"There is a demand to explain cyber security concepts in a way that is understandable to the general public," says Csilla Farkas, a computer science professor in the College of Engineering and Computing. "We can’t expect business leaders to become cyber security experts, but the experts can learn to express cyber security threats in such a way that business executives can make informed decisions."If you are interested in cybersecurity, apply for our cybersecurity specialization or certificate and drop by the Cybersecurity club. The full article: Imagine you’re a CEO trying to decide how much budget to devote to cyber security for your company. News headlines about disruptive hacks and cyber attacks have you worried, and the detailed technical explanations from the IT staff aren’t helping. "There is a demand to explain cyber security concepts in a way that is understandable to the general public," says Csilla Farkas, a computer science professor in the College of Engineering and Computing. "We can’t expect business leaders to become cyber security experts, but the experts can learn to express cyber security threats in such a way that business executives can make informed decisions." To that end, Farkas is using a grant awarded jointly from the Center for Teaching Excellence/Carolina Leadership Initiative to introduce a stronger communications component to a cyber security course. The idea was to introduce the students to leadership characteristics and public speaking attributes --- then have the students demonstrate those skills in a "shark tank" competition. "Students worked in small groups developing novel security technologies. In addition to detailed project reports, each group presented its proposed technology before a panel of external judges to obtain funding," Farkas said. "The catch was that some of the panel members were not computing professionals and the students couldn’t use any technical jargon to convince them about the significance of their research. I think the students improved a lot in communication skills." Computer information systems major David Brookins came into the course with a rudimentary understanding of cyber security issues and personal experience with attempting to explain the importance of safe browsing habits to his mom. "The course was structured in a way that explained the core concepts to us early on," he said "Once you have a thorough understanding of something, breaking it down to its core concepts and explaining those in a way a lay person would understand becomes much easier." "Over the break, for example, I was able to break down the idea behind a Distributed Denial of Service Attack to my mom to explain why I couldn't log into my Playstation." Student Aaron Hein liked the challenge of the course, especially the presentation to the judges. That exercise will probably become a routine reality when he joins the work force, he said. "The reality today is that business people hold the purse strings, and even in taking a corporate job one must often sell ideas, designs or the need for security to the people who have to pay for it," Hein said. "It's often not an easy sell. Dr. Farkas included that problem in with her security class in a meaningful way and gave us some insight into how to prepare for that type of presentation."
She started at Netscape as an interaction designer, went on to Yahoo where she established the company’s user experience and design practice, then joined Google as head of design. With that foundation, Au built her career as a major strategist in the Web industry. Now 20 years after graduating from Carolina, she has taken another career leap as a partner for a venture capital firm, while also purposefully finding a place of balance in her life.Her linkedin profile .
If you have an older parent living on their own, would you feel more comfortable if you had a way to monitor them and their living conditions from afar? Our next guest says she hopes to start testing just such a system soon by installing robot monitors in assisted living centers in the Midlands of South Carolina. Mike Switzer interviews Dr. Jenay Beer.You can find our more about her research by visiting her ART LAB.
"We've created education games in the past, but we want to see how to make them better. And how to actually use this where you can augment classrooms, augment therapies. And basically, better people's lives through technology."
"People want to play games. People don't like to sit there, if they're learning a language, and go through flashcards one after the other. They want to do something exciting and something fun. And if you put together those actions with the message - in other words, what you're trying to teach with it- you end up teaching people and motivating them at the same time. " says Shepherd, a computer science instructor at the University of South Carolina.
Mobile computing has traditionally implied mobile clients connected to a static infrastructure. This project breaks away from this point of view and envisions the possibility of injecting mobility into infrastructure. The PIs envision a WiFi access point on wheels that moves to optimize desired performance metrics. Movements need not necessarily be all around the floor of a home or office, neither do they have to operate on batteries, or connect wirelessly to the Internet. At homes, they could remain tethered to power and Ethernet outlets while moving in small areas (perhaps under the study table). In offices of the future, perhaps APs could move on tracks installed on top of false ceilings. The cloud could perhaps coordinate their mobility based on how users move within the environment, or how traffic and interferences change in the network. This project explores the viability of this vision and will present thorough measurements from various home/office environments. Initial measurements with moving WiFi APs in residential and enterprise environments exhibit promise. Analysis finds that complex multipath characteristics of indoor environments cause large fluctuations in link quality even when the antenna moves in the scale of one foot. Mobile APs can leverage this spatial variation by relocating to a pixel that is strong for its own clients and yet weak from its interferers. When multiple APs are coordinated by a central controller, the motion paths of the APs need to be jointly planned to optimize global network parameters. Heuristics will be developed that first assume the knowledge of AP locations; based on the outcome of this heuristic, the assumption might be relaxed. The project will also consider client mobility and how APs adapt to them, perhaps based on the quality of channel changes available from channel state information (CSI) in today's WiFi cards. If mobility proves to offer additional gains despite the advances in current technologies, robotic wireless networking might become an important and exciting direction of the future.
A computer science and engineering doctoral student at The University of South Carolina recently received an honor that will hopefullyplace her among the country’s most desirable engineering graduates in the future. The National Consortium for Graduate Degrees for Minorities in Engineering and Science, Incorporated named Karina Liles a GEM Affiliate Fellow. GEM’s mission is to broaden participation of minorities in Science, Technology, Engineering and Mathematics (STEM) fields at the master’s and doctoral levels. The national organization assists companies throughout the United States in providing graduate fellowships to minority students from communities where such talent is largely untapped. Liles is from Bennettsville, South Carolina. She received her undergraduate degree in computer science from Spelman College and then earned a Master of Education in Educational Technology from USC before beginning her doctoral study in the USC College of Engineering and Computing. “In high school, I began developing computer games for my three year old sister to help her learn her letters and colors, “ said Liles. “I quickly realized that I enjoyed working with computers and had a talent for it. I knew I needed a formal education which is where my true passion for computers, robots and technologies blossomed.” Liles now works alongside Dr. Jenay Beer in the Assisted Robotics and Technology (ART) Lab in the Department of Computer Science andEngineering. Her research is focused on creating and using robots as teaching assistants for middle school educators. She is also assisting with the programming of a robot to help music therapists who work with children with special learning needs. “We are certainly not trying to replace classroom teachers or therapists but rather, we hope the robots can assist these professionals. Students of all ages seem to be interested in the robots and respond to them with enthusiasm. We hope that helps in the learning process.”
If we are successful, computers could be used to recognize signs of road rage or intoxication in automobile drivers or to help teach autistic children how to interpret and respond appropriately to facial cues.
Zoom and AI Institute, Seminar Room 529