at the University of Maryland Institute for Advanced Computer Studies (UMIACS) where he was the subject matter expert on terrorism and international affairs collaborating with a team of inter-disciplinary scientists to build computational tools to support decision-makers facing 21st century security and development problems. Dr. Mannes earned his Ph.D. at the University of Maryland’s School of Public Policy in 2014. His dissertation topic was the evolving national security role of the vice president.</p>
    <p>Dr. Mannes is the author or co-author of four books on terrorism and has written scores of articles, papers, and book chapters on an array of topics including Middle East affairs, terrorism, technology, and other international security issues for popular and scholarly publications including Politico, Policy Review, The Wall Street Journal, Foreign Policy, The Journal of International Security Affairs, The Huffington Post, The National Interest, The Jerusalem Post, and The Guardian.</p>
    <p>This research was conducted with the support of the Apex Data Analytics Engine in the Department of Homeland Security (DHS) Science and Technology Directorate (S&amp;T). In no way should anything stated in this seminar be construed as representing the official position of DHS S&amp;T or any other component of DHS. Opinions and findings expressed in this seminar, as well as any errors and omissions, are the responsibility of the presenter alone.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/talk-robot-governance-institutions-and-issues-1030-tue-7-24-itr346/" rel="nofollow external" class="bo">talk: Robot Governance – Institutions and Issues, 10:30 Tue 7/24, ITR346</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
    </div>
]]>
  </Body>
  <Summary>    Robot Governance – Institutions and Issues       Dr. Aaron Mannes, ISHPI Information Technologies   10:30-11:30 Tuesday, 24 July 2018, ITE 346       Inexpensive sensors and information storage...</Summary>
  <Website>https://www.csee.umbc.edu/2018/07/talk-robot-governance-institutions-and-issues-1030-tue-7-24-itr346/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/77605/guest@my.umbc.edu/1729d29bc363b882d0ac2732137fc2f9/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 23 Jul 2018 17:27:32 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="77302" important="true" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/77302">
    <Title>SANS Diversity Training Program/Scholarship in Cybersecurity</Title>
    <Tagline>Applications Due July 3rd!</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">Hey ISSA members,<div> </div>
          <div>If you are interested in cybersecurity, be sure to check out the SANS Diversity Cyber Academy (DCA). Apply to this program to get GIAC certifications in the Information Security field, candidates will also participate in advanced technical training and be taught hands-on cyber defense and incident handing skills.</div>
          <div><br></div>
          <div>LINK below:</div>
          <div><a href="https://www.sans.org/cybertalent/cybersecurity-career/diversity-cyber-academy" rel="nofollow external" class="bo">https://www.sans.org/cybertalent/cybersecurity-career/diversity-cyber-academy</a></div>
          <div><br></div>
          <div>Good Luck!</div>
          <div><br></div>
          <div>~Your ISSA board</div>
          </div>
      ]]>
    </Body>
    <Summary>Hey ISSA members,    If you are interested in cybersecurity, be sure to check out the SANS Diversity Cyber Academy (DCA). Apply to this program to get GIAC certifications in the Information...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/77302/guest@my.umbc.edu/8059dc73cfc1ec0236830e768c2dcef3/api/pixel</TrackingUrl>
    <Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/issa</GroupUrl>
    <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
    <AvatarUrl size="original">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
    <Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 26 Jun 2018 22:27:32 -0400</PostedAt>
    <EditAt>Tue, 26 Jun 2018 22:28:13 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="77230" important="true" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/77230">
    <Title>Scholarship Opportunity</Title>
    <Tagline>Apply for a scholarship for IS students here!</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">Hello, everyone! We hope you are all enjoying your summer break so far.<div><br></div>
          <div>We have received information regarding a wonderful scholarship opportunity for rising freshman, sophomores, and juniors.</div>
          <div><br></div>
          <div>The custom apparel company Fresh Prints is offering a $2,000 scholarship to students who apply for it by the deadline on June 30th, 2018.<br><br><a href="https://apply.freshprints.com/scholarship6/?source=club" rel="nofollow external" class="bo">Here is the link to the application.</a> </div>
          <div>Good luck!</div>
          <div><br></div>
          <div>-Your ISSA executive board</div>
          </div>
      ]]>
    </Body>
    <Summary>Hello, everyone! We hope you are all enjoying your summer break so far.    We have received information regarding a wonderful scholarship opportunity for rising freshman, sophomores, and juniors....</Summary>
    <Website>https://apply.freshprints.com/scholarship6/?source=club</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/77230/guest@my.umbc.edu/7c93cad445643367aa9b72093c655138/api/pixel</TrackingUrl>
    <Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/issa</GroupUrl>
    <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
    <AvatarUrl size="original">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
    <Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 19 Jun 2018 17:44:20 -0400</PostedAt>
