Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
Download eCampus 2010 presentations and complementing documents here.
Into the Cloud: A Hands-on Workshop Exploring the Pros and Cons of Hosting Servers in Public, Private, and Hybrid Clouds
Adam Goldstein
Data Driven Security: A Different Approach to Determining Security Requirements
Steve Nyman
Picking Policy Priorities: Porn, Privacy, Procurement, P2P, or IP
Greg Jackson
So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users
Cormac Herley
Characterizing the Cyberthreat Landscape
Matthew Devost
Panel Discussion: Cloud Computing - Pros and Cons
David Bucciero, John Calkins, Greg Jackson, and Sheri Stahler
Three Approaches to Awareness: Unified Messaging, Local Responses, and National Cybersecurity Awareness Month
Michael Kaiser
How Should Colleges Respond to RIAA and Other File Sharing Subpoenas?
Ray Beckerman
American Privacy: Can a 19th Century Right Survive 21st Century Technology
Frederick Lane
Botnets: A Look Into Today's Malware Battle Front
Marc Evans
eDiscovery: A Panel Discussion
Adam Goldstein, George Moore, and Frederick Lane
Hacking Tools and the Hacker Curriculum
Far McKon and Sergey Bratus
Social Media and College Students: Understanding the Millennial Generation's Staying Connected Mindset
Davina Pruitt-Mentle