4 research outputs found

    Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries

    Get PDF
    Teaching cases based on stories about real organizations are a powerful means of storytelling. These cases closely parallel real-world situations and can deliver on pedagogical objectives as writers can use their creative license to craft a storyline that better focuses on the specific principles, concepts, and challenges they want to address in their teaching. The method instigates critical discussion, draws out relevant experiences from students, encourages questioning of accepted practices, and creates dialogue between theory and practice We present ‘Horizon’, a case study of a firm that suffers a catastrophic incident of Intellectual Property (IP) theft. The case study was developed to teach information security management (ISM) principles in key areas such as strategy, risk, policy and training to postgraduate Information Systems and Information Technology students at the University of Melbourne, Australia

    AN APPROACH TO IDENTIFICATION OF FACTORS AND RESOLUTION OF UNDERLYING POVERTY AND ECONOMIC INTEGRATION IN DEVELOPING COUNTRIES

    Get PDF
    The majority of people living in developing countries are seriously constrained due to their limited access to education, health and even very basic facilities of living peacefully. Since long all the efforts to alleviate poverty among poor people has not shown any significant betterment. However, beside poverty these countries are confronted with devastating differential between poor and rich in various capacities. As professionals we started realizing that most of the national and international welfare organization of the world is convinced that the poverty and income inequality in various forms is causing human suffering in almost every country in the world. Even Obama former President of United States of America recognized that this being a growing concern for the society’s economic wellbeing. Unexpectedly we see a small section of the society in such countries holds power and authority to rule the masses to safeguard their own private interest. It is obvious that the poor countries with ample human resources can be the major benefactors of the provision of income equality if dominance of the ruling class is wiped out. This research paper provides a kind of approach, which points out more adoptable option for creating self-supporting force of poor people to stand on their own for dignified living.&nbsp

    Teaching Information Security Management Using an Incident of Intellectual Property Leakage

    Get PDF
    Case-based learning (CBL) is a powerful pedagogical method of creating dialogue between theory and practice. CBL is particularly suited to executive learning as it instigates critical discussion and draws out relevant experiences. In this paper we used a real-world case to teach Information Security Management to students in Management Information Systems. The real-world case is described in a legal indictment (T-mobile USA Inc v. Huawei Device USA Inc. and Huawei Technologies Co. LTD) alleging theft of intellectual property (trade secrets) and breaches of contract concerning confidentiality and disclosure of sensitive information. The incident concerns a mobile phone testing robot (Tappy) developed by T-mobile USA to automate testing of mobile phones prior to launch. Tmobile alleges Huawei stole the technology by copying the robot’s specifications and stealing parts and software to develop its own testing robot. The incident scenario is interesting as it relates to a business asset that has both digital and physical components that has been compromised through an unconventional cyber-physical attack facilitated by insiders. The scenario sparked an interesting debate among students about the scope and definition of security incidents, the role and structure of the security unit, the utility of compliance-based approaches to security, and the inadequate use of threat intelligence in modern security strategies

    Negotiating a Hybrid Identity : a Discursive Analysis of Higher Education Muslim ESL Learners

    No full text
    The primary objective of this research study is to map out the nature of hybridity of ESL learners/speakers that results from their resistance and/or acceptance of Western cultural discourses that are embedded within English curriculum texts taught to Muslim ESL learners at higher educational institutes in Pakistan
    corecore