Skip to page navigation menu
Skip entire header
Brown.edu
News
—
Events
—
Exhibits
—
For You
Undergraduate Students
Graduate & Medical Students
Faculty
Medical & Clinical Faculty
Alumni
Visiting Scholars
Special Collections Researchers
Library Staff
Brown Digital Repository
Off-Campus Access
My Library Account
Search
⚲
☰
×
BruKnow
Library Website
Search →
×
Feedback
Discover
Browse Collections
Deposited Content
Theses & Dissertations
Library Collections
Recently Added
About
I Want to
Upload Something
Assign a DOI
Consult on a Project
Use an API
Read FAQs
Search
Off-Campus Access
My Library Account
Borrow, Request, & Renew
Articles, Journals, & Databases
Research Help
Hours & Locations
Events
Ask a Question Now
Skip 13 subheader links
Home
Feedback
Discover ▾
Browse Collections
Deposited Content
Theses & Dissertations
Library Collections
Recently Added
About
I Want to ▾
Upload Something
Assign a DOI
Consult on a Project
Use an API
Read FAQs
Login
⚲
Top
Uploaded Content
Content added by scholars through self-service upload
Active filters
genre%3AFlyer
Cancel selected facet
ir_collection_name%3AGrassroots Archive Digital Initiative
Cancel selected facet
mods_type_of_resource%3Atext
Cancel selected facet
keyword%3ADemocratization
Cancel selected facet
Collection
School of Professional Studies
Cancel selected facet
Refine your results
Collection
80
School of Professional Studies
67
Master of Science in Cybersecurity
12
Master of Science in Healthcare Leadership
1
IE Brown Executive MBA
Format
76
text
3
moving image
1
text_resources
Genre
1
Articles
75
Critical Challenge Project
1
Key Reflection Project
3
animations (visual works)
Keywords
1
"Network Security"
1
23 NYCYRR500
1
Accountable Care Organization (ACO)
1
Adaptive governance
1
Addiction
Show More...
×
Close
Keywords
1
"Network Security"
1
23 NYCYRR500
1
Accountable Care Organization (ACO)
1
Adaptive governance
1
Addiction
1
Aerospace
1
Affordable Care Act (ACA)
1
Agriculture technology
1
Agtech
1
Artifical Intelligence
1
Artificial intelligence (AI)
1
Assessment
1
Behavioral health
1
Beta Girl Training module
1
Big data
1
Blockchain
1
Bluetooth technology
1
Boards of Directors
1
Breach of trust
2
Bug Bounty
1
Business Case Studies
1
Business Integrated Security Roles (BISRs)
1
C-Suite
1
CCPA
1
COSO
1
Care navigation
1
Change management
1
Chief Executive Officer (CEO)
1
Children
1
Cloud computing
1
Cloud service provider
2
Commercial health insurance
1
Community benefit
1
Compliance
25
Computer security
2
Condition-specific bundled payments (CSBPs)
1
Confidential communications--Lawyers
2
Corporate governance
1
Corporate resiliency
1
Credit card fraud--Prevention
1
Critical Information Infrastructure
2
Critical infrastructure
1
Cryptography
1
Cyber Civil Support Teams (CCST)
1
Cyber Education
1
Cyber Incident Response
1
Cyber Key Terrain
1
Cyber intelligence surveillance
1
Cyber security frameworks
1
CyberScore
25
Cybersecurity
1
Cybersecurity staffing
1
Cybersecurity standards
1
Cyberwarfare
1
Data classification
1
Data governance
1
Data inventory
1
Data management
1
Data map
1
Data profile
4
Data protection
1
Data protection--Law and legislation
1
Data scandal
1
Data steward
1
Deep learning
1
Defense Federal Acquisition Regulation Supplement (DFARS)
1
Department of Defense (DoD)
1
Digital transformation
1
Distilleries
1
Due Diligence
1
Emergency Department
1
Employee Training
1
Employee retention
1
Employees--Recruiting
1
Employees--Training of
1
Encryption
1
European Commission
1
European Union
1
Executive cybersecurity
1
Executive dashboard
1
Executives
1
FFIEC
1
Facial recognition
1
Family systems
1
Federal Bureau of Investigation (FBI)
2
GDPR
1
Gap time
3
General Data Protection Regulation
3
General Data Protection Regulation (GDPR)
1
Geriatrics
1
Hackers
1
Hacking
1
Harmonization
1
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
1
Health care
1
Health care apps
1
Health care delivery
1
Healthcare policy
1
Hedge funds
1
Holistic medicine
1
Hospitals
1
IOA
1
IOC
1
ISO 27001/2
1
ITAR
1
Identity management
1
Implants
1
In-house counsel
1
Indications of Attack
1
Indications of Compromise
1
Information Security Awareness Training
1
Information Security Risk Management
1
Information storage and retrieval systems
1
Information technology--Security measures
1
Insider threat
1
Integrated practice unit
1
Integrated risk management
1
