- HALF-DAY
SESSIONS
- Morning
(9:00pm - 12:00pm)
-
- MORNING
SESSION 1
-
- ADVANCES
IN TECHNOLOGY-SUPPORTED LEARNING
Return
to Tutorials
Jay
F. Nunamaker, Jr. and Eric Santanen
-
- Some things just
come as naturally as breathing. For
everything else there is teaching-and-learning. For centuries, technology for learning did not advance beyond
slates and chalk, pencils, paper, and the printing press.
Formal learning processes evolved to maximize the benefits those
technologies could provide.
-
- Electronic and
computer technologies gave rise to a renaissance of approaches to learning.
Technical researchers are exploring everything from hyperlinked
multi-media presentations to fully immersive virtual worlds, and in many
cases the findings are quite promising.
Social and cognitive researchers report that the technological
innovations appear to be accompanied by substantial interpersonal, social
and institutional changes ranging from fully distributed student bodies to
fully asynchronous on-line university degree programs
-
- In this
tutorial five action researchers from around the globe discuss five very
different approaches to using technology to support learning.
Their presentations will deal with the pragmatic technical,
organizational, and social issues they find in the field.
They will demonstrate new technologies, and offer tips from the
trenches about implementing and studying technology-supported learning.
-
- Jay
Nunamaker
is Regents and Soldwedel Professor of MIS, Computer Science and
Communication, and Director of the Center for the Management of Information
at the University of Arizona, Tucson. His
research on group support systems addresses behavioral as well as
engineering issues and focuses on theory as well as implementation.
Dr. Nunamaker founded the MIS department (3rd and 4th nationally
ranked MIS department) at The University of Arizona and established
campus-wide instructional computer labs that has attracted academic leaders
in the MIS field to the university faculty. He received his Ph.D. in systems
engineering and operations research from Case Institute of Technology, an MS
and BS in engineering from the University of Pittsburgh, and a BS from
Carnegie Mellon University. He has been a registered professional engineer
since 1965.
- Email:
jnunamaker@cmi.arizona.edu
- Eric
Santanen is
an Assistant Professor of Management Information Systems in the Department
of Management at Bucknell University, where he teaches introduction to
information systems, management information systems, and capstones.
He earned his Ph.D. from the University of Arizona in June 2000,
where he was involved in several research projects, including Brainstorming
and Creativity, Colors and Interface Design, and a Scenario Modeling Tool. His BS and MS are from the New Jersey Institute of
Technology. His primary
research interests are: Group Support Systems using GSS for collaborative
requirements elicitation, collaborative process modeling, and increasing
creative ideation; Systems Analysis and Design: designing software for
distributed collaboration; and Human Factors, using of color in interface
design and issues for distributed, collaborative use of software, and
human-computer interaction.
- Email:
esantane@bucknell.edu
-
-
-
- MORNING
SESSION 2
-
- PUBLISHABLE
POSITIVISM: BULLETPROOF SCIENTIFIC PAPERS
Return
to Tutorials
- ABOUT
SYSTEMS
Robert O. Briggs
-
- Positivism and
interpretivism are mental tool sets for different purposes, but with at
least one common goal: to help keep us academics from concluding (and then
publishing) things that turn out to be embarrassingly wrong-headed.
If we wish to study “the inferences that people draw and the meanings people ascribe to the
things other people say and do,” then the mental disciplines of
interpretivism can help, if we wield them with intelligence and insight.
Likewise, if we form questions of cause
and effect, then positivist thought, when wielded with intelligence and
insight, can help us rule out misguided or self-interested explanations.
-
- This tutorial offers
a useful way to think about scientific enquiry into the design and use of
systems. It focuses on the
simple structure of the positivist approach, and the way that structure
plays out in a paper. Papers based on the positivist structure are
straightforward to write, and they can be nearly bulletproof to reviewers. They can be exciting, sometimes even inspiring to read, and
they can increase the likelihood that people, organizations, and societies
will survive and thrive. Papers
that adhere to the forms of
positivism without embracing its underlying structure are typically
difficult to write, agonizing to get past the reviewers, dull to read, and
ultimately, may make no difference to the world.
