Informing Science Institute

ISI Journals

  • Informing Science: The International Journal of an Emerging Transdiscipline (InformingSciJ)
  • Journal of Information Technology Education: Research (JITE:Research)
  • Journal of Information Technology Education: Innovations in Practice (JITE:IIP)
  • Journal of Information Technology Education: Discussion Cases (JITE: DC)
  • Interdisciplinary Journal of e-Skills and Lifelong Learning (IJELL)
  • Interdisciplinary Journal of Information, Knowledge, and Management (IJIKM)
  • International Journal of Doctoral Studies (IJDS)
  • Issues in Informing Science and Information Technology (IISIT)
  • Journal for the Study of Postsecondary and Tertiary Education (JSPTE)
  • Informing Faculty (IF)

Collaborative Journals

  • Muma Case Review (MCR)
  • Muma Business Review (MBR)
  • International Journal of Community Development and Management Studies (IJCDMS)
  • InSITE2024 : Jul 24 - 25 2024,
  • All Conferences »
  • Publications
  • Journals  
  • Conferences  

Disaster at a University: A Case Study in Information Security

disaster at a university a case study in information security

Back to Top ↑

  • Become a Reviewer
  • Privacy Policy
  • Ethics Policy
  • Legal Disclaimer

Twitter

SEARCH PUBLICATIONS

Informing Science Institute

  • Articles, Papers, Symposia
  • Case Studies
  • Why Was Boston Strong Initiative
  • Executive Education
  • Student Involvement
  • Confronting Disasters
  • 2019 Events
  • 2018 Events
  • 2017 Events
  • 2016 Events
  • 2015 Events
  • 2014 Events
  • 2013 Events
  • 2012 Events
  • 2011 Events
  • 2010 Events
  • 2009 Events
  • Why Was Boston Strong?
  • Our Program

In This Section

The program has developed an extensive catalogue of case studies addressing crisis events. These cases serve as an important tool for classroom study, prompting readers to think about the challenges different types of crises pose for public safety officials, political leaders, and the affected communities at large.

The following cases, here organized into three broad categories, are available through the  Harvard Kennedy School Case Program ; click on a case title to read a detailed abstract and purchase the document. A selection of these cases are also available in the textbooks Managing Crises: Responses to Large-Scale Emergencies  (Howitt and Leonard, with Giles, CQ Press) and Public Health Preparedness: Case Studies in Policy and Management (Howitt, Leonard, and Giles, APHA Press), both of which contain fifteen cases as well as corresponding conceptual material to support classroom instruction.

Natural Disasters, Infrastructure Failures, and Systems Collapse

At the Center of the Storm: San Juan Mayor Carmen Yulín Cruz and the Response to Hurricane Maria (Case and Epilogue) This case profiles how Carmen Yulín Cruz, Mayor of San Juan, Puerto Rico, led her City’s response to Hurricane Maria, which devastated the island and neighboring parts of the Caribbean in the fall of 2017. By highlighting Cruz’s decisions and actions prior to, during, and following the storm’s landfall, the case provides readers with insight into the challenges of preparing for and responding to severe crises like Maria. It illustrates how several key factors—including San Juan’s pre-storm preparedness efforts, the City’s relationships with other jurisdictions and entities, and the ability to adapt and improvise in the face of novel and extreme conditions—shaped the response to one of the worst natural disasters in American history.

A Cascade of Emergencies: Responding to Superstorm Sandy in New York City (A and B) On October 29, 2012, Superstorm Sandy made landfall near Atlantic City, New Jersey. Sandy’s massive size, coupled with an unusual combination of meteorological conditions, fueled an especially powerful and destructive storm surge, which caused unprecedented damage in and around New York City, the country’s most populous metropolitan area, as well as on Long Island and along the Jersey Shore. This two-part case study focuses on how New York City prepared for the storm’s arrival and then responded to the cascading series of emergencies – from fires, to flooding, to power failures – that played out as it bore down on the region. Profiling actions taken at the local level by emergency response agencies like the New York City Fire Department (FDNY), the case also explores how the city coordinated with state and federal partners – including both the state National Guard and federal military components – and illustrates both the advantages and complications of using military assets for domestic emergency response operations.

Part B of the case highlights the experience of Staten Island, which experienced the worst of Sandy’s wrath. In the storm’s wake, frustration over the speed of the response triggered withering public criticism from borough officials, leading to concerns that a political crisis was about to overwhelm the still unfolding relief effort.

Surviving the Surge: New York City Hospitals Respond to Superstorm Sandy Exploring the experiences of three Manhattan-based hospitals during Superstorm Sandy in 2012, the case focuses on decisions made by each institution about whether to shelter-in-place or evacuate hundreds of medically fragile patients -- the former strategy running the risk of exposing individuals to dangerous and life-threatening conditions, the latter being an especially complex and difficult process, not without its own dangers. "Surviving the Surge" illustrates the very difficult trade-offs hospital administrators and local and state public health authorities grappled with as Sandy bore down on New York and vividly depicts the ramifications of these decisions, with the storm ultimately inflicting serious damage on Manhattan and across much of the surrounding region. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Ready in Advance: The City of Tuscaloosa’s Response to the 4/27/11 Tornado On April 27, 2011, a massive and powerful tornado leveled 1/8 of the area of Tuscaloosa, AL. Doctrine called for the County Emergency Management Agency (EMA) to take the lead in organizing the response to the disaster – but one of the first buildings destroyed during the event housed the County EMA offices, leaving the agency completely incapacitated. Fortunately, the city had taken several steps in the preceding years to prepare for responding to a major disaster. This included having sent a delegation of 70 city officials and community leaders, led by Tuscaloosa Mayor Walter Maddox, to a week-long training organized by FEMA. “Ready in Advance” reveals how that training, along with other preparedness activities undertaken by the city, would pay major dividends in the aftermath of the tornado, as the mayor and his staff set forth to respond to one of the worst disasters in Tuscaloosa’s history.

The Deepwater Horizon Oil Spill: The Politics of Crisis Response (A and B) Following the sinking of the Deepwater Horizon drilling rig in late April 2010, the Obama administration organized a massive response operation to contain the oil spreading across the Gulf of Mexico. Attracting intense public attention, the response adhered to the Oil Pollution Act of 1990, a federal law that the crisis would soon reveal was not well understood – or even accepted – by all relevant parties.

This two-part case series profiles how senior officials from the U.S. Department of Homeland Security sought to coordinate the actions of a myriad of actors, ranging from numerous federal partners; the political leadership of the affected Gulf States and sub-state jurisdictions; and the private sector. Case A overviews the disaster and early response; discusses the formation of a National Incident Command (NIC); and explores the NIC’s efforts to coordinate the actions of various federal entities. Case B focuses on the challenges the NIC encountered as it sought to engage with state and local actors – an effort that would grow increasingly complicated as the crisis deepened throughout the spring and summer of 2010.

The 2010 Chilean Mining Rescue (A and B) On August 5, 2010, 700,000 tons of rock caved in Chile's San José mine. The collapse buried 33 miners at a depth almost twice the height of the Empire State Building-over 600 meters (2000 feet) below ground. Never had a recovery been attempted at such depths, let alone in the face of challenges like those posed by the San José mine: unstable terrain, rock so hard it defied ordinary drill bits, severely limited time, and the potentially immobilizing fear that plagued the buried miners. The case describes the ensuing efforts that drew the resources of countless people and multiple organizations in Chile and around the world.

The National Guard’s Response to the 2010 Pakistan Floods Throughout the summer of 2010, Pakistan experienced severe flooding that overtook a large portion of the country, displacing millions of people, causing extensive physical damage, and resulting in significant economic losses. This case focuses on the role of the National Guard (and of the U.S. military, more broadly) in the international relief effort that unfolded alongside that of Pakistan’s government and military. In particular it highlights how various Guard and U.S. military assets that had been deployed to Afghanistan as part of the war there were reassigned to support the U.S.’s flood relief efforts in Pakistan, revealing the successes and challenges of transitioning from a war-footing to disaster response. In exploring how Guard leaders partnered with counterparts from other components of the U.S. government, Pakistani officials, and members of the international humanitarian community, the case also examines how they navigated a set of difficult civilian-military dynamics during a particularly tense period in US-Pakistan relations.

Inundation: The Slow-Moving Crisis of Pakistan’s 2010 Floods (A, B, and Epilogue) In summer 2010, unusually intense monsoon rains in Pakistan triggered slow-moving floods that inundated a fifth of the country and displaced millions of people. This case describes how Pakistan’s Government responded to this disaster and highlights the performance of the country’s nascent emergency management agency, the National Disaster Management Authority, as well as the integration of international assistance.

"Operation Rollback Water": The National Guard’s Response to the 2009 North Dakota Floods   ( A ,  B , and   Epilogue ) In spring 2009, North Dakota experienced some of the worst flooding in the state’s history. The state's National Guard responded by mobilizing thousands of its troops and working in concert with personnel and equipment from six other states. This case profiles the National Guard’s preparations for and response to the floods and focuses on coordination within the National Guard, between the National Guard and civilian government agencies, and between the National Guard and elected officials.

Typhoon Morakot Strikes Taiwan, 2009 (A, B, and C) In less than four days, Typhoon Morakot dumped close to 118 inches of rain on Taiwan, flooding cities, towns, and villages; washing away roads and bridges; drowning farmland and animals; and triggering mudslides that buried entire villages. With the typhoon challenging its emergency response capacity, Taiwan’s government launched a major rescue and relief operation. But what began as a physical disaster soon became a political disaster for the President and Prime Minister, as bitter criticism came from citizens, the opposition party, and the President’s own supporters.

Getting Help to Victims of 2008 Cyclone Nargis: AmeriCares Engages with Myanmar's Military Government (Case and Epilogue) In May 2008, Cyclone Nargis in Myanmar (Burma) left 138,373 dead or missing and 2.4 million survivors’ livelihoods in doubt, making it the country’s worst natural disaster and one of the deadliest cyclones ever. Friendly Asian countries as well as western governments which previously had used economic sanctions to isolate Myanmar’s military government now sought to provide aid to Myanmar’s people. But they met distrust and faced adversarial relationships from a suspicious government, reluctant to open its borders to outsiders.

China's Blizzards of 2008 From January 10-February 6, a series of heavy snow storms intertwined with ice storms and subzero temperatures created China’s worst winter weather in 50 years. The storms closed airports and paralyzed trains and roads, damaged power grids and water supplies, caused massive black-outs, and left several cities in hard-hit areas isolated and threatened. The disruption of the power supply and transport also severely affected the production and flow of consumer goods and industrial materials, triggering a cascade of crisis nationwide. Coal reserves at power plants were nearly exhausted, production was significantly cut back at big factories, the chronic winter power shortage was exacerbated, and food prices spiked sharply in many areas because of shortages.

Thin on the Ground: Deploying Scarce Resources in the October 2007 Southern California Wildfires  When wildfires swept across Southern California in October 2007, firefighting resources were stretched dangerously thin. Readers are prompted to put themselves in the shoes of public safety authorities and consider how organizations can best address resource scarcities in advance of and during emergency situations.

"Broadmoor Lives:" A New Orleans Neighborhood’s Battle to Recover from Hurricane Katrina (A, B, and Sequel) Stunned by a city planning committee’s proposal to give New Orleans neighborhoods hard-hit by Hurricane Katrina just four months to prove they were worth rebuilding, the Broadmoor community organized and implemented an all-volunteer redevelopment planning effort to bring their neighborhood back to life.

Gridlock in Texas (A and B) As Hurricane Rita bore down on the Houston metro area in mid-September 2005, just a few weeks after Hurricane Katrina had devastated the Gulf Coast, millions of people flocked to the roadways. Part A details the massive gridlock that ensued, illustrating the challenges of implementing safe evacuations and of communicating effectively amidst great fear. Part B explores post-storm efforts to improve evacuation policies and procedures -- and how the resulting plans measured up in 2008, when the area was once again under threat, this time from Hurricane Ike.

Wal-Mart’s Response to Hurricane Katrina: Striving for a Public-Private Partnership (Case and Sequel) This case explores Wal-Mart's efforts to provide relief in the immediate aftermath of Hurricane Katrina, raising important questions about government’s ability to take full advantage of private sector capabilities during large-scale emergencies. (Included in Howitt & Leonard, Managing Crises)

Moving People out of Danger: Special Needs Evacuations from Gulf Coast Hurricanes (A and B ) In the face of Hurricanes Katrina and Rita, officials in Louisiana and Texas grappled with the challenging task of evacuating people with medical and other special needs to safety. The shortcomings of those efforts sparked major initiatives to improve evacuation procedures for individuals requiring transportation assistance – plans that got a demanding test when Hurricanes Gustav and Ike threatened the Gulf Coast in the fall of 2008. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Hurricane Katrina:  (A) Preparing for the Big One , and  (B) Responding to an "Ultra-Catastrophe" in New Orleans Exploring the failed response to Hurricane Katrina and its implications for the greater New Orleans area, the case begins with a review of pre-event planning and preparedness efforts. Part B details the largely ineffective governmental response to the rapidly escalating crisis.  (Included in Howitt & Leonard, Managing Crises; Also available in abridged form.)

Rebuilding Aceh: Indonesia's BRR Spearheads Post-Tsunami Recovery (Case and Epilogue) The December 26, 2004, Indian Ocean tsunami caused tremendous damage and suffering on several continents, with Indonesia's Aceh Province, located on the far northern tip of Sumatra Island, experiencing the very worst. In the tsunami's wake, the Indonesian government faced a daunting task of implementing a large-scale recovery effort, and to coordinate the many reconstruction projects that soon began to emerge across Aceh, Indonesia's president established a national-level, ad hoc agency, which came to be known by its acronym BRR. This case examines the challenges encountered by BRR's leadership as it sought to implement an effective recovery process.

