Nothing Special   »   [go: up one dir, main page]

skip to main content
article

On the global knowledge components in an information security curriculum---a multidisciplinary perspective

Published: 01 December 2010 Publication History

Abstract

Because of the borderless feature of the Internet, information security threats could come from anywhere around the globe. In this research, we propose adding global knowledge components in the information security curriculum using a multi-disciplinary approach. We argue that a global perspective has been lacking in the current information security curriculum. We then propose several knowledge components to be added in the curriculum to enhance the global perspective. We also examine how to incorporate knowledge from various related disciplines, including political science, criminal justice, and business administration. Through our empirical study on faculty from various disciplines and the industry practitioners with first-hand information security knowledge, we confirm that the proposed knowledge components are relevant to the information security education and practice. Analyzing the similarities and differences among responses from various disciplines, we also found that albeit different disciplines have slightly different emphases on the curriculum components, they all tend to agree on the importance of adding the global perspectives in information security education. Our research could be of value to the educators in the information security field when considering incorporating a global perspective into the curriculum. It could also shed some lights when examining the relevance of global information security to various disciplines.

References

[1]
Anderson, J. E., Schwager, P. H. (2002). Security in the information systems curriculum: Identification & status of relevant issues. Journal of Computer Information Systems, 3(16), 16-24.
[2]
Calkins, M. M. (2000). They shoot Trojan horses, don't they? An economic analysis of anti-hacking regulatory models. Georgetown Law Journal, 89, 171-224.
[3]
Casey, E. (2006). Investigating sophisticated security breaches. Communications of the ACM, 49(2), 48-54.
[4]
Cegielski, C. G. (2008). Toward the development of an interdisciplinary information assurance curriculum: Knowledge domains and skill sets required of information assurance professionals. Decision Sciences Journal of Innovative Education, 6(1), 29-49.
[5]
Connolly, P. (2000). Privacy as global policy. InfoWorld, 22(37), 49-50.
[6]
Cresson-Wood, C. (2004). Why information security is now multi-disciplinary, multi-departmental, and multi-organizational in nature. Computer Fraud & Security, Elsevier, 2004(Issue 1), 16-17.
[7]
Dash, J. (2001). Schools push soft skills for info security majors. Computerworld, 35(6), 24.
[8]
Deflem, M., & Shutt, J. E. (2008). Law enforcement and computer security threats and measures. In H. Bidgoli (Ed.), Global perspectives in information security: Legal, social, and international issues. New Jersey: Wiley & sons.
[9]
Ferrell, K. (2004). Cybercrime Spins Out Of Control, Tech Web.com, Wednesday, September 22, 2004.
[10]
Gerber, M., & von Solms, R. (2008). Information security requirements--Interpreting the legal aspects. Computers & Security, 27(Issues 5-6), 124-135.
[11]
Gritzalis, D., Theoharidou, M., & Kalimeri, E., (2005). Towards an Interdisciplinary InfoSec Education Model. Proc. 4th IFIP World Conf. Information Security Education, Moscow Engineering Physics Institute, pp. 22-35.
[12]
Hentea, M., Dhillon, H., & Dhillon, M. (2006). Towards changes in information security education. Journal of Information Technology Education, 5, 221-233.
[13]
Himma, K. E. (2008). Legal, social, and ethical issues of the internet. In H. Bidgoli (Ed.), Global perspectives in information security: Legal, social, and international issues. New Jersey: Wiley & sons.
[14]
Irvine, C. E., Chin, S.-K., & Frincke, D. (1998). Integrating security into the curriculum. IEEE Computer, 31(12), 25-30.
[15]
Jayaratna, N. (1993). Research notes: Information systems as social systems: Research at the LSE. International Journal of Information Management, 13(4), 299-301.
[16]
Jung, B., Han, I., & Lee, S. (2001). Security threats to internet: A Korean multi-industry investigation. Information & Management, 38(8), 487-498.
[17]
Karimi, J., & Konsynski, B. (1991). Globalization and information management strategies. Journal of Management Information Systems, 7(4), 7-26.