-
- In this
tutorial we will connect the dots from a simple statement of the
positivist philosophy to the nature and structure of a theory, to the
derivation of a hypothesis, to nature of an experiment, to the meaning of
data, to worthwhile and very publishable papers.
Along the way, it also attempts to dispel some of the prevailing
myths about positivism that ascribe it both too much and too little merit.
-
- Robert
O. Briggs
is Research Coordinator for the Center for the Management of Information at
the University of Arizona, is on the Faculty of Technology, Policy, and
Management at Delft University of Technology in The Netherlands, and is
Director of R&D for GroupSystems.com.
Since 1990 he has investigated the theoretical and technological
foundations of collaboration, and has applied his findings to the design and
deployment of new technologies, workspaces, and processes for
high-performance teams. He and
his colleagues are responsible for numerous recognized theoretical
breakthroughs and technological milestones. In his field research he has
created team processes for the highest levels of government, and has
published more than 60 scholarly works on the theory and practice of
collaborative technology. He
earned his Ph.D. in MIS at the University of Arizona and holds a BS and an
MBA from San Diego State University.
- Email:
bob@groupsystems.com
URL: www.groupsystems.com
-
-
-
- MORNING SESSION 3
-
-
- Persistent
conversations — interaction that occurs via instant messaging, email,
collaborative environments, etc.— afford new uses (e.g. searching,
replaying, restructuring) and raise new problems.
In this multi-disciplinary
workshop (associated with the Persistent Conversation Minitrack),
participants will analyze selected (before
the workshop) CMC site, and compare and discuss their findings.
-
- Thomas Erickson
is a Research Staff Member and an interaction designer and researcher at
IBM’s T. J. Watson Research Center in New York. He is interested in
understanding how large groups of people interact via networks, and in
designing systems that support deep, productive, coherent,
network-mediated conversation.
Email:
snowfall@acm.org
- Susan Herring
is an Associate Professor of Information Science and Linguistics at
Indiana University, Bloomington. Her research applies language-focused
methods of analysis to digital conversations in order to identify their
recurrent properties and social effects. She is the editor of
Computer-Mediated
Communication: Linguistic, Social and Cross-Cultural Perspectives (Benjamins,
1996) and Computer-Mediated
Conversation (Hampton, in press).
Email: herring@indiana.edu
-
-
- MORNING SESSION 4
-
- Nenad
Jukic and Svetlozar Nestorov
-
- Business
intelligence can be defined as a broad discipline whose main purpose is to
support fact-based business decisions.
Data warehousing and data mining represent the foundation of any
serious business intelligence effort. This
tutorial session will give a comprehensive introduction to these topics.
The first part of the tutorial will cover data warehousing topics,
including basic concepts and terminology, data warehouse modeling/design,
data staging, and on–line analytical processing (OLAP). This will be
accompanied by examples of data warehouse business applications.
The second part of the session will cover the general framework of
the process of knowledge discovery as well as specific data mining
techniques such as association rules, clustering, classification, and
sequence mining. This part of the tutorial will also include an overview of
commercial data mining tools and research prototypes.
- Many
of the contemporary areas of today’s business environment (such as
customer relationship management (CRM), e-business/e-commerce, and knowledge
management) successfully apply data warehousing and data mining, both in the
realms of academic research and industry applications.
Knowing and understanding the basic concepts as well as the
intricacies and nuances of these business intelligence methods puts any
information systems academic researcher or practitioner in a better position
to recognize and utilize the power hidden within the data they already own.
By the same token, the absence of familiarity with these fields is
often a culprit behind the under-utilization of available data and the
consequent absence of knowledge necessary to make sound and optimal
decisions.
- Nenad Jukic
is the director of Graduate Certificate Program in Data Warehousing and
Business Intelligence at Loyola University Chicago Graduate School of
Business where he also teaches courses and conducts research in the areas of
database systems, data warehousing, and e-business technology. His consultancies include services to U.S. military and
government agencies, as well as with a number of corporations that vary from
startups to Fortune 500 companies. Dr.
Jukic received his BS in Electrical Engineering and Computer Science from
the University of Zagreb, Croatia (1991), and his MS (1993) and Ph.D. (1997)
in Computer Science from the University of Alabama.
