This paper describes a popular postgraduate information systems security course and discusses a number of key issues that currently face the course. The course covers a broad range of managerial and technical topics, and makes use of a number of security tools and techniques to complement the theory taught. The paper details the content of the course and outlines how it is taught and assessed. Specific examples of content and methods are provided and, where applicable, insight is offered as to why the course has been arranged in that particular way. The paper also outlines a number of important concerns and issues currently confronting the course. The issues discussed include the coverage of the course, its breadth and depth, the incorporat...
The design of an IS postgraduate curriculum may take as staring point existing model curricula and g...
Information security management is an area with a lot of theoretical models. The models are designed...
Due to several recent highly publicized information breaches, information security has gained a high...
This paper describes the inception, planning and first delivery of a security course as part of a po...
Purpose: The purpose of this paper is to describe the development, design, delivery and evaluation o...
This paper examines problems with defining the requirements for a postgraduate course in Information...
This paper presents the structure and content of a series of a postgraduate curriculum in Internet S...
Given the magnitude of real and potential losses, both private and public employers increasingly exp...
Information technology has become the core tool of business organisations’. External and inter...
The development of Information Security as a discipline has only occurred in recent years. Currently...
Information security is becoming ever more important in our daily lives. Every day there are headli...
This paper describes an information security course that evolved from a technology-focused legacy sy...
When the power of computing and communications technology was unleashed for the benefit of the socie...
Given the magnitude of real and potential loses associated with security breaches, public employers ...
Part 3: Information Security Courses and CurriculaInternational audienceIn the light of Industry 4.0...
The design of an IS postgraduate curriculum may take as staring point existing model curricula and g...
Information security management is an area with a lot of theoretical models. The models are designed...
Due to several recent highly publicized information breaches, information security has gained a high...
This paper describes the inception, planning and first delivery of a security course as part of a po...
Purpose: The purpose of this paper is to describe the development, design, delivery and evaluation o...
This paper examines problems with defining the requirements for a postgraduate course in Information...
This paper presents the structure and content of a series of a postgraduate curriculum in Internet S...
Given the magnitude of real and potential losses, both private and public employers increasingly exp...
Information technology has become the core tool of business organisations’. External and inter...
The development of Information Security as a discipline has only occurred in recent years. Currently...
Information security is becoming ever more important in our daily lives. Every day there are headli...
This paper describes an information security course that evolved from a technology-focused legacy sy...
When the power of computing and communications technology was unleashed for the benefit of the socie...
Given the magnitude of real and potential loses associated with security breaches, public employers ...
Part 3: Information Security Courses and CurriculaInternational audienceIn the light of Industry 4.0...
The design of an IS postgraduate curriculum may take as staring point existing model curricula and g...
Information security management is an area with a lot of theoretical models. The models are designed...
Due to several recent highly publicized information breaches, information security has gained a high...