Responsible Collaboration Through Appropriate Research Security: A Workshop To Discuss and Study the Emergent Discipline of Research on Research Security
dc.contributor.author | Dao, Tam K. | en_US |
dc.contributor.author | Evans, Kenneth M. | en_US |
dc.contributor.author | Shannon, Michael D. | en_US |
dc.contributor.author | Bronk, Christopher | en_US |
dc.contributor.author | Neuhauser, Claudia | en_US |
dc.contributor.author | Roberts, Evan | en_US |
dc.contributor.author | Haselkorn, Mark P. | en_US |
dc.contributor.author | Ribes, David | en_US |
dc.contributor.author | Shih, Tommy | en_US |
dc.contributor.org | Baker Institute Science and Technology Policy Program | en_US |
dc.date.accessioned | 2024-09-09T13:55:49Z | en_US |
dc.date.available | 2024-09-09T13:55:49Z | en_US |
dc.date.issued | 2024 | en_US |
dc.description.abstract | This workshop report offers a summary of "Responsible Collaboration Through Appropriate Research Security" held at Rice University's Baker Institute for Public Policy in May 2024. The report discusses challenges and opportunities to the field of research on research security (RoRS), and provides recommendations to guide the National Science Foundation's new RoRS program. | en_US |
dc.identifier.citation | Dao, T. K., Evans, K. M., Shannon, M. D., Bronk, C., Neuhauser, C., Roberts, E., Haselkorn, M. P., Ribes, D., & Shih, T. (2024). Responsible Collaboration Through Appropriate Research Security: A Workshop To Discuss and Study the Emergent Discipline of Research on Research Security. James A. Baker III Institute for Public Policy of Rice University. https://doi.org/10.25613/YFR2-1593 | en_US |
dc.identifier.doi | https://doi.org/10.25613/YFR2-1593 | en_US |
dc.identifier.uri | https://hdl.handle.net/1911/117856 | en_US |
dc.language.iso | eng | en_US |
dc.publisher | James A. Baker III Institute for Public Policy of Rice University | en_US |
dc.rights | This work is protected by copyright and is made available here for research and educational purposes. Permission to reuse, publish, or reproduce the work beyond the bounds of fair use or other exemptions to copyright law must be obtained from the copyright holder. | en_US |
dc.subject.keyword | research security | en_US |
dc.subject.keyword | cybersecurity | en_US |
dc.subject.keyword | public policy | en_US |
dc.subject.keyword | science and technology policy | en_US |
dc.subject.keyword | national security | en_US |
dc.title | Responsible Collaboration Through Appropriate Research Security: A Workshop To Discuss and Study the Emergent Discipline of Research on Research Security | en_US |
dc.type | Report | en_US |
dc.type.dcmi | Text | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- S-T-Research_on_Research_Security_FINAL-090524.pdf
- Size:
- 2.47 MB
- Format:
- Adobe Portable Document Format