<?xml version="1.0"?>
<News hasArchived="false" page="54" pageCount="221" pageSize="10" timestamp="Wed, 29 Apr 2026 01:37:54 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=54">
<NewsItem contentIssues="true" id="80267" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/80267">
<Title>Cyber Security Steve Chan Reference Material + Handouts</Title>
<Tagline>Access to valuable resources for all with  @umbc.edu domain</Tagline>
<Body>
<![CDATA[
    <div class="html-content">Dear attendees of A Career in Security, implications and lifestyle with keynote speaker Steve Chan,<div><br></div><div>Below is a google drive link to a folder with all referenced material and handouts:</div><div><br></div><div><a href="https://drive.google.com/drive/folders/1UPZARWOFmfl3IXt-1nP2Dpjo6eiiJmRU?usp=sharing">https://drive.google.com/drive/folders/1UPZARWOFmfl3IXt-1nP2Dpjo6eiiJmRU?usp=sharing</a></div><div><br>All of the information and files in the cloud link are in the public domain. However, combined with Steve Chan's guidance, the collection of this information is very valuable.  </div><div><br></div><div>After the event, we will post the power point itself for reference. </div><div><br></div><div>We hope to see you <strong>tommorow in ITE 459 from 12pm - 2pm!</strong></div><div><strong><br></strong></div><div>~Your ISSA Executive Board</div></div>
]]>
</Body>
<Summary>Dear attendees of A Career in Security, implications and lifestyle with keynote speaker Steve Chan,    Below is a google drive link to a folder with all referenced material and handouts:...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/80267/guest@my.umbc.edu/7dfb7634ca0ad98561fdecc900481255/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/080/267/b29a0b3f531b73a23e573e1754c54b24/xxlarge.jpg?1541990913</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/080/267/b29a0b3f531b73a23e573e1754c54b24/xlarge.jpg?1541990913</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/080/267/b29a0b3f531b73a23e573e1754c54b24/large.jpg?1541990913</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/080/267/b29a0b3f531b73a23e573e1754c54b24/medium.jpg?1541990913</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/080/267/b29a0b3f531b73a23e573e1754c54b24/small.jpg?1541990913</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/080/267/b29a0b3f531b73a23e573e1754c54b24/xsmall.jpg?1541990913</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/080/267/b29a0b3f531b73a23e573e1754c54b24/xxsmall.jpg?1541990913</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 11 Nov 2018 21:49:24 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="80260" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/80260">
<Title>UMBC&#8217;s Alan Sherman and colleagues receive over $5M in NSF support for cybersecurity education</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/11/Sherman-Forno-NSF-5116-1920x768.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/Sherman-Forno-NSF-5116-1920x768-1024x410.jpg" alt="" style="max-width: 100%; height: auto;"></a></h1>
    <p></p>
    <h1>UMBC’s Alan Sherman and colleagues receive over $5M in NSF support for cybersecurity education</h1>
    <p><br>
    The National Science Foundation recently awarded <strong>Alan Sherman</strong>, professor of computer science and electrical engineering (CSEE), and his colleagues, two grants totaling over five million dollars to support students and research at UMBC.</p>
    <p><strong>Tools to assess learning</strong></p>
    <p>One of the two NSF grants asks the question, what is the most effective way to teach cybersecurity—with competitions, games, hands-on experiences, or other techniques? Through this award, Sherman and colleagues will focus on developing evidence-based tools to assess the effectiveness of various approaches to teaching cybersecurity.</p>
    <p>Sherman is working with <strong>Dhananjay Phatak</strong>, associate professor of CSEE; <strong>Linda Oliva</strong>, assistant professor of education; and collaborators at the University of Illinois at Urbana-Champaign to create two educational Cybersecurity Assessment Tools (CATS) that assesses a student’s conceptual understanding of cybersecurity. The first tool will be a concept inventory for students in any first course in cybersecurity. The second will be for students graduating from college who will be entering a career in cybersecurity.</p>
    <p><strong>Training future cybersecurity professionals</strong></p>
    <p>Sherman was awarded more than $4.9 million over five years through NSF’s CyberCorps: Scholarship for Service (SFS) program. The program is designed to increase the number of cybersecurity professionals that are trained to enter careers in government, focused on protecting the nation’s information, communications, and computer systems. <strong>Rick Forno</strong>, assistant director of UMBC’s Center for Cybersecurity, is co-PI on the new SFS program grant, as well as UMBC’s prior SFS awards.</p>
    <p>This funding will allow Sherman to extend the work that he began with support from his previous NSF CyberCorps grant, which ends in August 2019. The Scholarship for Service program at UMBC will support 34 students who are pursuing degrees at the undergraduate and graduate levels in computer science, computer engineering, information systems, cybersecurity, and other cyber-related programs.</p>
    <p>The grant funding will also allow Sherman to develop stronger connections with two community colleges in Maryland. Each year, one student graduating from Montgomery College and one student graduating from Prince George’s Community College will be selected to participate in the program beginning in their last year at community college, and continuing through their transfer to UMBC to complete their four-year degree. This collaboration will continue to strengthen the talent pipeline and increase the number of cybersecurity professionals who pursue public service careers.</p>
    <p><strong>The scholar experience</strong></p>
    <p>The SFS program and other cybersecurity education initiative help students develop their abilities to be prudent, thoughtful, and strategic in “managing trust and information in an adversarial cyber world.” Sherman explains, “Students must also pay careful attention to details and master relevant technical knowledge and skills, such as cryptology, network protocols, system design, and secure programming.”</p>
    <p>Each student who receives a scholarship completes a summer internship with a government agency at the local, state, federal, or tribal level. Each recipient is also required to complete government service in a cybersecurity-related position in their field after graduation.</p>
    <p>Based on a cohort model, the UMBC program encourages the SFS scholars to learn from each other and to engage in cybersecurity research on campus, such as through Sherman’s Cyber Defense Lab. Each January, the scholars complete a week-long collaborative research project in which they analyze a specific aspect of the security of UMBC’s computer system.</p>
    <p>“As we enter the next five years of this grant, UMBC’s SFS program remains a unique, robust opportunity for students to explore the wide range of possibilities in the cybersecurity discipline,” explains Forno. “It allows them to fully prepare for and commit themselves to entering the federal cyber workforce, and make a difference on Day One no matter where they begin their careers in the service of our nation.”</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/umbcs-alan-sherman-and-colleagues-receive-over-5m-in-nsf-support-for-cybersecurity-education/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks. Banner image: Rick Forno, left, and Alan Sherman. Photo by Marlayna Demond ’11 for UMBC.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/umbc-alan-sherman-award-nsf-cybersecurity-education-cybercorps-scholarship-service/" rel="nofollow external" class="bo">UMBC’s Alan Sherman and colleagues receive over $5M in NSF support for cybersecurity education</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC’s Alan Sherman and colleagues receive over $5M in NSF support for cybersecurity education     The National Science Foundation recently awarded Alan Sherman, professor of computer science and...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/umbc-alan-sherman-award-nsf-cybersecurity-education-cybercorps-scholarship-service/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/80260/guest@my.umbc.edu/0d0dd041b76f79e7007805123ace661e/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>research-awards</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 11 Nov 2018 09:06:35 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="80253" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/80253">
<Title>Federal Agencies and Contractors: Steve Chan + Papa Johns</Title>
<Tagline>Masters in Comp-Sci, 30+ Years of Valuable Experience, Certs</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><br></div><div><p><span><span>Dear UMBC
    ISSAers, ISCOMers, and all undergraduate students,</span></span></p>
    
