{"id":7409,"date":"2021-03-12T13:00:00","date_gmt":"2021-03-12T13:00:00","guid":{"rendered":"http:\/\/localhost\/myra\/?p=7409"},"modified":"2021-03-12T13:00:00","modified_gmt":"2021-03-12T13:00:00","slug":"lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao","status":"publish","type":"post","link":"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/","title":{"rendered":"Lecture on &#8216;Behavioural Information Security \u2013 from Trust to Inclusion&#8217; by Dr H. Raghav Rao"},"content":{"rendered":"\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:41% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"http:\/\/localhost\/myra\/wp-content\/uploads\/2021\/03\/CopyIMG_20210312_121800-1024x576.jpg\" alt=\"Dr H. Raghav Rao (AT&amp;T Distinguished Chair in Infrastructure Assurance and Security, University of Texas at San Antonio - USA)\" class=\"wp-image-7410 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p style=\"text-align: justify;\">On Friday, March 12<sup>th<\/sup>, first-year PGDM students attended a live-lecture titled \u201c<b>Behavioural Information Security \u2013 from Trust to Inclusion\u201d<\/b>. It was delivered by\u00a0<b><a href=\"http:\/\/localhost\/myra\/dr-h-raghav-rao\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/localhost\/myra\/dr-h-raghav-rao\/&amp;source=gmail&amp;ust=1615966501591000&amp;usg=AFQjCNH16EcPt2XYtBn7wKwYhC_qQSH13A\">Dr H. Raghav Rao<\/a><\/b> (AT&amp;T Distinguished Chair in Infrastructure Assurance and Security, the University of Texas at San Antonio &#8211; USA).<\/p>\n<p style=\"text-align: justify;\">Dr. Rao is a prolific researcher in the fields of decision-support systems, crisis communications, cybersecurity, and cross-cultural approaches to information systems. He is a Visiting Professor at the MYRA School of Business \u2013 and maintains close academic ties to Mysore, Bangalore, Manipal, and Mangalore.<\/p>\n<p style=\"text-align: justify;\">The lecture focused on<strong>\u00a0The Evolution of Trust and Technology\u00a0<\/strong>over the past few decades \u2013 and how theoretical knowledge in this field can be applied to modern-day issues like email-phishing, online rating systems, rider safety with Uber and Ola, hacking of personal information, online financial transactions, oversharing on personal media, food delivery quality, hotels and Airbnb, and even changing global politics. It was an informative and interesting session that was enjoyed by all attendees. \u00a0<\/p>\n<\/div><\/div>\n\n\n<p><em>This guest-lecture was hosted by the\u00a0<strong>MYRA Academic Office<\/strong>\u00a0\u2013 with the goal of giving students an opportunity to interact with international scholars on a regular basis.\u00a0<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>On Friday, March 12th, first-year PGDM students attended a live-lecture<\/p>\n","protected":false},"author":1,"featured_media":7411,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-7409","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-events"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lecture on &#039;Behavioural Information Security \u2013 from Trust to Inclusion&#039; by Dr H. Raghav Rao -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lecture on &#039;Behavioural Information Security \u2013 from Trust to Inclusion&#039; by Dr H. Raghav Rao -\" \/>\n<meta property=\"og:description\" content=\"On Friday, March 12th, first-year PGDM students attended a live-lecture\" \/>\n<meta property=\"og:url\" content=\"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-12T13:00:00+00:00\" \/>\n<meta name=\"author\" content=\"MSB\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"MSB\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/\",\"url\":\"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/\",\"name\":\"Lecture on 'Behavioural Information Security \u2013 from Trust to Inclusion' by Dr H. Raghav Rao -\",\"isPartOf\":{\"@id\":\"https:\/\/myra.ac.in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2021-03-12T13:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/myra.ac.in\/blog\/#\/schema\/person\/b4ab764d3aefdaa8fda3802f3aa5cc8d\"},\"breadcrumb\":{\"@id\":\"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/myra.ac.in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lecture on &#8216;Behavioural Information Security \u2013 from Trust to Inclusion&#8217; by Dr H. Raghav Rao\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/myra.ac.in\/blog\/#website\",\"url\":\"https:\/\/myra.ac.in\/blog\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/myra.ac.