People are becoming more creative in use of classic fraud schemes via information systems. This paper presents a case study resource for teaching information security controls to help combat information systems fraud. The Health First Case Study is designed to give undergraduate computer science, information systems, and information technology students an opportunity to plan security for a doctor’s office, with the guidance of another useful resource, the Small Business Security Workbook. The case study addresses social engineering, ethics, requirements documentation, security design, incident response, and personnel security. Course implementation examples are included for both face-to-face and online courses
Information assurance CIA) needs of 21st century businesses require expertise that had not yet been ...
The growing use of e-learning systems has been documented by numerous studies (Levy, 2005). Yet in s...
This textbook provides an overview of the major types of fraud and corrupt activities found in priva...
Case studies have been found to improve student performance and help students develop problem-solvin...
Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top ma...
Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resul...
In recent years, there has been a significant increase in the demand from professionals in different...
In this role-playing teaching case, students impersonate Selective Consulting, a fictitious, Austral...
Digital attacks on organizations are becoming more common and more sophisticated. Firms are interest...
Digital attacks on organizations are becoming more common and more sophisticated. Firms are interest...
Information systems provide an attractive opportunity for dishonest employees in sensitive job posit...
Case-based learning (CBL) is a powerful pedagogical method of creating dialogue between theory and p...
Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resul...
The purpose of this article is to alert and inform the reader of the rampant amount of fraud (cheati...
After serving as a treasurer for a student organization it was clear that it would not be difficult ...
Information assurance CIA) needs of 21st century businesses require expertise that had not yet been ...
The growing use of e-learning systems has been documented by numerous studies (Levy, 2005). Yet in s...
This textbook provides an overview of the major types of fraud and corrupt activities found in priva...
Case studies have been found to improve student performance and help students develop problem-solvin...
Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top ma...
Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resul...
In recent years, there has been a significant increase in the demand from professionals in different...
In this role-playing teaching case, students impersonate Selective Consulting, a fictitious, Austral...
Digital attacks on organizations are becoming more common and more sophisticated. Firms are interest...
Digital attacks on organizations are becoming more common and more sophisticated. Firms are interest...
Information systems provide an attractive opportunity for dishonest employees in sensitive job posit...
Case-based learning (CBL) is a powerful pedagogical method of creating dialogue between theory and p...
Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resul...
The purpose of this article is to alert and inform the reader of the rampant amount of fraud (cheati...
After serving as a treasurer for a student organization it was clear that it would not be difficult ...
Information assurance CIA) needs of 21st century businesses require expertise that had not yet been ...
The growing use of e-learning systems has been documented by numerous studies (Levy, 2005). Yet in s...
This textbook provides an overview of the major types of fraud and corrupt activities found in priva...