When Imperatives Collide: The 2003 San Diego Firestorm   (Case and Epilogue) In October 2003, multiple wildfires burned across southern California. Focusing on the response to the fires, this case explores what can happen when an operational norm — to fight fires effectively but safely — collides with the political imperative to override established procedures to protect the public.  (Included in Howitt & Leonard, Managing Crises)

"Almost a Worst Case Scenario:" The Baltimore Tunnel Fires of 2001 (A, B, and C) When a train carrying hazardous materials derailed under downtown Baltimore, a stubborn underground fire severely challenged emergency responders. Readers are prompted to give particular attention to the significant challenges of managing a multi-organizational response.  (Included in Howitt & Leonard, Managing Crises)

Safe But Annoyed: The Hurricane Floyd Evacuation in Florida When far more citizens than necessary evacuated in advance of Hurricane Floyd, Florida’s roadways were quickly overloaded and emergency management operations overwhelmed. In detailing these (and other) problems, the case highlights the challenges of managing evacuations in advance of potentially catastrophic events. (Included in Howitt & Leonard, Managing Crises)

The US Forest Service and Transitional Fires This case outlines the operational challenges of decision making in a high stress, high stakes situation – in this instance during rapidly evolving wildland fires, also known as "transitional fires." (Included in Howitt & Leonard, Managing Crises)

The Tzu Chi Foundation's China Relief Mission Tzu Chi is one of the largest charities in Taiwan, and one of the swiftest and most effective relief organizations internationally. Rooted in the value of compassion, the organization has many unusual operating features -- including having no long term plan. This case explores the basic operating approach of the organization and invites students to explain the overall effectiveness and success of the organization and its surprising success (as a faith-based, Taiwanese, direct-relief organization -- all of which are more or less anathema to the Chinese government) in securing an operating license in China.

Security Threats

Ce Soir-Là, Ils n'Arrivent Plus Un par Un, Mais par Vagues: Coping with the Surge of Trauma Patients at L'Hôpital Universitaire La Pitié Salpêtrière-Friday, November 13, 2015 On November 13, 2015, Dr. Marie Borel, Dr. Emmanuelle Dolla, Dr. Frédéric Le Saché, and Prof. Mathieu Raux were the doctors in charge of the trauma center at L'Hôpital de la Pitié Salpêtrière in Paris, where dozens of wounded and dying patients, most with severe gunshot wounds from military grade firearms, arrived in waves after a series of terrorist attacks across the city. The doctors had trained for a mass-casualty event but had never envisioned the magnitude of what they now saw. This case describes how they rapidly expanded the critical care capacity available so as to be able to handle the unexpectedly large number of patients arriving at their doors.

Into Local Streets: Maryland National Guard and the Baltimore Riots (Case and Epilogue) On April 19, 2015, Freddie Gray, a young African American male, died while in the custody of the Baltimore Police. In response to his death, protestors mobilized daily in Baltimore to vocalize their frustrations, including what they saw as law enforcement’s long-standing mistreatment of the African American community. Then, on April 27, following Gray’s funeral, riots and acts of vandalism broke out across the city. Overwhelmed by the unrest, the Baltimore police requested assistance from other police forces. Later that evening, Maryland Governor Larry Hogan declared a state of emergency and activated the Maryland National Guard. At the local level, Baltimore Mayor Stephanie Rawlings-Blake issued a nightly curfew beginning Tuesday evening.

“Into Local Streets” focuses on the role of the National Guard in the response to the protests and violence following Gray’s death, vividly depicting the actions and decision-making processes of the Guard’s senior-most leaders. In particular, it highlights the experience of the state’s Adjutant General, Linda Singh, who soon found herself navigating a complicated web of officials and agencies from both state and local government – and their different perspectives on how to bring an end to the crisis.

Defending the Homeland: The Massachusetts National Guard Responds to the 2013 Boston Marathon Bombings On April 15, 2013, Dzhokhar and Tamerlan Tsarnaev placed and detonated two homemade bombs near the finish line of the Boston Marathon, killing three bystanders and injuring more than two hundred others. This case profiles the role the Massachusetts National Guard played in the complex, multi-agency response that unfolded in the minutes, hours, and days following the bombings, exploring how its soldiers and airmen helped support efforts on multiple fronts – from performing life-saving actions in the immediate aftermath of the attack to providing security on the region’s mass transit system and participating in the search for Dzhokhar Tsarnaev several days later. It also depicts how the Guard’s senior officers helped manage the overall response in partnership with their local, state, and federal counterparts. The case reveals both the emergent and centralized elements of the Guard’s efforts, explores the debate over whether or not Guard members should have been armed in the aftermath of the bombings, and highlights an array of unique assets and capabilities that the Guard was able to provide in support of the response.

Recovery in Aurora: The Public Schools' Response to the July 2012 Movie Theater Shooting (A and B) In July 2012, a gunman entered a movie theater in Aurora, Colorado and opened fire, killing 12 people, injuring 58 others, and traumatizing a community. This two-part case briefly describes the shooting and emergency response but focuses primarily on the recovery process in the year that followed. In particular, it highlights the work of the Aurora Public Schools, which under the leadership of Superintendent John L. Barry, drew on years of emergency management training to play a substantial role in the response and then unveiled an expansive recovery plan. This included hiring a full-time disaster recovery coordinator, partnering with an array of community organizations, and holding mental health workshops and other events to support APS community members. The case also details the range of reactions that staff and community members had to APS' efforts, broader community-wide recovery efforts, and stakeholders' perspectives on the effectiveness of the recovery.

"Miracle on the Hudson" (A, B, and C) Case A describes how in January 2009, shortly after takeoff from LaGuardia Airport, US Airways Flight 1549 lost all power when Canada geese sucked into its engines destroyed them. In less than four harrowing minutes, Flight 1549’s captain and first officer had to decide whether they could make an emergency landing at a nearby airport or find another alternative to get the plane down safely. Cases B and C describe how emergency responders from many agencies and private organizations on both sides of the Hudson River – converging on the scene without a prior action plan for this type of emergency – effectively rescued passengers and crew from the downed plane.

Security Planning for the 2004 Democratic National Convention in  Boston (A, B, and Epilogue) When the city of Boston applied to host the 2004 Democratic Party presidential nominating convention, it hoped to gain considerable prestige and significant economic benefits. But convention organizers and local officials were forced to grapple with a set of unanticipated planning challenges that arose in the aftermath of the 9/11 terrorist attacks.  (Included in Howitt & Leonard, Managing Crises)

Command Performance: County Firefighters Take Charge of the 9/11 Pentagon Emergency This case describes how the Arlington County Fire Department – utilizing the Incident Management System – took charge of the large influx of emergency workers who arrived to put out a massive fire and rescue people in the Pentagon following the September 11, 2001, suicide jetliner attack.  (Included in Howitt & Leonard, Managing Crises)

Rudy Giuliani: The Man and His Moment Although not long before the September 11, 2001 terrorist attacks, New York Mayor Rudolph Giuliani had been under fire for aspects of his mayoralty, the post 9/11 Giuliani won national and international acclaim as a leader. This case recounts the details of Giuliani’s response such that students of effective public leadership can analyze both Giuliani’s decisions and style as examples.

Threat of Terrorism: Weighing Public Safety in Seattle (Case and Epilogue) When a terrorist was arrested in late December 1999 at the Canadian-Washington State border in a car laden with explosives, public safety officials worried that the city of Seattle had been a possible target. This case explores the debate that ensued concerning the seriousness of the threat and whether the city should proceed with its planned Millennium celebration.  (Included in Howitt & Leonard, Managing Crises)

Protecting the WTO Ministerial Conference of 1999 (Case and Epilogue) Two very different sets of actors made extensive preparations in advance of the World Trade Organization's Ministerial Conference of 1999 — protesters opposing international trade practices and public safety officials responsible for event security. This case examines the efforts of both, highlighting why security arrangements ultimately fell short.  (Included in Howitt & Leonard, Managing Crises)

The Shootings at Columbine High School: Responding to a New Kind of Terrorism (Case and Epilogue) Within minutes of the shootings at Columbine, numerous emergency response agencies – including law enforcement, fire fighters, emergency medical technicians, and others – dispatched personnel to the school site. Under intense media scrutiny and trying to coordinate their actions, they sought to determine whether the shooters were still active and rescue the injured.

To What End? Re-Thinking Terrorist Attack Exercises in San Jose (Case, Sequel 1, Sequel 2) In the late 1990s, a task force in San Jose, CA mounted several full-scale terrorist attack exercises, but—despite the best of intentions—found all of them frustrating, demoralizing, and divisive. In response, San Jose drew on several existing prototypes to create a new “facilitated exercise” model that emphasized teaching over testing, and was much better received by first responders.

Security Preparations for the 1996 Centennial Olympic Games (A, B, and C) This case describes efforts by state and federal government entities to plan in advance for security protection for the Atlanta Olympics. It also recounts the Centennial Park bombing and emergency response.  (Included in Howitt & Leonard, Managing Crises)

The Flawed Emergency Response to the 1992 Los Angeles Riots (A, B, and C) Following the announcement of the not guilty verdicts for the law enforcement officers accused of beating Rodney King, the City of Los Angeles was quickly overrun by severe rioting. This case reviews how local, county, state, and federal agencies responded and coordinated their activities in an effort to restore order.  (Included in Howitt & Leonard, Managing Crises)

Public Health Emergencies

Mission in Flux: Michigan National Guard in Liberia ( Case and Epilogue ) In summer and fall of 2014, thousands of individuals in Liberia, Sierra Leone, and Guinea contracted the Ebola virus. This outbreak of the deadly disease, which until then had been highly uncommon in West Africa, prompted a major (albeit delayed) public health response on the part of the international community, including an unprecedented commitment made by the United States, which sent almost 3,000 active military soldiers to Liberia. “Mission in Flux” focuses on the US military’s role in the Ebola response, emphasizing the Michigan National Guard’s eventual involvement. In particular, it provides readers with a first-hand account of the challenges the Michigan Guard faced as it prepared for and then deployed to Liberia, just as the crisis had begun to abate and federal officials in Washington began considering how to redefine the mission and footprint of Ebola-relief in West Africa. 

Fears and Realities: Managing Ebola in Dallas   ( Case   and  Epilogue ) “Fears and Realities” describes how public health authorities in Dallas, TX - along with their counterparts at the state and local levels, elected officials, and hospital administrators - responded to the first case of Ebola identified on U.S. soil during the 2014 outbreak of the disease. The hugely difficult tasks of treating the patient and mounting a response was made all the more challenging by confusion over the patient's background and travel history, and, eventually, by the intense focus and considerable concern on the part of the media and public at large. Efforts to curtail the spread of the disease were further complicated when two nurses who had cared for the patient also tested positive for Ebola, even though they apparently had followed CDC protocols when interacting with him. With three confirmed cases of the disease in Dallas – each patient with their own network of contacts – authorities scrambled to understand what was happening and to figure out a way to bring the crisis to an end before more people were exposed to the highly virulent disease.  (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Confronting a Pandemic in a Home Rule State: The Indiana State Department of Health Responds to H1N1 When Indiana State Health Commissioner Dr. Judy Monroe learned of the emergence of H1N1 in late April 2009, she had to quickly figure out how to coordinate an effective response within a highly balkanized public health system in which more than 90 local health departments wielded considerable autonomy. She would rely heavily on relationships she had worked hard to establish with local health officials upon becoming commissioner -- but she and her senior advisors would still have to scramble to find new ways to communicate and coordinate with their local partners.

On the Frontlines of a Pandemic: Texas Responds to 2009 Novel H1N1 Influenza A  As cases of a new strain of influenza strike in the spring of 2009, Texas, just over the border from the initial epicenter of the epidemic in Mexico, faces great uncertainty about the severity and extent of the epidemic. State officials, presiding over a highly decentralized public health and health care system and needing to work with school systems and other non-health actors, strive to improvise their response to reduce the spread of this disease, while providing anti-viral drugs and, ultimately, a new vaccine to its citizens. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Tennessee Responds to the 2009 Novel H1N1 Influenza A Pandemic Tennessee, not so severely struck by H1N1 in the spring of 2009 as some other states, expects to encounter worse in the fall. Working through a hybrid state- and local government-run health system, as well as a network of privately run pharmacies, Tennessee officials mobilize to cope with the expected demand for anti-viral medications and to distribute an expected new vaccine. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Harvard Encounters H1N1 In the spring of 2009, as the H1N1 epidemic was beginning to emerge, Harvard University’s medical, dental, and public health schools had to be shut down when a rash of cases and the possibility of widespread exposure emerged among the student body. The case tracks the decision-making by University officials as they cope with the uncertainties surrounding the outbreak of a potentially dangerous emergent infectious disease. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Beijing’s Response to the 2009 H1N1 Pandemic In spring 2009, H1N1 emerged in North America and began to spread rapidly throughout the world. Municipal government officials in Beijing, China – who feared a repeat of their painful experience with SARS in 2003 – responded by conducting health screenings at the airport, quarantining people with flu-like symptoms, and scaling capacity at Beijing’s hospitals. The case describes Beijing’s expansive effort to combat H1N1 and is designed to teach students about Beijing’s government as well as China’s public health system.

