Find us on
Computation Privacy and Regulatory Compliance Mechanisms for the Cloud
Keynote: Securing IT in Healthcare: Part III
ISTS Information Pamphlet
Participants in the most recent ISTS High School Summer Security Workshop were asked to complete an outreach project of their own design to spread the word about cyber security. From posters, presentations and articles to an encryption program, see what they produced.
ISTS and the Neukom Institute offer leave-term funding each term to support an undergraduate, or graduate student, in pursuing an unpaid internship with a non-profit.
|George Boateng '16|
George Boateng '16 interned during the Summer 2014 term in Ghana implementing a project he developed to encourage practical application of learned concepts. The program, "Project iSWEST 2014," (Innovating Solutions with Engineering, Science & Technology) is a summer program in Ghana to get high school students solving problems by inspiring them to be creative, equipping them with the requisite tools, soft and hard – basic science, engineering and technology (SET) skills - while coaching them to develop innovative solutions to problems in their communities. George recruited a highly motivated group of young Ghanaians, "Team Nsesa," to run the course, the goal of which was to promote a culture of innovation and problem solving (Nsesa means change in Akan).
For more information about Project iSWEST and Team Nsesa, click here.
|Peter Saisi '16|
Peter Saisi '16 spent Summer 2014 working with the County Government of Bungoma, Kenya, teaching Computer Studies and training Computer Studies teachers. He taught a pilot Computer Studies course to primary school children, introducing computers to children who have never handled them before and teaching word processing, spreadsheets and elementary programming to children who have used computers before. Additionally, he assisted a government instructor to train Computer Studies teachers and help them improve their proficiency to meet the government required standard. Based on these experiences, Peter created a report of his findings to the County Government to be considered in the crafting of a new IT based curriculum. Peter's internship was co-funded by the Tucker Foundation.
In their recently published 2014 Yearbook, the International Medical Informatics Association named Professor Sean Smith's Journal of the American Medical Informatics Association paper one of the best papers of 2014. In that paper, Sean and Professor Ross Koppel of Penn built a taxonomy of usability problems in health IT.
|Nate Fick '99 (Photo by Eli Burakian '00)|
"Nobody has a fortress anymore. The perimeter is not just gone—it's burned to the ground," said Nate Fick '99 in his keynote address at Securing the eCampus 2014, a conference on information security in higher education held July 15-16. About 60 people attended presentations on risk management, regulations and policy, disaster recovery, emerging global cyber-security threats, security awareness, and more. Securing the eCampus was co-hosted by ISTS and Dartmouth College Information Technology Services. Click on the title to read the full article: Network Security: 'The Barriers to Entry Are Very Low'.
"Dartmouth's Sergey Bratus is on a mission to protect the Internet from cyber attacks and other criminal enterprises. It's a big job." Thus begins the recent article from Dartmouth Now about Dr. Sergey Bratus, Research Assistant Professor in the Department of Computer Science. Click on the title to read the full article: Dartmouth Researcher Tackles Ubiquitous Internet Insecurity.
|Professor Smith with a cantenna
Photo by Eli Burakian '00
With the start of the fall term at Dartmouth, directorship of the Institute for Security, Technology, and Society transitioned from Denise Anthony, Associate Professor of Sociology, to Sean Smith, Professor of Computer Science.
A computer scientist with extensive expertise in information security, Professor Smith came to Dartmouth in 2000 from IBM. "An integral part of ISTS since its inception, Professor Smith's research spans a wide variety of subjects, from protection of the power grid to healthcare IT security to the psychology of misperception and how it relates to IT security. His efforts always have been at the leading edge of security research. I am extremely pleased that Professor Smith has accepted the directorship of ISTS," said Dartmouth Provost Martin Wybourne.
Photo by Eli Burakian '00
Former ISTS Director and current PI of the Trustworthy Health and Wellness (THaW) project, David Kotz, has been appointed to the Government Accountability Office's Health IT Policy Committee. Comptroller General of the GAO, Gene Dodaro announced the appointment and noted that Professor Kotz will fill the privacy and security expertise role on the committee. In the GAO press release Dodaro stated, "In developing policy for health information technology, it's important to take into account expertise related to privacy and security and to health care research as well as the views of health care workers who are the users of HIT."
In September 2013, a joint team comprised of ISTS affiliates and Clemson University researchers were awarded $1.5M over three years to further their research on mobile health technology. Awarded by the National Science Foundation's Computer Systems Research program, the Dartmouth portion of the project, called "Amulet", is led by Former ISTS Director and Champion International Professor of Computer Science David Kotz. Clemson's team is led by former ISTS postdoctoral fellow Jacob Sorber.
As described on their website, the Amulet project team "envisions a simple wristband that you can wear anywhere, any time, in any activity, which helps you monitor and manage your health. Unlike popular fitness trackers, this wristband talks to your other health and fitness devices, so they know it's you using them – and gives you a quick and easy way to approve the transfer of health information from one device to another or to your health record. It can help track your use of medications and remind you when it's time for the next dose. And, the wristband can provide critical health data to responders if you experience a medical emergency. It works with health-related apps on your smartphone or even on your smart television – but only when you and your Amulet are present and give permission."
Read more on the Amulet website.
Trustworthy Health and Wellness (THaW). This NSF-funded, Frontier-level project tackles many of the fundamental research challenges necessary to provide trustworthy information systems for health and wellness, as sensitive information and health-related tasks are increasingly pushed into mobile devices and cloud-based services. THaW is developing methods to authenticate clinical staff to tablet computers in a continuous and unobtrusive way, and to provide patients a usable way to control the information that mobile sensors collect about them.
Trustworthy Cyber Infrastructure for the Power Grid (TCIPG). As noted on the TCIPG website, "Researchers from the University of Illinois at Urbana-Champaign, Dartmouth College, Cornell University, the University of California at Davis, and Washington State University are together addressing the challenge of how to protect the nation's power grid by significantly improving the way the power grid infrastructure is built, making it more secure, reliable, and safe." This project is funded by the Department of Energy.
|Professor Locasto works with SISMAT students
Photo by Nick Gannon '15
Secure Information Systems Mentoring and Training (SISMAT). ISTS ran the SISMAT program for the sixth time this summer. The program aims to meet regional and national needs through a program of mentoring and training in cybersecurity.
ISTS - Neukom Internship Grants. ISTS and the Neukom Institute collaborate to offer leave-term funding each term to support an undergraduate, or graduate student, in pursuing an unpaid internship with a non-profit.
A video released by Dartmouth provides an overview of the cutting edge research and education and outreach efforts at the Institute for Security, Technology, and Society (ISTS). These efforts are designed to address the most critical issues affecting information security and privacy and the societal impact of information and communication technologies (ICTs) in an increasingly networked world.
View the slideshow at Flickr
Last Updated: 11/5/14