Email: njukic@wpo.it.luc.edu
Svetlozar
Nestorov is
an Assistant Professor of Computer Science at the University of Chicago,
where he does research and teaches courses in the fields of database systems
and data mining. He is also
involved in active research in a spectrum of areas including artificial
intelligence, computational science, bioinformatics, information
integration, and web technologies. He
has advised and collaborated with a number of startups, including Google.
Dr. Nestorov received his BS (1994), MS (1996), and Ph.D. (2000) in
Computer Science from Stanford University.
Email: evtimov@cs.uchicago.edu
-
-
MORNING SESSION 5
-
- Stephan Olariu and
Petia Todorova
-
- The
tutorial is
geared towards a very broad Computer Science, MIS, and Engineering audience.
No special background is assumed on the part of participants, and we will
introduce all the terms and terminology needed. The main goal is to provide
an up-to-date survey or sensor networks and their various applications.
The tutorial outline includes:
- ·
What are
sensor "networks"
- ·
System
assumptions
- ·
Sensor
networks as a new computational paradigm
- ·
Sensor
networks as a new communication paradigm
- ·
Booting
up: Training and self-organizing
- ·
Getting
work done: Transaction-based management
- ·
What’s
next: Biology-inspired paradigms
- ·
Potential
application domains:
- o
smart surfaces and volumes
- o
embedded systems
- o
surveillance
- o
environment sampling
- o
security
- o
health/process monitoring
- o
combat support
- ·
Specific
solutions to security problem
-
- Stephan
Olariu received the M.Sc. and Ph.D. degrees in computer science from
McGill University, Montreal in 1983 and 1986, respectively. In 1986 he
joined the Computer Science Department at Old Dominion University where he
is now a full professor. His
research interests include wireless sensor networks and their applications,
network security, mobile computing, parallel and distributed systems,
peer-to-peer networks, and performance evaluation.
Dr. Olariu has published extensively in various journals, books, and
conference proceedings.
- Email:
olariu@cs.odu.edu
- Petia
Todorova received
the MS degree in electrical engineering and Ph.D. degree
in computer networks from the Technical University of Sofia. Upon
graduation in 1980, she joined the Research Institute of Telecommunications
in Sofia, where she worked until 1987, when she became Visiting Scientist
with the University of West Berlin. Since 1988 she has been with GMD-FOKUS,
Berlin, now Fraunhofer Institute for Open Communication Systems (FhG-FOKUS)
as a Senior Scientist working in advanced networks technologies and
protocols. Dr. Todorova’s recent research interests include sensor
networks, network management, resource management and performance analysis
of wireless and ATM-based LEO satellite communication systems.
- Email:
todorova@fokus.gmd.de
-
-
-
-
MORNING SESSION 6
-
- OPTIMIZATION
SOFTWARE CLASS LIBRARIES
Return
to Tutorials
Stefan
Voß
-
- The
tutorial
is on optimization software class libraries.
It focuses on flexible and powerful collections of computational
objects for addressing complex optimization problems.
These component class libraries are suitable for use in the
increasing number of optimization applications that stand-alone or are
imbedded in advanced planning, engineering and bioinformatics applications.
Most researchers today use a number of modeling language software
packages and a number of software solvers to solve computational problems.
This tutorial outlines packaged software class libraries to enable
researchers to find cost-effective and efficient methods of getting problems
coded into the computer, or into a modeling language package or into
optimizing solvers - hence, providing software coding solutions to whatever
specialized needs a specific problem might require.
-
- Attendees
will be provided with a rich overview of the variety of components for
framing problems. With the growing number of application-specific software
systems and advance planning methods for specific classes of problems, e.g.
ERP, class libraries for optimization are increasingly useful, practical,
and needed. Benefits include
researchers being able to invest more effort toward examining better
algorithms, performing experiments, and making use of problem-specific
knowledge. The libraries that encapsulate general-purpose algorithms as
reusable, high-quality software components are themselves significant
contributions to on-going research. In addition to the research benefits,
the libraries described provide substantial practical value to organizations
that adopt them.
-
- This
topic is relevant to the Decision Technologies for Management track.
