<?xml version="1.0"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-05-23T17:51:02Z</responseDate><request verb="GetRecord" metadataPrefix="oai_dc">https://keep.lib.asu.edu/oai/request</request><GetRecord><record><header><identifier>oai:keep.lib.asu.edu:node-191218</identifier><datestamp>2025-05-20T15:17:28Z</datestamp><setSpec>oai_pmh:all</setSpec><setSpec>oai_pmh:repo_items</setSpec></header><metadata><oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><dc:identifier>191218</dc:identifier>
          <dc:identifier>https://hdl.handle.net/2286/R.2.N.191218</dc:identifier>
          <dc:identifier>&lt;p&gt;Deb McCaffrey and Jessica Kelley. 2022. Cybersecurity and Research are not a Dichotomy: How to form a productive operational relationship between research computing and data support teams and information security teams. In Practice and Experience in Advanced Research Computing (PEARC &#039;22). Association for Computing Machinery, New York, NY, USA, Article 67, 1–4. ASU KEEP Repository &lt;a href=&quot;https://hdl.handle.net/2286/R.2.N.191218&quot;&gt;https://hdl.handle.net/2286/R.2.N.191218&lt;/a&gt;&lt;/p&gt;&lt;p&gt;© Deb McCaffrey and Jessica Kelley | ACM 2022. This is the author&#039;s version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in In Practice and Experience in Advanced Research Computing (PEARC &#039;22). Association for Computing Machinery &lt;a href=&quot;https://doi.org/10.1145/3491418.3535180&quot;&gt;https://doi.org/10.1145/3491418.3535180&lt;/a&gt;&amp;nbsp;&lt;/p&gt;</dc:identifier>
          <dc:identifier>https://doi.org/10.1145/3491418.3535180</dc:identifier>
                  <dc:rights>http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
          <dc:rights>All Rights Reserved</dc:rights>
                  <dc:date>2022-07-14</dc:date>
                  <dc:format>4 pages</dc:format>
                  <dc:language>eng</dc:language>
                  <dc:contributor>McCaffrey, Deb</dc:contributor>
          <dc:contributor>Kelley, Jessica</dc:contributor>
                  <dc:type>Text</dc:type>
                  <dc:description>Cybersecurity and research do not have to be opposed to each other. With increasing cyberattacks, it is more important than ever for cybersecurity and research to corporate. The authors describe how Research Liaisons and Information Assurance: Michigan Medicine (IA:MM) collaborate at Michigan Medicine, an academic medical center subject to strict HIPAA controls and frequent risk assess- ments. IA:MM provides its own Liaison to work with the Research Liaisons to better understand security process and guide researchers through the process. IA:MM has developed formal risk decision processes and informal engagements with the CISO to provide risk- based cybersecurity instead of controls-based. This collaboration has helped develop mitigating procedures for researchers when standard controls are not feasible.</dc:description>
                  <dc:subject>Cybersecurity</dc:subject>
          <dc:subject>Information Security</dc:subject>
          <dc:subject>HIPAA</dc:subject>
          <dc:subject>Risk Management</dc:subject>
          <dc:subject>research computing and data</dc:subject>
                  <dc:title>Cybersecurity and research are not a dichotomy:
: How to form a productive operational relationship between research computing and data support teams and information security teams</dc:title></oai_dc:dc></metadata></record></GetRecord></OAI-PMH>
