|
Learn how to ensure that protected health data is handled safely with this video. Please note: this video uses automatically generated captions. From time-to-time, these captions aren't…
|
|
Scott Shackelford
serves as a professor of business law and ethics at the Indiana University
Kelley School of Business. He is also the Cybersecurity Program Chair and
Director of the Cybersecurity…
|
|
Dr. Efthymiopoulos is an Associate Professor of International Security and Strategy and former Dean of the College of Security and Global Studies, at the American University in the Emirates. He holds…
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Optimal Investment in Cybersecurity (Alex Alexeev, Prof. Kerry Krutilla) Link to paper: http://dlc.dlib.indiana.edu/dlc/bitstream/handle/10535/10289/Optimal%20Investment%20in%20Cybersecuri...
|
|
Advancing the Science of Cybersecurity Risk Assessment through Holistic, Dynamic Modeling (Prof. Diane Henshel, Mariana Cains, & Alex Alexeev)
|
|
Sometimes Three Rights Really Do Make a Wrong: Measuring Cybersecurity and Simpson’s Paradox (Prof. Eric Jardine, Virginia Polytechnic Institute & State University)
|
|
Too-Big-To-Fail 2.0: Cybersecurity & Online Platforms (Prof. Nizan Geslevich Packin, City University of New York)
|
|
This talk examines Russia’s evolving information strategy abroad, examining the variety of different tools now being used to try to influence the domestic political discourse and media space of…
|
|
Becoming an Information Security Engineer (Ashwin J. Mathew, Packet Clearing House)
Discussant: Prof. Barbara Cherry (IU)
|
|
Security of the Internet of Things: The Roles of Market Forces, Regulations and
Technology (Prof. Nir Kshetri, University of North Carolina at Greensboro)
Discussant: Worku Gedefa Urgessa…
|
|
Welcome from Prof. Scott Shackelford; Welcome from Federica Carugati, Ostrom Workshop Associate Director, & Introductions; Initial Brainstorming Session: Big Issues in Cybersecurity and…
|
|
|
|
|
|
Curious about what two-step login is, and how it keeps your personal information safe? Follow the adventures of Tracey Two-Step and learn more about two-step login at Indiana University!
|
|
|
|
Links in this video: IU Policy IT-12: go.iu.edu/it-12 Protect IU website: protect.iu.edu Use a Less Privileged Account: go.iu.edu/accounts-priv The Principle of Least Privilege: kb.iu.edu/d/amsv…
|
|
|