Teaching
This is a listing of traditional lecture-style courses that I teach at Indiana. In addition to these lecture-style courses below, I am also instructor for INFO 591, INFO 790, INFO 798, INFO 890, and INFO 490.
I have worked with teams in INFO 491 but not every year. I have supervised students at every level, from high school emerging scholars to doctoral researchers.
Traditional in-person sixteen week courses for the 2020-2021 academic year through 2023-2024.
Introduction to Mathematical Foundations of Cryptography
Spring
A course that starts with substitution ciphers and ends with elliptic curves. If you learn nothing other than not to write your own, then you have learned the most critical rule of crypto. Crypto means cryptography.
Economics of Security
Fall
Economics of security and privacy focuses on incentives and behaviors. Only three weeks of cryptocurrency with a focus on its uses in crime, and the privacy (or lack) of its transactions.
Classes for the 2019-2020 academic year
Legal & Social Informatics of Security.
Spring
The class for Luddy students enrolled in the Informatics Security cognate, in the Security minor from across the University, and is often chosen by students in the
Intelligence minor. Students from the Hamilton Lugar School of Global and International Studies enrolled in the
Cybersecurity and Global Policy program. This course combines lectures, readings, and in-class hands-on learning. Because of the pandemic, the normal group project component was replaced with a series of virtual seminars
with leaders from the public and private sectors.
Classes for the 2017-2018 as well as 2018-2019 academic years
INFO 525, INFO 609, and CS B649 were offered in class, in person as well as online. The courses were co-created with the students so no posted public syllabi.
These are canvas-intensive years.
Classes for the 2016-2017 academic year
Security & Privacy in the Internet of Things
Fall
The core class for students entering security covers the material necessary for security literacy. In addition to covering the majority of a well-regarded textboook, the course includes weekly applied labs, and one semester-long deep dives into a student-selected topic.
I525 Economics of Information
Security
Spring
Please see listings below for a sense of the course.
Classes for the 2015-2016 academic year
Security for Networked Systems
Spring
The core class for students entering security covers the material necessary for security literacy. In addition to covering the majority of a well-regarded textboook, the course includes weekly applied labs, and one semester-long deep dive into a student-selected topic.
I525 Economics of Information
Security
Spring
The previous descriptions (see below) are still applicable. However, some topics and all dates will change.
Classes for the 2014-2015 academic year
I525 Economics of Information
Security
Fall
The literature on which the course is based addresses human, organizational or social questions about security and privacy behaviors of people, groups, firms or even nations. The fundamental pedagogical approach in this class is that of a research seminar, with after an introductory period the class is based on shared learning. Students are expected to come prepared to answer the basic questions.
Classes for the 2013-2014 academic year
I525 Economics of Information
Security
Fall
The focus is on economic basis as applied to security and privacy. Obviously, this course was in the fall for one semester and the result was not more publications. Thus the return to the spring for the smooth continuity of the MSSI curriculum.
Classes for the 2011-2012 academic year
I525 Economics of Information
Security
Fall
This course was moved to the fall to enable an improved publication window for the students who choose to work on a research paper as opposed to the weekly summaries. Based on previous feedback, the course now begings with an example of security in the world of global power, then it moves to economic definitions, and then to the research papers that are the core of the course. Economics of information security addresses security from organizational, behavioral, and commercial perspectives. The course is based on a series of readings combining classics and cutting-edge work. There are two tracks in the course. One is for weekly essays; the other track requires a research paper. The student may consider both tracks by completing the weekly essays until February 4th, when the topic and abstract for the paper are due.
I330 Organizational Informatics of Security
Spring
Organizational Informatics includes theories of organizations and an introduction to analytical tools with emphasis on intuition rather than application. Organizational Informatics of security requires understanding security as a strategic technology, rather than as a neutral technology. Social informatics of security requires understanding security as a technology of control, as one element of a larger cultural, social or political reality.
Classes for the 2010-2011 academic year
I525 Economics of Information
Security
Spring
Economics of information security addresses security from organizational, behavioral, and commercial perspectives. The course is based on a series of readings combining classics and cutting-edge work. There are two tracks in the course. One is for weekly essays; the other track requires a research paper. The student may consider both tracks by completing the weekly essays until February 4th, when the topic and abstract for the paper are due.
Classes for the 2009-2010 academic year
I525 Economics of Information
Security
Fall
Economics of information security is not an exercise in analogy. It is the application of the tools of economics, in particular modeling, measuring, and experimentation in the tradition of economics, to computer security. The class has a set of basic topics, and each topic will be explored and examined according to the interest of the students.
