Mining traditional and social media, including text, photos, and video for anticipatory analysis, strategic planning and operation.
Design and develop a team-based professional development (PD) model to help middle and high school teachers create and implement interdisciplinary, computing-infused lessons using equitable pedagogies.
Work supported by NSF STEM+C Grant Award #1742332
Collaborative Research: Integrating computing in STEM: Designing, developing, and investigating a team-based professional development model for middle- and high-school teachers
Our world today is changing rapidly with the advent of smartphones, self-driving cars, smart meters, and even smart houses, where everything is connected to the Internet. In this new world of Internet of Things (IoTs), cybersecurity has become a very important concern in public, private, and government sectors. Cybersecurity focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction, where unauthorized access can be in the form of cyber-terrorism, cyber-warfare, or cyber-espionage [https://www.paloaltonetworks.com/documentation/glossary/what-is-cyber-security]. Strong actions need to be taken to protect ourselves from these massive threats.
Under the NICE framework and other CNAP educational initiatives, it is clear that the strongest action of all is the right education for the users and developers of the technology that can potentially come under attack. It is important to change the mindset of future generations with respect to cybersecurity, and make it an integral part of their education. The vision behind this goal is to avoid security being an afterthought, and to work towards producing cybersecurity-aware generations. Thus it is critical to invent creative ways to provide the correct education to our students at all levels.
For this huge and very important task, I am working with colleagues at The Citadel to revise our CS curriculum to embed cybersecurity principles and concepts in all our CS courses required for the major. We have already develop a proposal for both our beginning programming classes – CSCI 201 and CSCI 202.
The results are published in the following:
In addition, I have modified my Database Design to include a heavy emphasis on database security by including in-depth discussions on SQL Injections, Database Administration, and User roles and privileges, and database security models.