Keeping an Open Mind in an Emergency: CDC Experiments with 'Team B'   ( Case   and  Epilogue ) In the early 2000s, the US Centers for Disease Control and Prevention (CDC) sought to adapt its protocols for coping with public health emergencies. This case examines the usefulness of one such method, "Team B," which was designed to provide the principal investigating team with alternative explanations for and approaches to the incident at hand.  (Included in Howitt & Leonard, Managing Crises; and Howitt, Leonard, and Giles, Public Health Preparedness)

X-Treme Planning: Ohio Prepares for Pandemic Flu With concern developing about the possibility of a worldwide pandemic of avian flu, the Ohio Department of Health developed plans for how it would handle such an emergency, while at the same time seeking to exercise its nascent incident management system and continue its efforts to develop as an emergency response agency. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Emergency Response System Under Duress: Public Health Doctors Fight to Contain SARS in Toronto (A, B, and Epilogue) When an emergent infectious disease arrived in Toronto in 2003, the Canadian public health system struggled to bring it under control. This case explores the efforts of Canadian public health authorities to identify and understand the mysterious illness, which threatened the health — and lives — of Toronto’s residents and healthcare workers for months on end.  (Included in Howitt & Leonard, Managing Crises; and Howitt, Leonard, and Giles, Public Health Preparedness)

Hong Kong Copes with SARS, 2003: The Amoy Gardens (Case and Epilogue) In the last days of March 2003, the frightening new disease known as Severe Acute Respiratory Syndrome, or SARS, seemed to threaten to spread out of control in one of the world’s most densely-populated cities: Hong Kong. The SARS outbreak at Amoy Gardens became an exercise in crisis management for public health officials in Hong Kong—with their counterparts around the world either observing or actively advising.

When Prevention Can Kill: Minnesota and the Smallpox Vaccine Program (Case and Epilogue) Following the 2001 terrorist attacks, President Bush launched a program to vaccinate health workers and emergency responders against smallpox. This case describes that effort, placing particular emphasis on the difficulties that emerged in making that program work in Minnesota. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Charting a Course in a Storm: US Postal Service and the Anthrax Crisis This case describes how the USPS responded when it was struck by devastating anthrax attacks through the mails. It covers the initial response to protect employees, efforts to keep the mails moving to the greatest extent possible, and early steps toward decontamination of facilities and recovery.  (Included in Howitt & Leonard, Managing Crises; and Howitt, Leonard, and Giles, Public Health Preparedness)

White Powders in Georgia: Responding to Cases of Suspected Anthrax After 9/11 Although no spore of real anthrax showed up in Georgia during the anthrax attack period, the state was inundated with thousands of calls about suspect white powders. The case describes efforts by local and state officials to develop appropriate procedures to triage and prioritize possible cases, conduct tests of possible anthrax, and protect and reassure worried first responders. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

The West Nile Virus Outbreak in New York City (A, B, and Sequel) Case A tells how in the summer of 1999 New York City public health officials discovered sentinel cases of a hitherto unknown disease and identified it with assistance from the state, CDC, veterinary pathologists at the Bronx Zoo, and university researchers. Case B and the Sequel describe how the city organized a massive mosquito spraying effort, first in a single borough and then citywide. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Anthrax Threats in Southern California This case recounts how California officials responded (and over-responded) to an Anthrax hoax in late 1998, as well as how they then developed protocols of response and disseminated them to multiple jurisdictions. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Coping with Crisis: Hong Kong Public Health Officials and the "Bird Flu"  In 1997, public health authorities in Hong Kong worked to identify and control a dangerous new flu virus not previously known to infect humans. The case focuses on the authorities' communication with the public, as they sought to quell public fears notwithstanding their own incomplete knowledge of the disease. The case, too, describes the crisis management decision to undertake a massive slaughter of Hong Kong chickens, once they were shown to be the host of the deadly but difficult-to-transmit virus.

The City of Chicago and the 1995 Heat Wave (A and B) During the summer of 1995, more than 700 people died of heat-related illness in Chicago, Illinois. With most deaths occurring before the city recognized that an “epidemic” was going on, this case explores the silent crisis that overtook the city. (Included in Howitt, Leonard, and Giles, Public Health Preparedness)

Email: Password:

LearnTechLib - The Learning & Technology Library

Main navigation.

  • Proceedings
  • Popular Articles
  • Conference Papers
  • Dissertations
  • Collections
  • Publishing Partners
  • Usage Statisics
  • Technical Support
  • License Agreement
  • Digital Library
  • Volume 11, Issue 1

Disaster at a University: A Case Study in Information Security ARTICLE

Ramakrishna ayyagari , jonathan tyks.

JITE-IIP Volume 11 , Number 1 , 2012 ISSN 2165-3151 e-ISSN 2165-3151 Publisher: Informing Science Institute

  • Journal Info
  • Table of Contents
  • New issue alerts

Ayyagari, R. & Tyks, J. (2012). Disaster at a University: A Case Study in Information Security. Journal of Information Technology Education: Innovations in Practice, 11 (1), 85-96. Informing Science Institute. Retrieved February 17, 2024 from https://www.learntechlib.org/p/71164/ .

  • Access to Information
  • active learning
  • Administrative Organization
  • Antisocial Behavior
  • case studies
  • College Administration
  • Core Curriculum
  • curriculum development
  • EDUCATIONAL ENVIRONMENT
  • Information Security
  • information systems
  • information technology
  • Outsourcing
  • school culture
  • Full Text (external link)

Sign in or Register

Sign in using email & password.

Don't have a username/password? Sign up!

1-click Sign-in

Sign in with Facebook

Sign in with Google

Save to Collections

Choose collection(s) to save to:

  • General Default Rename to:

Share this Paper

  • ResearchGate

Choose export format:

  • RefWorks Text File*

Direct Export to RefWorks

  • United States
  • Netherlands
  • New Zealand
  • United Kingdom
  • Case studies in IT security and disaster recovery

By Mitch Betts

Executive Editor , Computerworld |

Here are examples of three IT managers who have taken creative approaches to dealing with issues such as recovering from laptop crashes and monitoring all of those security sensors.

Organization: Womble Carlyle Sandridge & Rice PLLC , Winston-Salem, N.C.

Mission: With approximately 450 lawyers, Womble Carlyle is one of the largest law firms in the mid-Atlantic and the Southeast, as well as one of the most technologically advanced. Founded in 1876, the firm celebrated its 125th anniversary last year.

Challenge: As hundreds of laptop-toting attorneys travel across the globe, they expect to get the same level of reliability as with desktop systems. When something goes wrong with a laptop, the IT staff needs to be able to restore the laptop's functionality -- fast.

In the past, the IT department responded to a laptop crash by talking travelers through the restoration process by phone, which often took hours, or by sending a CD or new hard drive overnight. But the firm wanted something faster to reduce the productivity loss for its lawyers.

Technology: The IT department considered several options, including homegrown backup procedures and backup products from Veritas Software Corp. in Mountain View, Calif. But it ultimately decided to use a PC/laptop backup technology called Connected TLM from Connected Corp. in Framingham, Mass.

Compared with simple backup/restore programs, Connected was able to do a more comprehensive backup of all files, including "registry files, data files, browser favorites and all of the little details that make that laptop theirs," says Sean Scott, CIO at Womble Carlyle. "And it did it in the background so that end users didn't even know it was happening."

After a pilot test with "power users," the Connected system was deployed on 400 laptops and 50 desktops.

Payoff: Laptop restorations that used to take four to six hours can now be done in 45 to 60 minutes, Scott says. For example, with Connected, it only takes eight minutes to restore Microsoft Word to its original state, he says.

Scott says Connected's backup is more storage-efficient than anticipated, because after backing up the operating system and standard applications once, it only backs up the files that are different on each machine. For example, if you need to back up 20 laptops, the first laptop may take three hours, the next one will take less time and each one after that will take a lot less time. Scott says the Connected backups have used only one-third of the disk space and one-half of the archival tapes that he expected.

Organization: Corio Inc. , San Carlos, Calif.

Mission: Corio is an application service provider that delivers enterprise software over a secure global network for a fixed fee. Customers include Fortune 500 companies, midsize businesses, universities and government agencies.

Challenge: Corio manages mission-critical data for its customers, so they want real-time security event monitoring on a per-customer basis.

Technology: Corio uses Counterpane Internet Security Inc. in Cupertino, Calif., as its managed security provider. "Counterpane has been phenomenal, but in the last six months, security-conscious customers have asked for a real-time event monitor that's specific to their environment and to have some level of control," says Mark Milatovich, director of security at Corio. So he brought in software from Sunnyvale, Calif.-based ArcSight Inc. , which monitors and correlates a wide range of security devices, such as firewalls and intrusion-detection systems, and provides reports.

Payoff: ArcSight provides "a window into our environment" at a central console while also providing customer-specific views. "Each customer's traffic has a signature, a pulse, and ArcSight allows us to look for anomalies," Milatovich says. But it takes several months to tune the software for each customer "to eliminate the noise and get the signal," he says.

Milatovich also likes the potential for labor savings from ArcSight's collecting of data from numerous security devices. "I'd have to have an army of people [to monitor] all of the logs from sensors," he says.

And customers like the ability to get high-level executive reports on security activity or to examine technical details, he adds.

Organization: American Tower Corp. , Boston

Mission: The company builds, owns and operates towers for cellular phone companies. It has about 14,400 sites in the U.S., Mexico and Brazil, including about 300 broadcast tower sites.

Challenge: American Tower is an unpopular company because there are so many opponents to building towers, so the goal of the IT staff is to keep hackers, critics and competitors out of its systems, says Rob Sherman, manager of IT storage and network operations.

Technology: Instead of waiting for vendors to post signature files for new hacker attacks and cleaning up after virus attacks, Sherman and network engineer T.J. Mitchell wanted something that would stop intruders before they could get in at all. So they turned to StormWatch software from Okena Inc. in Waltham, Mass. Unlike software that relies of attack signatures, StormWatch focuses on the behavior of critical applications. The proprietary technology intercepts all requests to the operating system, correlates the behavior with its rules engine and makes a real-time decision on whether to allow or deny that activity, based on the customer's security policy.

Payoff: The software has been in production use for several months at a cost of $18,000, and "it's amazing the things it has stopped," Sherman says. "Most software detects. This software detects and prevents." And by stopping viruses before they have a chance to get inside, StormWatch means the end of virus cleanup emergencies. "When the Code Red virus hit, a dozen people spent a week cleaning machines. We wasted a lot of time and money last year" before getting StormWatch, Sherman says.

In addition, the StormWatch reports that lists all of the hacker attacks that have been rebuffed "are nice to show to the boss," he says.

The CPU performance hit from StormWatch has been minimal, at just 2% of CPU utilization, Sherman adds.

  • The Security Action Plan

Stories in this report:

  • The Story So Far: IT Security and Disaster Recovery
  • Maximum Security Returns
  • Manage Those Patches!
  • Build a Computer Incident Response Team
  • Let the Pros Investigate Computer Crimes
  • Watch Out for Wireless Rogues
  • For Disaster Recovery, Put Your IT Eggs in Different Baskets
  • Denying Network Service
  • Think Like a Terrorist
  • Field Report: Out from the Shadows
  • How to Thrive in the IT Security Market
  • IBM's view of the hot trends in IT security
  • Intrusion-detection systems are evolving
  • Reporter's Notebook: IT Security
  • Top 10 Vulnerabilities in Today's Wi-Fi Networks

Mitch Betts is an executive editor at IDG Enterprise. He was previously executive editor of CIO and Computerworld magazines.

Copyright © 2002 IDG Communications, Inc.

disaster at a university a case study in information security

Book cover

Emerging Trends in Information Systems pp 99–115 Cite as

Integrating Case Studies into Information Security Education

  • Alexandra Savelieva 6 &
  • Sergey Avdoshin 7  
  • First Online: 26 November 2015

1022 Accesses

Part of the Progress in IS book series (PROIS)

Today the demand is growing for information security experts capable of analyzing problems and making decisions in business situations that involve risk or uncertainty. These skills can be acquired through systematic studying of various information security incidents. In this paper we propose a framework of methods, tools and taxonomies for analysis of case studies in information security field. Our framework allows to study every situation in a formal rather than ad-hoc way, and apply a wide range of threat modeling, risk analysis and project management techniques under lifelike conditions. We illustrate it by providing two case studies based on real situations: a conflict between a free email service provider and a commercial bank, and an attack on a famous security company by a powerful hacktivist group. The first situation explores the risks of using cloud services, while the second highlights the importance of applying secure code principles for in-house software development. Although the cases are seemingly different, we demonstrate that they can be analyzed with similar tools.

  • Information security
  • Security incident
  • Event chain
  • Parkerian Hexad
  • Information asset
  • Attack lifecycle

This work was done in 2011–2012 when Alexandra Savelieva was with Higher School of Economics in Moscow, Russia. Now she is working in Microsoft Corporation in Redmond, USA.

This is a preview of subscription content, log in via an institution .

Buying options

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Purchases are for personal use only

Ayyagari, R., & Tyks, J. (2012). Disaster at a university: A case study in information security. Journal of Information Technology Education, 11 (Innovations in practice).

Google Scholar  

Herreid, C. F. (Ed.). (2007). Start with a story: The case study method of teaching science . Arlington, VA: National Science Teachers Association. pp. 466.

Workshop on Teaching Information Assurance Through Case Studies and Hands-on Experiences. http://teaching-ia.appspot.com/

Logan, P., & Christofero, T. (2009). Giving failure a place in information security: Teaching students to use the post-mortem as a way to improve security. In: Proceedings of the 13th colloquium for information systems security education. University of Alaska, Fairbanks Seattle, WA, June 1–3, 2009.

Hartel, P. H., & Junger, M. (2012). Teaching information security students to “think thief” . Technical report TR-CTIT-12-19, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381–3625.

Savelieva, A. (2011). Special considerations in using the case-study method in teaching information security. In: Proceedings of “IT security for the next generation”. TUM, Germany: Garching, Boltzmannstr. http://www.kaspersky.com/images/alexandra_savelieva-10-95017.pdf

Savelieva, A. A., & Avdoshin, S. M. (2011). Information security education and awareness: Start with a story. In: Proceedings of “2011 workshop on cyber security and global affairs”. http://www.internationalcybercenter.org/workshops/cs-ga-2011/asavelieva

Bishop, M. (2006, September). Teaching context in information security. Journal on Educational Resources in Computing, 6 (3).

