Search for tag: "data security"

CI WG demo: CADRE (Collaborative Archive & Data Research Environment)

IUNI's Valentin Pentchev presents CADRE to the South Big Data Hub's Data Sharing & Cyberinfrastructure Working Group.

From  Stephanie McGavin A week ago 1 views 0  

A short breakdown of CADRE

Watch as the IUNI IT team explains the significance of the SBD-Gateway project and how the CADRE platform works in this short video.

From  Stephanie McGavin 2 Weeks ago 5 views 0  

K200 - Download & Unzip Student Data Files

Video covers: How to download and unzip the student data files for the Canvas textbook "Skills for Success".

From  Margaret Lion 10 Months ago 11 views 0  

IU CIBER Thai Language & Culture Modules 10: Safety & Asking for Help

Part 10 of our series on the language and culture of Thailand. In this video, you will learn what to if you are in trouble and how to communicate local people in case of emergency.

From  IIB Institute for Intl Business 10 Months ago 2 views 0  

Self-Defense

Learn the basics of self-defense and situational awareness in this video from IUPD's Lt. Rhodes. This video was recorded as a review for in-person self-defense classes, but is also a great…

From  Julie Newsom 10 Months ago 59 views 0  

Handling human subjects data responsibly

This panel of researchers in the humanities and social sciences will discuss practical strategies in dealing with human subjects data in their fields. Each will describe the most common issues they…

From  Erin Foster A year ago 3 views 0  

Developing HIPAA compliant workflows for ePHI

Do you store or analyze research data containing PHI on IU systems? This session will walk researchers through the additional physical, administrative, and technical safeguards necessary to work with…

From  Erin Foster A year ago 2 views 0  

Data Services for Human Subjects Research

These presentations provide an overview and discussion of the research data services offered by the Regenstrief Data Core and the IUPUI FSPH/IUSM Department of Biostatistics. Each speaker will…

From  Erin Foster A year ago 0 views 0  

Securing HIPAA Workflows on UITS Systems

Learn how to ensure that protected health data is handled safely with this video. Please note: this video uses automatically generated captions. From time-to-time, these captions aren't…

From  ittrvid IT Training Video A year ago 66 views 0  

CIBER Focus: "Information Governance around the World" with Scott Shackelford -- May 3, 2018

Scott Shackelford serves as a professor of business law and ethics at the Indiana University Kelley School of Business. He is also the Cybersecurity Program Chair and Director of the Cybersecurity…

From  IIB Institute for Intl Business A year ago 27 views 0  

CIBER Symposium on Cybersecurity & Sustainable Development: Day-in-Summary - Jan. 26, 2018

The 2018 International Symposium on Sustainable Development concluded with a "Day-in-Summary Discussion" involving all of the day's panelists and moderated by Keynote speaker Liisa…

From  IIB Institute for Intl Business A year ago 6 views 0  

CIBER Symposium on Cybersecurity & Sustainable Development: Keynote Address w/ Liisa Past - Jan. 26, 2018

On January 26, 2018, the third International Symposium on Sustainable Development was held. For 2018, the them was "Cybersecurity & Sustainable Development." The day started with a…

From  IIB Institute for Intl Business A year ago 18 views 0  

Jefferson Davis, "The Grammar of Graphics: An Introduction to ggplot2" (IU Workshop in Methods, 2017-10-13)

In The Grammar of Graphics, Leland Wilkinson created a systematic way to think about statistical graphics and the presentation of quantitative data. The package ggplot2 by Hadley Wickham implements…

From  ssrc Social Science Research Commons A year ago 24 views

Dr. James Ziliak and Dr. Charles Hokayem, "Kentucky Research Data Center Infosession" (IU Workshop in Methods, 2017-09-22)

Friday, September 22, 2017 Dr. James Ziliak and Dr. Charles Hokayem, "Kentucky Research Data Center Infosession" Social Science Research Commons (Woodburn Hall 200), 2pmThe Kentucky…

From  ssrc Social Science Research Commons A year ago 6 views

10/02/2017 Colloquium Series - Hyeran Jo:“Weapon of the Weak? Rebel Groups’ International Law Talk, 1974–2011”

Rebel groups in armed conflicts around the globe are often violators of international law. Yet, out of approximately 350 rebel groups in contemporary armed conflicts, 60 groups issue what legal…

From  David Price A year ago 6 views 0  

IT-28 And Risk Mitigation Infoshare 1 (of 3)

On Thursday, September 28, ITCP will hosted an infoshare about IT-28 with Ian Washburn and Charles Escue from the University Information Security Office(UISO). This was the first in wht will be a…

From  IT Community IT Community Partnerships A year ago 92 views 0  

09/18/17 - Angie Raymond: “Information and the Regulatory Landscape: A Growing Need to Reconsider Existing Legal Frameworks”

Advanced artificial intelligence (AI) systems are already being used to enhance our lives and to transform the way businesses operate. Businesses across a broad spectrum of industries are exploring…

From  David Price A year ago 13 views 0