ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Virginia Tech Shooting — A Case Study, Part 2

Updated on April 26, 2013
Diane Lockridge profile image

Lockridge holds an EdS in Curriculum and Instruction, an MS in Elementary Education, and a BA in History. She also homeschools her children.

How the Virginia Tech Shootings Changed Security Measures on College Campuses

Immediately after the incident at Virginia Tech, administration became more “student centered” notes Geller (2008, p. 11) by focusing on how to approach students who returned to classes for the semester, and for those who did not. The college brought in counselors and volunteers who were available to help students during the first few days back at class.

Since the tragedy, Virginia judges that “rule on commitment now must identify the purpose of treatment and the source of case management. Court clerks are required to notify the state police when a special judge declares an individual to be mentally ill” (Stoil, 2007, paragraph 9). Unfortunately even with this measure Stoil notes that the reporting would not have prevented Sueng-Hui Cho from driving two hours away from in a nearby state that do not have similar laws (paragraph 9).

With so many “smart” devices and mobile forms of communication, some schools have taken to releasing information through texts and emails, which go directly, and quite literally, into the hands of the students. Virginia Tech now obtains several points of contact until a confirmation has been received that the recipient has received the message (Bithell, 2008, paragraph 14).

In addition to using technology more, the Virginia Campus has made great changes to the VTPD, including the “addition of a deputy chief, a sergeant, an investigator, and six officers, plus two administrative positions” (Bithell, paragraph 11).

The college has also been equipped with classrooms that can lock from the inside, keeping students safe inside the classroom (Bithell, paragraph 16) and has installed a siren system encouraging students to “shelter, shut and seek” when engaged (Bithell, paragraph 15).

While “what it means to be safe in an open campus differs from institution to another” notes Chigani, Balci, Barkhi (2011, p. 3), a report from the Arkansas Safe Campus Task Force (2010), noted that the incident at Virginia Tech has helped other institutes to look at their own safety precautions and procedures ([ASCTF], p. 4). Even the International Association of Campus Law Enforcement Administration ([IACLEA], 2008) compiled a report on their findings of the Virginia Tech shootings and made suggestions as how to avoid such a tragedy in the future.

For example, the IACLEA suggested that colleges and universities ensure that their message system such as a phone relay was accessible from both on and off campus, and that sufficient personal, such as campus officers, had access to dispatch correct and timely information to the students and staff (IACLEA, p. 5). The IACLEA also suggested ensuring that campus security has first responder or EMT-like training which would allow security to promptly handle emergency care situations (IACLEA, p. 6). The ASCTF warns about ensuring the campus administration has current contact information for students, and suggests that the information be “keep current on least an annual basis” (ASCTF, p. 9). Mastrodicasa (2008) warns that using emails may be too outdated, since it relies on the students checking their emails; social networking or text messages are more likely to get read quicker (p. 43).

With regarding to using technology for security, in one week Penn Sate had 6,200 people sign up for a voluntary text messaging system that would allow students to receive messages on security issues (Mastrodicasa p. 44). Other universities, such as St. John’s Universities in Queens, New York and the University of Colorado at Boulder have also successfully used similar programs on their campus during emergency situations (Mastrodicasa, p. 45).

Truly, better security measures could have been in place on the campus, and the administration may have needed to pay better head to student and faculty complaints, however Cho ultimately made the decision to go on the rampage himself. This tragic incident has allowed campuses everywhere to not only evaluate their own security issues, but also evaluate the care of the student and how even disturbed students such as Sueng-Hui Cho need an advocate.


Arkansas Safe Campus Task Force. (2010) 2010 Best practices and recommendations: an all-hazards approach to campus safety planning and operations.

Bithell, S. (Spring 2008). A year later: remembrance and resilience. VirginiaTech Magazine. Chigani, A., Balci, O., & Barkhi, R. (2011) Decision support for campus emergency response management.

Geller, E. S. (2008, March). The tragic shootings at Virginia tech: personal perspectives, prospects and preventative potentials. Traumatology. 14 (1) 8-20.

International Association of Campus Law Enforcement Administration. Overview of the Virginia tech tragedies and implications for campus safety: the IACLEA blueprint for safer campuses. (2008)

Mastrodicasa, J. (2008). Technology use in campus crisis. New Directions for Student Services, (124), 37-53. doi:10.1002/ss.294

Stoil, M. (2007, December) "Virginia tech's implications: real policy change will remain elusive, just as it has for the past 20 years.” Behavioral Healthcare. (27)12

Virginia Tech Review Panel. (2007) Mass Shootings at Virginia Tech. Retrieved from


This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

Show Details
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)