Higher Education

Readings & Cases in Information Security: Law & Ethics, 1st Edition

  • Michael E. Whitman Michael J. Coles College of Business, Kennesaw State University
  • Herbert J. Mattord Michael J. Coles College of Business, Kennesaw State University
  • ISBN-10: 1435441575  |  ISBN-13: 9781435441576
  • 352 Pages
  • © 2011 | Published
  • College Bookstore Wholesale Price = $41.00
  *Why an online review copy?
  • It's the greener, leaner way to review! An online copy cuts down on paper and on time. Reduce the wait (and the weight) of printed texts. Your online copy arrives instantly, and you can review it anytime from your computer or favorite mobile device.

If you prefer a print copy to review, please contact your representative.

About

Overview

Readings and Cases in Information Security: Law and Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text, this resource offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.

Features and Benefits

  • Contains a variety of case studies designed to stimulate in-class and written discussion.
  • Prepares the reader for situations in the information security industry with best practices, articles and cases relating to the most up-to-date security issues.
  • Discussion questions at the end of various readings or case studies inspire the reader to further their understanding of each case and gain better perspective on material covered.
  • Coverage of current ethical and legal issues provides a modern look at one of today's fastest growing fields.
  • Running case studies uses realistic scenarios to prompt classroom discussion and expand worldview on legal and ethical matters in the information security field.

Table of Contents

Part I: PREFACE & INTRODUCTION.
Part II: RUNNING CASE: INTRODUCTION AND BACKGROUND.
Part III: PERSONNEL & PRIVACY.
Reading: Data Privacy: Is it Possible? John H. Nugent, Texas Women's University, Case: Technology Department and a Human Resources Department: A Case Study and Analysis. Jeffrey M. Stanton. Syracuse University. Case: IT Ethics and Security in an IT Certification Project. Jeffrey P. Landry, University of South Alabama. J. Harold Pardue, University of South Alabama. Reading: An Etymological View of Ethical Hacking. Michael Whitman, Kennesaw State University. Running Case.
Part IV: RISK MANAGEMENT.
Reading: CYBER Insurance and Residual Information Risk Management
Tridib Bandyopadhyay, Kennesaw State University. Paper: Rethinking Risk-based Security. Herbert Mattord, Kennesaw State University. Case: Video Maze. Patricia Morrison, Cape Breton University. Running Case.
Part V: MANAGEMENT OF SECURITY TECHNOLOGY.
Reading: Cryptography Algorithms Standards: A Guideline for Management. Wasim A Al-Hamdani, Kentucky State University. Reading: Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy Tridib Bandyopadhyay, Kennesaw State University. Case: Advanced Topologies, Inc. Reading: Web Applications: Vulnerabilities and Remediation Shankar Babu Chebrolu, Cisco Systems Vinay K. Bansal, Cisco Systems. Reading: Managing Secure Database Systems Li Yang, University of Tennessee at Chattanooga.Running Case.
Part VI: INFORMATION SECURITY PROGRAM MANAGEMENT.
Case: Legal and Ethical Issues in Information Security Metrics
Jennifer L. Bayuk, Stevens Institute of Technology, School of Systems and Enterprises. Reading: Impact of Incomplete or Missing Information in a Security Policy Wasim A Al-Hamdani, Kentucky State University
Wendy Dixie, Kentucky State University. Case: Using Laws for Federal Agencies to Investigate Legal and Ethical Management of Information Security Jeffrey P. Landry, University of South Alabama. Case: The Law in Information Security Management Katherine H. Winters, University of Tennessee at Chattanooga. Running Case.
Part VII: REGULATORY COMPLIANCE MANAGEMENT.
Reading: Security Compliance Auditing: Review and Research Directions
Guillermo A. Francia, III, Jacksonville State University Jeffrey S. Zanzig, Jacksonville State University. Reading: Global Information Security Regulations, Case Studies and Cultural Issues Guillermo A. Francia, III, Jacksonville State University
Andrew P. Ciganek, Jacksonville State University. Case: Collaboration and Compliance in Healthcare: A Threat Modeling Case Study.
Divakaran Liginlal, University of South Alabama, Lara Z. Khansa, Virginia Polytechnic Institute & State University, Jeffrey P. Landry, University of South Alabama. Running Case.

Learning Resource Bundles

Choose the textbook packaged with the resources that best meet your course and student needs. Contact your Learning Consultant for more information.