Homepage — ECCH for educators. http://www.ecch.com/educators/

McNulty, E. (2007). Boss, I think someone stole our customer data. Harvard Business Review, September , 37–42.

ISO/IEC 27001:2005. (2005). Information technology security techniques information security management systems requirements.

Parker, D. B. (1998). Fighting computer crime . New York: Wiley.

Parker, D. B. (2009). Toward a new framework for information security. In S. Bosworth, M. E. Kabay, & E. Whyne (Eds.), The computer security handbook (5th ed.). New York: Wiley.

Howard, M., & Lipner, S. (2006). The security development lifecycle: SDL: A process for developing demonstrably more secure software (pp. 304). Microsoft Press.

Landwehr, C. E., & Bull, A. R. (1994). A taxonomy of computer program security flaws, with examples. ACM Computing Surveys, 26 (3), 211–254.

Article   Google Scholar  

Lindqvist, U., & Jonsson, E. (1997). How to systematically classify computer security intrusions (pp. 154–163). IEEE Symposium on Security and Privacy, Los Alamitos, CA.

Paulauskas, N., & Garsva, E. (2006). Computer system attack classification (2nd ed., Vol. 66). Kaunas: Technology.

Weber, D. J. (1998). A taxonomy of computer intrusions . Master’s thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology.

Howard, J. D., & Longstaff, T. A. (1998). A common language for computer security incidents . Technical report, Sandia National Laboratories.

Serdiouk, V. A. (2007). Advances in technologies for protection against attacks in corporate networks . Moscow: Tekhnosphera.

Event Chain Methodology in Project Management. White Paper by Intaver Institute Inc., http://www.intaver.com/Articles/Article_EventChainMethodology2011.pdf

Zetter, K. (2011). Bank sends sensitive E-mail to wrong Gmail address, Sues Google . Wired, September 21, 2009. http://www.wired.com/threatlevel/2009/09/bank-sues-google/

Bright, P. (2011). Anonymous speaks: the inside story of the HBGary hack . ArsTechnica, http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack . 12 Alexandra Savelieva, Sergey Avdoshin.

Honan, M. (2012). How Apple and Amazon security flaws led to my epic hacking . Wired.com. http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/

Honan, M. (2012). How I resurrected my digital life after an epic hacking . Wired.com. http://www.wired.com/gadgetlab/2012/08/mat-honan-data-recovery/

Russian Court Website Defaced in Support of Pussy Riot. (2012). Moscow: AFP. http://www.straitstimes.com/breaking-news/world/story/russian-court-website-defaced-support-pussy-riot-20120821

Rivner, U. (2011). Anatomy of an attack. Copyright 2011 EMC Corporation, http://blogs.rsa.com/anatomy-of-an-attack/

Tamai, T. (2009). Social impact of information system failures. IEEE Computer, 42 (6), 58–65.

Avdoshin, S. M., Savelieva, A. A., & Serdiouk, V. A. (2010). Microsoft technologies and products for information protection . Microsoft Faculty Resource Center, https://www.facultyresourcecenter.com/curriculum/pfv.aspx?ID=8476&Login=

Kaspersky Lab Global Website. IT security for the next generation. http://www.kaspersky.com/about/events/educational-events/it_security_conference#tab=tab-4

Foundation for Educational Innovations. Best proposals-2011 , http://www.hse.ru/org/hse/iff/methodics_2011

Download references

Acknowledgements

The present work benefited from the input of reviewers and participants of BIR 2012 Workshop on Teaching Business Informatics Intelligent Educational Systems and E-learning, thanks to Dr. Prof. Oleg Kozyrev, Director of HSE Nizhny Novgorod campus, and other members of the organizing committee, who made it possible for the authors to give a talk in teleconference mode. Alexandra Savelieva wishes to thank Oksana Chernenko, Executive Director of the HSE Foundation for Education Innovations, for her support, encouragement and guidance throughout the development of this educational project. The authors also wish to express their gratitude to Dr. Anatoli Shkred, CEO and Rector at INTUIT. RU, and Dr. Alexander Gavrilov, Academic Lead at Microsoft Russia, whose positive feedback and useful comments encouraged them to continue the work after the publication of the first case study-based electronic course on information security. The authors would like to sincerely thank Dr. Prof. Arun Sood, Co-Director, International Cyber Center, for the opportunity to present the idea of using case studies to a broad audience of professional specific target groups involved in cyber security all around the world participating in “2011 Workshop on Cyber Security and Global Affairs”, and Dr. Prof. Vladimir Azarov, Deputy Director of Research at MIEM HSE, for the invitation to MQ&ISM-2012 conference collocated with an intensive course on the ISO 27000 series of standards by CIS Austria.

Author information

Authors and affiliations.

Microsoft Corporation, Redmond, WA, USA

Alexandra Savelieva

National Research University Higher School of Economics, Moscow, Russia

Sergey Avdoshin

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Sergey Avdoshin .

Editor information

Editors and affiliations.

ERCIS, University of Münster, Münster, Germany

Jörg Becker

Higher School of Economics, National Research University, Nizhny Novgorod, Russia

Oleg Kozyrev

Eduard Babkin

Victor Taratukhin

Natalia Aseeva

Appendix: A Case Study #1: The Dangers of Keeping Corporate Mail in a Cloud

The first application of our case study analysis framework is a story that triggered a lot of discussions in the professional community due to its complicated nature and interesting background [ 22 ]. Event chain for the case study is depicted in Fig.  4 .

Case study #1: event chain

When the bank employee receives a call from the client, he has no reliable way to verify the identity of the person calling (i.e. the authenticity property of client’s request is questionable). We cannot be confident at this point that the email address communicated during this call as the client agent’s address was received by the bank employee correctly, due to possible noise at the phone line and human error when reading and writing texts (especially by hand). Although the probability of such error is low, the impact of sending confidential information to an unintended recipient is high, as stated in the table for information asset ‘Client agent’s email address’ and security property ‘Integrity’.

Next, the employee sends the requested data to the wrong email address. We know that he also attaches a file containing data of 1324 other clients, and that this information should have never left the bank boundaries. Thus, we can assume that neither authorization system to limit the employees’ access to sensitive client data nor outgoing mail filtering system were in place. Had it been the case, the utility of this information assets would be zero since the employee would not be able to retrieve it and send to an untrusted address because the email would have been automatically blocked.

Nevertheless, the email did leave the bank. Without evidence that someone read the message, we cannot say that the confidentiality was affected. Instead, the bank lost control of the email information contents (had it been encrypted, there would be no reasons to worry). The bank employee had no way to check whether the email was accessed at all: for example, it could be mistaken by the recipient for spam due to the huge amount of financial fraud spam circulating in the world (as we know from the information about the case revealed later, this was indeed the case: the user put the letter to his junk mail box without even opening it). The information about email status could have been easily retrieved if the email had been sent to a bank corporate mail, or some service rented by the bank from an external mail service provider under appropriate agreement. This was not the case, so the employee followed up with a second email asking the recipient to disregard and remove the previous email and urgently contact the bank for further information. By doing so, he was arguably increasing the probability of the situation when the fact of information leakage from the bank becomes public: even if the user disposed of the previous email, he could become curious about the situation; if not, there was no guarantee that he wouldn’t copy the email contents before disposing of the email as requested. In any case, he was very unlikely to contact the bank for clarification.

Further development of the situation affects the email service provider not willing to disclose the recipient’s identity due to its user policy without appropriate court order. The Bank then sued the email service provider requesting the user’s identity to be revealed and account suspended, insisting that the case should be filed under seal. The information assets and security properties affected at this point were the e-mailbox owner’s identity (confidentiality), his or her email archive (availability). Finally, the fact of information leakage from the bank eventually became publicly known.

Table representation of the case study analysis is provided in Table  3 .

Appendix: B Case Study #2: The Shoemaker’s Son Always Goes Barefoot

The situation analyzed in this section is an example of so-called advanced persistent threat, or APT. Unlike case study #1 where the information security breach was a result of a series of mishaps, this story is about a hacker group which intentionally targets its persistent efforts at a specific entity. The irony is that the target entity appears to be a famous company that specializes in providing services in information security area. See [ 23 ] and other relevant publications in press and online media for more information on the notorious security incident.

The concept of Attack Lifecycle (Fig.  2 in Sect.  3.3 ) is very instrumental for building the Event Chain diagram. At the first stage, the target information system is the company custom content management system (CMS) from a third party developer.

Reconnaissance—the hackers analyze CMS vulnerabilities and discover a possibility to apply SQL injection attack;

Penetration—the hackers apply SQL injection;

Information damage—the hackers retrieve CMS contents from the database;

Proliferation—the hackers identify employees’ aliases and hashed passwords as useful piece of information for further extension of the attack.

Proliferation phase of the first attack serves as the Reconnaissance phase for the next attacks, where the target information systems are the support machine and the email service provider used by the company. Penetration involves breaking the cryptographic algorithm MD5 used for hashing users’ passwords, and so on.

A simplified information security event chain of the case is presented in Fig.  5 .

Case study #2: event chain

Case study analysis table representation is provided below in Table  4 . Utility, unlike other security properties, is considered here from the attacker’s perspective, i.e. we assume that the information asset is of no utility (useless) to the attacker if handled properly. Therefore, by ’risk’ we mean probability and impact of the situation when the information asset becomes useful to the attacker.

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter.

Savelieva, A., Avdoshin, S. (2016). Integrating Case Studies into Information Security Education. In: Becker, J., Kozyrev, O., Babkin, E., Taratukhin, V., Aseeva, N. (eds) Emerging Trends in Information Systems. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-319-23929-3_9

Download citation

DOI : https://doi.org/10.1007/978-3-319-23929-3_9

Published : 26 November 2015

Publisher Name : Springer, Cham

Print ISBN : 978-3-319-23927-9

Online ISBN : 978-3-319-23929-3

eBook Packages : Business and Management Business and Management (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

the international research foundation

  • Welcome to myUMBC

TIRF's 2021 Doctoral Disserttion Grants competition

Application deadline: may 26, 2021.

TIRF – The International Research Foundation for English Language Education – is pleased to announce its 2021 Doctoral Dissertation Grants (DDG) competition. Grants of up to $5,000 will be made to successful applicants investigating a range of topics in English language education. The application deadline is Wednesday, May 26, 2021.  

There are two types of grants offered through TIRF’s DDG program. Information about the two types of grants, as well as eligibility concerns, resource videos, answers to frequently asked questions, and much more can be found at: https://www.tirfonline.org/grants-prizes/doctoral-dissertation-grants/  

 TIRF and its Trustees are grateful to be working in partnership with Cambridge Assessment English and the British Council, as well as individual donors, in support of the 2021 DDG competition.  

Recent Posts

  • Justin DePrima Successfully Defends his Dissertation Posted about 1 month ago
  • Performance and Discussion: The Beauty in her Cage Posted about 1 month ago
  • Alison Morrow Successfully Defends her Dissertation Posted about 1 month ago
  • Roberto Zurbano Torres visits campus Posted about 1 month ago
  • Alyse Minter Successfully Defends her Dissertation Posted 2 months ago

myUMBC is a UMBC limited public community forum for information sharing and dialogue. As a public institution, UMBC generally may not limit a community member's right to free speech on this forum. UMBC does not endorse the views expressed or information presented here, unless specifically stated in an official UMBC post. Learn more...

The International Research Foundation - for English Language Education - TIRF TODAY

The International Research Foundation

For english language education - tirf today, the international research foundation - for english language education - tirf today.

25 April 2016

The International Research Foundation for English Language Education ___________________________________________________________________ Promoting research and TIRF TODAY best practices to improve the use of English in A pril 2016 Volume 7, Issue 4 the emerging global Oh, the Places TIRFers Go! The month of April has been an exceptionally busy TIRF Trustee Donna Christian and the Foundation’s know. [...] Because TIRF has continued to grow its Routledge, this volume was a popular title at both position in our field, as demonstrated by the expan- the TESOL Convention in Baltimore and the AAAL sion of our programs and traffic to our website, our Convention in Orlando. [...] on the fourth volume in the series, which focuses on Help support TIRF via This piece will report some of the highlights from the the use of digital technology in language education. [...] www.tirfonline.org the prize as one of its programs, with the first prize Such support results in TIRF’s ability to save thou- made during the TESOL Convention (see the piece sands of dollars, so that we may continue to dedi- on page one of this newsletter for further infor- cate funding to our programs. [...] The mis- as AAAL, TESOL, and IATEFL– story, at the end of the AAAL sion of AAAL is to facilitate the support the work of teachers, Conference this month, I became advancement and dissemination researchers, graduate students, the volunteer President of that of knowledge and understanding and other language professionals, organization.

Creators/Authors

Person icon

Workstudy LEL

The International Research Foundation for English Language Education

151177 artifacts

Claim this report

Flag this item

LEL, W., 2016. The International Research Foundation - for English Language Education - TIRF TODAY , The International Research Foundation for English Language Education. United States of America. Retrieved from https://policycommons.net/artifacts/1648013/the-international-research-foundation/ on 16 Dec 2023. CID: 20.500.12592/1s5dv3.