    <EditAt>Fri, 22 Jun 2018 21:41:40 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="76983" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/76983">
  <Title>UMBC CSEE student and alumna selected to attend Heidelberg Laureate Forum</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="https://news.umbc.edu/wp-content/uploads/2018/05/Nobel-Prize-1920x768.jpg" style="max-width: 100%; height: auto;"></p>
    <h1>UMBC CSEE student and alumna to attend Heidelberg Laureate Forum</h1>
    <p>A UMBC Ph.D. student and an alumna have been selected to participate in this year’s international Nobel laureate forums, which connect top student engineers and scientists from universities around the globe with the world’s leading scientific researchers.</p>
    <p><strong>Kavita Krishnaswamy</strong> ‘07, computer science and mathematics, and Ph.D. ‘18, computer science, will attend the Heidelberg Laureate Forum, and <strong>Naomi Mburu </strong>‘18, chemical engineering, will attend the Lindau Nobel Laureate Forum. <strong>William Easley</strong> ‘13, information systems management, M.S. ‘15, human-centered computing, and Ph.D. ‘22, human-centered computing, was also nominated to participate in the Heidelberg Laureate Forum.</p>
    <p>“These competitive events bring great minds, who have been recognized for outstanding scientific achievement, together with a new generation of scientists, who are considered to be among the top young minds from countries around the world,” explains <strong>Renetta Tull</strong>, associate vice provost for strategic initiatives. She is delighted to say, “This year, we have not one, but two students from UMBC who will receive this significant honor.”</p>
    <div>
    <img src="https://news.umbc.edu/wp-content/uploads/2018/05/Naomi-Mburu-class-of18-5326-1.jpg" style="max-width: 100%; height: auto;">Naomi Mburu. Photo by Marlayna Demond ’11 for UMBC.</div>
    <p>Mburu, the first UMBC student to receive the <a href="https://news.umbc.edu/umbcs-naomi-mburu-receives-first-rhodes-scholarship-in-school-history/" rel="nofollow external" class="bo">Rhodes Scholarship</a>, will attend the 68th Lindau Nobel Laureate meeting, June 24 – 29, in Lindau, Germany. The meeting brings approximately 500 undergraduate and Ph.D. students, and post-doctoral researchers together from around the globe to promote connections between scientists across generations, cultures, and disciplines. Each year the focus of the meeting changes to address topics including physiology, medicine, physics, and chemistry.</p>
    <p>“I am beyond excited to be attending this meeting with 40+ Nobel laureates and brilliant students from around the world,” says Mburu. “There will be opportunities to both network and speak with the Nobel laureates, while celebrating different cultures and learning more about advances in medicine and physiology.”</p>
    <p>In addition to her most recent honors, Mburu received a <a href="https://news.umbc.edu/three-umbc-students-receive-goldwater-scholarships-for-future-leaders-in-stem-research/" rel="nofollow external" class="bo">Goldwater Scholarship</a> in 2016. She has also already conducted research at European Organization for Nuclear Research in Switzerland.</p>
    <p>During the one-week-long Heidelberg Laureate Forum, Krishnaswamy will have the opportunity to connect and network with leaders in the fields of mathematics and computer science. The forum will be held at Heidelberg University in Germany, September 22 – 28.</p>
    <div>
    <img src="https://news.umbc.edu/wp-content/uploads/2018/01/DSC_3208-e1515530830192.jpg" style="max-width: 100%; height: auto;">Kavita Krishnaswamy. Photo by Britney Clause ’11.</div>
    <p>Krishnaswamy is one of just 200 students from around the world selected to participate in the Heidelberg Laureate Forum. She shares, “I am very thankful for the opportunity to represent UMBC and help promote the public understanding of mathematics and computer science from the perspective of improving the quality of life for individuals with physical disabilities through the advancement of robotics.”</p>
    <p>Krishnaswamy’s previous honors include being named a Microsoft Fellow and received the Google Lime Scholars in 2017, prestigious honors that recognize emerging scholars in computing who are dedicated to increasing diversity in the industry.</p>
    <p>“At UMBC we think of our university as an institution committed to inclusive excellence that prepares students who can compete on a global scale,” Tull reflects. “Kavita and Naomi’s awards signify that others around the world agree.”</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/umbc-students-selected-to-attend-nobel-laureate-meetings-in-germany/" rel="nofollow external" class="bo">UMBC news article</a> by Megan Hanks. Banner image: Nobel Prize. Photo by Flickr user Adam Baker under license <a href="https://creativecommons.org/licenses/by/2.0/" rel="nofollow external" class="bo">CC BY 2.0</a>.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/06/umbc-csee-student-and-alumna-selected-to-attend-heidelberg-laureate-forum/" rel="nofollow external" class="bo">UMBC CSEE student and alumna selected to attend Heidelberg Laureate Forum</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p>
    </div>
]]>
  </Body>
  <Summary>UMBC CSEE student and alumna to attend Heidelberg Laureate Forum   A UMBC Ph.D. student and an alumna have been selected to participate in this year’s international Nobel laureate forums, which...</Summary>
  <Website>https://www.csee.umbc.edu/2018/06/umbc-csee-student-and-alumna-selected-to-attend-heidelberg-laureate-forum/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/76983/guest@my.umbc.edu/d92c1e5ec9554b3130b702774e1b508a/api/pixel</TrackingUrl>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>students</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>6</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 01 Jun 2018 08:55:26 -0400</PostedAt>
</NewsItem>
</News>
