Design and delivery of undergraduate IT security management course

Abawajy, Jemal H. 2009, Design and delivery of undergraduate IT security management course, Lecture notes in computer science, vol. 5576, pp. 402-411.

Attached Files
Name Description MIMEType Size Downloads

Title Design and delivery of undergraduate IT security management course
Author(s) Abawajy, Jemal H.
Journal name Lecture notes in computer science
Volume number 5576
Start page 402
End page 411
Publisher Springer
Place of publication Heidelberg, Germany
Publication date 2009
ISSN 0302-9743
1611-3349
Keyword(s) Information security management
curriculum development
Information Security Manager
job analysis
Summary Information technology has become the core tool of business organisations’. External and internal threats as well as legal, regulatory and contractual compliance requirements are all combining to make effective information security a key information technology management challenges. This paper describes an undergraduate information technology security management course that provides comprehensive knowledge and skills necessary to manage both strategic and operational aspects of information security. The course covers a broad range of managerial topics in information technology security and makes use of a number of security tools and techniques to complement the theory taught. In this paper, we describe our approach, our experiences and lessons learned for teaching information technology security management course. The paper details the content of the course and outlines how it is taught and assessed.
Language eng
Field of Research 130202 Curriculum and Pedagogy Theory and Development
Socio Economic Objective 930301 Assessment and Evaluation of Curriculum
HERDC Research category C1 Refereed article in a scholarly journal
HERDC collection year 2009
Copyright notice ©2009, Springer-Verlag Berlin
Persistent URL http://hdl.handle.net/10536/DRO/DU:30029102

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 331 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jun 2010, 12:46:21 EST by Leanne Swaneveld

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.