-
- Stefan
Voß is
full professor and director of the Institute of Information Systems at the
University of Hamburg. Research interests are in management science and
information systems. He is author of several books and numerous papers. He
serves as Associate Editor of INFORMS Journal on Computing and Area Editor
of Journal of Heuristics. He is consulting with several companies.
- Email:
stefan.voss@tu-bs.de
-
-
- AFTERNOON
SESSION 7
-
- COLLABORATION
ENGINEERING: REPEATABLE SUCCESSES WITH
Return
to Tutorials
- TEAM
TOOLS AND PROCESSES
- Robert O. Briggs,
Gert-Jan de Vreede, Jay F. Nunamaker, and Bob Harder
-
- Organizations exist
to create value that individuals cannot create alone.
Yet teamwork and process design is at best, an art.
The findings of collaboration researchers have illuminated the
cognitive foundations of collaboration, and upon those foundations, a new
approach is being built: Collaboration
Engineering. Its goal is to
design and deploy collaboration technologies and recurring collaboration
processes such that practitioners can attain predictable, repeatable
success. This approach seeks to move collaboration from art to a science to
an engineering discipline, so that ordinary people can achieve predictable,
repeatable success on mission-critical tasks that require joint effort.
-
- Collaboration
Engineering is in its infancy, but early results are exciting.
This tutorial will present the latest thinking on the following
elements of the approach:
-
- ·
A
Way of Thinking: A
conceptual model of collaboration that allow the designers of processes and
technologies to understand how the interventions they design are likely to
play out with the teams that use them.
- ·
A
way of working: the
tasks (steps, phases, activities) of a design methodology for collaborative
tools, embedding them in repeatable collaborative processes.
- ·
A
way of modeling:
Visual and verbal formalisms for representing subtle and
sophisticated collaborative processes quickly and simply.
- ·
A
way of controlling: the
managerial aspects of the methodology. It includes planning and feedback and
determines in which ways various persons and groups should interact over the
course of the design
-
- We will also go
hands-on with some state-of-the-art thinkLets and with the latest technology
for creating purpose-built collaborative applications on the fly.
We will tour a variety of collaboration technologies, and give
examples of how they can be integrated into repeatable processes like risk
self-assessments, requirements negotiation, and military
command-and-control.
-
- Robert
O. Briggs
is Research Coordinator for the Center for the Management of Information at
the University of Arizona, is on the Faculty of Technology, Policy, and
Management at Delft University of Technology in The Netherlands, and is
Director of R&D for GroupSystems.com.
Since 1990 he has investigated the theoretical and technological
foundations of collaboration, and has applied his findings to the design and
deployment of new technologies, workspaces, and processes for
high-performance teams. He and
his colleagues are responsible for numerous recognized theoretical
breakthroughs and technological milestones.
In his field research he has created team processes for the highest
levels of government, and has published more than 60 scholarly works on the
theory and practice of collaborative technology.
He earned his Ph.D. in MIS at the University of Arizona, and holds a
BS and an MBA from San Diego State University.
- Email:
bob@groupsystems.com
URL: www.groupsystems.com
-
- Gert-Jan
DeVreede is
full professor at the University of Nebraska, Omaha.
Previously, he was department head of the Faculty of Engineering,
Policy, and Management at the Delft University of Technology in the
Netherlands, where he is still an affiliated fellow.
He received his Ph.D. in Systems Engineering from Delft, where he
established a successful program of Group Support Systems research.
His research interests include the application of collaborative
technologies to facilitate organizational design activities, and the
adoption and diffusion of GSS in both Western environments as well as
developing countries. His
articles have appeared in various journals, including JMIS, JDS, Journal of
Creativity and Innovation Management, Holland Management Review, Database,
Group Decision and Negotiation, CACM, and Journal of Simulation Practice and
Theory.
- Email:
gdevreede@mail.unomaha.edu
- Jay
Nunamaker
is Regents and Soldwedel Professor of MIS, Computer Science and
Communication, and Director of the Center for the Management of Information
at the University of Arizona,
Tucson. His research on group
support systems addresses behavioral as well as engineering issues and
focuses on theory as well as implementation.
