Teaching information security management: Reflections and experiences

被引:13
|
作者
机构
[1] Ahmad, Atif
[2] Maynard, Sean
来源
| 1600年 / Emerald Group Holdings Ltd.卷 / 22期
关键词
Security of data - Curricula - Information management - Industrial management;
D O I
10.1108/IMCS-08-2013-0058
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] STANDARDIZATION IN INFORMATION SECURITY MANAGEMENT
    Fal', A. M.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2010, 46 (03) : 512 - 515
  • [22] IT/IS SECURITY MANAGEMENT WITH UNCERTAIN INFORMATION
    Klimes, Cyril
    Bartos, Jiri
    KYBERNETIKA, 2015, 51 (03) : 408 - 419
  • [23] The Construction of Information Security Management
    Quan, Yin
    SOCIAL SCIENCE AND EDUCATION, 2013, 10 : 519 - 521
  • [24] A framework for the management of information security
    Leiwo, J
    Zheng, YL
    INFORMATION SECURITY, 1998, 1396 : 232 - 245
  • [25] Knowledge management and information security
    Buogo, Mateus
    Fachinelli, Ana Cristina
    Giacomello, Cintia Paese
    ATOZ-NOVAS PRATICAS EM INFORMACAO E CONHECIMENTO, 2019, 8 (02): : 49 - 59
  • [26] Security in Management of Distributed Information
    Ogiela, Marek R.
    Ogiela, Lidia
    Ogiela, Urszula
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 457 - 462
  • [27] Security for System Wide Information Management Collaborative Information Management
    Wilson, Ian
    Yang, Sherry
    2017 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE (ICNS), 2017,
  • [28] Is information security under control? Investigating quality in information security management
    Baker, Wade H.
    Wallace, Linda
    IEEE SECURITY & PRIVACY, 2007, 5 (01) : 36 - 44
  • [29] Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.
    Smith, E.
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 224 - 231
  • [30] Teaching Security Management for Mobile Devices
    Yuan, Xiaohong
    He, Wu
    Yang, Li
    Simpkins, Lindsay
    SIGITE'16: PROCEEDINGS OF THE 17TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION, 2016, : 14 - 19