Download citation (RIS)

Add to list

  • CAL Solutions

cal-logo-no-backgroudn.png

  • Annual Reports
  • Professional Development

Adult English Language Education

Dual Language and Multilingual Education

Immigrants and Newcomers

International Language Education

PreK-12 EL Education

Testing and Assessment

World Languages

  • Permissions
  • Subscribe to CAL News

the international research foundation

Publications & Products

Teaching and learning english grammar: research findings and future directions.

the international research foundation

Edited by MaryAnn Christison, Donna Christian, Patricia A. Duff, and Nina Spada Published by  Routledge  and the International Research Foundation for English Language Education ( TIRF )

An important contribution to the emerging body of research-based knowledge about English grammar, this volume presents empirical studies along with syntheses and overviews of previous and ongoing work on the teaching and learning of grammar for learners of English as a second/foreign language. It explores a variety of approaches, including form-focused instruction, content and language integration, corpus-based lexicogrammatical approaches, and social perspectives on grammar instruction.

Nine chapter authors are Priority Research Grant or Doctoral Dissertation Grant awardees from The International Research Foundation for English Language Education (TIRF), and four overview chapters are written by well-known experts in English language education. Each research chapter addresses issues that motivated the research, the context of the research, data collection and analysis, findings and discussion, and implications for practice, policy, and future research. The TIRF-sponsored research was made possible by a generous gift from Betty Azar. This book honors her contributions to the field and recognizes her generosity in collaborating with TIRF to support research on English grammar.

Teaching and Learning English Grammar  is the second volume in the Global Research on Teaching and Learning English Series, co-published by Routledge and TIRF. 2015  236 pages

Order online from the publisher website . Enter code AF001 at checkout to receive a 20% discount.

the international research foundation

  • EMPLOYEE RESOURCES
  • PRIVACY POLICY

Powered by World Data Inc.

  Welcome to EnglishTeacherWebsites.Com

English Teacher Websites

  • Our website design
  • A website of your own
  • Resources for Teachers
  • Resources for Students
  • Teacher-Teaching Blogs
  • Find an English Teacher
  • English Language Schools
  • Learn English Online
  • Find a Teaching Job
  • Advertise a Teaching Job
  • Find a Teacher Trainer
  • Becoming an ESL Teacher
  • Working as an ESL Teacher
  • Teaching English Abroad
  • The Teacher Speaks

English Language Resources

Tirf online.

TIRF, if you didn't know, is The International Research Foundation for English Language Education. This nonprofit organization has a mission to generate new knowledge about English language teaching and learning. TIRF plans to apply research findings to practical language problems by working collaboratively with teachers, researchers, authors, publishers, philanthropic foundations, government agencies, and major companies.

The site contains information about the organisation, details of events, discussions and a community section which is devoted to things currently happening in the TIRF community, interviews, projects and milestones.

TIRF Online provides a range of teaching and learning resources for teachers, researchers, parents, graduate students, program administrators, and the general public free of charge. These include Links to organizations with similar aims to TIRF, Journals in language teaching and applied linguistics, Reference lists on various topics, and much, much more.

TIRF Online

Click to visit TIRF Online

If you like us, Share us!

IERF

Services & Fees

  • Required Documentation
  • How to Apply

Services & Fees

General Report

Detail report, detail report with course level identification, additional services, rush services.

If requesting a Rush service, please note that  ALL  fees must be paid by cashier’s check, money order or credit card only.  No personal checks will be accepted for rush applications .

Please also note that Rush applications received after 12:00pm PST/PDT will be considered to have been received the next business day . This also applies to payments, correspondence and documentation received after 12:00pm PST/PDT.

If additional documentation and/or fees is/are required, the turnaround time will be effective from the date of receipt of the application, required documents and fee.

IMPORTANT: Be advised that if you apply online, you will receive a file number. When sending your documents in, please write your file number on the outside of the envelope. This will notify us that your case is a rush service, so that we can give your application immediate attention. If you are arranging to have your school or translator send documents directly to our office, please also request that they reference your file number on the outside of the envelope. Unfortunately, if your package does not include your full IERF file number on the exterior, IERF cannot guarantee that your rush service will be correctly applied on the business day it is received.

24-Hour Rush (Next Business Day)

10-day rush.

If you would like to pay for upgraded rush services and have an existing IERF file number that starts with a letter click below:

Extra Copies

Copies requested at the time of the application.

One official agency copy and one applicant copy are included in the report fee. Applicant copies are unofficial reports provided in PDF format for your personal reference. Additional official copies requested at the time of application cost $30 per copy. One delivery option must be selected for each official report requested, and the corresponding fees will be applied (see mailing options below).

Copies Requested After an Evaluation Report Has Been Mailed

Once a report has been mailed, extra copies may be obtained within two years from the date that the report was issued using the Request Form for Duplicate Copies of an Evaluation .  Separate fees apply.

Please note that applicant files and documents are only kept for 2 years.  Returning applicants seeking additional reports after the 2-year period must submit a new application and new fees. Applicants who applied before 2020 may also need to resubmit their academic records.

Mailing Options

  • Email/electronic delivery for $10 per address
  • Regular Mail for $10 per physical address
  • Domestic Secure Mailing for $25 per physical address
  • Domestic Next Day Delivery for $40 per physical address
  • International Secure Mailing for $75 per physical addressWe recommend that you select either Secure Mailing or Domestic Next Day Delivery for the return of your original academic records. Please note that your original documents will not be returned to you, unless you instruct us in writing to return them via regular mail. IERF accepts no liability related to the loss or damage of documents during mailing.

If you would like to pay for mailing with a tracking service and have an existing IERF file number that starts with a letter click below: Pay Now

If you would like to pay for an upgrade to any of the services listed above and have an existing IERF file number that starts with a letter click below:

Copyright © 2023 International Education Research Foundation, Inc.

Privacy Overview

International research foundation rsd/crps.

turn your device to view this site correctly

  • Special Reports
  • Clinical Practice Guidelines
  • Ketamine Therapy
  • Live Opioid Conference
  • Science Board

The International Research Foundation for RSD / CRPS is a not-for-profit organization (501c3) dedicated to education and research on Reflex Sympathetic Dystrophy and Complex Regional Pain Syndrome. The primary mission of the Foundation is to establish an international research network which will help educate medical professionals and support research worldwide. Reflex Sympathetic Dystrophy, known as RSD, is a chronic neurological disease which affects millions of people around the world. This disease is also known as Complex Regional Pain Syndrome or CRPS. The Foundation was the first to publish a study demonstrating the optimal dosing of ketamine required to treat CRPS. The website includes: Clinical Practice Guidelines for Reflex Sympathetic Dystrophy (Third Edition): The Clinical Practice Guidelines have become the guide for diagnosis and management of RSD / CRPS. Live International Video Conference: To learn about the use of opioids (narcotics) to treat CRPS in adults and children. 4K Video Tour: To learn more about our Headquarters and Surgery Center in Tampa, Florida USA --> 1910 East Busch Boulevard Tampa, Florida 33612 Website Developed by Rafztech

  • Lung Cancer Awareness Month 2023
  • Corporate Development
  • Partners for Thoracic Cancer Care
  • Legacy Society
  • Annual Report
  • Board of Directors
  • Governing Committees
  • Distinguished Service Awards
  • Lectureship Awards
  • Search Upcoming Meetings & Webinars
  • Past Meetings & Webinars
  • WCLC 2023 Meeting Highlights
  • Virtual Library
  • Guide to COVID-19 and Lung Cancer
  • Journal of Thoracic Oncology
  • JTO Clinical and Research Reports (JTO CRR)
  • IASLC Reviewer Workshop
  • Staging Project
  • IASLC Atlas of Molecular Testing for Targeted Therapy in Lung Cancer
  • Pathologic Response Project
  • Early-Career Opportunities
  • Search ILCN
  • WCLC 2023 News
  • Press Releases
  • ILCN Editorial Group
  • Lung Cancer Considered Podcast
  • ILCN Multidisciplinary Forum Theater
  • Become a Member
  • Renew Your Membership
  • Partner Society Membership Offers
  • IASLC Resources for SBOC Annual Meeting
  • Cancer Care Team Award
  • STARS Participants
  • Advocacy Awards
  • Advocacy Partner Spotlight
  • Patient Advocate Spotlight
  • Donor Recognition
  • Research Grant Program
  • Grant Recipient Spotlights
  • Research Grant Recipients

IASLC

Lung Cancer Research Foundation and the International Association for the Study of Lung Cancer (IASLC) Announce New Research Partnership: Groups Introduce $2.5 Million, Four-Year Research Partnership Focused on Finding Cure for Oncogene-Driven Lung Cancer

NEW YORK, NY (December 5, 2023) – The Lung Cancer Research Foundation (LCRF) and the International Association for the Study of Lung Cancer (IASLC) today announced a new research partnership, titled IASLC - LCRF Team Science Research Grant on the Next Step in the Cure of Oncogene-Driven Lung Cancers.

Lung cancer is responsible for more deaths worldwide than any other cancer, accounting for an estimated 130,180 deaths annually in the United States alone. In the last 10 to 15 years, accelerated clinical trials and FDA approvals of targeted therapies for non-small cell lung carcinoma have been possible in part due to advances in molecular profiling of tumors. Many of these targeted therapies are directed against oncogenic drivers, with EGFR as one of the first oncogenic drivers that was successfully targeted with the use of tyrosine kinase inhibitors (TKIs.) Shortly thereafter, EML4-ALK rearrangements were identified as molecular markers and tumors harboring these alterations could successfully be treated with molecularly targeted agents. Subsequently, additional oncogenic driver alterations in BRAF, RET, KRAS G12C, HER2, MET, NTRK, and ROS1 were identified along with corresponding therapeutic options for treatment. Despite substantial progress in this area, available treatments are not curative, and resistance to those treatments invariably develops.

Because current therapeutic options are not curative, IASLC and LCRF have created this Team Science award to focus on furthering the development of novel therapies, including immunotherapeutic approaches, for patients with oncogene-driven lung cancers. It is the intent of the two organizations to fund work that will have the potential to increase survivorship and have a near-term benefit for these patients.

“Resistance in oncogene-driven lung cancers is a frustrating inevitability for these patients,” says Dr. Antoinette Wozniak, Chief Scientific Officer for LCRF. “Partnering with IASLC on funding research that will bring us closer to a cure is not only exciting, it is the right thing to do. We firmly believe that it is in working together – funders as well as researchers – that solutions will be discovered and survivorship will increase.”

“We, along with LCRF, recognize that it takes teams of people to address large, complicated problems like oncogenic-driven lung cancers and resistance to therapy,” says Dr. Karen Kelly, Chief Executive Officer, IASLC. “We’re pleased to be collaborating with LCRF to create this Team Science award to work on curing oncogenic-driven lung cancers.”

The IASLC-LCRF Team Science Research Grant on the Next Step in the Cure of Oncogene-Driven Lung Cancers award is expected to total $2.5 million for a period of four years to a team of researchers whose proposals have a program of closely integrated projects focused on the specific goal of curing oncogene-driven lung cancer that would not otherwise be realized by any single component of the team.

All applications will be subject to a rigorous review by IASLC’s Scientific Affairs Committee and LCRF’s Scientific Advisory Board. More details about the Request for Proposal, along with eligibility, requirements, and deadlines will soon be available at LCRF.org/FundingOpportunities. 

About the Lung Cancer Research Foundation (LCRF) The Lung Cancer Research Foundation® (LCRF) is the leading nonprofit organization focused on funding innovative, high-reward research with the potential to extend survival and improve quality of life for people with lung cancer. LCRF's mission is to improve lung cancer outcomes by funding research for the prevention, diagnosis, treatment, and cure of lung cancer. To date, LCRF has funded 418 research grants, totaling nearly $44 million, the highest amount provided by a nonprofit organization dedicated to funding lung cancer research. For more information about the LCRF grant program and funding opportunities, visit lcrf.org/research .

About the IASLC The International Association for the Study of Lung Cancer (IASLC) is the only global organization dedicated solely to the study of lung cancer and other thoracic malignancies. Founded in 1974, the association's membership includes more than 10,000 lung cancer specialists across all disciplines in over 100 countries, forming a global network working together to conquer lung and thoracic cancers worldwide. The association also publishes the Journal of Thoracic Oncology, the primary educational and informational publication for topics relevant to the prevention, detection, diagnosis and treatment of all thoracic malignancies. Visit www.iaslc.org for more information.

Contact: LUNG CANCER RESEARCH FOUNDATION (LCRF) Sheila Sullivan Sr. Director, Marketing & Communications [email protected]  

INTERNATIONAL ASSOCIATION FOR THE STUDY OF LUNG CANCER (IASLC) Chris Martin IASLC Media Relations [email protected]  

Scientific Committee

Tax foundation response to un request for public input on inclusive and effective tax cooperation.

The Tax A tax is a mandatory payment or charge collected by local, state, and national governments from individuals or businesses to cover the costs of general government services, goods, and activities. Foundation appreciates the opportunity to provide public input on the report being prepared in connection to the resolution adopted by the General Assembly on 30 December 2022 on the “Promotion of inclusive and effective tax cooperation at the United Nations.” [1]

We want to point out four key aspects of cross-border tax policy that policymakers should consider.

First, sound tax policy, as we see it, should be based on the principles of simplicity, stability, transparency, and neutrality.

Successful international tax coordination requires shared principles and a shared vision of outcomes. One failure of the tax coordination process at the Organisation for Economic Co-operation and Development (OECD) during its two-pillar approach has been the lack of consistent economic and policy principles. One academic frequently remarks that the OECD project works on Marxist principles, just not Karl Marx’s. It was Groucho Marx who said, “those are my principles, and, if you don’t like them, I have others.” [2]

Inconsistency of principles is not a sound approach.

Second, tax cooperation efforts should recognize the importance of maintaining open lanes for cross-border trade and investment, especially given the frailty of cross-border supply chains witnessed in recent years.

