Part I: PREFACE & INTRODUCTION.
Part II: RUNNING CASE: INTRODUCTION AND BACKGROUND.
Part III: PERSONNEL & PRIVACY.
Reading: Data Privacy: Is it Possible? John H. Nugent, Texas Women's University, Case: Technology Department and a Human Resources Department: A Case Study and Analysis. Jeffrey M. Stanton. Syracuse University. Case: IT Ethics and Security in an IT Certification Project. Jeffrey P. Landry, University of South Alabama. J. Harold Pardue, University of South Alabama. Reading: An Etymological View of Ethical Hacking. Michael Whitman, Kennesaw State University. Running Case.
Part IV: RISK MANAGEMENT.
Reading: CYBER Insurance and Residual Information Risk Management
Tridib Bandyopadhyay, Kennesaw State University. Paper: Rethinking Risk-based Security. Herbert Mattord, Kennesaw State University. Case: Video Maze. Patricia Morrison, Cape Breton University. Running Case.
Part V: MANAGEMENT OF SECURITY TECHNOLOGY.
Reading: Cryptography Algorithms Standards: A Guideline for Management. Wasim A Al-Hamdani, Kentucky State University. Reading: Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy Tridib Bandyopadhyay, Kennesaw State University. Case: Advanced Topologies, Inc. Reading: Web Applications: Vulnerabilities and Remediation Shankar Babu Chebrolu, Cisco Systems Vinay K. Bansal, Cisco Systems. Reading: Managing Secure Database Systems Li Yang, University of Tennessee at Chattanooga.Running Case.
Part VI: INFORMATION SECURITY PROGRAM MANAGEMENT.
Case: Legal and Ethical Issues in Information Security Metrics
Jennifer L. Bayuk, Stevens Institute of Technology, School of Systems and Enterprises. Reading: Impact of Incomplete or Missing Information in a Security Policy Wasim A Al-Hamdani, Kentucky State University
Wendy Dixie, Kentucky State University. Case: Using Laws for Federal Agencies to Investigate Legal and Ethical Management of Information Security Jeffrey P. Landry, University of South Alabama. Case: The Law in Information Security Management Katherine H. Winters, University of Tennessee at Chattanooga. Running Case.
Part VII: REGULATORY COMPLIANCE MANAGEMENT.
Reading: Security Compliance Auditing: Review and Research Directions
Guillermo A. Francia, III, Jacksonville State University Jeffrey S. Zanzig, Jacksonville State University. Reading: Global Information Security Regulations, Case Studies and Cultural Issues Guillermo A. Francia, III, Jacksonville State University
Andrew P. Ciganek, Jacksonville State University. Case: Collaboration and Compliance in Healthcare: A Threat Modeling Case Study.
Divakaran Liginlal, University of South Alabama, Lara Z. Khansa, Virginia Polytechnic Institute & State University, Jeffrey P. Landry, University of South Alabama. Running Case.