CIS 8080 Information
Systems Security and Privacy
Spring Semester,
2019
On-Line Readings
Particulars:
Department of Computer Information
Systems, College of Business Administration, Georgia
State University,
Post Office Box 4015,
Atlanta, Georgia
30302-4015, USA
Tel. +1
404.413.7362, Internet baskerville@acm.org
These pages are for use of students taking the above course at the Georgia State University
and are not intended for the general public.
Downloadable From study.net
(See the web link given in your syllabus)
Note: The following case
materials are available as a course pack for registered students found at
·
Chandrasekhar, R.
(2013). Intel Corp. - Bring Your Own
Device (No. W13035). London, Ontario: Richard Ivey School of Business, The
University of Western Ontario
·
Manworren, N., Letwat,
J., & Daily, O. (2016). Why you should care about the Target data breach. Business Horizons, 59, 257-266.
·
McGee, H., Hsieh,
N.-H., & Mcara, S. (2016). Apple:
Privacy vs. Safety? Cambridge, Mass: Harvard Business School Case
9-316-069)
·
Verma, V.,
Pathak, A. A., Bathini, D. R., & Pereira, A. (2014). Enterall Infosec Solutions: Growing an Ethical Hacking Business.
London, Ontario: Richard Ivey School of Business University of Western Ontario
W14608 Version 2014-12-09)