Health, Technology and Aging
Fall
undergraduate: I399/C325
graduate: C625
MW 11:15-12:30
The combination of an aging population and ubiquitous technology creates the potential to help elders stay at home longer, be more productive, and maintain autonomy. This class focuses on the creation of technology-based businesses that use emerging technologies to help elders. Andriod mobile phones will be provided to up to 20 teams of innovators. The final project presentations will be to a group of entrepreneurs who will evaluate the technological innovation and business case as well as the presentation itself. Informatics students should sign up for INFO 399. Sponsored in part by Google's educational initiative, students with all levels of programming skill (from zero to guru) are welcome to participate.
I130 Introduction to Security Informatics
Fall
An introduction to security which focuses on the topics that are part of the Informatics security minor. The professors who teach in the required and elective courses in the minor will introduce their subjects in the course.
Classes for the 2008-2009 academic year
I525 Economics of Information
Security
Fall
Economics of information security is not an exercise in analogy. It is the application of the tools of economics, in particular modeling, measuring, and experimentation in the tradition of economics, to computer security. The class has a set of basic topics, and each topic will be explored and examined according to the interest of the students.
I130 Introduction to Security Informatics
Fall
An introduction to security which focuses on the topics that are part of the Informatics security minor. The professors who teach in the required and elective courses in the minor will introduce their subjects in the course.
I330 Organizational Informatics of Security
Spring
An introduction to security which focuses on the topics that are part of the Informatics security minor. The professors who teach in the required and elective courses in the minor will introduce their subjects in the course.
I130 Introduction to Security Informatics
Spring
An additional session of the introduction to security course. As in the fall, this course focuses on the topics that are part of the Informatics security minor. The professors who teach in the required and elective courses in the minor will introduce their subjects in the course. In both semesters, there will be at least one professional guest speaker to address the issue of careers in security informatics.
Classes for the 2007-2008 academic year
I525 Economics of Information
Security
Fall
Economics of information security is not an exercise in analogy. It is the application of the tools of economics, in particular modeling, measuring, and experimentation in the tradition of economics, to computer security. The class has a set of basic topics, and each topic will be explored and examined according to the interest of the students.
Health, Technology and Aging
Fall
undergraduate/graduate: C325/C625
MW 11:15-12:30
The combination of an aging population and ubiquitous technology creates the potential help elders stay at home longer, be more productive, and maintain autonomy. This class focuses on the creation of technology-based businesses that use emerging technologies to help elders. The final project presentations will be to a group of entrepreneurs who will evaluate the business idea as well as the presentation itself. Informatics students should sign up for INFO 399.
I130 Introduction to Security Informatics
Fall
An introduction to security which focuses on the topics that are part of the Informatics security minor. The professors who teach in the required and elective courses in the minor will introduce their subjects in the course.
I330 Organizational Informatics of Security
Spring
An introduction to security which focuses on the topics that are part of the Informatics security minor. The professors who teach in the required and elective courses in the minor will introduce their subjects in the course.
I130 Introduction to Security Informatics
Spring
An additional session of the introduction to security course. As in the fall, this course focuses on the topics that are part of the Informatics security minor. The professors who teach in the required and elective courses in the minor will introduce their subjects in the course. In both semesters, there will be at least one professional guest speaker to address the issue of careers in security informatics.
Classes for the 2006-2007 academic year
I537 Social Informatics of
Security
Fall
Identity, trust, privacy, and therefore security are socially constructed. Privacy is contested, and identities are stolen because of existence of lack of information control. This course is for graduate students interested in an examination of security technologies in terms of social context, power contests, and human interactions. Undergraduate students who complete I303 in the fall may take I537 as the second required 300 level elective in the spring.
I330 Organizational and Social
Informatics of Security
Spring
Organizational Informatics includes theories of organizations and an introduction to
analytical tools with emphasis on intuition rather than application. Organizational Informatics of security requires understanding security as a strategic technology, rather than as a neutral technology. Social informatics of security requires understanding security as a technology of control, as one element of a larger cultural, social or political reality.
I130 Introduction to Cybersecurity
Spring
An introduction to the study of cybersecurity with particular focus on the undergraduate Informatics cognate. The professors who teach in the cognate will introduce their subjects in the course. This course is for one credit hour. This will be the second year the course is offered.
I130 Introduction to Cybersecurity
Fall
An introduction to the study of cybersecurity with particular focus on the undergraduate Informatics cognate. The professors who teach in the cognate will introduce their subjects in the course. This course is for one credit hour. This will be the second year the course is offered.
