Opportunities and Challenges of Cybersecurity for Undergraduate Information Systems Programs

2022 ◽  
pp. 361-382
Author(s):  
Shouhong Wang ◽  
Hai Wang

This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level as well as twenty descriptions of cybersecurity jobs posted on the internet. The collected qualitative data has been analyzed from the from the perspective of IS education. The findings indicate that the topics of cybersecurity management and essential cybersecurity technology are relevant to the IS discipline. The article suggests that these topics can be the components of two cybersecurity courses offered by IS programs to meet the demands and challenges of cybersecurity.

Author(s):  
Shouhong Wang ◽  
Hai Wang

This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level as well as twenty descriptions of cybersecurity jobs posted on the internet. The collected qualitative data has been analyzed from the from the perspective of IS education. The findings indicate that the topics of cybersecurity management and essential cybersecurity technology are relevant to the IS discipline. The article suggests that these topics can be the components of two cybersecurity courses offered by IS programs to meet the demands and challenges of cybersecurity.


2014 ◽  
Vol 20 (1) ◽  
pp. 61-70
Author(s):  
Jacek Borzyszkowski

The purpose – The purpose of the article was an attempt to assess the significance of two spheres connected with the functioning of DMOs, i.e. internet marketing and the development of modern technologies and information systems. Design – The study covers theoretical issues connected with the essence of destination management organizations as the basic organizational structures in the tourism sector, and with the significance of the Internet and modern information technologies in the activities of these organizations. The second part of the study covers the empirical issues of the problem analyzed. Approach and methodology – Apart from theoretical deliberations, it provides the review of previous research. Moreover, the results of the author’s research were used with the aid of the diagnostic survey technique. The results from 53 DMOs that represent 19 European states were obtained. Findings – The quantity of expenditures on information technologies was defined in the structure of the total expenditures on the part of DMOs. The average value for all the organizations under analysis was 10.9%. Owing to the application of the point grading method (Likert scale), it was demonstrated that internet marketing and the development of modern technologies and information systems are becoming increasingly more important areas of the activities. Originality of the research – The originality is evident in the insights it provides about use of modern information technologies and the Internet in the activities of DMO. The empirical deliberations presented in this article should become an important point of reference for many DMOs and should emphasize the growing significance of information technologies.


Author(s):  
Andy Paul Harianja ◽  
Iwada Grawilser Talunohi

The development of the field of information technology is very rapid, therefore many companies, industries, shops and other business entities are using information systems to increase their business. Online sales information systems are used to carry out business processes such as distribution, sales, purchasing, marketing of goods or services by using communication networks and the internet. Online sales information systems can help people who do not have a place or shop to carry out their business. Students in this case, especially at the Catholic University of Santo Thomas, are an opportunity to take advantage of this facility in carrying out their business, especially if they do not have a place or shop to carry out their business. For this reason, an online sales information system was built that can be accessed through the website.


i-com ◽  
2017 ◽  
Vol 16 (2) ◽  
pp. 181-193 ◽  
Author(s):  
Christian Reuter ◽  
Katja Pätsch ◽  
Elena Runft

AbstractThe Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.


2019 ◽  
Vol 14 (1) ◽  
pp. 15-34 ◽  
Author(s):  
Lorraine Lee ◽  
Rebecca Sawyer

ABSTRACT The verification of Information Technology (IT) controls is a core responsibility of IT auditors. This case places the student in the role of an IT auditor assigned to test the operating effectiveness of a specific IT general control: user access management. In addition to learning about IT controls, the case introduces several Excel functions such as VLOOKUP, MATCH, INDEX, and various text functions. The student documents the results of the IT controls tests by completing a testing matrix and writing a memo. General controls, user access management, and Excel applications are all topics taught in Accounting Information Systems (AIS) and Audit courses. As such, instructors can use this case at the undergraduate or graduate level in an IT Audit, Accounting Information Systems, or Audit class.


Author(s):  
Heather Steinmann ◽  
Ruslan T. Saduov

This chapter is a teaching case study which draws on Kolb's experiential learning model and Latour's Actor-Network theory, specifically, the ideas of learning as a process rather than as an outcome and of technological space as a cross-cultural network actor. The authors report on a collaboration between undergraduate-level students at a US university and graduate-level students at a Russian university within the Trans-Atlantic and Pacific Project originated to set up international academic collaborations. The chapter provides a theoretically grounded description of the project's successes and failures as well as guidance for teachers wishing to use experiential learning through networking as an instruction tool.


Sign in / Sign up

Export Citation Format

Share Document