Case-based learning in the management practice of information security: an innovative pedagogical instrument
暂无分享,去创建一个
Sean B. Maynard | Atif Ahmad | Sameen Motahhir | Ashley Anderson | Atif Ahmad | S. Maynard | Sameen Motahhir | A. Anderson
[1] David H. Jonassen,et al. The effects of successful versus failure-based cases on argumentation while solving decision-making problems , 2013 .
[2] Aubteen Darabi,et al. Learning from failure: a meta-analysis of the empirical studies , 2018, Educational Technology Research and Development.
[3] Christian Leuprecht,et al. Beyond the Castle Model of cyber-risk and cyber-security , 2016, Gov. Inf. Q..
[4] W. Alec Cram,et al. Teaching Information Security in Business Schools: Current Practices and a Proposed Direction for the Future , 2016, Commun. Assoc. Inf. Syst..
[5] Rens Scheepers,et al. Asset Identification in Information Security Risk Assessment: A Business Practice Approach , 2016, Commun. Assoc. Inf. Syst..
[6] Jason R. C. Nurse,et al. Developing cybersecurity education and awareness programmes for Small and medium-sized enterprises (SMEs) , 2019, Inf. Comput. Secur..
[7] R. Baskerville. Information Warfare: A Comparative Framework for Business Information Security , 2005 .
[8] K. Kendall,et al. Enhancing Online Executive Education Using Storytelling: An Approach to Strengthening Online Social Presence , 2017 .
[9] Sean B. Maynard,et al. Teaching information security management: reflections and experiences , 2014, Inf. Manag. Comput. Secur..
[10] Curtis J. Bonk,et al. A Review of Case-based Learning Practices in an Online MBA Program: A Program-level Case Study , 2009, J. Educ. Technol. Soc..
[11] Sean B. Maynard,et al. Information Security Policy: A Management Practice Perspective , 2016, ACIS.
[12] A. B. Ruighaver,et al. Incident response teams - Challenges in supporting the organisational security function , 2012, Comput. Secur..
[13] Kevin C. Desouza,et al. How integration of cyber security management and incident response enables organizational learning , 2020, J. Assoc. Inf. Sci. Technol..
[14] Kevin C. Desouza,et al. Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack , 2019, Comput. Secur..
[15] Finn Olav Sveen,et al. Blind information security strategy , 2009, Int. J. Crit. Infrastructure Prot..
[16] Sean B. Maynard,et al. Defining the Strategic Role of the Chief Information Security Officer , 2018, Pac. Asia J. Assoc. Inf. Syst..
[17] Glenn Lowry,et al. Information Systems Education for the 21st Century: Aligning Curriculum Content and Delivery with the Professional Workplace. , 2005 .
[18] W. Alec Cram,et al. Organizational information security policies: a review and research framework , 2017, Eur. J. Inf. Syst..
[19] A. B. Ruighaver,et al. Security Policy Quality: A Multiple Constituency Perspective , 2007 .
[20] Mikko T. Siponen,et al. Information security standards focus on the existence of process, not its content , 2006, CACM.
[21] Sean B. Maynard,et al. Information security strategies: towards an organizational multi-strategy perspective , 2014, J. Intell. Manuf..
[22] Janis L. Gogan,et al. Snowfall and a stolen laptop , 2015 .
[23] Zbigniew Kotulski,et al. Cybersecurity education: Evolution of the discipline and analysis of master programs , 2018, Comput. Secur..
[24] José María de Fuentes,et al. Design recommendations for online cybersecurity courses , 2019, Comput. Secur..
[25] Sean B. Maynard,et al. Towards a Framework for Strategic Security Context in Information Security Governance , 2018, Pac. Asia J. Assoc. Inf. Syst..
[26] Exploration of the efficacy of the case method of teaching , 2018 .
[27] Linda Pinsky,et al. A conceptual framework for developing teaching cases: a review and synthesis of the literature across disciplines , 2006, Medical education.
[28] Graeme G. Shanks,et al. A situation awareness model for information security risk management , 2014, Comput. Secur..
[29] Atif Ahmad,et al. Incorporating a knowledge perspective into security risk assessments , 2011 .
[30] Sean B. Maynard,et al. Toward Sustainable behaviour Change: an Approach for Cyber Security Education Training and Awareness , 2019, ECIS.
[31] P. Datta,et al. Cybersecurity: the three-headed Janus , 2018, Journal of Information Technology Teaching Cases.
[32] Graeme G. Shanks,et al. A case analysis of information systems and security incident responses , 2015, Int. J. Inf. Manag..
[33] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[34] A. B. Ruighaver,et al. Information Security Governance: When Compliance Becomes More Important than Security , 2010, SEC.
[35] Herbert J. Mattord,et al. Cybersecurity Curricular Guidelines , 2017, World Conference on Information Security Education.
[36] Robert E. Crossler,et al. Cultivating cybersecurity learning: An integration of self-determination and flow , 2020, Comput. Secur..
[37] Kristijan Mirkovski,et al. A storyteller's guide to problem‐based learning for information systems management education , 2019, Inf. Syst. J..
[38] Rachelle Bosua,et al. Protecting organizational competitive advantage: A knowledge leakage perspective , 2014, Comput. Secur..
[39] Samuel C. Yang. A meta-model of cybersecurity curriculums: Assessing cybersecurity curricular frameworks for business schools , 2020 .