    <p><span><span>Coming up this <strong>Monday November 12<sup>th</sup>, in ITE 459, from 12pm –
    2pm </strong>is your chance to get your questioned answered about cybersecurity, get
    some free pizza, and network with your colleagues/professors!</span></span></p>
    
    <p><span><span>DON’T MISS THE</span></span><span><span> <u>ISSA
    EXCLUSIVE with Steve Chan:</u> Steve Chan serves as the Vice President of
    the ISSA Central MD chapter and has a master’s degree in computer science from
    John Hopkins. ISSA Central MD won chapter of the year in 2017! Mr. Chan has
    numerous insights about many government agencies AND has worked for tens of big
    name conglomerates over the years. <u>We will provide Papa John’s Pizza
    and Desserts.</u></span></span></p>
    
    <p><span> </span></p>
    
    <p><span><strong><span>Event Title: A life in
    Cybersecurity- lifestyle and implications:</span></strong></span><span></span></p>
    
    <p><span><strong><span>This will be from 12-2pm in
    ITE 459.</span></strong></span><span></span></p>
    
    <p><span><strong><span>Event Link:</span></strong></span><span></span></p>
    
    <p><span><strong><span> <a href="https://my3.my.umbc.edu/groups/issa/events/64942" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/issa/events/64942</span></a></span></strong></span><span></span></p>
    