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/myra.ac.in\/blog\/#\/schema\/person\/b4ab764d3aefdaa8fda3802f3aa5cc8d\",\"name\":\"MSB\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/myra.ac.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/611f40e8eca137d63a8a68d0cc3e6c16cbf8afad10710f8b2698fb241bc38ef0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/611f40e8eca137d63a8a68d0cc3e6c16cbf8afad10710f8b2698fb241bc38ef0?s=96&d=mm&r=g\",\"caption\":\"MSB\"},\"sameAs\":[\"https:\/\/myra.ac.in\/blog\"],\"url\":\"https:\/\/myra.ac.in\/blog\/author\/myra2021\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lecture on 'Behavioural Information Security \u2013 from Trust to Inclusion' by Dr H. Raghav Rao -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/","og_locale":"en_US","og_type":"article","og_title":"Lecture on 'Behavioural Information Security \u2013 from Trust to Inclusion' by Dr H. Raghav Rao -","og_description":"On Friday, March 12th, first-year PGDM students attended a live-lecture","og_url":"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/","article_published_time":"2021-03-12T13:00:00+00:00","author":"MSB","twitter_card":"summary_large_image","twitter_misc":{"Written by":"MSB","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/","url":"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/","name":"Lecture on 'Behavioural Information Security \u2013 from Trust to Inclusion' by Dr H. Raghav Rao -","isPartOf":{"@id":"https:\/\/myra.ac.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/#primaryimage"},"image":{"@id":"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/#primaryimage"},"thumbnailUrl":"","datePublished":"2021-03-12T13:00:00+00:00","author":{"@id":"https:\/\/myra.ac.in\/blog\/#\/schema\/person\/b4ab764d3aefdaa8fda3802f3aa5cc8d"},"breadcrumb":{"@id":"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/myra.ac.in\/blog\/lecture-on-behavioural-information-security-from-trust-to-inclusion-by-dr-h-raghav-rao\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/myra.ac.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Lecture on &#8216;Behavioural Information Security \u2013 from Trust to Inclusion&#8217; by Dr H. Raghav Rao"}]},{"@type":"WebSite","@id":"https:\/\/myra.ac.in\/blog\/#website","url":"https:\/\/myra.ac.in\/blog\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/myra.ac.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/myra.ac.in\/blog\/#\/schema\/person\/b4ab764d3aefdaa8fda3802f3aa5cc8d","name":"MSB","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/myra.ac.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/611f40e8eca137d63a8a68d0cc3e6c16cbf8afad10710f8b2698fb241bc38ef0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/611f40e8eca137d63a8a68d0cc3e6c16cbf8afad10710f8b2698fb241bc38ef0?s=96&d=mm&r=g","caption":"MSB"},"sameAs":["https:\/\/myra.ac.in\/blog"],"url":"https:\/\/myra.ac.in\/blog\/author\/myra2021\/"}]}},"_links":{"self":[{"href":"https:\/\/myra.ac.in\/blog\/wp-json\/wp\/v2\/posts\/7409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/myra.ac.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/myra.ac.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/myra.ac.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/myra.ac.in\/blog\/wp-json\/wp\/v2\/comments?post=7409"}],"version-history":[{"count":0,"href":"https:\/\/myra.ac.in\/blog\/wp-json\/wp\/v2\/posts\/7409\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/myra.ac.in\/blog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/myra.ac.in\/blog\/wp-json\/wp\/v2\/media?parent=7409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/myra.ac.in\/blog\/wp-json\/wp\/v2\/categories?post=7409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/myra.ac.in\/blog\/wp-json\/wp\/v2\/tags?post=7409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}