Tax policy decisions can either enhance or suppress economic growth created by cross-border investment. As the 2022 World Investment Report clearly identifies, the outlook for global foreign direct investment (FDI) is weak. [3] Additionally, the report analyzed the potential impact of the global minimum tax rules on FDI and found, “a potential downward effect on global FDI at about -2 percent.” [4]

In fact, corporate income tax A corporate income tax (CIT) is levied by federal and state governments on business profits. Many companies are not subject to the CIT because they are taxed as pass-through businesses, with income reportable under the individual income tax . is particularly distortive because business investments are mobile across borders, especially in the long term. [5] The harms of corporate taxation can be mitigated by ensuring that capital investments are fully deductible and business losses can be used to offset profits without limit. Despite this, it is still an inferior source of tax revenue from an economic efficiency perspective. [6]

Third, policymakers should not ignore the fundamental challenge of coordinating policies among countries with very different tax systems.

Countries vary widely in the extent to which they use corporate income taxes to raise revenue. Some rely on them a lot, others only a little (opting instead for more economically efficient methods of taxation). For example, in 2019, Nigeria raised 45.9 percent of its total tax revenue from corporate income taxes while Brazil raised just 8.6 percent. [7]

Any international tax cooperation effort needs to respect the diverse and divergent policy paths that countries take and avoid designing blanket proposals that undermine sound systems of taxation.

Finally, the UN’s efforts to coordinate corporate tax policy should reduce tax uncertainty, not add to it.

The current state of cross-border tax and multilateral negotiations is borderline chaos. A decade ago, the OECD launched the Base Erosion and Profit Shifting Profit shifting is when multinational companies reduce their tax burden by moving the location of their profits from high-tax countries to low-tax jurisdictions and tax havens. Project at the behest of the G20. Since then, dozens of countries have changed their tax rules for multinationals by adding various anti-abuse rules. Rather than evaluating the performance of those new rules, countries recently began to invest in new tools to tax multinationals in the cross-border arena including equalization levies, digital services taxes, digital permanent establishment rules, and the policies envisaged by the two-pillar project.

New UN efforts for effective tax cooperation should avoid duplicating ongoing efforts at the OECD or putting forward contrary proposals that will create additional uncertainty for taxpayers. Otherwise, there will be an increased risk of double taxation Double taxation is when taxes are paid twice on the same dollar of income, regardless of whether that’s corporate or individual income. driven by contradictory standards for taxing the profits of multinationals.

Therefore, the UN should only engage in international tax policy coordination if it can effectively reduce tax uncertainties while respecting the principles outlined above and supporting cross-border trade and investment.

This should not be read as an endorsement of the approach the OECD has taken with its proposals. Rather, we see the outcomes at the OECD as clearly violating the principles that we follow as an organization when evaluating tax policies. But adding yet another layer of international taxation on top of the work at the OECD and in national capitals would make the system even more complex.

The global economy needs policymakers who are invested in seeing growth recover and avoiding unnecessary barriers to cross-border trade and investment. The challenges countries face will become even more difficult to solve in a stagnant global economy. We strongly encourage leaders at the UN to promote principled, pro-growth policies in the context of future multilateral efforts.

Stay informed on the tax policies impacting you.

Subscribe to get insights from our trusted experts delivered straight to your inbox.

[1] United Nations, “General Assembly Resolution on ‘Promotion of Inclusive and Effective Tax Cooperation at the United Nations,’” Dec. 30, 2022, https://www.un.org/development/desa/financing/document/general-assembly-resolution-promotion-inclusive-and-effective-tax-cooperation-united .

[2] Michael Devereux, at the International Tax Policy Forum and Institute of International Economic Law Conference at Georgetown University Law Center, January 12, 2023.

[3] UNCTAD, World Investment Report 2022, June 9, 2022, https://unctad.org/publication/world-investment-report-2022 .

[4] UNCTAD, “Chapter 3 – The Impact of a Global Minimum Tax on FDI,” World Investment Report 2022, June 9, 2022, https://worldinvestmentreport.unctad.org/world-investment-report-2022/chapter-3-the-impact-of-a-global-minimum-tax-on-fdi/ .

[5] Åsa Johansson, Chistopher Heady, Jens Matthias Arnold, Bert Brys, and Laura Vartia, “Taxation and Economic Growth,” OECD Economics Department Working Papers, July 3, 2008, https://www.oecd-ilibrary.org/economics/taxation-and-economic-growth_241216205486 .

[6] Lisa Hogreve and Daniel Bunn, “Capital Cost Recovery Cost recovery is the ability of businesses to recover (deduct) the costs of their investments. It plays an important role in defining a business’ tax base and can impact investment decisions. When businesses cannot fully deduct capital expenditures, they spend less on capital, which reduces worker ’s productivity and wages. across the OECD,” Tax Foundation, Apr. 26, 2022, https://taxfoundation.org/capital-allowances-cost-recovery/ and Elke Asen, “Net Operating Loss Policies in the OECD,” Tax Foundation, June 23, 2021, https://taxfoundation.org/net-operating-loss-policies-oecd/#Design .

[7] OECD, Corporate Tax Revenues, last updated July 7, 2022, https://stats.oecd.org/Index.aspx?DataSetCode=CTS_REV .

National Science Foundation logo.

SCIENCE & ENGINEERING INDICATORS

Publications output: u.s. trends and international comparisons.

  • Report PDF (1.4 MB)
  • Report - All Formats .ZIP (9.8 MB)
  • Supplemental Materials - All Formats .ZIP (3.3 MB)
  • MORE DOWNLOADS OPTIONS
  • Share on Twitter
  • Share on Facebook
  • Share on LinkedIn
  • Send as Email

R&D

Definitions

Citations: Citations, generally at the end of each article, provide researchers with the list of the prior research relied on for the article. Citations of S&E publications by other S&E publications provide an indication of the impact of publications and of the flow of knowledge or linkage between sectors or geographic locations.

Coauthorship: Coauthorship refers to cases in which more than one author is listed on a publication. Data on coauthorship can be used to measure collaboration across regions, countries, economies, and institutional sectors. Publication counts of coauthorship use whole counting, so each region, country, or economy contributing to the article receives credit for that article. An article is considered to contain an international coauthorship when institutional addresses for its authors are located in two or more different regions, countries, or economies. Table SPBS-36 shows international coauthorship from 2003 to 2022.

European Union (EU -27 ): The EU comprises 27 member nations: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czechia, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, and Sweden. Bulgaria and Romania joined the EU in 2007, and Croatia joined in 2013—these nations are included in the EU grouping for all years analyzed in this report. In 2020, the United Kingdom left the EU, and data covering the United Kingdom are excluded from the EU-27 in the text of the report but are available in the supplemental tables as “EU-27 and United Kingdom.”

Fractional counting: A method of counting S&E publications in which credit for coauthored publications is divided among the collaborating institutions or regions, countries, or economies based on the proportion of their participating authors. Fractional counting allocates the publication count based on the proportion of the coauthors named on the article with institutional addresses from each region, country, or economy. Fractional counting enables the counts to sum up to the number of total articles. For example, if a publication were authored by two researchers from the University of Oslo, one from University College London, and one from the University of Washington, half of the publication would be attributed to Norway, and a quarter each to the United Kingdom and the United States when the fractions are calculated at the level of researchers. For this report, fractions were calculated at the level of researchers. If an author provides multiple institutions, and those institutions are in different regions, countries, or economies, then each region, country, or economy receives an appropriate fraction of the count.

Highly cited article (HCA): An HCA ratio provides an indication of scientific impact (Waltman, van Eck, and Wouters 2013). The HCA ratio for a region, country, or economy is calculated as the share of all articles published in a given year by authors with institutional addresses within that region, country, or economy that fall within the top 1% by citation count of all articles published that year, measured for each research field. The HCA ratio is indexed to 1.00, so a region, country, or economy whose authors produce highly cited articles at the expected (i.e., global average) rate has an HCA ratio of 1.00—that is, 1% of the region’s, country’s, or economy’s articles are among the top 1% of the world’s highly cited articles. A region, country, or economy with an HCA ratio greater than 1.00 is producing a disproportionately high level of articles with exceptional scientific impact, whereas a region, country, or economy whose authors produce relatively fewer influential articles will have an HCA ratio below 1.00.

International collaboration index (ICI) : The ICI helps identify the propensity of collaboration between two regions, countries, or economies. The ICI is calculated as follows: I c xy = ( Cxy / Cx ) / ( Cy / Cw ), where I c xy is the index of collaboration between country x and country y , Cxy is the number of publications coauthored between country x and country y , Cx is the total number of international coauthorships by country x , Cy is the total number of international coauthorships by country y , and Cw is the total number of international coauthorships in the database. An index greater than 1.0 means that a country-country pair has a stronger-than-expected tendency to collaborate; an index less than 1.0 indicates a weaker-than-expected tendency to collaborate ( Table SPBS-38 ).

Open a ccess (OA): OA refers to peer-reviewed publications that are accessible online to any reader without requiring a journal subscription or other fees from readers (Piwowar et al. 2018). Several commonly defined types of OA have been adopted for the purposes of this analysis. Gold OA denotes articles published in journals that are entirely OA as a matter of journal policy. Hybrid OA refers to articles appearing in closed-access journals where the authors have paid a fee to make the article OA. Bronze OA denotes articles in closed-access journals that become OA after an embargo period of closed access or articles that appear available as OA despite lacking the license information to guarantee OA in the long term. Green OA denotes articles that are self-archived by authors in OA repositories, which are often maintained and administered by universities or other institutions.

Relative c itation (RC) : The RC is a normalization of the relative scientific impact of publications produced by a given region, country, or economy that takes into consideration variations in citation behavior between fields and years of publication. For a publication in a given scientific field and publication year, the citation count is divided by the average count of all publications in the relevant field and publication year.

Relative c itation i ndex (RCI) : The RCI normalizes cross-national citation data for variations in relative size of publication output. It is computed by dividing the share of the citing region’s, country’s, or economy’s outgoing citations going to the cited region, country, or economy, then dividing this number by the share of publications attributed to the cited region, country, or economy.

Whole counting: This measure (also called full or integer counting) assigns one count to each region, country, or economy or institutional sector involved in coauthoring the article, irrespective of its proportionate involvement in authorship. Although fractional counting aims to assess the proportionate contributions of regions, countries, or economies or sectors, whole counting aims to assess the participation of regions, countries, or economies or sectors. One result of this difference is that the sum of articles from regions, countries, or economies or institutional sectors will exceed the total number of articles when whole counting is used. For the United States in 2022, there were 458,000 publications in the Scopus database as measured on a fractional-count basis and 608,000 as measured on a whole-count basis ( Table SPBS-2 and Table SPBS-17 ). In the full-counting method, each publication is counted once for each entity listed in the address field. For example, if a publication were authored by two researchers from the University of Oslo, one from University College London, and one from the University of Washington, the publication would be counted once for Norway, once for the United Kingdom, and once for the United States. When it comes to aggregating groups of institutions (e.g., research consortia) or groups of countries (e.g., the EU-27), double counting is avoided. This means that if authors from Croatia and France co-published an article, this publication would be credited only once when counting publications for the EU-27, although each country had been credited with one publication count.

Key to Acronyms and Abbreviations

AI: artificial intelligence

APC : article processing charge

EU -27 : European Union

HCA: highly cited article

ICI: international collaboration index

NCSES: National Center for Science and Engineering Statistics

NSB: National Science Board

OA: open access

R&D: research and development

RCI: relative citation index

S&E: science and engineering

T O D: Taxonomy of Disciplines

Related Content

the international research foundation

TIRF invests worldwide in individuals and organizations committed to English language education, empowering them to build a brighter future for themselves, those they serve, and our multilingual world. Quality Research

The International Research Foundation for English Language Education is pleased to share these reference lists with researchers and teachers throughout the world. They are stored as Word documents so that they will be dynamic tools. You may download them and use them at your convenience.

November 23, 2021 Trent Newman (2016 DDG Awardee) TIRF Grantee: Trent Newman (2016 DDG Awardee) TIRF Research Topics Investigated: (1) Plurilingua... October 13, 2021 Celia Reddick (2020 DDG Awardee) TIRF Grantee: Celia Reddick (2020 DDG Awardee) TIRF Research Topic Investigated: Migrants and Re... October 13, 2021 View All News

As a foundation for English language education, TIRF (The International Research Foundation for English Language Education) gives high priority to the development of a coherent program of research in language learning and teaching, dissemination of that research, and other related professional services associated with the continuous improvement ...

IERF is the oldest credentials evaluation service in the U.S. Our equivalency reports are used to assist persons who have studied outside the U.S. With over 46 years of experience, IERF has processed over 550,000 evaluations and is one of the most respected evaluation agencies.

TIRF - The International Research Foundation for English Language Education Research Services Interlochen, MI 387 followers

THE INTERNATIONAL RESEARCH FOUNDATION FOR ENGLISH LANGUAGE EDUCATION The Foundation for Language Education aka TIRF | Interlochen, MI | www.tirfonline.org Summary Programs + Results Financials Operations Mission Promoting research and best practices that inform and enrich English language education in multilingual contexts Ruling year info 1999

The International Research Foundation for English Language Education (TIRF) and Routledge, showcases research by scholars from around the world, whose research has been funded by grants from TIRF, awarded through a carefully vetted international competition. Since 2002, TIRF, an independent foundation started by the TESOL

Dr. James Alatis. TIRF - The International Research Foundation for English Language Education - established the TIRF James E. Alatis Prize for Research in Language Policy and Planning in Educational Contexts in 2015 to honor the contributions TIRF Trustee Emeritus James E. Alatis made to the field as an outstanding educator and leader.

TIRF - The International Research Foundation for English Language Education - is pleased to announce its 2021 Doctoral Dissertation Grants (DDG) competition. Grants of up to $5,000 will be made to successful applicants investigating a range of topics in English language education. The application deadline is Wednesday, May 26, 2021.