    <p><span>PLEASE RSVP BY CLICKING THE GOING BUTTON AT BOTTOM OF
    EVENT LINK</span></p><br></div></div>
]]>
</Body>
<Summary>Dear UMBC ISSAers, ISCOMers, and all undergraduate students,    Coming up this Monday November 12th, in ITE 459, from 12pm – 2pm is your chance to get your questioned answered about cybersecurity,...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/80253/guest@my.umbc.edu/cd1bd254dc3bc89cd6483ef1a320bec2/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/080/253/becc1cd41d3f7afc9ef7c18dcac454f3/xxlarge.jpg?1541801765</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/080/253/becc1cd41d3f7afc9ef7c18dcac454f3/xlarge.jpg?1541801765</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/080/253/becc1cd41d3f7afc9ef7c18dcac454f3/large.jpg?1541801765</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/080/253/becc1cd41d3f7afc9ef7c18dcac454f3/medium.jpg?1541801765</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/080/253/becc1cd41d3f7afc9ef7c18dcac454f3/small.jpg?1541801765</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/080/253/becc1cd41d3f7afc9ef7c18dcac454f3/xsmall.jpg?1541801765</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/080/253/becc1cd41d3f7afc9ef7c18dcac454f3/xxsmall.jpg?1541801765</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 09 Nov 2018 17:16:15 -0500</PostedAt>
<EditAt>Fri, 09 Nov 2018 17:16:35 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80128" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/80128">
<Title>Richard Forno: Threats remain to US voting system &#8211; and voters&#8217; perceptions of reality</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/file-20181106-74772-egm5dt_slider.jpg" style="max-width: 100%; height: auto;">As Americans go to the polls, the voting process and the information environment are still not secure. <span><a href="http://www.apimages.com/metadata/Index/APTOPIX-Election-2018-Georgia/c0c2653a5cff44eeb562ada74c3d17bc/3/0" rel="nofollow external" class="bo">AP Photo/David Goldman</a></span><h1><strong>Threats remain to US voting system – and voters’ perceptions of reality</strong></h1>
    <p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>As the 2018 midterms proceed, there are still significant risks to the integrity of the voting system – and information warfare continues to try to influence the American public’s choices when they cast their ballots.</p>
    <p>On the day of the election, there were a number of <a href="https://www.propublica.org/article/oops-we-forgot-to-plug-in-the-voting-machine" rel="nofollow external" class="bo">early hitches in voting at individual polling places</a>, such as <a href="https://bklyner.com/sloppy-start-on-election-day/" rel="nofollow external" class="bo">polling places opening late</a> and vote-counting machines not plugged in. But there seem not – at least not yet – to be major <a href="https://www.propublica.org/electionland/" rel="nofollow external" class="bo">problems across the country</a>.</p>
    <p>However, not all the election-related news and information voters have been encountering in recent days and weeks is accurate, and some of it is deliberately misleading. As this election’s results come back, they will reveal whether the misinformation and propaganda campaigns conducted alongside the political ones were effective.</p>
    <h2>Securing election systems</h2>
    <p>America’s electoral process remains highly fragmented, because of the country’s cherished tradition of decentralized government and local control. While this may leave some individual communities’ voting equipment potentially vulnerable to attack, the nation’s voting process overall may be more trustworthy as a result of this fragmentation. With no unified government agency or office to provide, administer and protect election technologies, there’s not one central national element that could fail or be attacked.</p>
    <p>Across the country, though, many districts’ voters will cast ballots with the <a href="http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/" rel="nofollow external" class="bo">help of machines</a> that have <a href="https://theconversation.com/americas-aging-voting-machines-managed-to-survive-another-election-68100" rel="nofollow external" class="bo">long-standing</a> <a href="https://theconversation.com/aging-voting-machines-threaten-election-integrity-54523" rel="nofollow external" class="bo">security concerns</a>. Fortunately, <a href="https://www.axios.com/five-states-without-paper-trail-of-votes-32801015-4ba1-4b41-80ca-ebab2cdda087.html" rel="nofollow external" class="bo">45 states</a> keep a paper record of each vote cast – whether for fear of threats to voting integrity or just <a href="https://www.the-parallax.com/2018/11/03/funding-secure-voting/" rel="nofollow external" class="bo">budget constraints preventing purchase</a> of newer gear. But that means <a href="http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/" rel="nofollow external" class="bo">five states</a> – Louisiana, Georgia, South Carolina, New Jersey and Delaware – don’t keep paper records of their voters’ choices.</p>
    <p><a href="https://www.politico.com/newsletters/morning-cybersecurity/2018/07/12/voting-machine-vendors-under-pressure-277054" rel="nofollow external" class="bo">Voting machine vendors have been reluctant</a> to appear before Congress to explain their systems’ security practices – <a href="https://www.usatoday.com/story/tech/2017/07/30/hackers-defcon-conference-exploit-vulnerabilities-voting-machines/523639001/" rel="nofollow external" class="bo">and shortcomings</a>. However, <a href="https://fcw.com/articles/2018/10/02/nielsen-election-cyber-dhs.aspx" rel="nofollow external" class="bo">federal agencies have helped some states</a> reduce the likelihood of voting machines being hacked or physically tampered with.</p>
    <h2>Beyond voting machines</h2>
    <p>Election security is about much more than voting machines and vote-counting systems, though they are the most visible technologies at work on Election Day. State systems that track voter registrations, or allow users to register online, are enticing targets for hackers, too. Security firm Carbon Black reported that <a href="https://www.forbes.com/sites/daveywinder/2018/10/30/81-5m-voter-records-for-sale-on-dark-web-ahead-of-midterm-elections/" rel="nofollow external" class="bo">81 million voter records from 20 states</a> are available in online forums. This data, obtained by hacking various official and corporate databases, could be used to facilitate voter fraud or sow confusion at polling places on Election Day: How would you feel if you were told that someone using your name and address had already voted?</p>
    <p>There are security concerns even in states like Oregon, where everyone votes on paper and mails in their ballots in advance of Election Day. That <a href="https://lmtribune.com/northwest/phishing-attempts-on-oregon-election-officials-increase/article_938cbf55-cc7d-532b-8f6c-f27bf0150040.html" rel="nofollow external" class="bo">state’s election officials were targeted by hackers</a> seeking to gain access to <a href="https://arstechnica.com/tech-policy/2018/11/file-sharing-software-on-state-election-servers-could-expose-them-to-intruders/" rel="nofollow external" class="bo">state email and database systems</a>. With that access, attackers might be able to digitally impersonate a government official to send false or confusing emails, press releases or other notifications to citizens, journalists or poll workers.</p>
    <p>Also at risk are public-facing official websites that carry election information. Merely changing the reported location of polling places or voting hours could prevent some people from voting. Also vulnerable are states’ methods of announcing preliminary election results. At a major internet security conference in August, children were able to compromise replicas of several states’ election-reporting systems. The most remarkable was that in just 10 minutes, an <a href="https://www.pbs.org/newshour/nation/an-11-year-old-changed-election-results-on-a-replica-florida-state-website-in-under-10-minutes" rel="nofollow external" class="bo">11-year-old boy cracked the security</a> on a copy of the Florida secretary of state’s website and was able to change the publicly announced vote totals for candidates. That could be enough to cast doubt on whatever was later reported as the official results – and the integrity of the system itself.</p>
    <h2>Managing information on social media</h2>
    <p>A more difficult threat to defend against is <a href="https://theconversation.com/how-the-russian-government-used-disinformation-and-cyber-warfare-in-2016-election-an-ethical-hacker-explains-99989" rel="nofollow external" class="bo">information warfare</a>, which doesn’t attack voting machines or election officials’ computers. Rather, it <a href="https://theconversation.com/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds-100069" rel="nofollow external" class="bo">targets voters’ perceptions and decisions</a>, seeking to influence how they vote.</p>