Dr. Nunamaker founded the MIS department (3rd and 4th nationally
ranked MIS department) at The University of Arizona and established
campus-wide instructional computer labs that has attracted academic leaders
in the MIS field to the university faculty. He received his Ph.D. in systems
engineering and operations research from Case Institute of Technology, an MS
and BS in engineering from the University of Pittsburgh, and a BS from
Carnegie Mellon University. He
has been a registered professional engineer since 1965.
- Email:
jnunamaker@cmi.arizona.edu
- Robert
Harder is a
Computer Scientist for the US Army Research Laboratory.
He serves as a researcher at the US Army Battle Command Battle
Laboratory at Fort Leavenworth, Kansas.
He is currently applying Group Support Systems to military decision
making processes envisioned for the future Army.
He earned his MS in Industrial Engineering at North Carolina
Agriculture and Technical State University and holds a BA from the
University of Florida in Mathematics.
- Email:
harderr@leavenworth.army.mil
-
-
-
AFTERNOON SESSION 8
-
-
- SIMULATION
FOR MEDICAL TRAINING
Return
to Tutorials
Alan Liu,
Mark Bowyer, and Gilbert Muniz
-
- Simulators
are effective tools for medical education.
A simulator’s virtual model replicates human anatomy and
physiology, permitting many medical conditions to be reproduced. This tutorial provides
an introduction to the field of computer-based medical simulation.
Topics include: a survey of current state-of-the-art, current research
issues, and case studies of current practice. The clinical perspective will
be emphasized. This tutorial is
designed for individuals who are new to the field, or who are interested in
recent developments.
-
- Alan
Liu is Project Scientist – Medical Simulation, and is involved in defining the SimCen’s research
directions and technical infrastructure. He developed simulators for pericardiocentesis and
Diagnostic Peritoneal Lavage that are world-firsts. Dr.
Liu has organized tutorials and
workshops on medical simulation, and was an invited speaker at the 2002 USMI
Health Studies forum in Washington D.C.
- Email:
aliu@simcen.usuhs.mil
-
- Mark W. Bowyer MD,
FACS, COL, MC, USAF,
is Acting Director, National Capital Area Medical Simulation Center.
He is also the Chief, Division of Trauma and Combat Surgery at USU
and Vice Chair (Air Force), American College of Surgeons Military Region
Committee on Trauma. Dr. Bowyer developed a simulation-based curriculum for
medical students starting surgical rotation, and has an ongoing interest and
involvement in validating medical simulators.
- Email:
mbowyer@simcen.usuhs.mil
-
- Gilbert M. Muñiz, is Director of
Administration, Director of Computer and VTC/ADL, National Capital Area
Medical Simulation Center. He is an authority in military medical
readiness and medical education simulation technology. He manages the
SimCen’s daily operations. Dr. Muñiz was a principal member managing the
design, and construction of the SimCen. He is the project manager for the
SimCen’s facilities expansion and the CAVE development project.
- Email:
gmuniz@simcen.usuhs.mil
-
-
- AFTERNOON SESSION 9
-
- Multilingual
Information Access
Return
to Tutorials
Fredric
Gey
-
- The growth of the
Internet and the World Wide Web have made available vast written and spoken
resources on a global scale from almost all countries in the world.
The languages represented on the web are a reflection of this
diversity of resources and to the serious searcher, documents in languages
other than English may provide unique news, cultural insight and altogether
different perspectives on our electronic world.
Moreover, most of the world's peoples speak a native tongue other
than English. This fact will
increasingly be felt on the Internet. According
to the Global Internet Statistics (as of January 2003), the majority of
internet users speak a
non-English language (63.5% versus 36.5%) as their native tongue
- (see http://www.global-reach.biz/globstats/index.php3
for details).
-
- This
tutorial will
cover the research sub-areas relevant to multilingual information access,
including cross-language search and use of machine translation software, as
well as the recent revival of statistical machine translation as a research
area of fundamental importance for intelligence activities. It will cover
cross-language search and retrieval evaluations that are currently taking
place for eight European languages and for Japanese, Chinese, and Arabic in
Europe, Japan and the United States. The
tutorial also will cover multilingual digital libraries, as well as
commercial applications of multilingual information access and machine
translation in software localization and patent search.
