A firm that specializes in setting up computer systems is asked by a potential client to guarantee 100% security. Knowing that is an impossible request, the owner considers what he might offer as a counter proposal that would make sense.
JVAB, an elite small business that specializes in cybersecurity penetration testing has more demand for its services than it can handle. The skill set required for its activities is very specialized, however. It is also hard to find. How should it go about seeking new employees?
A supplier of marketing and logistics web sites has been approached by a customer wanting to incorporate multifactor authentication. What approach should be taken and how should it be configured so as not to disrupt existing customers?
A small consulting business has the opportunity to work with a new age company interested in moving its proprietary psychological software to the cloud. But if the security of that software is compromised, it could seriously damage the client. Should he proceed?
Does it make sense for the University of South Florida to acquire cyber insurance? This case study explores the issues involved and the nature of the cyber insurance product.
How do you balance flexibility and security in deploying a new online journal? Is WordPress the best solution? An information security case that was developed during the launch of the MCR and MBR journals and was also used in a cybersecurity program.
A list of items that need to be checked prior to the final publication of an MCR discussion case. Authors will be able to reduce turnaround time dramatically if they use this checklist prior to making a submission and prior to making their final revision.
How do you design a research journal to publish articles that engage practice? A sample case that was used in the DBA program during the process of developing the Muma Business Review journal.
Templates for creating Muma Case Review discussion cases can be downloaded here.