    <p>Long before the 2016 U.S. presidential election, information warfare was influencing elections around the world, including in <a href="https://www.washingtonpost.com/business/economy/russian-disinformation-on-facebook-targeted-ukraine-well-before-the-2016-us-election/2018/10/28/cc38079a-d8aa-11e8-a10f-b51546b10756_story.html" rel="nofollow external" class="bo">Ukraine</a>, <a href="https://www.nytimes.com/2018/10/15/technology/myanmar-facebook-genocide.html" rel="nofollow external" class="bo">Myanmar</a> and <a href="https://www.wired.co.uk/article/egypt-fake-news-facebook-oppress-women" rel="nofollow external" class="bo">Egypt</a>. But after 2016, <a href="https://www.theverge.com/2018/11/5/18056610/facebook-mark-warner-congress-cambridge-analytica" rel="nofollow external" class="bo">Facebook and Twitter came under intense scrutiny</a> for their role in providing digital environments that facilitated the spread of misinformation to sow discontent, and special counsel Robert Mueller began <a href="https://theconversation.com/if-the-12-indicted-russians-never-face-trial-in-the-us-can-anything-be-gained-99997" rel="nofollow external" class="bo">investigating Russians’ influence efforts</a>.</p>
    <p>In the run-up to the 2018 midterms, Russians and others were still hard at work trying to influence Americans to vote in ways that help foreign interests. In October, the U.S. Department of Justice charged a Russian woman with <a href="https://thehill.com/policy/national-security/412287-russian-woman-charged-with-interfering-in-midterm-elections" rel="nofollow external" class="bo">creating thousands of fake social media accounts</a> allegedly representing American citizens to “<a href="https://www.justice.gov/opa/pr/russian-national-charged-interfering-us-political-system" rel="nofollow external" class="bo">create and amplify divisive social media and political content</a>” before the election.</p>
    <p>This year, though, unlike two years ago, <a href="https://www.nytimes.com/2018/10/20/us/politics/2018-digital-misinformation-roundup.html" rel="nofollow external" class="bo">social media companies are taking action</a>. Twitter and Facebook have both <a href="https://theconversation.com/why-do-so-many-people-fall-for-fake-profiles-online-102754" rel="nofollow external" class="bo">deleted thousands of accounts</a> <a href="https://theconversation.com/hate-speech-is-still-easy-to-find-on-social-media-106020" rel="nofollow external" class="bo">they identified</a> as engaging in <a href="https://theconversation.com/even-a-few-bots-can-shift-public-opinion-in-big-ways-104377" rel="nofollow external" class="bo">propaganda and influence-peddling</a>. And they have <a href="https://www.theguardian.com/commentisfree/2018/jul/20/facebook-pledge-to-eliminate-false-information-is-itself-fake-news" rel="nofollow external" class="bo">made other efforts</a> to <a href="https://www.wired.com/story/inside-facebooks-plan-to-safeguard-2018-election/" rel="nofollow external" class="bo">identify and fight falsehoods</a> on their platforms, too.</p>
    <p>Nevertheless, online misinformation continues to thrive. <a href="https://www.knightfoundation.org/reports/disinformation-fake-news-and-influence-campaigns-on-twitter" rel="nofollow external" class="bo">More than 80 percent</a> of the Twitter accounts that often shared links to false and misleading information in 2016 are still active today. And the <a href="https://theconversation.com/unlike-in-2016-there-was-no-spike-in-misinformation-this-election-cycle-105946" rel="nofollow external" class="bo">amount of online misinformation</a> is <a href="https://comprop.oii.ox.ac.uk/research/midterms2018/" rel="nofollow external" class="bo">higher than it was</a> two years ago.</p>
    <h2>Investigating alleged wrongdoing</h2>
    <p>U.S. intelligence and police agencies are concerned about the <a href="https://thehill.com/policy/cybersecurity/412863-officials-prepare-for-potential-false-claims-of-election-interference" rel="nofollow external" class="bo">potential effects of misinformation</a> on the American electorate. But large proportions of the country don’t <a href="https://www.newsmax.com/ronpaul/state-deep-trump-mueller/2018/07/16/id/872012/" rel="nofollow external" class="bo">trust those organizations</a> to be <a href="https://arstechnica.com/tech-policy/2018/11/with-no-evidence-georgias-top-voting-official-accuses-dems-of-cyberattack/" rel="nofollow external" class="bo">politically independent</a>. It doesn’t help that the White House continues to <a href="https://www.washingtonpost.com/politics/without-evidence-trump-and-sessions-warn-of-voter-fraud-in-tuesdays-elections/2018/11/05/e9564788-e115-11e8-8f5f-a55347f48762_story.html" rel="nofollow external" class="bo">claim, without evidence</a>, that <a href="https://www.cnn.com/2018/10/22/politics/donald-trump-voter-fraud/index.html" rel="nofollow external" class="bo">voter fraud</a> is a significant problem.</p>
    <p>Mainstream news organizations can find themselves under scrutiny too, either for <a href="https://www.washingtonpost.com/outlook/2018/10/24/russians-didnt-swing-election-trump-fox-news-might-have/" rel="nofollow external" class="bo">reporting falsehoods</a> that <a href="https://www.pbs.org/newshour/arts/after-a-week-of-russian-propaganda-i-was-questioning-everything" rel="nofollow external" class="bo">appear to gain traction online</a> or for failing to <a href="https://www.poynter.org/news/guide-anti-misinformation-actions-around-world" rel="nofollow external" class="bo">filter out or properly identify inaccurate information</a> for their readers.</p>
    <h2>Looking ahead</h2>
    <p>Protecting democracy is a huge challenge. I’ve written before that it involves <a href="https://theconversation.com/this-election-was-not-hacked-but-it-was-attacked-67511" rel="nofollow external" class="bo">more than technical solutions</a> to computer problems. The U.S. government, and the people it serves, must find the desire and the drive to establish secure and trustworthy procedures for running elections across the country. Education is also key, teaching people from an early age how to recognize propaganda and misinformation, and think critically about the information they encounter. Facts are not subject to alternative views; without widespread agreement on common objective realities, society and government cannot function well.</p>
    <p>Technology continues to evolve, presenting challenges to individuals and society alike. Emerging “<a href="https://theconversation.com/detecting-deepfake-videos-in-the-blink-of-an-eye-101072" rel="nofollow external" class="bo">deepfake</a>” technology is already helping <a href="https://www.lawfareblog.com/deep-fakes-looming-crisis-national-security-democracy-and-privacy" rel="nofollow external" class="bo">create convincing videos of people appearing to say</a> and do things they never said or did. In addition, intelligent social media <a href="https://www.theverge.com/2018/10/15/17980026/social-media-bot-human-difference-ai-study" rel="nofollow external" class="bo">bots are becoming more human-like</a>, making identifying and blocking them much more difficult. That’s just some of the challenges that democracies will face in the future.</p>
    <p>Many of these problems will not have a clearly defined fix, because they involve a nuanced balancing of individual rights and social necessities. Real and lasting solutions must come from civil discourse by rational and objectively informed people who have, above all, the actual honest desire to do it right.</p>
    <p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article is republished from <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/threats-remain-to-us-voting-system-and-voters-perceptions-of-reality-105545" rel="nofollow external" class="bo">original article</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/richard-forno-threats-remain-to-us-voting-system-and-voters-perceptions-of-reality/" rel="nofollow external" class="bo">Richard Forno: Threats remain to US voting system – and voters’ perceptions of reality</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>As Americans go to the polls, the voting process and the information environment are still not secure. AP Photo/David Goldman Threats remain to US voting system – and voters’ perceptions of...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/richard-forno-threats-remain-to-us-voting-system-and-voters-perceptions-of-reality/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/80128/guest@my.umbc.edu/62e8cd58997d5f8ac394b048c69634de/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 15:03:32 -0500</PostedAt>
<EditAt>Tue, 06 Nov 2018 15:03:32 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80055" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/80055">
<Title>Don't miss Federal Agencies &amp; Contractors Week: 11/5 - 11/12</Title>
<Tagline>Attend ISCOM's superb events &amp; get Papa Johns Pizza on 11/12</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Hi everybody!</span></p>
    
