Item request has been placed!
×
Item request cannot be made.
×

Processing Request
Information Security Management in Distress at SkillPlat.
Item request has been placed!
×
Item request cannot be made.
×

Processing Request
- المؤلفون: Bongiovanni, Ivano1
- المصدر:
Journal of Information Systems Education. Fall2022, Vol. 33 Issue 4, p338-356. 19p.
- الموضوع:
- معلومة اضافية
- نبذة مختصرة :
In this role-playing teaching case, students impersonate Selective Consulting, a fictitious, Australian-based company tasked with assessing the information security practices of SkillPlat, a provider of apprenticeship and traineeship services. The case develops around the one-week visit paid by Selective Consulting to SkillPlat's headquarters, during which the consultants identify several issues that denote poor information security management practices by the company. After analysing the case materials (the main text, plus seven exhibits), students write a report in which they assess the pros and cons of SkillPlat's information security management practices, offer recommendations for improvement, and indicate other sources of information that could be useful for a more detailed analysis. The report is expected to cover various topics in information security management: policies, user behaviours/human factors, governance, security practices, risk management, physical security, protection of personally identifiable information and privacy, organisational culture, etc. This teaching case has been successfully utilised with two cohorts of Master students as an assessment piece, at the end of a course on cybersecurity management. The present case requires students to offer solid arguments in favour of their assessment and recommendations, tapping into their knowledge of the subject and external resources (e.g., industry reports, academic papers, etc.). This Teaching Case needs to be accompanied by its Teaching Notes. [ABSTRACT FROM AUTHOR]
- نبذة مختصرة :
Copyright of Journal of Information Systems Education is the property of Information Systems & Computing Academic Professionals (ISCAP) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
No Comments.