Wednesday, 09 Oct 2019
Post-Award Actions 101
Learn the basics about post-award actions and the most frequently asked questions. We'll talk about how to request a PI change, who can submit a no-cost extension request, who really needs to sign a revised Goldsheet, and other useful information about budgeting and managing award changes. Our goal is to help you learn how to save time and navigate these processes quickly and efficiently.
CEAH Fall 2019 Reception
The Center for Excellence in the Arts and Humanities (CEAH) and the Office of the Vice President for Research (VPR) would like to welcome back our faculty in the arts and humanities with a fall reception. Join us for refreshments and a cash bar as we celebrate the exciting research taking place in the arts.
Thursday, 10 Oct 2019
IRB Basics: Protecting Human Research Subjects
This is the second session of a three-part series that looks more indepth at components of the IRB submission process. Participants in this will discuss risk in human subjects research and approaches for minimizing or mitigating risk. We'll also examine confidentiality and data security measures to protect research subjects.
Campus conversation: Managing threats and fear
"From Words to Bullets: Managing Threats and Fear," presented by ISU Police. Explore common fears about verbal, physical, and lethal attacks, as well as a space to gain knowledge participants can then use as tools to increase their own safety. Small group discussions will follow the presentation.
Artstor - What is it Good For?
This workshop will provide an introduction to Artstor, the preeminent image repository for scholarly and educational research in the world. Let us know if you need accommodation. Register through Learn@ISU, Keyword:LIB.
Wednesday, 16 Oct 2019
How to Secure your Export-controlled or Controlled Unclassified Research Data and Interest
This session will teach you about physical & IT security measures for export control plans, and introduces you to the concept of Controlled Unclassified Information (CUI). You'll learn how to implement security measures for your research data and interests, and gain a better understanding of why these security measures are necessary.