CIS 8080 Information Systems Security and Privacy

Spring Semester, 2019

On-Line Readings

Richard Baskerville

Particulars:

Department of Computer Information Systems, College of Business Administration, Georgia State University, Post Office Box 4015, Atlanta, Georgia 30302-4015, USA

Tel. +1 404.413.7362, Internet baskerville@acm.org

 


These pages are for use of students taking the above course at the Georgia State University and are not intended for the general public. 


Downloadable From study.net


(See the web link given in your syllabus)

 

Note:  The following case materials are available as a course pack for registered students found at

 

·         Chandrasekhar, R. (2013). Intel Corp. - Bring Your Own Device (No. W13035). London, Ontario: Richard Ivey School of Business, The University of Western Ontario

·         Manworren, N., Letwat, J., & Daily, O. (2016). Why you should care about the Target data breach. Business Horizons, 59, 257-266.

·         McGee, H., Hsieh, N.-H., & Mcara, S. (2016). Apple: Privacy vs. Safety? Cambridge, Mass: Harvard Business School Case 9-316-069)

·         Verma, V., Pathak, A. A., Bathini, D. R., & Pereira, A. (2014). Enterall Infosec Solutions: Growing an Ethical Hacking Business. London, Ontario: Richard Ivey School of Business University of Western Ontario W14608 Version 2014-12-09)