At the end of the Spring Quarter, during the final examination period scheduled for this class, we will hold a 2-hour poster session for others in the Department to see the work you have done. This is a chance for you to show them what you have done!
The final poster is a visual representation for communicating the scope and value of the team’s work to others. The poster should be primarily graphical, with words at a minimum. The content for the poster comes from the final report and presentation, but the focus should be on the dimensions of the problem addressed and the results of the work. The results may not necessarily be numbers, figures, and conclusions; the project’s major contribution may be in a process, methodology, or organization of knowledge. Expect your audience to have at least a basic familiarity with information security, but design your poster to be an aid to you in explaining your work at multiple levels of detail.
Expect to spend some time on visual depictions of elements that you have put into words for your final report. It is important that you leave plenty of time to iterate over a few drafts of visual depictions: start with the simplest version and work on making it more cohesive and expressive over time. It will also be helpful to do test-runs of your visuals and of the overall organization of the poster. Consider a printed handout for the poster session; this can be a small version of your poster, the list of references for your poster, or both, but should be considered an appendix rather than more poster space. If you intend to use a handout that provides more information (full reference list, detailed graphic, additional results), include the handout when you turn the poster in.
For the presentation of the poster, be sure that all teammates can give a brief overview of the poster and speak to some of the details of the whole work.
The poster should contain the following items:
Here is the tentative grading rubric for the poster:
ECS 289M, Introduction to Research in Computer and Information Security
Version of December 30, 2021 at 9:30PM
|You can also obtain a PDF version of this.|