[18]
Milberg, S., Smith, J., & Burke, S. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35-57.
[19]
Powers, D. M. (2008). Cyberlaw: The major areas, development, and information security aspects. In H. Bidgoli (Ed.), Global perspectives in information security: Legal, social, and international issues. New Jersey: Wiley & sons.
[20]
Rasmussen, M. (2003) Analyst report: IT Trends 2003--Information security standards, regulations and legislation--Giga Information Group® 2003. Retrieved May 21, 2005 from CSOonline. com site: http://www.csoonline.com/analyst/report721.html.
[21]
Reidenberg. (2000). Resolving conflicting international data privacy rules in cyberspace. Stanford Law Review, 52(5), 1315-1367.
[22]
Rudraswamy, V., & Vance, D. A. (2001). Transborder data flows: Adoption and diffusion of protective legislation in the global electronic commerce environment. Logistics Information Management, 14(1/2), 127-136.
[23]
Saunders, C. (2002). EU Oks spam ban, online privacy rules, Internet News. Retrieved April 4, 2008, from http://www.internetnews.com/IAR/article.php/l154391.
[24]
Sofaer, A. D., & Goodman, S. E. (2006). Cyber Crime and Security. The Transnational Dimension. Hoover Press, www.hoover.org/publications/books/fulltext/cybercrime/1.pdf (Accessed on May 8, 2006).
[25]
Stephens, D. (1999). The globalization of information technology in multinational corporations. Information Management Journal, 33(3), 66-71.
[26]
Symantec Internet Security Threat Report (2006), Trends for July 05-December 05, Volume IX, Published March 2006, https://enterprise.symantec.com/enterprise/whitepaper.cfm.
[27]
Symantec Internet Security Threat Report (2008a), Trends for July 07-December 07, Volume XIII, Published April 2008, http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_ internet_security_threat_report_xiii_04-2008.en-us.pdf
[28]
Symantec Report on the Underground Economy (2008b), July 07-June 08, Published November 2008.
[29]
Teer, F.E., Kruck, S. E., & Kruck, G. (2007). Empirical study of students' computer security--practices/ perceptions. Journal of Computer Information Systems, 3(105).
[30]
Theoharidou, M., & Gritzalis, D. (2007). Common body of knowledge for information security. IEEE Security & Privacy, 5(2), 64-67.
[31]
Todd, J., & Vickers, K. (2003). Developing high-tech entrepreneurs: A multidisciplinary strategy. Decision Sciences Journal of Innovative Education, 1(2), 317-320.
[32]
Walters, L. M. (2007). A draft of an information systems security and control course. Journal of Information Systems, 21(1), 123-148.
[33]
White, G., & Long, J. (2007). Thinking Globally: Incorporating an International Component in Information Security Curricula. Information Systems Education Journal, galley (411.1913). http:// isedj.org/galley/411.1913/. ISSN: 1545-679X. (Also appears in The Proceedings of ISECON 2006: §2324. ISSN: 1542-7382).
[34]
Williams, P. (2001). Organized crime and cybercrime: Synergies, trends, and responses, global issues, arresting transnational crimes, An Electronic Journal of the U.S. Department of State-August 2001 Volume 6, Number 2.
[35]
Zuckerman, A. (2001). Order in the courts? World Trade, 14(9), 26-29.

Cited By

View all
  • (2023)Educational Technology in Islamic Education: A Systematic Literature ReviewProceedings of the 2023 6th International Conference on Educational Technology Management10.1145/3637907.3637967(148-155)Online publication date: 3-Nov-2023
  1. On the global knowledge components in an information security curriculum---a multidisciplinary perspective

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Education and Information Technologies
    Education and Information Technologies  Volume 15, Issue 4
    December 2010
    113 pages

    Publisher

    Kluwer Academic Publishers

    United States

    Publication History

    Published: 01 December 2010

    Author Tags

    1. Global information security
    2. Information security
    3. Information security curriculum
    4. Multi-disciplinary approach

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Educational Technology in Islamic Education: A Systematic Literature ReviewProceedings of the 2023 6th International Conference on Educational Technology Management10.1145/3637907.3637967(148-155)Online publication date: 3-Nov-2023

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media