7. Multi-Disciplined IA Approach Goal of System Policy Security Awareness Training Procedures & Practices Mechanisms Secure System IA Audit Feedback Business School—IT iSchool Evans School—Internet Center Law School—Shidler Center Business School—IT iSchool Evans School Law School Tech Comm-Eng iSchool Computer Science Elect Engr Business School—IT iSchool Tech Comm-Eng
22. Information Security Compliance and Risk Management Institute: Where Information Technology, Law and Risk Management Converge September 16-17, 2009 University of Washington UW Tower Auditorium Seattle, Washington http://www.engr.washington.edu/epp/infosec/index.php
25. Attribute Agricultural Age Industrial Age Information Age Wealth Land Capital Knowledge Advancement Conquest Invention Paradigm Shifts Time Sun/Seasons Factory Whistle Time Zones Workplace Farm Capital equipment Networks Organization Structure Family Corporation Collaborations Tools Plow Machines Computers Problem-solving Self Delegation Integration Knowledge Generalized Specialized Interdisciplinary Learning Self-taught Classroom Online
27. And just whom do you think is going to clean up this mess, Noah?
28.
29. Our Love Affair with the Internet Shoppers embrace the online model POSTED: 0727 GMT (1527 HKT), December 20, 2006 Embracing Internet Technologies Baby Boomers Embracing Mobile Technology US Internet Users Embrace Digital Imaging Docs Embracing Internet
66. If government predictions are right, health IT will create 50,000 new jobs in the future. The new jobs will be needed at all levels, from engineers to IT workers. People who have experience in the computer science and informatics fields will be especially attractive to potential employers, but the federal government will put some money toward training employees. Nurses could have the hardest time transitioning from paper to digital, but the training will help to close the informatics gap 50,000 Health IT Jobs Expected October 28, 2009 - 5:53pm
67. U.S. Faces Cyber Security Gap Without Training, Education March 24, 2010 By Kenneth Corbin WASHINGTON -- As discussions about the federal approach to cyber security continue to percolate across the highest levels of government , one of the most important steps policymakers can take is to nourish the education and training of a new crop of security experts, a senior administration official said here at the FOSE government IT show . Working in concert with the government, the private sector has made significant strides in improving software security and ferreting out vulnerabilities in the supply chain, but the flow of cyber security experts graduating from the nation's universities with advanced degrees remains anemic , according to Richard Marshall, the director of global cyber security management at the Department of Homeland Security.
68. Homeland Security to hire 1,000 cybersecurity experts By Michael Cooney October 1, 2009 01:42 PM ET Network World - The Department of Homeland Security wants to hire 1,000 cybersecurity professionals in the next three years, according to agency Secretary Janet Napolitano. The department has the authority to recruit and hire cybersecurity professionals across DHS over the next three years in order to help fulfill its mission to protect the nation’s cyber infrastructure, systems and networks , she said.
72. Global Competition Technologies & Policies Professional & Social Trends Experts & Community / Business Leaders Potential: Students Researchers Educators Political Environment Economy Outcomes: Professionals New Knowledge New Technology Ed. Products Ideology Culture Pedagogical institute Model
73.
74. Global Competition Technologies & Policies Professional & Social Trends Experts & Community / Business Leaders Potential: Students Researchers Educators Political Environment Economy Outcomes: Professionals New Knowledge New Technology Ed. Products Ideology Culture Pedagogical institute Model
Expect to see a similar evolution within Virtual Worlds to that on the rest of the internet – attacks will become monetized
Evolution of threats on the Internet – we can expect to see the same evolution in Virtual worlds.
The nutshell: a fake pastor from Nigeria tries to con a stranger out of money only to end up with a horrific tattoo instead. In a supposed bid for financial assistance to help Pakistani earthquake survivors this scammer tried to trick the wrong individual. The scambusters write back that he could have up to $150,000 if only he were a member of the church. The scammer bites, of course, and is told that he’ll simply have to get a tattoo showing his devotion to the church. Sure enough, he gets the tattoo and sends pictures! At this point things get strange: the scambusters fake being another scammer who has hacked into the good church’s email system. They finally get the scammer to “work for them” and admit what he is doing. Before it is finished, the scambusters have the name and address of the scammer and leave him waiting (forever) for his funds).