![]() |
|||||||||||||||
|
|||||||||||||||
Goals & Methodology |
|||||||||||||||
Goals Although academic institutions are plagued by information security incidents and their potential damage to public safety is growing exponentially, little research has been conducted to address these issues. This research project is the first empirical baseline of information security in academic institutions as it relates to public safety. The purpose of the Information Security In Academic Institutions (ISAI) project is three-fold:
The outcomes of this project will be critical to universities, policy-makers, law enforcement agencies, and technical solution providers. ISAI will provide these stakeholders with objective data, recommendations for policy, and a roadmap for implementation. Specifically, we will:
Methodology ISAI will ensure maximum benefit to our stakeholders and the public by collecting data from IT Directors across the United States. To maximize impact for policy as well as practice, we will integrate this data with federal policy of agencies such as National Institute of Standards and Technology (NIST) and insights of information technology organizations. ISAI will collect data via three methods:
This combination of methods provides a robust data set from which insights from the current study and directions for future research can be obtained. Activities will leverage strategic input from academic institutions, key policy-makers, and team members’ expertise to maximize our research outcomes. The quantitative survey and forensic analysis data will be integrated with the qualitative interview data using the Research Methodology Process (Burd, 2001). Our project is tightly managed to ensure stakeholders' expectations are met within appropriate timeframes. Thirteen specialists, each hand-picked for their expertise, are involved in this project and dedicated to its success. |
|||||||||||||||
![]() |
|||||||||||||||
For more information: contact@infosecurityresearch.org (917) 783 – 8496 (646) 365-3148 (fax) This project is supported by Grant No. 2004-IJ-CX-0045 awarded by the National Institute of Justice, Office of Justice Programs, US Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the US Department of Justice. |