Technology Design and Policy
College of Information Science & Technology, Penn State
Mobile User Experience and Design
Instructor: Erika Poole, 2011Course Description:
We work, learn, socialize, stay informed, play, get entertained, and keep track of personal agendas with and through mobile devices. Smartphones have become integral to our life. But what motivates people to download and use a mobile app? When and why do people stop using an app? What works well and what doesn’t? What is the process of designing the user experience on mobile devices? How do we make better decisions and how do we communicate our design ideas? In this course, we will focus on the users' experience of mobile apps; we will design, prototype, and evaluate mobile apps from users' perspectives. We will discuss key aspects of the mobile design process including: understanding and analyzing user needs, transforming user needs into mobile design solutions, designing the user interfaces and experience of mobile apps, using trendy prototyping tools to create functional mock-ups, and conducting user research to evaluate the prototypes.
Legal and Regulatory Environment of Information Science and Technology
Instructor: Carleen Maitland, 2009Course Description:
New information technologies are creating a global economy heavily dependent upon networked information, hardware, software, and electronic commerce, which calls for adaptation of existing legal and business practices. In many cases, these new technologies pose problems with which existing laws or legislation are inadequate to cope, but the complexity of the environment makes new solutions elusive. This course examines the legal, regulatory, and political environment within which intellectual property rights and e-commerce in the information technology environment are evolving. These include examination of contracting issues, licensing of information and products, data protection, patents, cyberspace regulation, and implications for personal privacy. The course also focuses on where technology is making regulation difficult by challenging previous concepts upon which our legal and regulatory systems depend.
Informatics, Risk and the Post-Modern World
Instructor: Andrea Tapia, 2010
As the post-modern world becomes increasingly complicated, the ability to discern, identify, and address threats in terms of risk becomes exceedingly more difficult. Provision of understanding some of the underlying psychological, social, political, religious, and technical components of how risk accelerates through various stages will be critical for protection of national and international interests within the security sphere. As extreme events become more prevalent in society, security informatics will be at the heart of both recognizing emerging situations and employing tools/agents to assuage emergency, terrorist, or even national disaster events.This course provides the student with a broad perspective to critically examine both theories and practice of security informatics as related to the cultures in which threats emerge asymmetrically. Students will be placed in the role of systems analysts to problem solve and analyze information from a broad bandwidth of information specifically as informed by culture, post-modern thought, psychological intent, and situation awareness. The course will be grounded by participation in case studies and/or analyzing exercises of risk.