DEPARTMENT OF COMPUTING
Dr. Bob Nielson, Tenured Associate Professor of Computer Science and Information Technology
E-MAIL: nielson@dixie.edu
PHONE: 435.652.7978
OFFICE: BURNS 238
OFFICE HOURS: MWF 09:00am - 09:45am or by appointment


Dixie State Univeristy -- Courses Bob Teaches Spring 2020

Computer Science
High School Honors CS -- Problem Solving with a computer -- How to solve problems with a computer.
CS 1400 -- Introduction to Computer Programming.
CS 1410 -- Object Oriented Programming -- Second Semester computer programming.
CS 2450 -- Software Engineering (IT4450) -- Programming as a team.
CS 4991 -- Competitive Programming -- Prepare for programming contests.

Information Technology
IT 1100 -- Introduction to Operating Systems -- Linux, Windows, MAC-OS.
IT 1200 -- Computer Hardware (CJ2500) -- Hardware and Windows.
IT 3150 -- Windows Servers -- Installation and Configuration of Windows Server 2012.
IT 4300 -- Database Systems (CS4307) --Installation, Design, and Programming of Database Systems.
IT 4310 -- Database Administration --noSQL and Oracle Databases.

More About Bob
Bob has been a computer consultant and programmer throughout southern Utah for the last 30 years.
Bob has been teaching at Dixie State University for ten years now.

Academic Credentials and Degrees:
A+ - Comptia
Network + - Comptia
PCPRO - TestOut
BS - Mathematics - Southern Utah University
MS - Computer Science - Utah State University
DCS - Computer Science - Colorado Technical University

Jobs
Computer Careers in Utah

Research Interests & Publications
Examining Database Security Methods -- Strategies to Prevent Inference-Based Snooping in Database Tables.
Abstract
One of the primary reasons for a database is to capture data for future statistical analysis. But savvy users can use this information to deduce the confidential information that is contained in a database. A real need exists to allow for general statistical analysis from a database while still preventing the disclosure of detailed confidential information. This paper discusses several methods that attempt to do just that including query restriction, data perturbation, output perturbation, conceptual, partitioning, and hybrid methods.
Conference Paper
Disertation
Defense Presentation