People in leadership positions may sacrifice privacy for security

Pennsylvania State University (PSU) researchers performed experiments examining how people with high-status job assignments assessed security and privacy and how impulsive or patient they were in making decisions. The results showed that participants who were randomly placed in charge of a project tended to become more concerned with security. In a follow-up experiment, those appointed as supervisors also exhibited a more patient, long-term approach to decision-making. “Hopefully, by calling attention to these tendencies, decision-makers can rebalance their priorities on security and privacy,” says PSU professor Jens Grossklags. In the first experiment, the researchers randomly assigned 146 participants roles as either a supervisor or a worker to determine how those assignments changed the way leaders approached security or privacy during a task. Those appointed supervisors displayed a significant increase in their concern for security, while those who were assigned a worker-level status expressed higher concern for privacy. The second experiment, consisting of 120 participants, examined whether patience correlated with high-status assignments. The researchers found the low-status workers were more impulsive, as they were willing to sacrifice 35 percent more to receive prize money now rather than later, while supervisors were more willing to wait, showing they would be more patient in making decisions with long-term consequences.

People in leadership positions may sacrifice privacy for security | Penn State University.

Why Apple’s Swift Language Will Instantly Remake Computer Programming

The language is called Swift, and on June 2, Apple released a test version to coders outside the company, billing it as a faster and more effective means of building software apps for iPhones, iPads, and Macs.

via Why Apple’s Swift Language Will Instantly Remake Computer Programming | Enterprise | WIRED.

Position in Mathematical Logic at Charles University in Prague

The Department of Algebra invites applications for a tenure-track position at the rank of assistant professor in the area of mathematical logic. The expected starting date is January 1, 2015 or soon afterwards and is negotiable.

Areas of special interest are:

(i) interactions of logic with computational complexity theory, or
(ii) model theory (any of its facets).

However, strong candidates in all areas of mathematical logic will be considered. Candidates are required to have a proven international research record corresponding to their career stage and a postdoctoral experience.

Department of Algebra.

Position in CS at California State U Channel Islands

California State University at Channel Islands (CSUCI) is seeking to fill a tenure-track position in Computer Science at the Assistant Professor rank. The program is poised to grow and we are looking for enthusiastic candidates who will help build a world-class program. All areas of specialization are welcome; candidates with expertise in Computer Security, Networks, Theory, Data Mining or Software Engineering are particularly encouraged to apply.

Responsibilities include teaching undergraduate and graduate computer science courses, pursuing funded research and scholarly publications, contributing to general education and interdisciplinary courses, assisting in the development of new academic programs and pursuing appropriate industrial collaboration.

CSUCI Faculty Applicant Site.

Python bumps off Java as top learning language

I think that Python is a great learning language. The constructs are easy and natural, and students end up “fighting” more with the overall algorithm implementation (which is good) than with the details of system management.

Python has surpassed Java as the top language used to introduce U.S. students to programming and computer science, according to a recent survey posted by the Association for Computing Machinery (ACM).

Eight of the top 10 computer science departments now use Python to teach coding, as well as 27 of the top 39 schools, indicating that it is the most popular language for teaching introductory computer science courses, according to Philip Guo, a computer science researcher who compiled the survey for ACM.

The three largest, most popular online class providers — Coursera, edX and Udacity — also offer introductory programming courses in Python, Guo found.

Python has been growing in popularity in the educational realm for at least the past few years, though this survey is the first to show it has eclipsed Java, which has been the dominant teaching language for the past decade, Guo said in a blog post about his survey.

via Python bumps off Java as top learning language – Computerworld.

Shortage of cybersecurity professionals poses risk to national security

The nationwide shortage of cybersecurity professionals – particularly for positions within the federal government – creates risks for national and homeland security, according to a new study from the RAND Corporation.

Demand for trained cybersecurity professionals who work to protect organizations from cybercrime is high nationwide, but the shortage is particularly severe in the federal government, which does not offer salaries as high as the private sector.

“It’s largely a supply-and-demand problem,” said Martin Libicki, lead author of the study and senior management scientist at RAND, a nonprofit research organization. “As cyber attacks have increased and there is increased awareness of vulnerabilities, there is more demand for the professionals who can stop such attacks. But educating, recruiting, training and hiring these cybersecurity professionals takes time.”

via Shortage of cybersecurity professionals poses risk to national security.

Data Security Best Practices

Small businesses may think the cost of protecting data is high, but doing nothing can be far more expensive.

No matter the size or scope of the business, everyone is reliant on data to get the job done. That is why every business –big or small– needs a data-security-best-practices plan. If your company’s data is lost, the cost to recover or recreate it can be insurmountable for small operations.

“It doesn’t really cost a lot” for companies to protect their data, says David Zimmerman, chief executive of LC Technology International. “It could be thousands of dollars to recover the data if the recovery is successful at all.”

Small businesses owners have seen enough news about data breaches to know they need to keep sensitive information secure from hackers. But many don’t take time to put IT security best practices in place, and fail to protect their data from a hard drive crash or computer meltdown. If the data isn’t backed up it can take days or even weeks to be up and running, which could mean the demise of many small businesses.  That’s why experts say you need a good data protection plan in place that combines both on-site and off-site backups.

via Data Security Best Practices | Fox Small Business Center.

NSF Dear Colleague Letter- Cybersecurity Education EAGERs

The National Science Foundation (NSF) is announcing its intention to fund a small number of Early Concept Grants for Exploratory Research (EAGERs) to encourage advances in cybersecurity education, an area supported by the Foundation’s Secure and Trustworthy Cyberspace (SaTC) (see solicitation NSF 13-578) and CyberCorps®: Scholarship for Service (see solicitation NSF 14-510) programs.

EAGER is a mechanism for supporting exploratory work in its early stages on untested, but potentially transformative, research ideas or approaches. This work may be considered especially “high risk – high payoff” in the sense that it, for example, involves radically different approaches, applies new expertise, or engages novel disciplinary or interdisciplinary perspectives.

via NSF Dear Colleague Letter- Cybersecurity Education EAGERs » CCC Blog.