Insights, innovations, strategies, and common issues were sought during the interviews to create a foundational conversation for stakeholders. Technology leaders at eight of these institutions were interviewed to determine the priority of information security, operational barriers that impede the implementation of effective security controls, current problems and issues that inhibited security controls, and what additional resources were necessary to implement security controls according to best practices. This qualitative multi-case study examined small and private, non-profit institutions of higher education to understand the challenges that technology managers face in securing these systems. The complex task of securing information and computing systems is made more difficult at institutions of higher education due to philosophical traditions of academic freedom as well as growing budgetary constraints and intransigent stakeholder expectations of unimpeded access to educational and entertainment resources. The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |