A firm that specializes in setting up computer systems is asked by a potential client to guarantee 100% security. Knowing that is an impossible request, the owner considers what he might offer as a counter proposal that would make sense.
JVAB, an elite small business that specializes in cybersecurity penetration testing has more demand for its services than it can handle. The skill set required for its activities is very specialized, however. It is also hard to find. How should it go about seeking new employees?
A supplier of marketing and logistics web sites has been approached by a customer wanting to incorporate multifactor authentication. What approach should be taken and how should it be configured so as not to disrupt existing customers?
A small consulting business has the opportunity to work with a new age company interested in moving its proprietary psychological software to the cloud. But if the security of that software is compromised, it could seriously damage the client. Should he proceed?
Does it make sense for the University of South Florida to acquire cyber insurance? This case study explores the issues involved and the nature of the cyber insurance product.
How do you balance flexibility and security in deploying a new online journal? Is WordPress the best solution? An information security case that was developed during the launch of the MCR and MBR journals and was also used in a cybersecurity program.
A list of items that need to be checked prior to the final publication of an MCR discussion case. Authors will be able to reduce turnaround time dramatically if they use this checklist prior to making a submission and prior to making their final revision.
Basic instructions on using the Muma journal templates.
A brief video on signing up for the review system
A note describing open access publishing. Intended as a technical note sample.