The International Research Foundation for English Language Education _____ Promoting research and TIRF TODAY best practices to improve the use of English in A pril 2016 Volume 7, Issue 4 the emerging global Oh, the Places TIRFers Go! The month of April has been an exceptionally busy TIRF Trustee Donna Christian and the Foundation's know.

Edited by MaryAnn Christison, Donna Christian, Patricia A. Duff, and Nina Spada Published by Routledge and the International Research Foundation for English Language Education (). An important contribution to the emerging body of research-based knowledge about English grammar, this volume presents empirical studies along with syntheses and overviews of previous and ongoing work on the teaching ...

TIRF Online. TIRF, if you didn't know, is The International Research Foundation for English Language Education. This nonprofit organization has a mission to generate new knowledge about English language teaching and learning. TIRF plans to apply research findings to practical language problems by working collaboratively with teachers ...

IERF was established in 1969 as the first credentials evaluation service, not only in the U.S., but also in the world. IERF conducts research on international education and prepares credentials evaluations for persons who have studied outside of the United States and who need a statement of educational equivalency.

1910 E. Busch Blvd. Tampa, Florida 33612 *Research at the International Research Foundation for RSD/CRPS is carried out in collaboration with the University of Florida College of Medicine, ranked #1 in Florida.

The official Report Delivery Fees are as follows (only one delivery option is available per evaluation report): Email/electronic delivery for $10 per address. Regular Mail for $10 per physical address. Domestic Secure Mailing for $25 per physical address. Domestic Next Day Delivery for $40 per physical address.

The International Research Foundation for RSD / CRPS is a not-for-profit organization (501c3) dedicated to education and research on Reflex Sympathetic Dystrophy and Complex Regional Pain Syndrome.

NEW YORK, NY (December 5, 2023) - The Lung Cancer Research Foundation (LCRF) and the International Association for the Study of Lung Cancer (IASLC) today announced a new research partnership, titled IASLC - LCRF Team Science Research Grant on the Next Step in the Cure of Oncogene-Driven Lung Cancers.. Lung cancer is responsible for more deaths worldwide than any other cancer, accounting for ...

At Stockholm University she is focusing her research on cognitive aspects of dialogue interpreting (VR grant 2016-01118) as research leader for the SPRINT research group. Together with the research group on Interpreter and Interpreter training at the Western Norway University of Applied Sciences, she investigates training of deaf interpreters.

International Retinal Research Foundation Providing financial support for vision research. ALERT! Call for IRRF Funding Application Forms: All Postdoctoral Scholar Awards - $35,000 for One Year — Submission Deadline: March 15. Applications for regular grant funding will not be accepted in 2023. The next submission date is May 15, 2024.

Elena Litchman. professor of integrative biology and W.K. Kellogg Biological Station faculty member, is internationally recognized for her research on phytoplankton communities in both freshwater and marine environments. Litchman received her Honors Diploma in biology from Moscow State University, Russia, and her PhD in ecology from the ...

That is why today, we're launching the AI Alliance - a group of leading organizations across industry, startup, academia, research and government coming together to support open innovation and open science in AI. The AI Alliance is action oriented and decidedly international, designed to create opportunities everywhere through a diverse range of institutions that can shape the evolution of ...

March 13, 20234 min read By: Daniel Bunn. The Tax Foundation appreciates the opportunity to provide public input on the report being prepared in connection to the resolution adopted by the General Assembly on 30 December 2022 on the "Promotion of inclusive and effective tax cooperation at the United Nations.". [1]

Ametistov Foundation Project "Terra Legis". Amnesty International. Amnesty International Moscow Group (Russia-5) Antimilitarist Radical Association. Center for Assistance to Victims of Violence and Human Trafficking. Center for Development of Democracy and Human Rights. Center for Legal Enlightenment of Youth.

Academic publications in the form of peer-reviewed journal articles and conference proceedings are an important medium where scientific discoveries are made and shared. This report presents data that reflect the expanding volume of research activity, variations in scientific impact, and a growing research ecosystem of international and domestic collaborations.

Additionally, Brandizzi's research and lab receive support from the MSU Research Foundation and from Michigan Translational Research and Commercialization awards to develop an exciting research portfolio in the basic and applied sciences, resulting in a combined total of approximately $2 million annually in grants.

With $3.5 million in funding from the GI Research Foundation, a team at the MD Anderson Cancer Center explores a one-two punch to combat BRAF-mutated colorectal cancer and its "dismal prognosis."

In October 2023, the Miracles for Myeloma 5K Run/Walk annual event celebrated its 11th anniversary. Founded in 2013, the Miracles for Myeloma 5K event has raised more than $830,000 to date. It has made a significant impact on myeloma research by funding 10 Brian D. Novis Research Grants (7 grants to Senior investigators plus 3 grants to Junior ...

Chair (2007) and vice-Chair (2005) of the Gordon Research Conferences on Solid State Chemistry; Member of the Scientific Advisory Board of the Max Planck Institute of the Chemical Physics of Solids, Dresden (2000 - 2005); Vice-Chair and member of the Board of Directors of the International Centre of Diffraction Data (ICDD, 2002 - 2010);

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Disaster Readiness of Hospital Information Systems: A Case Study from a Turkish University Hospital

Profile image of Hilal Kaya

Abstract— One of the crucial points for information systems is to guarantee security of the produced data and the data production process as well as designing information systems in order to serve humanity. At this point of view, concept of disaster refers to the unplanned loss or interruption of the data that has been achieved. All data generated by hospital information systems are kept in databases, stored in data warehouses and protected in data centers. Causes of disasters are mainly classified into two groups as natural and human-based. These causes that often threatening information technologies are earthquakes, floods, staff's faults, fire, virus attacks etc. According to these reasons, data centers or communication through the data infrastructure elements can be affected in an unplanned way. Therefore, it’s possible to lose data completely; even data cannot be delivered or cannot be stored properly. Earthquake-resistant buildings, fire early alarm systems, backup power p...

Related Papers

Martin Hromada

disaster at a university a case study in information security

Kevin Chason

Yearbook of Medical Informatics

Summary Introduction: As many medical workflows depend vastly on IT support, great demands are placed on the availability and accuracy of the applications involved. The cases of IT failure through ransomware at the beginning of 2016 are impressive examples of the dependence of clinical processes on IT. Although IT risk management attempts to reduce the risk of IT blackouts, the probability of partial/total data loss, or even worse, data falsification, is not zero. The objective of this paper is to present the state of the art with respect to strategies, processes, and governance to deal with the failure of IT systems. Methods: This article is conducted as a narrative review. Results: Worst case scenarios are needed, dealing with methods as to how to survive the downtime of clinical systems, for example through alternative workflows. These workflows have to be trained regularly. We categorize the most important types of IT system failure, assess the usefulness of classic counter meas...

Studies in health technology and informatics

Rıdvan Atilla

This study aims to improve a medical module which provides a real-time medical information flow about pre-hospital processes that gives health care in disasters; transferring, storing and processing the records that are in electronic media and over internet as a part of disaster information systems. In this study which is handled within the frame of providing information flow among professionals in a disaster case, to supply the coordination of healthcare team and transferring complete information to specified people at real time, Microsoft Access database and SQL query language were used to inform database applications. System was prepared on Microsoft .Net platform using C# language. Disaster information system-medical module was designed to be used in disaster area, field hospital, nearby hospitals, temporary inhabiting areas like tent city, vehicles that are used for dispatch, and providing information flow between medical officials and data centres. For fast recording of the di...

IOP Conference Series: Materials Science and Engineering

difana meilani

MIS Quarterly

Raj Sharman

This paper examines how an individual’s disaster experience affects his or her perceptions of sociotechnical safety factors (risk, information assurance, resilience) and perceived usefulness of hospital information systems (HIS). This paper consists of two studies focusing on different aspects: a quasi-field experiment conducted with employees in three hospitals affected by a severe snowstorm (labeled a federal disaster) (N = 103), where we compare the perceptual factors in the context of the disaster experience (with versus without recall), and a comparative study between a first sample group (with disaster experience) and a second, contrast sample group (with no disaster experience) of hospital employees (N= 179) from two similar hospitals. The results show that the disaster experience changes the relationships among the perceptual factors that affect perceived usefulness. Individuals tend to perceive negative factors (such as risk) as having greater effects when they actually hav...

Alpaslan H Kuzucuoglu

Bilgi merkezlerinin afetlerden etkilenme riski ve bilgi merkezlerinin afete karsi hazirlikli olmasi konusunda literaturde cok sayida calisma bulunsa da afetlerin ve acil durumlarin cesitliligi her bir olay uzerinde farkli hazirlanma ve mudahale modellerinin gelistirilmesini zorunlu kilar. Acil durum ve afetlerden bilgi merkezlerinin korunma standartlarinda bu yapilarin diger yapilar gibi degerlendirilmektedir. Oysa bilgi merkezlerinde ayni anda cok sayida insan ve calisan bulunmaktadir ve bu durumda riski artirici bir faktordur. Bu nedenle, bu yapilarda oncelikli koruma standartlarinin gelistirilmesi gereklidir. Kutuphaneler, arsivler, sanat galerileri, bilgi evleri, kiraathaneler, muzeler vb. bilgi merkezleri olan onemli kurumlarin icinde barindirdigi eserler (somut, basili, elektronik vb.) bilimin, sanatin, teknolojinin gelismesine katkida bulunan mekanlardir ve kesinlikle her turlu afet riskinden korunmalidirlar. Muzelerde sergileme ve depolama alanlari; kutuphanelerde ise ozelli...

IEEE Journal of Biomedical and Health Informatics

Viswanath Venkatesh

Natural disasters, such as hurricanes, tornadoes, cyclones, earthquakes, volcanic eruptions, wildfires, and floods, can have a profound impact on healthcare by limiting healthcare providers' ability to effectively provide patient care in the affected areas and respond to myriad healthcare needs of the affected population. The situation can potentially be exacerbated if healthcare providers do not have effective mechanisms in place for disaster response. The response to hurricane Katrina, a category 3 hurricane that made landfall in August 2005 and affected several states in southwestern U.S., was a vivid example of how the lack of effective planning and responsiveness can affect healthcare services. In this article, based on an extensive case study, which included a careful assessment of information from various sources, of the Veterans Health Administration's (VHA) response to hurricane Katrina, we present five strategies for developing and leveraging information technology (IT) capabilities to effectively respond during natural disasters: (1) an integrated IT architecture; (2) a universal data repository; (3) web-based disaster coordination; (4) an IT-enabled disaster support system; and (5) standardized and integrated IT-enabled disaster response processes. We discuss how these strategies can effectively help healthcare providers manage continuity and offer quality of care during the time of natural disasters.

Christian Sese

1.1 Background of the Problem When disaster strikes, a community‟ s critical services must be able to protect the lives and well-being of the affected population, particularly immediately following impact. The ability of health services to function without interruption in these situations is a matter of life and death. It is imperative that all health services are housed in structures that can resist the force of natural disasters, that equipment and furnishings are not damaged, that vital connections (such as water, electricity, medical gases, etc.) continue to function, and that health personnel are able to provide medical assistance when they are most needed.

Health Policy and Planning

Maxine Whittaker

FEMA Case Study Library

Collections.

  • COVID-19 Best Practice Case Studies
  • Interagency Recovery Coordination Case Studies
  • Mitigation Best Practices
  • Preparedness Grants Case Studies
  • Assistance to Firefighters Grant Case Studies
  • Loss Avoidance Studies
  • Risk MAP Best Practices
  • Cooperating Technical Partners Program Success Stories

Search All Case Studies

Enhanced communication for mt-2 submittals as part of the fema letters of map revision review partners program.

The Colorado Water Conservation Board and Mile High Flood Control District hold pre-submittal meetings. These meetings are a chance to answer questions about the Letter of Map Revision process. This joint effort has made for more complete submittals. It has also improved coordination among local agencies and mapping partners.

Preparedness Grant Effectiveness Case Study: New York City

In August 2021, FEMA conducted a grant effectiveness case study with New York City to understand how FEMA preparedness grant funding helped prepare the city’s mass fatality management (MFM) system for the significant increase in deaths related to the COVID-19 pandemic. FEMA conducted this case study virtually with representatives from NYC’s MFM system, including NYC Emergency Management (NYCEM) and the NYC Office of Chief Medical Examiner (OCME). 

Blue Lake Rancheria Case Study: Impacts of Preparedness Grant Funding

In 2022, FEMA‘s National Preparedness Assessment Division conducted a grant effectiveness case study with the Blue Lake Rancheria to better understand the effects of preparedness grant funding investments made by the tribe. To conduct this case study, FEMA personnel held a virtual interview with Blue Lake Rancheria’s Office of Emergency Services in September 2022. During the case study, participants discussed the tribe’s use of preparedness grant dollars to invest in community resilience, investment and allocation strategies, and recommendations for improving FEMA’s administration of its preparedness grant programs.

Equity-Based Approach to Floodplain Management in Virginia

This presentation focuses on the history of environmental justice in the Commonwealth of Virginia and how those legacies impact current policies.

Equity In Region 3 Planning

The purpose of the Equity In Region 3 Planning brief is to provide an example of equity inclusion in a recent planning effort and to describe our path forward.

Voluntary Regional Planning Approach Builds Stronger Partnerships

In the mid-1990s, North Carolina was a leader in mitigation planning. In 1996, the state created a Hazard Mitigation Planning Initiative. This grew outreach, training and funding support for North Carolina’s local planning efforts. This marked a milestone for North Carolina’s efforts to improve planning in its local jurisdictions.

New Jersey: County of Hunterdon Acquisition of Repetitive Loss Property

Hunterdon County will acquire flood-prone property impacted by Hurricane Ida to prevent future losses.

New Jersey: Berkeley Township Elevation of Three Homes

The township of Berkeley will raise three residential properties for long-term flood protection.