Bundle: Readings & Cases in Information Security: Law & Ethics + Computer Crime, Investigation, and the Law

ISBN-10: 1133616836 | ISBN-13: 9781133616832

List Price = $93.95  | CengageBrain Price = $93.95  | College Bookstore Wholesale Price = $71.00

This Bundle Includes:

  • Readings & Cases in Information Security: Law & Ethics
    List Price = $54.95  | CengageBrain Price = $54.95  | College Bookstore Wholesale Price = $41.00
  • Computer Crime, Investigation, and the Law
    List Price = $39.95  | CengageBrain Price = $39.95  | College Bookstore Wholesale Price = $30.00


Supplements

All supplements have been updated in coordination with the main title. Select the main title's "About" tab, then select "What's New" for updates specific to title's edition.

For more information about these supplements, or to obtain them, contact your Learning Consultant.

Instructor Supplements

Cengeage Learning eBook Instant Access Code  (ISBN-10: 111131294X | ISBN-13: 9781111312947)

List Price = $13.95  | CengageBrain Price = $13.95  | College Bookstore Wholesale Price = $10.50

Management of Information Security  (ISBN-10: 1435488849 | ISBN-13: 9781435488847)

Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger on the pulse of industry changes and academic relevance.

List Price = $205.95  | CengageBrain Price = $205.95  | College Bookstore Wholesale Price = $154.50

Readings and Cases in the Management of Information Security  (ISBN-10: 0619216271 | ISBN-13: 9780619216276)

These readings provide students with a depth of content and analytical perspective not found in other textbooks. Organized into five units, Planning, Policy, People, Projects and Protection, each unit includes items such as academic research papers, summaries of industry practices or written cases to give students valuable resources to use as industry professionals.

List Price = $47.95  | CengageBrain Price = $47.95  | College Bookstore Wholesale Price = $36.00

Student Supplements

Cengeage Learning eBook Instant Access Code  (ISBN-10: 111131294X | ISBN-13: 9781111312947)

List Price = $13.95  | CengageBrain Price = $13.95  | College Bookstore Wholesale Price = $10.50

Management of Information Security  (ISBN-10: 1435488849 | ISBN-13: 9781435488847)

Management of Information Security primarily focuses on the managerial aspects of information security, such as access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. The third edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger on the pulse of industry changes and academic relevance.

List Price = $205.95  | CengageBrain Price = $205.95  | College Bookstore Wholesale Price = $154.50

Readings and Cases in the Management of Information Security  (ISBN-10: 0619216271 | ISBN-13: 9780619216276)

This text provides students with a set of industry focused readings and cases illustrating real-world issues in information security.

List Price = $47.95  | CengageBrain Price = $47.95  | College Bookstore Wholesale Price = $36.00

Meet the Author

Author Bio

Michael E. Whitman

Michael Whitman, Ph.D., CISM, CISSP, is Professor of Information Security at Kennesaw State University, Kennesaw, Georgia. He also serves as the Executive Director of the Center for Information Security Education, Coles College of Business. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded KSU’s successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CDE), awarded jointly by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the Editor-in-Chief of the Journal of Cybersecurity Education, Research and Practice, and is Director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in Information Security Policy, Threats, Curriculum Development, and Ethical Computing. He currently teaches graduate and undergraduate courses in Information Security. Dr. Whitman has several information security textbooks currently in print, including PRINCIPLES OF INFORMATION SECURITY; MANAGEMENT OF INFORMATION SECURITY; READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, VOLUMES I AND II; THE HANDS-ON INFORMATION SECURITY LAB MANUAL; PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY; and THE GUIDE TO NETWORK SECURITY AND THE GUIDE TO FIREWALLS AND NETWORK SECURITY. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Previously, Dr. Whitman served the U.S. Army as an Automated Data Processing System Security Officer (ADPSSO).

Herbert J. Mattord

Herbert Mattord, Ph.D., CISM, CISSP, completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University, where he is Assistant Chair of the Department of Information Systems and Associate Professor of Information Security and Assurance program. Dr. Mattord currently teaches graduate and undergraduate courses in Information Security and Assurance as well as Information Systems. He and Michael Whitman have authored PRINCIPLES OF INFORMATION SECURITY, MANAGEMENT OF INFORMATION SECURITY, READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY, THE GUIDE TO NETWORK SECURITY, and THE HANDS-ON INFORMATION SECURITY LAB MANUAL, Dr. Mattord is an active researcher, author, and consultant in Information Security Management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education, and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA, and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University: San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge found in this and his other textbooks.