    <p><span>The ISSA is excited to partner with our hard-working
    sister org ISCOM to present <strong>Federal
    Agencies &amp; Contractors Week!</strong></span></p>
    
    <p><span>This week focuses on public sector federal agencies
    that serve in defense, intelligence, and security roles along with private
    sector contractors with a similar field of focus (ISCOM Executive Board 2018).'
    </span></p>
    
    <p><span>There are <u>FOUR</u> events we hope you can make it
    out to. </span></p>
    
    <p><span><span>1.<span>       </span></span></span><strong><span>11/5</span></strong><span>
    - <u>Software Development and Data Analytics Crash Course ft. Asymmetrik</u></span></p>
    
    <p><span>This will be from <strong>12:00-12:50pm in ITE 456.</strong></span></p>
    
    <p><span> </span></p>
    
    <p><span><span>2.<span>       </span></span></span><strong><span>11/7</span></strong><span> -
    <u>Visibility day ft. Next Century Corporation* there’ll be free food!</u></span></p>
    
    <p><span>This will be from <strong>11am-2pm in UC 312.</strong></span></p>
    
    <p><span> </span></p>
    
    <p><strong><span><span>3.<span>      
    </span></span></span></strong><strong><span>11/9</span></strong><span> –
    <u>ISCOM exclusive Friday career panel with different professionals from many
    different orgs</u> (check out ISCOM’s group page for updates). This will be
    from <strong>12:00-12:50pm in ITE 237.</strong></span></p>
    
    <p><span> </span></p>
    
    <p><span><span>4.<span>       </span></span></span><strong><span>11/12</span></strong><span>
    - <u>ISSA EXCLUSIVE with Steve Chan:</u> Steve Chan serves as the Vice
    President of the ISSA Central MD chapter and has a master’s degree in computer
    science from John Hopkins. ISSA Central MD won chapter of the year in 2017! Mr.
    Chan has numerous insights about many government agencies AND has worked for
    tens of big name conglomerates over the years. <u>We will provide Papa John’s
    Pizza and Desserts. </u></span></p>
    
