Abstract
Information technology has become the core tool of business organisations’. External and internal threats as well as legal, regulatory and contractual compliance requirements are all combining to make effective information security a key information technology management challenges. This paper describes an undergraduate information technology security management course that provides comprehensive knowledge and skills necessary to manage both strategic and operational aspects of information security. The course covers a broad range of managerial topics in information technology security and makes use of a number of security tools and techniques to complement the theory taught. In this paper, we describe our approach, our experiences and lessons learned for teaching information technology security management course. The paper details the content of the course and outlines how it is taught and assessed.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Sharma, S.K., Sefchek, J.: Teaching information systems security courses: A hands-on Approach. Computers and Security 26(4), 290–299 (2007)
Crowley, E.: Information system security curricula development. In: Proceedings of the 4th conference on Information technology curriculum, pp. 249–255 (2003)
Turnbull, N.: From the preface of the book IT Governance: A Manager’s Guide to Data Security & BS 7799/ISO 17799
Bishop, M.: Introduction to Computer Security. Addison-Wesley Professional, Reading (2004)
Steele, G., Stojkovic, V.: An Information System Security Course for the Undergraduate Information Systems Curriculum. Information Systems Education Journal 2(3), 3–14 (2004)
Shing, M.-L., Shing, C.-C., Chen, K.L., Lee, H.: Issues in information security curriculum: collaborative learning and team teaching. International Journal of Innovation and Learning 4(5), 516–529 (2007)
Teaching IT security Computer Fraud & Security, vol. 2008(3), p. 10 (March 2008)
Mubarak, S.: A Critical Analysis on Theoretical Perspectives of Teaching Information Security in Tertiary Education. In: 18th Australasian Conference on Information Systems, pp. 844–847 (2007)
Ramsden, P.: Learning to teach in higher education. Routledge, London (2003)
Jensen, B.K., Cline, M., Guynes, C.S.: Teaching the undergraduate CS Information Security Course. ACM SIGCSE Bull. 38(12), 61–63 (2006)
Theoharidou, M., Gritzalis, D.: Common Body of Knowledge for Information Security. IEEE Security & Privacy 5(2), 64–67 (2007)
Crowley, E.: Information System Security Curricula Development. In: Proc. 4th Conf. IT Curriculum, pp. 249–255. ACM Press, New York (2003)
Morneau, K.: Designing an Information Security Program as a Core Competency of Network Technologists. In: Proc. 5th Conf. IT Education, pp. 29–32. ACM Press, New York (2004)
Kim, K.-Y., Surendran, K.: Information Security Management Curriculum Design: A Joint Industry and Academic Effort. Journal of Information Systems Education 13(3), 227–236 (2002)
McKenzie, W., Murphy, D.: I hope this goes somewhere: Evaluation of an online discussion group. Australian Journal of Education Technology 16(3), 239–257 (2000)
Hsu, C., Backhouse, J.: Information Systems Security Education: Redressing the Balance of Theory and Practice. Journal of Information Systems Education 13(3), 211–217 (2002)
Harley, S.: Situated Learning and Classroom Instruction. Educational Technology, 46–51 (1993)
Anderson, J., et al.: Situated Learning and Education. Educational Research 25(4), 5–11 (1996)
Purao, Sandeep: Hyper-Link Teaching and Intelligent Slides: Complementary Strategies To Foster Active Learning. Journal of Education for MIS 5(1), 63–78 (1998)
Mckinney Jr., E.H., Yoos II, C.J.: The One School Roomhouse: An Information and Learning Approach to Curriculum Integration. Journal of Management Education 22(5), 618–636 (1998)
Logan, P.Y.: Crafting an Undergraduate Information Security Emphasis Within Information Technology. Journal of Information Systems Education 13(3), 177–182
Skills Gaps in the World’s IT Workforce, The Computing Technology Industry Association Inc. (February 2008), http://www.comptia.org/sections/research/default.aspx
Suydam, M.: Tapping the Security Job Market. Information Security, pp. 40–44 (October 1999)
Samavedham, L.: Teaching Students to Think: A Matter
USA Presidential’s National Plan for Information Systems Protection, http://www.ciao.gov/National_Plan/national_plan%20_final.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abawajy, J.H. (2009). Design and Delivery of Undergraduate IT Security Management Course. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-02617-1_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02616-4
Online ISBN: 978-3-642-02617-1
eBook Packages: Computer ScienceComputer Science (R0)