Chapter 3: Legal, Ethical, and
Professional Issues in Information
Ethical decision evaluation
A scientist developed a theory that required proof through the
construction of a computer model. He hired a computer programmer to
Security and Personnel
Why are personnel critical to info security?
What are the considerations?
Positioning and naming security function
Planning proper staffing
Assess impact of info security on all IT functions &
Module 4 - Policies, Programs
(Textbook: Chapters 4, 5)
Read this article about Enron. Discuss with
at least one classmate and figure out
what/where went wrong.
In particular, what was wrong (if any) with
policies in th
Module 2 - Planning
(Textbook: Chapters 2, 3)
Precursors to planning
Vision without execution is hallucination.
Random Widget Works
Random Widget Works will be the