Internet data
1
Internet of Battlefield Things (IoBT)
2
Internet of Things (IoT)
1
Internet privacy
1
Israel
1
Joint Intelligence Preparation of the Operational Environment
1
Labor market
1
Laparosocpic surgery
1
Law--International unification
1
Laws
2
Leaks (Disclosure of information)
1
Lean management
1
Legal
1
Machine learning
1
Medicaid
1
Mental health
1
Metrics
1
Microchipping
1
Mobile applications
1
Mobile computing
1
NIST 800-171
1
NIST 800-53
1
NIST Cybersecurity framework
1
Nanoelectronics
1
National Association Corporate Directors (NACD)
1
Near-field communication (NFC)
1
New employees
1
OCC
1
Offensive Cyber
1
Onboarding
1
Opiate use disorder
1
PSD2
1
Password security
1
Patient privacy
1
Personal data
4
Phishing
1
Physical security
1
Physicians
1
Population health
1
Precision farming
9
Privacy
1
Privacy Impact Assessments
1
Privacy legislation
2
Privacy technology
2
Private health insurance
1
Public-private sector cooperation
1
Puerto Rico
1
Radio-frequency identification (RFID)
1
Ransomware
1
Real Property
1
Recommended Practice for Nanoscale and Molecular Communication Framework
1
RegTech
1
Responsible Disclosure
1
Revised Payment Service Directive
1
Ridge, Thomas J.
1
Risk
1
Risk Assessment
1
Risk frameworks
1
Risk management
1
SD-WAN
1
SDN
1
SOC 2
1
SSAE 16
1
Security rating
1
Security ratings
1
Security risk vector
1
Self-Sovereign Identity
1
Shared responsibility model
1
Small and medium-sized enterprises (SMEs)
1
Small and midsize business (SMB)
1
Small businesses
1
Smart phones
1
Social Engineering
1
Software
1
Software Defined Networks
1
Software Defined WAN
2
Software as a Service (SaaS)
1
Spine
1
Substance abuse
2
Training
2
cyber-legibility primer
2
cybersecurity
2
data protection
×
Items
«
1
»
Items (1-80) out of 80 results
Sort by title (A-Z)
relevance
title (A-Z)
title (Z-A)
date (old to new)
date (new to old)
new to the BDR
100 per page
10
per page
20
per page
50
per page
100
per page
View
normal
gallery
A GDPR-Ready Cybersecurity and Privacy Plan for B2B SaaS Startups
Accurately Measuring your Organizations Defensive Posture Against Phishing Attacks
Adjuvant Security: A Cyber Legibility Primer
An Executive Cyber Education Framework for the Federal Bureau of Investigation
An In-House Counsel's Guide to Cybersecurity
Analyzing How An Accountable Care Organization Can Achieve Financial Sustainability Over A Five-Year Period By Applying the Triple Aim
Andrews Institiute Spine Integrated Practice Unit
Application and Integration of Cyber Operations to the Tactical Level of War
Appropriate Information Security Risk Management Practices for Today and the Future
Boards of Directors and Cybersecurity
Broadening the search to narrow the gap: The cybersecurity workforce challenge
Can We Trust Security Ratings? - Use and Credibility of Third-party Security Vendor Security Ratings
CCST Constraints: Addressing Programmatic Issues For Cyber Civil Support Teams
Children's Privacy
Coding for Privacy: An Agile Approach to Address Dynamic Privacy and Data Protection Requirements
Cyber Risk Scoring for Executives: An Assessment Framework
Cybersecurity Begins with ‘C-‘: Understanding and Managing Cyber Risk in the C-Suite
Cybersecurity is a Combat Sport: A Novel Approach
Cybersecurity Strategies and Policies in Managing 3rd Party Vendor Risks: A case for a quantitative Cybersecurity Scoring and Continuous Monitoring in the Financial Services industry
Data Governance and Cybersecurity Crossroads
Data Strategy is Business Strategy: Changing Conversations about Data Management
Developing Affordable Cyber Security Plans for Small and Medium Sized Businesses
DPOExpert.org
Encouraging Responsible Disclosure of Software Vulnerabilities
Establishment of a Minimally Invasive Program in Gynecologic Oncology Surgery in The Commonwealth of Puerto Rico
Evaluation Criteria for Implementing Disclosure Agreements and Trust Boundaries
Expanding the Role of the Cloud Service Provider to Reduce the Burgeoning Insider Threat Risk
Exploration of Artificial Intelligence in Cybersecurity
Forming the Cyber-Secured Board
Goodbye Plastic, Hello Bluetooth?: The Evolution of a Card-less Payment Industry
Governing Cybersecurity in an Emerging Market: A Proposal for Mozambique
Harmonizing Vendor Risk in the Financial Industry
Helping hedge funds address cybersecurity threats in a new regulatory environment.
