Learn More
Computer security issues have typically been approached from the perspective of building technical countermeasures to reduce risk. Recently, researchers have recognized that computer users play an important role in ensuring secure systems by implementing those technical countermeasures. As a means of encouraging safe computing practice, user training and(More)
This paper describes the use the Information Orientation (IO) Maturity Model as the basis of a MBA course-based project. The IO model explicitly draws the relationship between business performance and several information and technology management concepts. More importantly, the IO Model is accompanied by a specific method of gathering and analyzing data,(More)