Purpose: The purpose of this paper is to describe the development, design, delivery and evaluation of a postgraduate information security subject that focuses on a managerial, rather than the more frequently reported technical perspective. The authors aimed to create an atmosphere of intellectual excitement and discovery so that students felt empowered by new ideas, tools and techniques and realized the potential value of what they were learning in the industry. Design/methodology/approach: The paper develops fundamental principles and arguments that inform the design and development of the teaching curriculum. The curriculum is aimed at security management professionals in general and consultants in particular. The paper explains the teach...
This paper presents the structure and content of a series of a postgraduate curriculum in Internet S...
Cyber security is a growing area of international importance, with shortages present for cyber secur...
Cyber security is a growing area of international importance, with shortages present for cyber secur...
Information technology has become the core tool of business organisations’. External and inter...
Information security management is an area with a lot of theoretical models. The models are designed...
The growing importance of information security as a business issue has encouraged instructors to ext...
This paper describes a popular postgraduate information systems security course and discusses a numb...
This paper describes the inception, planning and first delivery of a security course as part of a po...
This paper describes an information security course that evolved from a technology-focused legacy sy...
In this paper the authors present a curriculum design for Information Security Management, which was...
Given the magnitude of real and potential loses associated with security breaches, public employers ...
Given the magnitude of real and potential losses, both private and public employers increasingly exp...
In recent years, a dramatic shift has occurred in the way computers are used. The advances in comput...
Abstract: Information system security teaching is very complex because of the wide range of domains ...
Part 3: Information Security Courses and CurriculaInternational audienceThe paper shares the NRNU ME...
This paper presents the structure and content of a series of a postgraduate curriculum in Internet S...
Cyber security is a growing area of international importance, with shortages present for cyber secur...
Cyber security is a growing area of international importance, with shortages present for cyber secur...
Information technology has become the core tool of business organisations’. External and inter...
Information security management is an area with a lot of theoretical models. The models are designed...
The growing importance of information security as a business issue has encouraged instructors to ext...
This paper describes a popular postgraduate information systems security course and discusses a numb...
This paper describes the inception, planning and first delivery of a security course as part of a po...
This paper describes an information security course that evolved from a technology-focused legacy sy...
In this paper the authors present a curriculum design for Information Security Management, which was...
Given the magnitude of real and potential loses associated with security breaches, public employers ...
Given the magnitude of real and potential losses, both private and public employers increasingly exp...
In recent years, a dramatic shift has occurred in the way computers are used. The advances in comput...
Abstract: Information system security teaching is very complex because of the wide range of domains ...
Part 3: Information Security Courses and CurriculaInternational audienceThe paper shares the NRNU ME...
This paper presents the structure and content of a series of a postgraduate curriculum in Internet S...
Cyber security is a growing area of international importance, with shortages present for cyber secur...
Cyber security is a growing area of international importance, with shortages present for cyber secur...