Partner Developed High-Water Mark Mural to Engage Community

Carson City, Nevada created a high-water mark mural that serves as both a teaching tool and a reminder of the community’s flood risk.

Texas: Harris County Flood Control District Buyout

A community in Harris County, Texas, is moving to higher ground to prepare for future floods by creating a natural floodplain.

  • Sviluppo siti web

Gestione Social

  • Pubblicità Online
  • Wecont Media
  • Club delle Ricette
  • Club dei Motori
  • link-in-b.io
  • To The Table

Siamo un’agenzia di Digital Marketing , ci occupiamo di Web Strategy e di Social Media .

Cosa Facciamo

Da oltre 10 anni gestiamo direttamente brand page su tutti i maggiori social network e aiutiamo le grandi e piccole aziende a sfruttare al meglio la loro presenza social.

Sviluppo Web

Sviluppiamo interamente in ottica mobile first siti internet, magazine, web-app ed e-commerce per grandi aziende, Piccole Medie Imprese e la Pubblica Amministrazione.

Content Creation

Dalla gestione diretta di magazine online alla produzione di video, passando per la creazione di contenuti testuali per siti web realizziamo contenuti di alto valore.

Alcuni dei nostri clienti

disaster at a university a case study in information security

Ultime Notizie

disaster at a university a case study in information security

  • 15 Luglio 2022

Su Instagram Arrivano le Note e le Pubblicità nei Profili

disaster at a university a case study in information security

  • 13 Maggio 2022

Meta spinge sulla messaggistica: Whatsapp sarà anche in Business Suite

disaster at a university a case study in information security

  • 9 Maggio 2022

Iubenda down maggio 2022, cos’è successo?

disaster at a university a case study in information security

  • 21 Aprile 2022

Cambia l’algoritmo Instagram: penalizzati i repost

For more audio journalism and storytelling, download New York Times Audio , a new iOS app available for news subscribers.

The Daily logo

  • February 16, 2024   •   39:24 An Explosive Hearing in Trump’s Georgia Election Case
  • February 15, 2024   •   29:38 How China Broke One Man’s Dreams
  • February 14, 2024   •   33:06 The Biden Problem Democrats Can No Longer Ignore
  • February 13, 2024   •   27:23 Why the Race to Replace George Santos Is So Close
  • February 12, 2024   •   21:57 Why Boeing’s Top Airplanes Keep Failing
  • February 11, 2024   •   42:04 The Sunday Read: ‘The Unthinkable Mental Health Crisis That Shook a New England College’
  • February 9, 2024   •   34:05 Kick Trump Off the Ballot? Even Liberal Justices Are Skeptical.
  • February 8, 2024   •   36:53 A Guilty Verdict for a Mass Shooter’s Mother
  • February 7, 2024   •   29:15 El Salvador Decimated Gangs. But at What Cost?
  • February 6, 2024   •   31:45 The U.N. Scandal Threatening Crucial Aid to Gaza
  • February 5, 2024   •   25:10 The 1948 Economic Moment That Might Explain Our Own
  • February 4, 2024 The Sunday Read: ‘The Great Freight-Train Heists of the 21st Century'

An Explosive Hearing in Trump’s Georgia Election Case

Fani t. willis, the district attorney, defended her personal conduct as defense lawyers sought to disqualify her from the prosecution..

  • Share full article

Hosted by Michael Barbaro

Featuring Richard Fausset

Produced by Rob Szypko ,  Sydney Harper and Alex Stern

With Rachelle Bonja

Edited by Devon Taylor

Original music by Marion Lozano and Dan Powell

Engineered by Chris Wood

Listen and follow The Daily Apple Podcasts | Spotify | Amazon Music

In tense proceedings in Georgia, a judge will decide whether Fani T. Willis, the Fulton County district attorney, and her office should be disqualified from their prosecution of former President Donald J. Trump.

Richard Fausset, a national reporter for The Times, talks through the dramatic opening day of testimony, in which a trip to Belize, a tattoo parlor and Grey Goose vodka all featured.

On today’s episode

disaster at a university a case study in information security

Richard Fausset , a national reporter for The New York Times.

Fani Willis is pictured from the side sitting behind a witness stand. She wears a pink dress.

Background reading

With everything on the line, Ms. Willis delivered raw testimony .

What happens if Fani Willis is disqualified from the Trump case?

Read takeaways from the hearing .

There are a lot of ways to listen to The Daily. Here’s how.

We aim to make transcripts available the next workday after an episode’s publication. You can find them at the top of the page.

The Daily is made by Rachel Quester, Lynsea Garrison, Clare Toeniskoetter, Paige Cowett, Michael Simon Johnson, Brad Fisher, Chris Wood, Jessica Cheung, Stella Tan, Alexandra Leigh Young, Lisa Chow, Eric Krupke, Marc Georges, Luke Vander Ploeg, M.J. Davis Lin, Dan Powell, Sydney Harper, Mike Benoist, Liz O. Baylen, Asthaa Chaturvedi, Rachelle Bonja, Diana Nguyen, Marion Lozano, Corey Schreppel, Rob Szypko, Elisheba Ittoop, Mooj Zadie, Patricia Willens, Rowan Niemisto, Jody Becker, Rikki Novetsky, John Ketchum, Nina Feldman, Will Reid, Carlos Prieto, Ben Calhoun, Susan Lee, Lexie Diao, Mary Wilson, Alex Stern, Dan Farrell, Sophia Lanman, Shannon Lin, Diane Wong, Devon Taylor, Alyssa Moxley, Summer Thomad, Olivia Natt, Daniel Ramirez and Brendan Klinkenberg.

Our theme music is by Jim Brunberg and Ben Landsverk of Wonderly. Special thanks to Sam Dolnick, Paula Szuchman, Lisa Tobin, Larissa Anderson, Julia Simon, Sofia Milan, Mahima Chablani, Elizabeth Davis-Moorer, Jeffrey Miranda, Renan Borelli, Maddy Masiello, Isabella Anderson and Nina Lassam.

Richard Fausset , based in Atlanta, writes about the American South, focusing on politics, culture, race, poverty and criminal justice. More about Richard Fausset

Advertisement

IMAGES

  1. Case Study: Information Security Risk Assessment In

    disaster at a university a case study in information security

  2. (PDF) A Study on the Disaster Information Collection Support System

    disaster at a university a case study in information security

  3. IT Disaster Of The Week (02-07-20)

    disaster at a university a case study in information security

  4. Case Study On Information Security Management With Examples

    disaster at a university a case study in information security

  5. Disaster management with case study

    disaster at a university a case study in information security

  6. Disaster management with case study

    disaster at a university a case study in information security

VIDEO

  1. Seminar: Evidence for Policy in Disaster Risk Management (Day 1)

  2. BCA2514 E GOV CASE STUDY E SUVIDHA

COMMENTS

  1. Disaster at a University: A Case Study in Information Security

    ... Compliance with these security policies in higher educational institutions is relatively underexamined with less validated evidence [6]. Moody [7] conducted research using 32 theories to...

  2. PDF Disaster at a University: A Case Study in Information Security

    Introduction Security and disaster training is identified as the top IT required skill that needs to be taught in IS curriculums (Kim, Hsu, & Stern, 2006). Accordingly, information security and privacy have be-come core concepts in information system education (Hentea, Dhillon, & Dhillon, 2006; Kro-enke, 2012; Laudon & Laudon, 2010).

  3. Disaster at a University: A Case Study in Information Security

    A framework of methods, tools and taxonomies for analysis of case studies in information security field, which allows to study every situation in a formal rather than ad-hoc way, and apply a wide range of threat modeling, risk analysis and project management techniques under lifelike conditions is proposed. Expand.

  4. Disaster at a University: A Case Study in Information Security

    Disaster at a University: A Case Study in Information Security Ayyagari, Ramakrishna; Tyks, Jonathan Journal of Information Technology Education: Innovations in Practice, v11 p85-96 2012 Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums.

  5. Disaster at a University: A Case Study in Information Security

    JITE:IIP - Disaster at a University: A Case Study in Information Security Disaster at a University: A Case Study in Information Security Ramakrishna Ayyagari, Jonathan Tyks Journal of Information Technology Education: Innovations in Practice • Volume 11 • 2012 • pp. 085-096 https://doi.org/10.28945/1569 DOWNLOAD PDF 8159 total downloads Back

  6. Case Studies

    This two-part case series profiles how senior officials from the U.S. Department of Homeland Security sought to coordinate the actions of a myriad of actors, ranging from numerous federal partners; the political leadership of the affected Gulf States and sub-state jurisdictions; and the private sector.

  7. Disaster at a University: A Case Study in

    My Research and Language Selection Sign into My Research Create My Research Account English; Help and support. Support Center Find answers to questions about products, access, use, setup, and administration.; Contact Us Have a question, idea, or some feedback? We want to hear from you.

  8. Disaster at a University: A Case Study in Information Security

    Disaster at a University: A Case Study in Information Security. ARTICLE Ramakrishna Ayyagari, Jonathan Tyks. ... E-mail Share OpenURL Abstract. Citation. Ayyagari, R. & Tyks, J. (2012). Disaster at a University: A Case Study in Information Security. Journal of Information Technology Education: Innovations in Practice, 11(1), 85-96. Informing ...

  9. Case studies in IT security and disaster recovery

    By Mitch Betts Executive Editor , Computerworld | Jul 15, 2002 12:00 am PST Here are examples of three IT managers who have taken creative approaches to dealing with issues such as recovering...

  10. Integrating Case Studies into Information Security Education

    The majority of case studies for information security classes are based on a situation made up of one or more unwanted or unexpected events that have compromised, or could very likely compromise, the security of an information asset and affect the business operations. ... R., & Tyks, J. (2012). Disaster at a university: A case study in ...

  11. disaster at a university a case study in information security

    Ayyagari, R. & Tyks, J. (2012). Disaster at a University: A Case Study in Information Security. Journal of Information Technology Education: Innovations in... A case is presented that addresses a data breach at a university caused by lax security policies and includes an element of social engineering that uniquely...

  12. Disaster at a University: A Case Study in Information Security

    Journal of Information Technology Education: Volume 11, 2012 Innovations in Practice Disaster at a University: A Case Study in Information Security Ramakrishna Ayyagari and Jonathan Tyks University of Massachusetts-Boston, Boston, MA, USA [email protected]; [email protected] Executive Summary Security and disaster training is identified as a ...

  13. Security Case B

    Disaster at a University: A Case Study in Information Security (Part B) The Outcome: Victim of Social Engineering. Throughout the process, the auditor found countless examples of lax information security throughout the organization. There was a lack of a coordinated security policy, and the policies in place were not being followed.

  14. Case Study

    Case Study - Week 1 (Plan for Business Continuity and Disaster Planning) ... Case Study - Week 1 (Plan for Business Continuity and Disaster Planning) University: Wilmington University. Course: Plan for ... Case Study: W eek 1. Rohit Puli. Wil mington University. SEC 6010: Plan for Information Security. Pr ofessor Gl enn D.Stover. 10/31/2021 ...

  15. (PDF) Disaster Readiness of Hospital Information Systems: A Case Study

    In information and communications technology disaster this study, hospitals that have information systems in recovery services manual [12] play a guiding role in the international standards are examined and published articles development and provision of information security. studied on the issue of data recovery during disaster are In order to ...

  16. Disaster And Risk Management In An Electronic Environment: A Case Study

    Disaster and Risk Management is an essential framework for making better decisions to safeguard vital documents in an information centre. Developing a disaster and risk management procedures ...

  17. Disaster at university case study.docx

    Disaster at university case study This case focuses on the Turn Key University's lack of security when it came to its IT systems (specifically their Transaction Management System, TMS). Social engineering is employed to remedy a data breach at a university caused by inadequate security measures.

  18. FEMA Case Study Library

    In August 2021, FEMA conducted a grant effectiveness case study with New York City to understand how FEMA preparedness grant funding helped prepare the city's mass fatality management (MFM) system for the significant increase in deaths related to the COVID-19 pandemic. FEMA conducted this case study virtually with representatives from NYC's ...

  19. Information Security Disaster at a University

    Disaster at a University: A Case Study in Information Security Read the Case Study in your groups System Description Since 2000, TKU used a transaction management system for student meal plans.

  20. Security policy compliance behaviour case study

    The resulting aftermath placed a significant financial burden on the university since it was not prepared to grasp an information collateral disaster. This case could be used as a pedagogical select as is uniquely captured a data breach in a university setting. Readers of the case will identify that at the verwalten gauge aforementioned case ...

  21. Disaster at a University A Case Study in Informati

    Disaster at a University A Case Study in Informati - Journal of Information Technology Education: - Studocu Information security in higher education institutions Database Management Systems (CSCT3208) Université de Dschang This document has been uploaded by a student, just like you, who decided to remain anonymous. Université de Dschang

  22. Disaster at a University: Information Security Case Study

    CSC Programing. Case3: Disaster at a University: A Case Study in Information Security Jeslin Edison EPGPKC07048 Assignment Questions (WEB) 1. Describe the TKU. Turn Key University (TKU) is a medium sized public university located in Idaho. The institution is situated on a beautiful 25-acre campus, just north of a major city.

  23. An Explosive Hearing in Trump's Georgia Election Case

    In tense proceedings in Georgia, a judge will decide whether Fani T. Willis, the Fulton County district attorney, and her office should be disqualified from their prosecution of former President ...

  24. EPGP204

    2.Describe the IT division setup at TKU Information Technology division consists of six departments -- Institutional Projects, Media Services, Teaching Support, Computing Systems, Web Services, and Network & Telecom. Each of these departments was headed by a Director who reports to the Chief Information Officer (CIO). The Information Technology Division manages all aspects of computing on the ...