Skip to main content
Log in

On the global knowledge components in an information security curriculum–a multidisciplinary perspective

  • Published:
Education and Information Technologies Aims and scope Submit manuscript

Abstract

Because of the borderless feature of the Internet, information security threats could come from anywhere around the globe. In this research, we propose adding global knowledge components in the information security curriculum using a multi-disciplinary approach. We argue that a global perspective has been lacking in the current information security curriculum. We then propose several knowledge components to be added in the curriculum to enhance the global perspective. We also examine how to incorporate knowledge from various related disciplines, including political science, criminal justice, and business administration. Through our empirical study on faculty from various disciplines and the industry practitioners with first-hand information security knowledge, we confirm that the proposed knowledge components are relevant to the information security education and practice. Analyzing the similarities and differences among responses from various disciplines, we also found that albeit different disciplines have slightly different emphases on the curriculum components, they all tend to agree on the importance of adding the global perspectives in information security education. Our research could be of value to the educators in the information security field when considering incorporating a global perspective into the curriculum. It could also shed some lights when examining the relevance of global information security to various disciplines.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Anderson, J. E., Schwager, P. H. (2002). Security in the information systems curriculum: Identification & status of relevant issues. Journal of Computer Information Systems, 3(16), 16–24.

    Google Scholar 

  • Calkins, M. M. (2000). They shoot Trojan horses, don’t they? An economic analysis of anti-hacking regulatory models. Georgetown Law Journal, 89, 171–224.

    Google Scholar 

  • Casey, E. (2006). Investigating sophisticated security breaches. Communications of the ACM, 49(2), 48–54.

    Article  Google Scholar 

  • Cegielski, C. G. (2008). Toward the development of an interdisciplinary information assurance curriculum: Knowledge domains and skill sets required of information assurance professionals. Decision Sciences Journal of Innovative Education, 6(1), 29–49.

    Article  Google Scholar 

  • Connolly, P. (2000). Privacy as global policy. InfoWorld, 22(37), 49–50.

    Google Scholar 

  • Cresson-Wood, C. (2004). Why information security is now multi-disciplinary, multi-departmental, and multi-organizational in nature. Computer Fraud & Security, Elsevier, 2004(Issue 1), 16–17.

    Article  Google Scholar 

  • Dash, J. (2001). Schools push soft skills for info security majors. Computerworld, 35(6), 24.

    MathSciNet  Google Scholar 

  • Deflem, M., & Shutt, J. E. (2008). Law enforcement and computer security threats and measures. In H. Bidgoli (Ed.), Global perspectives in information security: Legal, social, and international issues. New Jersey: Wiley & sons.

    Google Scholar 

  • Ferrell, K. (2004). Cybercrime Spins Out Of Control, TechWeb.com, Wednesday, September 22, 2004

  • Gerber, M., & von Solms, R. (2008). Information security requirements—Interpreting the legal aspects. Computers & Security, 27(Issues 5–6), 124–135.

    Article  Google Scholar 

  • Gritzalis, D., Theoharidou, M., & Kalimeri, E., (2005). Towards an Interdisciplinary InfoSec Education Model. Proc. 4th IFIP World Conf. Information Security Education, Moscow Engineering Physics Institute, pp. 22–35.

  • Hentea, M., Dhillon, H., & Dhillon, M. (2006). Towards changes in information security education. Journal of Information Technology Education, 5, 221–233.

    Google Scholar 

  • Himma, K. E. (2008). Legal, social, and ethical issues of the internet. In H. Bidgoli (Ed.), Global perspectives in information security: Legal, social, and international issues. New Jersey: Wiley & sons.

    Google Scholar 

  • Irvine, C. E., Chin, S.-K., & Frincke, D. (1998). Integrating security into the curriculum. IEEE Computer, 31(12), 25–30.

    Google Scholar 

  • Jayaratna, N. (1993). Research notes: Information systems as social systems: Research at the LSE. International Journal of Information Management, 13(4), 299–301.

    Article  Google Scholar 

  • Jung, B., Han, I., & Lee, S. (2001). Security threats to internet: A Korean multi-industry investigation. Information & Management, 38(8), 487–498.

    Article  Google Scholar 

  • Karimi, J., & Konsynski, B. (1991). Globalization and information management strategies. Journal of Management Information Systems, 7(4), 7–26.

    Google Scholar 

  • Milberg, S., Smith, J., & Burke, S. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.

    Article  Google Scholar 

  • Powers, D. M. (2008). Cyberlaw: The major areas, development, and information security aspects. In H. Bidgoli (Ed.), Global perspectives in information security: Legal, social, and international issues. New Jersey: Wiley & sons.

    Google Scholar 

  • Rasmussen, M. (2003) Analyst report: IT Trends 2003—Information security standards, regulations and legislation—Giga Information Group® 2003. Retrieved May 21, 2005 from CSOonline.com site: http://www.csoonline.com/analyst/report721.html.