Human Microchipping: Simplified Technology or Privacy Risk?
IMPROVING CYBERSECURITY THROUGH EMPLOYEE TRAINING: A FRAMEWORK FOR SOCIAL ENGINEERING AWARENESS TRAINING BASED ON FIELD RESEARCH
Improving Cybersecurity Training in The US Department Of Defense: Operation Vigilant Phoenix
Improving State's Incident Response
Integrated Holistic Healthcare: A Model for Community Behavioral Health
Internet of Things...or Threats
Lawyers, Technology, and Breaches: Maintaining Legal Posture in Incident Response
Making Commercially Funded Condition-Specific Bundled Payments More Attractive
Brown-affiliated users only
Making Commercially Funded Condition-Specific Bundled Payments More Attractive
Brown-affiliated users only
Making Do: Cybersecurity and Privacy Compliance for Small and Medium Businesses
Making Mid-Century, Modern:Transitioning a Third Generation Small Gear Shop and Aerospace Company into the Modern Age
Making Privacy Operational
Massachusetts Hospital Community Benefits and Alignment with Community Needs: A Post Health Care Reform Analysis
Maximum Security - Minimum Staff: Integrating Security Into Your Business
Mobile Cloud Computing: Security and Privacy Challenges
On PSD2 and GDPR Harmonization
Onboard and Upward: Developing Culture
Password Security
Phishing
Phishing Awareness Training
Precision Agriculture and AgTech: An Industry Risk Assessment
Privacy and Machine Learning in Physical Security
Privacy has a technology problem: Navigating the volatile privacy technology market
Privacy has a technology problem: Navigating the volatile privacy technology market
Ransomware
Redesign of Bellevue Hospital’s Care Delivery Model Using Lean Management
Residential Family Program Proposal for retrospective chart review, application, and expansion
SD-WAN Implementation: Design and Security Considerations
Security Considerations for Mobile Health Application Use
Security Frameworks for Nanoscale Communication Networks
Self-Sovereign Identity: A Blockchain-Enabled Paradigm Shift for State Government Identity Management
Spreading HIPAA Awareness Via Popular Media
Strategic Plans To Implement A Cost-Effective, Reproducible And Scalable, Geriatric Care-Navigation Program That Aligns Emergency Medicine Providers And Hospitals With The Quality And Value Expectations of Patients and Payers
The Agile Blue Team: Leveraging DevOps Concepts for Continuous Cyber Resiliency
The Answer to the Cybersecurity Skill Gap? She is Hiding in Plain Sight
The Benefits and Challenges of Creating Legal Definitions for Malware
The Critical Elements of CEO Leadership That Will Improve Cybersecurity
The Encryption Conniption
The Future of Risk - Creating a Framework for Growth of the Corporate Risk Function
The GDPR and US Small and Medium-sized Companies: Simple Tools to Begin the Compliance Process
The Legal and Policy Landscape and Way Forward for Security Researchers (Abstract)
The Ultimate High Wire Act: The Impact of Wire Fraud on Housing and Small Law Firms
Transforming Security Through a Public Cloud Migration
Use of a Mobile Device App for Voting and its Challenges
Using Facial Recognition to Identify Persons of Interest at Large, Private Events, While Protecting Personal Data and Privacy
Validating Privacy Requirements for the Personal Data Trade: Lessons from the Sarbanes-Oxley Act of 2002
Virtual Clipboard Project
«
1
»
Items (1-80) out of 80 results
×
Feedback
Loading...