Internet Security Management

A Challenging Joint Postgraduate Curriculum Design
  • Helen L. Armstrong
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 125)


This paper describes the design of a joint program in Internet Security Management between the Schools of Information Systems and Computer Science. An overview of the curriculum is given, and the roles played by each School in the teaching of the courses described. The advantages and hurdles of designing offerings across independent Schools are also discussed.

Key words

Internet Security Internet Security Management Curriculum Design Postgraduate Studies 


  1. Argyris, C. [ 1982 ], Reasoning, Learning and Action, Jossey-Bass, USAGoogle Scholar
  2. Bloom B, M. Englehard, E. Frost, W. Hill and D. Krathwohl [ 1956 ], Taxonomy of Educational Objectives: The classification of Educational GoalsHandbook 1, Cognitive Domain, Longmans, New YorkGoogle Scholar
  3. ECU [ 2002 ], Masters of Computer Security, Edith Cowan University, Scholar
  4. GLAM [2000] MSc Information Security and Computer Crime,Glamorgan University and dosommat=string amd year=2002
  5. Kolb, D.A. [ 1984 ], Experiential Learning: Experiences as a Source of Learning and Development, Prentice-Hall Inc, Englewood Cliffs, New JerseyGoogle Scholar
  6. LE [ 2002 ] Postgraduate Prospectus, MSc in Security Management, Leicester University, hd/pgprospectus/courses/courses. txt?operation=retrieve&primary=m900d4Google Scholar
  7. LSE [ 2002 ] MSc Information Systems Security and Access, London School of Economics University of London, htmlGoogle Scholar
  8. NOIE [ 2201a ] Information Security — A Major Priority, Media release from the National Office for the Information Economy, Available WWW Scholar
  9. NOIE [ 2001b ] Report on E-Security R&D in Australia: An Initial Assessment, National Office for the Information Economy, Canberra, Australia, JuneGoogle Scholar
  10. RHUL [ 2000 ] MSc in Information Security, Royal Holloway University of London, Scholar
  11. WMIN [ 2002 ] MSc in Information Technology Security, Westminster University, Scholar

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • Helen L. Armstrong
    • 1
  1. 1.School of Information SystemsCurtin University of TechnologyPerthAustralia

Personalised recommendations