    <p><strong><span>Event
    Title: A life in Cybersecurity- lifestyle and implications:</span></strong></p>
    
    <p><strong><span>This
    will be from 12-2pm in ITE 459.</span></strong></p>
    
    <p><strong><span>Event
    Link: </span></strong></p>
    
    <p><strong><span><span> </span><a href="https://my3.my.umbc.edu/groups/issa/events/64942" rel="nofollow external" class="bo">https://my3.my.umbc.edu/groups/issa/events/64942</a></span></strong></p>
    
    <p><span>On behalf of the ISSA executive board, have a strong
    close to the semester and we can’t wait to see you. Please try to make it out
    to some of these events, even if you can’t stay for the entire time. </span></p>
    
    <p><span>*Next Century delivers a new class of insightful,
    intuitive, efficient technology solutions for the healthcare, national
    security, and corporate security industries. Next Century’s expertise lies in
    geographic information systems (GIS), image exploitation, mobile computing,
    wireless networks, visualization, and user interface design. It's a great
    opportunity- not to mention that John McBeth, their president, CEO, and
    founder, will be there too!</span></p></div>
]]>
</Body>
<Summary>Hi everybody!    The ISSA is excited to partner with our hard-working sister org ISCOM to present Federal Agencies &amp; Contractors Week!    This week focuses on public sector federal agencies...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/80055/guest@my.umbc.edu/633810fa0c304646a860b1be1f5d10b4/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/080/055/9b6f5c91f89a2e5b05ee4253d68c6b59/xxlarge.jpg?1541381524</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/080/055/9b6f5c91f89a2e5b05ee4253d68c6b59/xlarge.jpg?1541381524</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/080/055/9b6f5c91f89a2e5b05ee4253d68c6b59/large.jpg?1541381524</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/080/055/9b6f5c91f89a2e5b05ee4253d68c6b59/medium.jpg?1541381524</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/080/055/9b6f5c91f89a2e5b05ee4253d68c6b59/small.jpg?1541381524</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/080/055/9b6f5c91f89a2e5b05ee4253d68c6b59/xsmall.jpg?1541381524</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/080/055/9b6f5c91f89a2e5b05ee4253d68c6b59/xxsmall.jpg?1541381524</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 04 Nov 2018 20:25:03 -0500</PostedAt>
<EditAt>Sun, 04 Nov 2018 20:32:12 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="79860" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/79860">
<Title>talk: Unbiased Decisions with Biased Data, Nov 14</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/10/mdai_foulds-1024x536.png" alt="" style="max-width: 100%; height: auto;"></p>
    <h3>Differential Fairness for Machine Learning and Artificial Intelligence Systems: Unbiased Decisions with Biased Data</h3>
    <p> </p>
    <h4>Prof. James Foulds<br>
    Information Systems, UMBC</h4>
    <h4>5:30-7:30 14 November 2018<a href="https://www.meetup.com/Maryland-AI/events/255486251/" rel="nofollow external" class="bo"><br>
    MD-AI Meetup, Emerging Technology Centers, Baltimore</a></h4>
    <p>With the rising influence of machine learning algorithms on many important aspects of our daily lives, there are growing concerns that biases inherent in data can lead the behavior of these algorithms to discriminate against certain populations. Biased data can lead data-driven algorithms to produce biased outcomes along lines of gender, race, sexual orientation, and political ties, with important real-world consequences, including decision-making for lending and law enforcement. Thus, there is an urgent need for machine learning algorithms that make unbiased decisions with biased data. We propose a novel framework for measuring and correcting bias in data-driven algorithms, with inspiration from privacy-preserving machine learning and Bayesian probabilistic modeling. A case study on census data demonstrates the utility of our approach.</p>
    <p>Dr. <a href="http://jfoulds.informationsystems.umbc.edu/" rel="nofollow external" class="bo">James Foulds</a> is an Assistant Professor in the Department of Information Systems at UMBC. His research interests are in both applied and foundational machine learning, focusing on probabilistic latent variable models and the inference algorithms to learn them from data. His work aims to promote the practice of probabilistic modeling for computational social science, and to improve AI’s role in society regarding privacy and fairness. He earned his Ph.D. in computer science at the University of California, Irvine, and was a postdoctoral scholar at the University of California, Santa Cruz, followed by the University of California, San Diego. His master’s and bachelor’s degrees were earned with first class honours at the University of Waikato, New Zealand, where he also contributed to the Weka data mining system.</p>
    <p>Register to attend at the <a href="https://www.meetup.com/Maryland-AI/events/255486251/" rel="nofollow external" class="bo">MD-AI meetup site</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/talk-unbiased-decisions-with-biased-data-nov-14/" rel="nofollow external" class="bo">talk: Unbiased Decisions with Biased Data, Nov 14</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Differential Fairness for Machine Learning and Artificial Intelligence Systems: Unbiased Decisions with Biased Data       Prof. James Foulds  Information Systems, UMBC   5:30-7:30 14 November 2018...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/talk-unbiased-decisions-with-biased-data-nov-14/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/79860/guest@my.umbc.edu/8c79794c1015d58f44720144549d688a/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>data-science</Tag>
<Tag>information-systems</Tag>
<Tag>machine-learning</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 27 Oct 2018 11:48:12 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="79844" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/79844">
<Title>Meet the Staff: Rebecca Dongarra</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/10/DSC_40111-203x300.jpg" alt="" width="203" height="300" style="max-width: 100%; height: auto;"></p>
    <p><strong>Name</strong>: Rebecca Dongarra</p>
    <p><strong>Educational Background</strong>: Bachelor of Arts in Biology from St. Mary’s College of Maryland, currently pursuing a master’s degree in Instructional Systems Development through UMBC</p>
