You may submit a case study using the submission form (a text version is also available). Instructions are included below. Please note that each submission will be reviewed by the Higher Education Information Security Council (formerly the Security Task Force) before it is posted in the appropriate location on this wiki. |
Case studies are descriptions of real-world, practical, proven solutions to information security challenges implemented by one or more institutions. The intent of these case studies is to provide ideas for approaches which may be adopted or adapted to other school's particular situations.
By filling in a relatively simple form, a case study is written up and submitted to the Higher Education Information Security Council (HEISC). Once it is received, it is typically reviewed by one or more of the HEISC working groups. This vetting process gives the institution submitting the case study an opportunity to answer questions or add content that enhances its value.
Submitting a case study not only documents a successful institutional approach to information security, as well as providing useful guidance to other institutions, it also gives the author(s) the opportunity to publish.
Below is a complete list of case study submissions that are referenced throughout the site (look for this symbol: ). To contribute examples of practices that have been effective in your institution, please use the submission form (or text version).
Please note that we are currently in the process of converting all of the case study submissions from PDF forms to wiki pages. This will make all of the content contained in the case studies searchable on this wiki. |
Questions or comments? Contact us.
Except where otherwise noted, this work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0).