Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events  

Jenna Weins

Leveraging Data Across Time and Space to Build Predictive Models for Healthcare-Associated Infections
Jenna Wiens
The University of Michigan
Oct 31, 2014
1:45pm - 006 Steele 

cybersec awareness month

My Computer Ate My Data, Changed My Students' Grades and Stole My Money
OR
What all faculty need to know about securing their information
DCAL, 102 Baker Library
Nov 4, 2014 12-1:30pm
Registration required

 

 

 

Recent Talks  

Radu Sion

Computation Privacy and Regulatory Compliance Mechanisms for the Cloud
Radu Sion
Stony Brook University and Private Machines Inc.
May 28, 2013

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013

 

Newsletter 

ists newsletter fall 2013

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeEvents > SISMAT >

Applying to SISMAT


sismat2014This year we will be accepting applications on a rolling basis from December 15, 2013 through March 1, 2014. Similarly, we will notify people on a rolling basis of their status. 

We are seeking exceptionally motivated student/faculty pairs with an interest in systems security and the real-world application of cryptology. SISMAT is geared toward undergraduate participants who can expect to successfully complete an internship and conduct an independent academic project, and toward professors who are interested in improving the state of security education at small colleges.

Prerequisites

More specifically, a qualified student applicant:

  • Will be a junior or senior in the fall of 2014. (Although exceptional rising sophomores may apply, the program is targeted at students nearing graduation.)
  • Has completed the core systems curriculum at their institution, which will likely entail at least two programming classes, a discrete math class, and one or more "systems" courses (e.g., advanced programming, programming in the large, operating systems, databases, or networking). Equivalent technical experience will be considered in lieu of formal coursework.
  • Has identified and received a commitment to participate from a partner CS or Engineering faculty member at their home institution.
  • Can commit to attending the two-week training course in June (which starts on Tuesday, June 17th and ends on Friday, June 27th).
  • Can commit to completing an internship in secure systems in the summer of 2014.
  • Can commit to completing an independent research, design, or reading course during the 2014-2015 academic year.

Applications

To apply for the the SISMAT 2014 program, undergraduate candidates should submit the following information by the deadline.  Please submit the application form online and the rest via a single email to ISTS.  There are two phases to our review process: your application materials and, for those that the review committee decides to move to the next round, a short interview.  There are four parts to the application process that are the responsibility of the student.

  1. Complete the application form
  2. A copy of your transcript. You do not need to submit official transcripts.
  3. A cover letter explaining in 2-3 pages why you are interested in computer security.
  4. Your resume.  (Please note that your resume will be sent to potential internship sponsors.)
  5. Optionally, you may include any additional information you would like us to know. (However, we discourage the submission of code samples or lengthy articles, as we will not be able to consider them in detail.)

Additionally, your designated Computer Science or Engineering faculty member must submit a letter of support and recommendation stating his or her interest in serving as your partner and mentor throughout your participation in SISMAT, particularly for your independent project in the 2014-2015 academic year.

The letter need not propose a specific research topic, but should address the faculty member's ability to mentor given other professional responsibilities (such as teaching load, sabbatical terms, etc), and his or her personal motivations for participating with you in SISMAT.

Faculty members should include their contact information (email, phone, etc.), and email the letter by the deadline to ISTS.

Please do NOT submit a hard copy of this information.

For those applicants that the review committee decides to move forward in the application process, there will be short (~15 minute) interviews conducted via Skype, Google+, or teleconference.

Attachment Formats

If possible, we ask applicants and partner faculty members to submit letters and other attached materials in .pdf format. However, other formats (such as .rtf or .doc) are acceptable.

Last Updated: 2/25/14