In this paper the authors present a curriculum design for Information Security Management, which was synthesized using the inputs from both the industry and academia. The top down curriculum design process carried out in Korea starts with the analysis of the job of an Information Security Manager (ISM), identifies the knowledge elements needed for successfully fulfilling the main responsibilities of the job and finally synthesizes them into seven courses suitable for flexible implementation. Additionally, a lateral occupational analysis of ISM reveals the value-skills (soft-skills) that should be considered in the actual implementation of the curriculum
Organizations have become especially vulnerable to security threats to their most important asset, i...
This paper presents the structure and content of a series of a postgraduate curriculum in Internet S...
When the power of computing and communications technology was unleashed for the benefit of the socie...
Generally, the Information Security Manager (ISM) is responsible for an organization's informat...
The IT industry in Korea, having recognized the importance of Information Security (IS), is in press...
Issues associated with information security are numerous and diverse. Since the majority of organiza...
Information security management is an area with a lot of theoretical models. The models are designed...
Purpose: The purpose of this paper is to describe the development, design, delivery and evaluation o...
The requirements for training in the field of information security (IS) in terms of IS management as...
With the dramatic increase in threats to information security, there is a clear need for a correspon...
Part 3: Information Security Courses and CurriculaInternational audienceThe paper shares the NRNU ME...
Given the magnitude of real and potential losses, both private and public employers increasingly exp...
This research compared the employment of the skills and attributes needed by information systems sec...
This paper describes an information security course that evolved from a technology-focused legacy sy...
Managing IT security and assurance is a top priority for organizations. Aware of the costs associate...
Organizations have become especially vulnerable to security threats to their most important asset, i...
This paper presents the structure and content of a series of a postgraduate curriculum in Internet S...
When the power of computing and communications technology was unleashed for the benefit of the socie...
Generally, the Information Security Manager (ISM) is responsible for an organization's informat...
The IT industry in Korea, having recognized the importance of Information Security (IS), is in press...
Issues associated with information security are numerous and diverse. Since the majority of organiza...
Information security management is an area with a lot of theoretical models. The models are designed...
Purpose: The purpose of this paper is to describe the development, design, delivery and evaluation o...
The requirements for training in the field of information security (IS) in terms of IS management as...
With the dramatic increase in threats to information security, there is a clear need for a correspon...
Part 3: Information Security Courses and CurriculaInternational audienceThe paper shares the NRNU ME...
Given the magnitude of real and potential losses, both private and public employers increasingly exp...
This research compared the employment of the skills and attributes needed by information systems sec...
This paper describes an information security course that evolved from a technology-focused legacy sy...
Managing IT security and assurance is a top priority for organizations. Aware of the costs associate...
Organizations have become especially vulnerable to security threats to their most important asset, i...
This paper presents the structure and content of a series of a postgraduate curriculum in Internet S...
When the power of computing and communications technology was unleashed for the benefit of the socie...