  • Reidenberg. (2000). Resolving conflicting international data privacy rules in cyberspace. Stanford Law Review, 52(5), 1315–1367.

    Article  Google Scholar 

  • Rudraswamy, V., & Vance, D. A. (2001). Transborder data flows: Adoption and diffusion of protective legislation in the global electronic commerce environment. Logistics Information Management, 14(1/2), 127–136.

    Article  Google Scholar 

  • Saunders, C. (2002). EU Oks spam ban, online privacy rules, Internet News. Retrieved April 4, 2008, from http://www.internetnews.com/IAR/article .php/l154391.

  • Sofaer, A. D., & Goodman, S. E. (2006). Cyber Crime and Security. The Transnational Dimension.Hoover Press, www.hoover.org/publications/ books/fulltext/cybercrime/1.pdf (Accessed on May 8, 2006).

  • Stephens, D. (1999). The globalization of information technology in multinational corporations. Information Management Journal, 33(3), 66–71.

    Google Scholar 

  • Symantec Internet Security Threat Report (2006), Trends for July 05–December 05, Volume IX, Published March 2006, https://enterprise.symantec.com/enterprise/whitepaper.cfm

  • Symantec Internet Security Threat Report (2008a), Trends for July 07–December 07, Volume XIII, Published April 2008, http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiii_04-2008.en-us.pdf

  • Symantec Report on the Underground Economy (2008b), July 07–June 08, Published November 2008

  • Teer, F.E., Kruck, S. E., & Kruck, G. (2007). Empirical study of students’ computer security—practices/perceptions. Journal of Computer Information Systems, 3(105)

  • Theoharidou, M., & Gritzalis, D. (2007). Common body of knowledge for information security. IEEE Security & Privacy, 5(2), 64–67.

    Article  Google Scholar 

  • Todd, J., & Vickers, K. (2003). Developing high-tech entrepreneurs: A multidisciplinary strategy. Decision Sciences Journal of Innovative Education, 1(2), 317–320.

    Article  Google Scholar 

  • Walters, L. M. (2007). A draft of an information systems security and control course. Journal of Information Systems, 21(1), 123–148.

    Article  Google Scholar 

  • White, G., & Long, J. (2007). Thinking Globally: Incorporating an International Component in Information Security Curricula. Information Systems Education Journal, galley (411.1913). http://isedj.org/galley/411.1913/. ISSN: 1545-679X. (Also appears in The Proceedings of ISECON 2006: §2324. ISSN: 1542–7382).

  • Williams, P. (2001). Organized crime and cybercrime: Synergies, trends, and responses, global issues, arresting transnational crimes, An Electronic Journal of the U.S. Department of State–August 2001 Volume 6, Number 2

  • Zuckerman, A. (2001). Order in the courts? World Trade, 14(9), 26–29.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ju Long.

Appendix A: Survey instrument

Appendix A: Survey instrument

1.1 Information security curriculum international needs survey

You are invited to participate in a study to help better develop Information Security Curriculum involving international considerations. We will appreciate your assistance. This survey contains seven items and ten topics.

  1. 1.

    What is your teaching and research field?

  2. A.

    Accounting

  3. B.

    Finance

  4. C.

    Economics

  5. D.

    Marketing

  6. E.

    Management

  7. F.

    Computer Information Systems & QM

  8. G.

    Criminal Justice

  9. H.

    Political Science

  10. I.

    Computer Science

For the following item #2 and topics #1 to #10, how interested are you in the following information security issues and topics? Please rate your interest with the following scale:

  1. A.

    Strongly NOT Valued/Relevant

  2. B.

    NOT Valued/Relevant

  3. C.

    No Opinion/Undecided/Neutral

  4. D.

    Valued/Relevant

  5. E.

    Strongly Valued/Relevant

  1. 2.

    How important is the understanding of the international information security issues for you to be prepared for the working world?

  2. Topic 1.

    Introduction on International information security risks.

  3. Topic 2.

    International sources and techniques of cyber-crime and cyber-terrorism

  4. Topic 3.

    Information & privacy laws from foreign countries and how they differ.

  5. Topic 4.

    Various measures and technologies that different governments and foreign agencies are using in fighting international cyber-crime and how they differ.

  6. Topic 5.

    Current international laws and policies on cyber security and how these laws are enforced in different countries.

  7. Topic 6.

    How international organizations, such as U.N. and E.U. are coordinating the global efforts in fighting against cyber-crime and cyber-terrorism

  8. Topic 7.

    The incentives for governments and companies of developing nations to enforce security regulations and policies.

  9. Topic 8.

    The obstacles for governments and companies of developing nations to improve their information security infrastructure.

  10. Topic 9.

    Different cultural values and ethics concerning information security.

  11. Topic 10.

    Introduction on information warfare.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Long, J., White, G. On the global knowledge components in an information security curriculum–a multidisciplinary perspective. Educ Inf Technol 15, 317–331 (2010). https://doi.org/10.1007/s10639-010-9121-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10639-010-9121-0

Keyword

Navigation