|
In this video we present options for making sure your Zoom meetings are secure from uninvited guests. In Part 1, we demonstrate steps you can take before your meeting; in Part 2, we show what you can…
|
|
Part 10 of our series on the language and culture of Thailand. In this video, you will learn what to if you are in trouble and how to communicate local people in case of emergency.
|
|
Learn the basics of self-defense and situational awareness in this video from IUPD's Lt. Rhodes. This video was recorded as a review for in-person self-defense classes, but is also a great…
|
|
|
|
|
|
|
|
|
|
The Second Annual Diversity Leadership Conference will be welcoming intellectual, author and journalist Marc Lamont Hill as a keynote speaker, as well as countless budding student leaders, to Indiana…
|
|
|
|
|
|
Advancing the Science of Cybersecurity Risk Assessment through Holistic, Dynamic Modeling (Prof. Diane Henshel, Mariana Cains, & Alex Alexeev)
|
|
Sometimes Three Rights Really Do Make a Wrong: Measuring Cybersecurity and Simpson’s Paradox (Prof. Eric Jardine, Virginia Polytechnic Institute & State University)
|
|
Becoming an Information Security Engineer (Ashwin J. Mathew, Packet Clearing House)
Discussant: Prof. Barbara Cherry (IU)
|
|
Security of the Internet of Things: The Roles of Market Forces, Regulations and
Technology (Prof. Nir Kshetri, University of North Carolina at Greensboro)
Discussant: Worku Gedefa Urgessa…
|
|
Welcome from Prof. Scott Shackelford; Welcome from Federica Carugati, Ostrom Workshop Associate Director, & Introductions; Initial Brainstorming Session: Big Issues in Cybersecurity and…
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lecture 8: Organizational Issues & Styles
|
|
Lecture 7: Managerial Issues
|