Issues and Opinions: Assessing the Emphasis on Information Security in the Systems Analysis and Design Course

[1]  Mat Honan 29. How Apple and Amazon Security Flaws Led to My Epic Hacking , 2013 .

[2]  Donna F. Dodson,et al.  INFORMATION SECURITY AND PRIVACY ADVISORY BOARD , 2012 .

[3]  Moshe Zviran,et al.  Identification and Authentication: Technology and Implementation Issues , 2006, Commun. Assoc. Inf. Syst..

[4]  Abhi Shelat,et al.  Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..

[5]  Alan R. Dennis,et al.  Systems Analysis and Design with UML , 2003 .

[6]  Julie E. Kendall,et al.  Systems analysis and design , 1981 .

[7]  Shirley Radack,et al.  Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems , 2004 .

[8]  Amitava Dutta,et al.  Management's Role in Information Security in a Cyber Economy , 2002 .

[9]  Annabelle Lee,et al.  Information Security in the System Development Life Cycle | NIST , 2004 .

[10]  Michael R. Grimaila,et al.  Evaluation of security solutions in the SCADA environment , 2014, DATB.

[11]  William C. Barker,et al.  Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories , 2008 .

[12]  Leon Gommans,et al.  Generic AAA Architecture , 2000, RFC.

[13]  Jeffrey L. Whitten,et al.  Systems Analysis and Design Methods , 1986 .

[14]  David W. Miller,et al.  On Contending with Unruly Neighbors in the Global Village: Viewing Information Systems as Both Weapon and Target , 2011, Commun. Assoc. Inf. Syst..

[15]  Ryan T. Wright,et al.  IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems , 2010, Commun. Assoc. Inf. Syst..

[16]  Frantz Rowe,et al.  Functionality vs. Security in IS: Tradeoff or Equilibrium? , 2012, ICIS.

[17]  Patrick D. Howard,et al.  Official (ISC)2? Guide to the CAP? CBK? , 2012 .

[18]  J. Initiative SP 800-39. Managing Information Security Risk: Organization, Mission, and Information System View , 2011 .

[19]  Peter G. Neumann Risks to the Public in Computers and Related Systems , 1995, SOEN.

[20]  Barry W. Boehm,et al.  Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.