Fredric Gey
does research in cross-language information retrieval.
He was co-chair for the past two years of the DARPA sponsored English
Arabic retrieval evaluation at National Institute of Standards and
Technology. He co-chaired a
workshop on “Cross-Language Information Retrieval: A Research Roadmap”
attended by 50 researchers at the ACM Information
Retrieval Conference (SIGIR-2002) in Tampere Finland.
(see http://ucdata.berkeley.edu/sigir-2002 for overview and papers).
He has received NSF and DARPA grant funding for research in this
area. He has a Ph.D. in Information Science from the University of
California at Berkeley where he holds a research management position.
- Email:
gey@ucdata.berkeley.edu
-
-
- AFTERNOON SESSION 10
-
- ENTERPRISE
INFORMATION TECHNOLOGY ARCHITECTING:
Return
to Tutorials
- PRACTICE
AND CHALLENGES
- Stephen
H. Kaisler and Frank J. Armour
-
- This
tutorial presents the basic concepts and methodologies for the
discipline known as Enterprise IT Architecting within a
framework, structure, and methodology which the authors have
successfully applied at several businesses and US federal government
agencies, including the U.S. Senate, U.S. Capitol Police, the Bureau of the
Census, and the Architect of the Capitol. Examples from these
implementations will be provided to highlight the application of the
principles. Enterprise IT
Architecting is a necessary step for designing and developing a system of
information systems. It includes the definition of the business, work,
functional, information and technical perspective. As such, it is the
enabling approach for the system development process that builds complex
information systems.
-
- The objectives of
this tutorial are:
- ·
Explain
what enterprise IT Architecting
is and why it is important;
- ·
Discuss
the role of an enterprise IT architectural framework
- ·
Briefly
describe architectural IT frameworks
- ·
Describe
the elements of an enterprise IT architecture
- ·
Describe
an enterprise IT Architecting methodology
- ·
Address
the challenges facing enterprise architects
-
- Stephen H. Kaisler is currently the Information Technology Advisor to the
Sergeant At Arms of the U.S. Senate and an Adjunct Professor of Engineering
in the Department of Computer Science at George Washington University.
He has previously worked as an independent consultant, advisor to the
IRS, Chief Scientist at Analytics, Strategic Computing Program Manager at
DARPA, and research scientist at the CIA. He co-authored the Treasury
Information System Architecture Framework (predecessor to the Federal
Enterprise Architecture Framework) and the Treasury Architecture Development
Process. He received a BS in
Physics, MS in Computer Science from the University of Maryland, and a D.Sc.
from George Washington University.
- Email: skaisler1@comcast.net
-
- Frank Armour is a senior IT consultant and an adjunct faculty member in
the Kogod School of Business at American University, where he teaches
Information Technology courses in the MBA program.
Dr. Armour’s work and research includes enterprise information
technology architectures, requirements analysis, object-oriented development
and system development processes. He is currently consulting to both
government and private organizations on the effective application of object
oriented enterprise architecture development approaches. In a previous
position at American Management Systems (AMS) he had a joint appointment as
the lead Object Methodologist and as the Assistant Director of the Object
Technology Lab in AMS Center for Advanced Technologies.
He received his Ph.D. from George Mason University.
- Email:
farmour@worldnet.att.net
-
-
-
AFTERNOON SESSION 11
-
- Test
Management and Organization
Return
to Tutorials
Rex
Black
This tutorial on Test
Management will provide the attendee with an overview of managing and
organizing test subprojects that occur within the larger context of the
software lifecycle. After a
brief discussion about why organizations test and what value a test
subproject can add, we will discuss how testing fits into the larger
project and organizational context. This
is critical, because misalignment of testing subprojects with the larger
context and the project management team’s expectation—not technical
test team incompetence as might be expected—is the leading cause of test
subproject failure. The
second half of the class will focus on tactics for creating this
alignment. We’ll look at
the critical areas of scoping the test effort and defining realistic
budgets and schedules to address that scope.
Finally, we’ll discuss some of the challenges and key activities
associated with managing a test subproject.