    <p><strong>Hometown</strong>: West Friendship, Maryland</p>
    <p><strong>Current role</strong>: Academic Affairs Manager</p>
    <p>Rebecca moved from the College of Natural and Mathematical Sciences as the Data and Events Coordinator to join CSEE. She was a team member on the STEM BUILD at UMBC Initiative grant supported by NIH from 2016 to 2018. Prior to working in higher education, Rebecca established herself as a small business owner and local community leader. When not working, Rebecca enjoys hiking, volunteering with YMCA and USA swim teams and keeping busy with gardening.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/meet-the-staff-rebecca-dongarra/" rel="nofollow external" class="bo">Meet the Staff: Rebecca Dongarra</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Name: Rebecca Dongarra   Educational Background: Bachelor of Arts in Biology from St. Mary’s College of Maryland, currently pursuing a master’s degree in Instructional Systems Development through...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/meet-the-staff-rebecca-dongarra/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/79844/guest@my.umbc.edu/30374187d643a5df3faca099e24da84e/api/pixel</TrackingUrl>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 26 Oct 2018 11:54:01 -0400</PostedAt>
<EditAt>Fri, 26 Oct 2018 11:54:01 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="79520" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/79520">
<Title>Alumni startup at bwtech@UMBC earns unique award for AI work with UMBC research team</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/10/bwtechbuilding_1024.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/10/bwtechbuilding_1024-1024x410.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h1>Alumni startup RedShred earns unique award for AI work with UMBC research team</h1>
    <p>The artificial intelligence startup <a href="http://redshred.com/" rel="nofollow external" class="bo">RedShred</a>—cofounded by two UMBC alumni and housed in the bwtech@UMBC incubator—has received a rare Phase II Small Business Innovation Research Award from the National Science Foundation to expand in a new direction, in collaboration with UMBC faculty and graduate students.</p>
    <p><strong>Jeehye Yun</strong> ‘97, computer science, and <strong>Jim Kukla </strong>‘97, M.S ‘00, computer science, launched RedShred in 2014, with the support of a Phase I Small Business Technology Transfer Award from NSF. For the past four years, RedShred has created software to help universities and other institutions sort through complex government listings in search of opportunities (requests for proposals, or RFPs) that meet their needs and expertise. The new Phase II award will support RedShred as they make their products available to companies in the commercial sector.</p>
    <p>“At RedShred our mission is to help people read less and win more,” says Yun. “We’re excited about this Phase II grant, which allows us to commercialize our Phase I research and development, and develop new mechanisms to help people understand increasingly complicated documents.”</p>
    <p>UMBC faculty and students have collaborated with RedShred to advance the technologies behind their products. <strong>Tim Finin</strong>, professor of computer science and electrical engineering, and several graduate students have worked with RedShred to better understand how large documents, such as RFPs, tend to be structured, even when each one is formatted differently and doesn’t follow a template. They describe this process as identifying the document’s semantic DNA.</p>
    <p>By defining and identifying the core elements of each RFP, UMBC student researchers have been able to create “at-a-glance” summaries of these highly complex documents that provide all the necessary information and save the client the time of wading through levels of detail.</p>
    <p>“Our collaboration with RedShred has given UMBC students great opportunities to participate in both basic and applied research focused on developing an innovative commercial product,” explains Finin. “This has involved both undergraduate and graduate students majoring in computing as well as the arts and humanities. For example, computer science graduate student <strong>Muhammad Rahman</strong> Ph.D. ‘18, computer science, developed a problem he encountered when working with RedShed into his Ph.D. dissertation, which he completed his summer.”</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/alumni-startup-at-bwtechumbc-earns-unique-award-for-artificial-intelligence-work-with-umbc-research-team/" rel="nofollow external" class="bo">UMBC News article</a> written by Megan Hanks</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/alumni-ai-startup-redshred-earns-unique-nsf-award-work-umbc-researchers/" rel="nofollow external" class="bo">Alumni startup at bwtech@UMBC earns unique award for AI work with UMBC research team</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Alumni startup RedShred earns unique award for AI work with UMBC research team   The artificial intelligence startup RedShred—cofounded by two UMBC alumni and housed in the bwtech@UMBC...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/alumni-ai-startup-redshred-earns-unique-nsf-award-work-umbc-researchers/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/79520/guest@my.umbc.edu/68024441130a0936e3fa8df191086e80/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 16 Oct 2018 17:12:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="79465" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/79465">
<Title>Professional Graduate Programs Open House, Sat. 10/20 (CYBR, DATA, &#8230;)</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/header.png" style="max-width: 100%; height: auto;"></p>
    <h1>Professional Graduate Programs Open House, Sat. 10/20</h1>
    <p>The <a href="https://openhouse.umbc.edu/" rel="nofollow external" class="bo">Fall Open House</a> for UMBC’s Professional Programs (Main Campus offerings) takes place on Saturday, October 20 in the first floor of PAHB from 9:30-11:30am. Students interested in exploring and/or pursuing these graduate programs (degrees and/or certificates) or just want to learn more about these fields are encouraged to register and attend. CSEE students interested in pursuing a BS/MPS option for selected programs (such as CYBR or Data Science) are especially welcome.</p>
