This a follow-on to previous IACIS 2018 & 2019 presentations that reported on a needs analysis of information systems security education at a 2,500-student college of business in an 11,000-student university in the Upper Midwest USA (UWEC). This year we bring in some results from a 1,700-student college of business in a 6,500- student university in the Southeast USA (GCSU). Preliminary Results are summarized in tables 1 and 2. In this study we compare MIS majors and Business Students and find little differences and conclude much more research is needed. Security of information systems is becoming more crucial by the day (Cerrudo, 2017), both conceptual knowledge and skill in tool use being necessary (Tarala, 2011). Countering this trend is ...
Skill/knowledge areas for undergraduate information systems (IS) curricula were assessed by computer...
Every information systems professional has a role to play in security. Analysts must consider securi...
abstract: How prepared are individuals to work in an environment with sensitive information? Do busi...
This a follow-on to previous IACIS 2018 & 2019 presentations that reported on a needs analysis of in...
Given the magnitude of real and potential losses, both private and public employers increasingly exp...
A survey of college students from both IS and CS programs was undertaken to understand student recog...
This research compared the employment of the skills and attributes needed by information systems sec...
The primary purpose of this study was to gather information about students\u27 opinion regarding th...
Organizations have become especially vulnerable to security threats to their most important asset, i...
Information systems security is increasingly important to managers and employees from all discipline...
Over the years, the news media has reported numerous information security incidents. Because of iden...
The need to professionally and successfully conduct computer forensic investigations of incidents ha...
Information security is becoming ever more important in our daily lives. Every day there are headli...
Issues associated with information security are numerous and diverse. Since the majority of organiza...
Today, irrespective of what career field a college graduate enters, personal computer literacy is a ...
Skill/knowledge areas for undergraduate information systems (IS) curricula were assessed by computer...
Every information systems professional has a role to play in security. Analysts must consider securi...
abstract: How prepared are individuals to work in an environment with sensitive information? Do busi...
This a follow-on to previous IACIS 2018 & 2019 presentations that reported on a needs analysis of in...
Given the magnitude of real and potential losses, both private and public employers increasingly exp...
A survey of college students from both IS and CS programs was undertaken to understand student recog...
This research compared the employment of the skills and attributes needed by information systems sec...
The primary purpose of this study was to gather information about students\u27 opinion regarding th...
Organizations have become especially vulnerable to security threats to their most important asset, i...
Information systems security is increasingly important to managers and employees from all discipline...
Over the years, the news media has reported numerous information security incidents. Because of iden...
The need to professionally and successfully conduct computer forensic investigations of incidents ha...
Information security is becoming ever more important in our daily lives. Every day there are headli...
Issues associated with information security are numerous and diverse. Since the majority of organiza...
Today, irrespective of what career field a college graduate enters, personal computer literacy is a ...
Skill/knowledge areas for undergraduate information systems (IS) curricula were assessed by computer...
Every information systems professional has a role to play in security. Analysts must consider securi...
abstract: How prepared are individuals to work in an environment with sensitive information? Do busi...