This course addresses key regulatory questions regarding cybersecurity and cybercrime. The point of departure of the course is the increasing focus on cybersecurity not only as a technical issue, but ...
This module introduces students, who may wish to work within the cultural heritage sector, to conservation as a profession and to the preservation and scientific investigation of cultural heritage ...
In depth understanding of molecular methods used for addressing epigenetic phenomena in basic research and in the clinic. The understanding of the bases for genetic and epigenetic inheritance has been ...
This course provides an introduction to the field of global health and global health research. Taking an interdisciplinary approach, the course discusses a variety of perspectives on global health ...
A major assumption behind all traditional regression models is that of independent observations. However, this assumption may not hold in all situations. Often we will have some sort of clustered data ...
Financial Markets Law and Regulation matters to us all. It is about our payments, mortgages, banking, other forms of savings and pensions. It is also about Norway’s sovereign wealth fund, the shares ...
The last decade has brought about an increase in the availability of new types of data, which are often messier and larger than what economists are used to. This requires a broader and more varied ...
This course gives an introduction to numerical methods for solving problems in physics and chemistry, i.e. methods for solving ordinary and partial differential equations, matrix operations and ...
This course has joint teaching with ECON9300B – Advanced Macroeconomic Theory. Macroeconomic theory with main emphasis on dynamic general equilibrium models. Mathematical tools for modern dynamic ...
The course provides an overview of physiological functions in humans and other mammals. The course provides an understanding of how the human body functions, and forms the foundation of our ...
Network and communications security is an important part of information security: a large portion of IT-related attacks are performed either using network connections or are directed at network ...
This course addresses general public international law, including the sources of international law (treaties, customary international law and general principles of law), rights and obligations of ...