This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background
Teaching cases based on stories about real organizations are a powerful means of storytelling. These...
Information security is becoming ever more important in our daily lives. Every day there are headli...
Given the magnitude of real and potential loses associated with security breaches, public employers ...
This paper presents the structure and content of a series of a postgraduate curriculum in Internet S...
This paper describes a popular postgraduate information systems security course and discusses a numb...
This paper describes an information security course that evolved from a technology-focused legacy sy...
Purpose: The purpose of this paper is to describe the development, design, delivery and evaluation o...
The development of Information Security as a discipline has only occurred in recent years. Currently...
Purpose - The purpose of this paper is to compare and contrast university governance structures with...
Given the magnitude of real and potential losses, both private and public employers increasingly exp...
Information technology has become the core tool of business organisations’. External and inter...
Information security management is an area with a lot of theoretical models. The models are designed...
This paper examines problems with defining the requirements for a postgraduate course in Information...
In this paper the authors present a curriculum design for Information Security Management, which was...
Over the past few years, more and more companies have been investing in electronic commerce (EC) by ...
Teaching cases based on stories about real organizations are a powerful means of storytelling. These...
Information security is becoming ever more important in our daily lives. Every day there are headli...
Given the magnitude of real and potential loses associated with security breaches, public employers ...
This paper presents the structure and content of a series of a postgraduate curriculum in Internet S...
This paper describes a popular postgraduate information systems security course and discusses a numb...
This paper describes an information security course that evolved from a technology-focused legacy sy...
Purpose: The purpose of this paper is to describe the development, design, delivery and evaluation o...
The development of Information Security as a discipline has only occurred in recent years. Currently...
Purpose - The purpose of this paper is to compare and contrast university governance structures with...
Given the magnitude of real and potential losses, both private and public employers increasingly exp...
Information technology has become the core tool of business organisations’. External and inter...
Information security management is an area with a lot of theoretical models. The models are designed...
This paper examines problems with defining the requirements for a postgraduate course in Information...
In this paper the authors present a curriculum design for Information Security Management, which was...
Over the past few years, more and more companies have been investing in electronic commerce (EC) by ...
Teaching cases based on stories about real organizations are a powerful means of storytelling. These...
Information security is becoming ever more important in our daily lives. Every day there are headli...
Given the magnitude of real and potential loses associated with security breaches, public employers ...