Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish
Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish
Austen Parrish (2014-2022)
A recent Bureau of Labor Statistics report estimated a near 30 percent growth in coming years for information security professionals, far outpacing most other job types. While Indiana University has long recognized the importance of data security and privacy, multiple new initiatives are ensuring that the next generation of chief information security officers, systems analysts, privacy professionals and others will come from our law school.
One of the ways the law school is leading the way is through the university’s new master of science in cybersecurity risk management. That degree program combines the resources of three of IU’s top-ranked schools …
Expanding The Artificial Intelligence-Data Protection Debate, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Expanding The Artificial Intelligence-Data Protection Debate, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Cybersecurity And The New Era Of Space Activities, David P. Fidler
Cybersecurity And The New Era Of Space Activities, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Securing The Internet Of Healthcare, Michael Mattioli, Scott J. Shackelford, Steve Myers, Austin Brady, Yvette Wang, Stephanie Wong
Securing The Internet Of Healthcare, Michael Mattioli, Scott J. Shackelford, Steve Myers, Austin Brady, Yvette Wang, Stephanie Wong
Articles by Maurer Faculty
Cybersecurity, including the security of information technology (IT), is a critical requirement in ensuring society trusts, and therefore can benefit from, modern technology. Problematically, though, rarely a day goes by without a news story related to how critical data has been exposed, exfiltrated, or otherwise inappropriately used or accessed as a result of supply chain vulnerabilities. From the Russian government's campaign to influence the 2016 U.S. presidential election to the September 2017 Equifax breach of more than 140-million Americans' credit reports, mitigating cyber risk has become a topic of conversation in boardrooms and the White House, on Wall Street and …