Case-based learning in the management practice of information security: an innovative pedagogical instrument

[1]  David H. Jonassen,et al.  The effects of successful versus failure-based cases on argumentation while solving decision-making problems , 2013 .

[2]  Aubteen Darabi,et al.  Learning from failure: a meta-analysis of the empirical studies , 2018, Educational Technology Research and Development.

[3]  Christian Leuprecht,et al.  Beyond the Castle Model of cyber-risk and cyber-security , 2016, Gov. Inf. Q..

[4]  W. Alec Cram,et al.  Teaching Information Security in Business Schools: Current Practices and a Proposed Direction for the Future , 2016, Commun. Assoc. Inf. Syst..

[5]  Rens Scheepers,et al.  Asset Identification in Information Security Risk Assessment: A Business Practice Approach , 2016, Commun. Assoc. Inf. Syst..

[6]  Jason R. C. Nurse,et al.  Developing cybersecurity education and awareness programmes for Small and medium-sized enterprises (SMEs) , 2019, Inf. Comput. Secur..

[7]  R. Baskerville Information Warfare: A Comparative Framework for Business Information Security , 2005 .

[8]  K. Kendall,et al.  Enhancing Online Executive Education Using Storytelling: An Approach to Strengthening Online Social Presence , 2017 .

[9]  Sean B. Maynard,et al.  Teaching information security management: reflections and experiences , 2014, Inf. Manag. Comput. Secur..

[10]  Curtis J. Bonk,et al.  A Review of Case-based Learning Practices in an Online MBA Program: A Program-level Case Study , 2009, J. Educ. Technol. Soc..

[11]  Sean B. Maynard,et al.  Information Security Policy: A Management Practice Perspective , 2016, ACIS.

[12]  A. B. Ruighaver,et al.  Incident response teams - Challenges in supporting the organisational security function , 2012, Comput. Secur..

[13]  Kevin C. Desouza,et al.  How integration of cyber security management and incident response enables organizational learning , 2020, J. Assoc. Inf. Sci. Technol..

[14]  Kevin C. Desouza,et al.  Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack , 2019, Comput. Secur..

[15]  Finn Olav Sveen,et al.  Blind information security strategy , 2009, Int. J. Crit. Infrastructure Prot..

[16]  Sean B. Maynard,et al.  Defining the Strategic Role of the Chief Information Security Officer , 2018, Pac. Asia J. Assoc. Inf. Syst..

[17]  Glenn Lowry,et al.  Information Systems Education for the 21st Century: Aligning Curriculum Content and Delivery with the Professional Workplace. , 2005 .

[18]  W. Alec Cram,et al.  Organizational information security policies: a review and research framework , 2017, Eur. J. Inf. Syst..

[19]  A. B. Ruighaver,et al.  Security Policy Quality: A Multiple Constituency Perspective , 2007 .

[20]  Mikko T. Siponen,et al.  Information security standards focus on the existence of process, not its content , 2006, CACM.

[21]  Sean B. Maynard,et al.  Information security strategies: towards an organizational multi-strategy perspective , 2014, J. Intell. Manuf..

[22]  Janis L. Gogan,et al.  Snowfall and a stolen laptop , 2015 .

[23]  Zbigniew Kotulski,et al.  Cybersecurity education: Evolution of the discipline and analysis of master programs , 2018, Comput. Secur..

[24]  José María de Fuentes,et al.  Design recommendations for online cybersecurity courses , 2019, Comput. Secur..

[25]  Sean B. Maynard,et al.  Towards a Framework for Strategic Security Context in Information Security Governance , 2018, Pac. Asia J. Assoc. Inf. Syst..

[26]  Exploration of the efficacy of the case method of teaching , 2018 .

[27]  Linda Pinsky,et al.  A conceptual framework for developing teaching cases: a review and synthesis of the literature across disciplines , 2006, Medical education.

[28]  Graeme G. Shanks,et al.  A situation awareness model for information security risk management , 2014, Comput. Secur..

[29]  Atif Ahmad,et al.  Incorporating a knowledge perspective into security risk assessments , 2011 .

[30]  Sean B. Maynard,et al.  Toward Sustainable behaviour Change: an Approach for Cyber Security Education Training and Awareness , 2019, ECIS.

[31]  P. Datta,et al.  Cybersecurity: the three-headed Janus , 2018, Journal of Information Technology Teaching Cases.

[32]  Graeme G. Shanks,et al.  A case analysis of information systems and security incident responses , 2015, Int. J. Inf. Manag..

[33]  Herbert J. Mattord,et al.  Principles of Information Security , 2004 .

[34]  A. B. Ruighaver,et al.  Information Security Governance: When Compliance Becomes More Important than Security , 2010, SEC.

[35]  Herbert J. Mattord,et al.  Cybersecurity Curricular Guidelines , 2017, World Conference on Information Security Education.

[36]  Robert E. Crossler,et al.  Cultivating cybersecurity learning: An integration of self-determination and flow , 2020, Comput. Secur..

[37]  Kristijan Mirkovski,et al.  A storyteller's guide to problem‐based learning for information systems management education , 2019, Inf. Syst. J..

[38]  Rachelle Bosua,et al.  Protecting organizational competitive advantage: A knowledge leakage perspective , 2014, Comput. Secur..

[39]  Samuel C. Yang A meta-model of cybersecurity curriculums: Assessing cybersecurity curricular frameworks for business schools , 2020 .