TEACHING


THE PENNSYLVANIA STATE UNIVERSITY:

    Primary Instructor: SRA 397E Security Economics and Privacy Behaviors (Spring 2013, Spring 2014)
    (Teaching Assistant: Chase Miller)

    Primary Instructor: SRA 471 Informatics, Risk, and the Post-Modern World (Fall 2011, Spring 2013)
    (Teaching Assistant: Wen Yao)

    Primary Instructor: SRA 221 Fundamentals of Information Security (Spring 2011, Fall 2011, Fall 2012, Fall 2013)
    (Guest Lecturers: Alan Nochenson, David Reitter, Teaching Assistants/Learning Assistants: Wen Yao, Bing Liu / Jason Turpyn, Ankit Jain)
    SRA 221 focuses on fundamentals of information security. Students will learn the principles of information security, security architectures and models, aspects and methods of information security such as physical security control, operations security, access control, hacks/attacks/defense, systems and programs security, cryptography, network and web security, worms and viruses, and other Internet secure applications. Students will also learn how to plan and manage security, security policies, business continuity plans, disaster recovery plans, and social and legal issues of information security.

PRINCETON UNIVERSITY:

    Preceptor: COS 126 General Computer Science Fall 2009 (Robert Sedgewick)
    An introduction to computer science in the context of scientific, engineering, and commercial applications. The goal of the course is to teach basic principles and practical issues, while at the same time preparing students to use computers effectively for applications in computer science, physics, biology, chemistry, engineering, and other disciplines. Topics include: programming in Java; hardware and software systems; algorithms and data structures; fundamental principles of computation; and scientific computing, including simulation, optimization, and data analysis.

UC BERKELEY:

    Primary Instructor & Course Developer: IS 290-18 Economics of Network Security and Privacy
    Network security and privacy depends not only on technological, but also economic, behavioral, and legal factors. This course will draw upon analytical and empirical studies from economics, computer science, and public policy to shed light on the role played by incentives and rationality on the adoption and effectiveness of security mechanisms, and on the design of technical, market-based, and regulatory solutions to different security threats. Topics include: economics of spam, phishing, and other security exploits; economics of privacy; incentives, rationality, and security decision making; market insurance for security and privacy; and design principles for network and system security.
    [Course Description]  [Course Website]  [Schedule and Readings]

    Guest Lecturer: CS 294 Privacy and Security Enhancing Technologies (Dawn Song)
    I spoke about recent developments in the area of the economics of privacy and security.
    [Course Website

    Guest Lecturer: IS 250 Computer-Based Communications Systems and Networks (John Chuang)
    The lecture focused on research in wireless sensor networks.

Jens Grossklags
    Teaching Assistant: IS 296A Economics-Informed Design of Networked Systems (John Chuang)
    Economics and network design have always been intimately intertwined. The infrastructural nature of networks, the decentralization of ownership and control, and the derivation of utility by heterogeneous users and applications, all point to the need for incorporating economic considerations into the design of networks. In this research seminar, we will read and discuss recent papers exploring the many different areas in which network design and economics intersect, including: economic characteristics of networks, modeling strategic behavior in network games, information asymmetries in networked environments, incentive engineering and market-based resource allocation, etc., with applications to Internet architecture, peer-to-peer, ad-hoc, and overlay networks, and network security, etc.

    Teaching Assistant: IS 250 Computer-based Communication Systems and Networks (John Chuang)
    This course offers a multidisciplinary inquiry into the technology, business, economics, and public-policy of computer networks and distributed applications. We will cover the technical foundations of computer networks, including: Internet architecture, network technologies and protocols (e.g., 802.*, TCP/IP, HTTP), routing algorithms and policies, network applications (e.g., p2p overlays, VoIP), emerging network technologies, and network security. Tightly integrated will be coverage on the business, economics and policy of networking, including: economic characteristics of networks, network industry structure and ISP competition, wireless spectrum auction, network neutrality, and incentive-centered design of networks and applications.

    Teaching Assistant: IS 206 Distributed Computing Applications and Infrastructure (Doug Tygar, John Chuang)
    Three hours of lecture and one hour of laboratory per week. Course must be completed for a letter grade to fulfill degree requirement. Technological foundations for computing and communications: computer architecture, operating systems, networking, middleware, security. Programming paradigms: object oriented-design, design and analysis of algorithms, data structures, formal languages. Distributed-system architectures and models, inter-process communications, concurrency, system performance.

    Teaching Assistant: IS 208 Analysis of Information Organizations and Systems (Peter Lyman, Yale Braunstein)
    Three hours of lecture per week. Project planning and scheduling, process design, project management and coordination. Analysis of information needs, specification of system requirements, analysis of alternatives, design of alternatives. Quantitative methods and tools for analysis and decision making. Document management. Design, implementation, and evaluation of a project.

HUMBOLDT-UNIVERSITY BERLIN:
    Project Supervisor: Electronic Business Case Studies (Gerrit Tamm, Oliver Günther)

    Teaching Assistant: Database Management (Oliver Günther, Steffan Baron)
    Hierarchical, network, and relational data models; SQL; Relational integrity rules and normal forms, and database design; Indices, recovery and concurrency; Web applications; three-tier architectures; Data mining and data warehouses

    Teaching Assistant: Foundations of Information Systems (Oliver Günther)
    History of computing; hardware, and operating systems; Java programming and HTML editing; database theory; basic algorithms; Introduction to distributed systems and the Internet

 

Back to main index