Classes for the 2005-2006 academic year
Organizational
Informatics
Organizational Informatics includes theories of organizations and an introduction to
analytical tools with emphasis on intuition rather than application.
Introduction to Cybersecurity
An introduction to the study of cybersecurity with particular focus on the undergraduate Informatics cognate. The professors who teach in the cognate will introduce their subjects in the course. This course is for one credit hour.
Economics of Information
Security
The language of computer security suggest the range of analogies. A virus
is a medical problem, while an invasive worm brings to mind the problems of
ecosystems. Computer crime and intrusion detection argue that the problem
is one of criminal behavior. Firewalls suggest that the network itself is
a hostile force, that must be segregated into the conflagration beyond and
the safety within. The construction of demilitarized zones (DMZs) between
trusty local area networks and the wider network beyond argues that it is
war, not flames, on the network. Yet for all that is involved in computer
security, and all that is lost, there is a potential measure: dollars.
Classes for the 2004-2005 academic year
Organizational
Informatics
A partial listing of the course taught by myself and Bill Aspray for undergraduates
in Informatics.
Classes for the 2003-2004 academic year
STM 483: Information Management
Information management begins with an introduction to the unique economic
implications of digital on-line information. The course provides an understanding
of the concepts of managing digital information, then an application of these
concepts in the final.
STP 308: Technical Design and Human Values
How are value and political choices designed into technology? How do distinct
values emerge from the same technologies? How can policy makers recognize
values and prevent hard-wired technological value choices? This class begins
with two weeks of theory, but the focus of this class is a series of information
technology case studies. 2001-2002 was the first year this course was offered,
under the name Design for Values.
STP 301:
Security and Privacy
Technology is being presented in popular discourse as a savior from the threats
of terrorism, and conversely as threat to democracy with the hard-wiring of
big brother. Accountability and anonymity seem to be inherently opposed. The
course identifies necessary trade-offs, and illustrates that many of the current
security and privacy exchanges risk reducing both. Wireless identifiers on
every article of clothing and the Federal Total Information Awareness program
are topics in this course as they will be integral parts of our lives in a
few years. Framing the class discussion are the basics of choosing security
technologies for federal systems.
CANCELED FOR 2003-2004
STP 304:
Telecommunications Modeling Commerce
Who bought the first fax machine? How did e-mail arise? This course will focus
on systems with feedback. The course will begin with an explanation of feedback,
and then a series of lectures will focus on specific mechanisms for feedback
in the economic and technical realm. Readings and cases will provide real
world examples. Dynamic cost-based modeling with technical uncertainty. Technical
change presents an interesting set of problems for quantitative modeling.
This course was originally offered as "Information and Telecommunications
Protocols: Modeling and Policy Analysis" in 2002. Analysis of technology
policy problems in developing countries is a rich source of material for this
project-based course.
Classes for the 2002-2003 academic year
During this year I was on research leave, therefore I taught only a core
course on analytic methods Analytic
Frameworks for Policy.
Classes for the 2001-2002 academic year
STP 304:
Internet Commerce
What good are free goods, and what the business models for free software?
What business models survived the boom? Why did other fail? What policy choices
are being and have been made to balance and tilt the information markets?
I developed this course in 1998-1999.
STP 308: Design
for Values
This course focused on how value choices are designed into or emerge from
the design of technologies. In particular this class will focus on protocols
rather than the interfaces of particular implementations. 2001-2002 was the
first year I offered this course.
STP 301: Communications
Policy
Governance has had a critical role in shaping modes and methods of communications
from Charlemagne to Prince Charles. In return, technologies have altered social
patterns, including those of governance. In this course the continuing threads,
repeating patterns, and new twists of communications technologies are examined.
This course was based on the introduction to information policy two years
previous.
Classes for the 2000-2001 academic year
STP 304M: The Mechanisms and Methods of Internet Commerce
offered in Spring 2001. Updated from the previous year.
STP 308: Information
and Telecommunications Protocols: Modeling and Policy Analysis
offered in Spring of 2001. Listed as STP 308, ESD 127 at MIT and DHP P232
at the Fletcher School. Analytic modeling of technical uncertainty.
STP 301: Introduction
to Information Policy for Fall of 2000.
Classes from the 1999-2000
STP 308: Internet Commerce: Technologies and Issues
Much of the material in this course can be found in Trust
and Risk in Internet Commerce published the following year.
STP-307: Business
and the Internet: Strategy, Law and Policy
This had been the only course previous taught on IT and policy. I took over
this course for one year and then developed more focused courses. In part
because this course was developed to ask the question about the potential
of the Internet. By 2000, it was obvious this topic needed more than an overview
course.