- Rex
Black is
Principal Consultant of RBCS, Inc., a company that provides world-wide
consulting, training, and project staffing services for clients, including
Bank One, Cisco, Dell, Hitachi, and Schlumberger.
In addition to papers and speeches for international conference, Mr.
Black’s books are Managing the
Testing Process and Critical
Testing Processes, Vol. I and II.
Email: RexBlack@itx.netcom.com
-
-
- AFTERNOON
SESSION 12
-
- FUNDAMENTALS
OF COMPUTER AND NETWORK SECURITY
Return
to Tutorials
Paul
W. Oman
-
- Data from the
Carnegie Mellon Computer Emergency Response Team (CERT) and the FBI shows an
exponential growth of cyber intrusions and attacks worldwide.
Attacks have be launched against businesses, utilities, banks,
E-commerce, telecommunication switching centers, Internet service providers,
government agencies, and even hospitals and 911 call centers.
There is no safe harbor. Researchers
in computer science and cyber security understand the frailties of our
digital infrastructures, but have done a poor job sharing those concerns and
issues with researchers from other disciplines.
-
- This
tutorial
presents the fundamental issues of computer and network security in a manner
in which non-computer scientists can understand.
Researchers in health-care, business and E-commerce, workplace
management and collaboration, and business data processing need to
understand the vulnerabilities within their digital systems, and the
technologies available to mitigate the risks of cyber intrusion or attack.
The tutorial starts by looking at the range and growth of cyber
offenses documented by CERT and the FBI.
We then define terms like hacking, cracking, hacktivism, sniffing,
snorting, and other offensive means of attack, with accompanying examples
and demonstrations. Then we
concentrate on defensive technologies like proper password protection,
low-cost authentication devices, biometrics, and cryptology.
From there we migrate to network security technologies including
remote authentication techniques, email and web security, devices for modem
and network cryptography, and virtual private networking.
-
- Hands on displays
and demonstrations will show participants how attack-defend scenarios unfold
in the real world. Attendees
will gain (1) an appreciation of the problem and need for cyber security,
(2) a much better understanding of how to safeguard their own personal and
professional computer networks, and (3) ideas for incorporating security
issues into their own research venues.
Paul W. Oman is a Professor of
Computer Science at the University of Idaho.
He is currently working on cyber security with grants from NSF and
NIST. He has published over 100
papers and has received several awards for teaching and speaking at
conferences.
- Email:
oman@ucidaho.edu
-
-
-
AFTERNOON SESSION 13
-
- CIVIC
INNOVATION AND DEMOCRATIC DESIGN
Return
to Tutorials
Beth
Noveck
-
- Internet technology
has revolutionized every aspect of our private lives but had limited impact
on our lives as public citizens. Even
after a decade of living with the communications potential of interactive
technology, we have not yet begun to realize the democratic benefits of this
technology. Democratic
understood, that is, not as political ideology but as a way of life where
citizens, co-workers and neighbors pursue self-governance through
deliberative and informed participation in decision making. Making better use of technology for civic engagement
requires knowledge of how technology, law and policy work together and the
ability to synthesize this knowledge into the design of innovative tools to
promote democratic practice.
-
- This
inter-disciplinary tutorial
will lay the foundation for the E-Democracy Mini-Track by providing
participants with a hands-on introduction to innovation in electronic
democracy. The tutorial
will have three, connected parts. The morning will survey the legal and policy issues related
to e-democracy and innovation. We
will focus on telecommunications regulation, intellectual property law and
the emerging law of e-government. In
order to develop technology for democracy, we need to address what we mean
by democracy. We will therefore
provide an introduction to democratic theory.
During the rest of the afternoon, we will “do democratic design,”
first by applying our new understanding of democratic theory to the critique
of existing civic technologies and then doing our own democratic design
process by thinking through the design of a new application for citizen
participation. The “case
study” and background readings will be distributed to participants prior
to the conference.
-
- Beth
Noveck
directs the Democracy Design Workshop at New York Law School where she
teaches the Law of E-Government and E-Democracy, intellectual property and
innovation and the law. Professor Noveck’s recent projects include the design of
civic deliberation software, an interactive database for democratic practice
and the Playgroup to design a massively multi-player democracy game.
- Email:
bnoveck@nyls.edu