    <p>Programs represented include</p>
    <ul><li>
    <ul><li><strong><a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">Cybersecurity</a></strong></li>
    <li><strong><a href="http://datascience.umbc.edu/" rel="nofollow external" class="bo">Data Science</a></strong></li>
    <li><strong><a href="http://www.umbc.edu/hit/" rel="nofollow external" class="bo">Health Information Technology</a></strong></li>
    <li><a href="http://www.umbc.edu/engm/" rel="nofollow external" class="bo">Engineering Management</a></li>
    <li><a href="http://www.umbc.edu/se/" rel="nofollow external" class="bo">Systems Engineering</a></li>
    <li><a href="http://www.umbc.edu/isd/" rel="nofollow external" class="bo">Instructional Systems Development</a></li>
    <li><a href="https://gradschool.umbc.edu/admissions/programs/ipdm/" rel="nofollow external" class="bo">Integrated Product Development &amp; Manufacturing</a></li>
    <li><a href="https://gradschool.umbc.edu/admissions/programs/techm/" rel="nofollow external" class="bo">Technical Management</a></li>
    </ul></li>
    </ul><p>Faculty program directors will be presenting in individual breakout sessions and relevant support staff will be on-hand to provide administrative overviews, answer questions, and mingle. Refreshments will be provided.</p>
    <p>If you are interested, please RSVP at <a href="https://openhouse.umbc.edu/" rel="nofollow external" class="bo">https://openhouse.umbc.edu/</a>. If you have questions contact: *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/professional-graduate-programs-open-house-sat-10-20-cybr-data/" rel="nofollow external" class="bo">Professional Graduate Programs Open House, Sat. 10/20 (CYBR, DATA, …)</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Professional Graduate Programs Open House, Sat. 10/20   The Fall Open House for UMBC’s Professional Programs (Main Campus offerings) takes place on Saturday, October 20 in the first floor of PAHB...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/professional-graduate-programs-open-house-sat-10-20-cybr-data/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/79465/guest@my.umbc.edu/86f1c97f4c4128e766fac35a5b08d2dc/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>engineering-management</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>systems-engineering</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 15 Oct 2018 13:41:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="79389" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/79389">
<Title>UMBC students win top prize at Maryland Cyber Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/10/MDCC_DSC_0420.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/10/MDCC_DSC_0420-1024x507.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p>Busy teams of students clustered around laptops in a room overlooking Baltimore’s Inner Harbor on Tuesday, focused on solving as many challenges as possible during a “capture-the-flag” style competition. After hours of intense competition in cyberspace, UMBC’s team emerged victorious, named champions of the college division of the <a href="https://www.fbcinc.com/e/cybermdconference/challenge.aspx" rel="nofollow external" class="bo">2018 Maryland Cyber Challenge</a>.</p>
    <p>Started in 2011, the competition is part of the annual <a href="https://www.fbcinc.com/e/cybermdconference/" rel="nofollow external" class="bo">CyberMaryland Conference</a>. UMBC’s team included <strong>Niara Richards</strong> ‘22, computer science; <strong>Nithya Prakash</strong> ‘22, information systems; <strong>Josh Mpere</strong> ‘19, computer science; <strong>Seamus Burke</strong> ‘20 computer science; and <strong>Swathi Krithivasan</strong> ‘22, computer science. They worked together to test their skills in a series of real-world cybersecurity challenges over the course of two virtual qualifying rounds and then the final competition, beating talented teams from the U.S. Air Force Academy and University of Maryland, University College.</p>
    <p>“It was my first time competing in the Maryland Cyber Challenge, although I have a pretty extensive competition background,” said Burke. “I am especially proud of my freshman teammates who put in a ton of effort, solved challenges, and didn’t get discouraged when the challenges got more difficult.”</p>
    <p>Burke is a Center for Women in Technology (CWIT) Scholar and Mpere is a Cyber affiliate. Richards, Prakash, and Krithivasan all participate in UMBC’s Cyber Scholars Program, which works to prepare the next generation of cybersecurity professionals.</p>
    <p>All five members of the winning team will receive a monetary award and an offer to complete a summer internship to continue growing their experience and skills. Additionally, the university will receive new technologies (including software) to support more UMBC students in developing their cybersecurity skills.</p>
    <p>“The competition was a fantastic experience and gave me a lot of exposure into topics that I otherwise would not have gained, especially as a freshman,” said Krithivasan. “We had a mix of both upper and underclassmen on our team, which really enabled us to learn and grow from working with each other.”</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/umbc-students-win-top-prize-at-maryland-cyber-challenge/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks. Banner image: Nithya Prakash, Swathi Krithivasan, and Josh Mpere being recognized at the award ceremony. Photo by Mike Lackner, computer science and informatics, and technology instructor at Loyola Blakefield High School.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/umbc-students-win-top-prize-at-maryland-cyber-challenge/" rel="nofollow external" class="bo">UMBC students win top prize at Maryland Cyber Challenge</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Busy teams of students clustered around laptops in a room overlooking Baltimore’s Inner Harbor on Tuesday, focused on solving as many challenges as possible during a “capture-the-flag” style...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/umbc-students-win-top-prize-at-maryland-cyber-challenge/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/79389/guest@my.umbc.edu/47ab5dd33368ef4592c0c7b6b6307d5b/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 11 Oct 2018 14:10:39 -0400</PostedAt>
<EditAt>Thu, 11 Oct 2018 14:10:39 -0400</EditAt>
</NewsItem>

</News>
