Read more
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.
List of contents
SECTION 1. TECHNICAL CASES, TEACHING CASES, 1.1. Data Breach at Nintendo Co. Ltd.: 300,000 Nintendo Users Hacked, 1.2. Target Corporation, 1.3. Case Study: Cyber-attack on Ukrainian Power Grid, 1.4. Capital One Data Breach, 1.5. LinkedIn Data Hack, 1.6. Zoombombing: A Technical Perspective, 1.7. Case Study: Ransomware Attack on IT Firm Collabera, 1.8. Neuralink: A Neural Technology Company, 1.9. Securing the Internet of Things, RESEARCH CASES, 1.10. Connected Vehicles: An Era of Communications Technologies, Cybersecurity, and Innovation, 1.11. SilverPush: A Case of Convenience versus Privacy, SECTION 2. BEHAVIORAL AND SOCIAL CASES, TEACHING CASES, 2.1. Microsoft 365 Phishing Case, 2.2. Internet of Things Security: Trend Micro Experiment, 2.3. 2014 Cyber-attack on eBay Case Study Analysis, 2.4. Internal Revenue Service Scams, 2.5. International Student Scams, 2.6. Security and Privacy Risk with Social Robotics, 2.7. Financial Fraud (IS System Controls) at NCL Ltd, 2.8. When You Can’t Believe What You See or Hear, 2.9. Robots: Attack Vectors and Safeguards, 2.10. Ransomware: Hollywood Presbyterian Medical Center, 2.11. Fast Food Phishing: Cyber Espionage, 2.12. Workplace Robots, RESEARCH CASES, 2.13. Facial Recognition: Legal, Ethical, and Cultural Concerns, 2.14. Aadhaar: The National Identity System of India, SECTION 3. PROCESS CASES, TEACHING CASES, 3.1. NHS: COVID-19 Research Ethics and Governance, 3.2. Marriot Data Breach: A Case Study Analysis, 3.3. ChoicePoint, 3.4. TJX, 3.5. Case Study: A Data Breach on Flipboard, 3.6. What Happens in Vegas: Breach of Data Confidentiality, 3.7. PIH Health Phishing, 3.8. Biometric Protection and Security: A Case Study on Clearview AI, 3.9. Zoombombing: A Business Process Perspective, 3.10. Security in the Healthcare Sector, 3.11. eBay Hack, 3.12. Using AI to Maintain Security of Healthcare Systems, RESEARCH CASES, 3.13. Digital Identity Theft Using Deepfakes
About the author
Steven Wingreen is an Associate Professor of Information Systems and Decision Sciences at the University of Canterbury in Christchurch, New Zealand. Prior to his academic career, he was a manager of networks and telecommunications whose responsibilities included network security. He has taught IT security and risk management over the span of his 23-year teaching career at multiple universities, both as a component of more comprehensive courses and as its own course. His current research agenda on the topic of emerging technologies in 21st century commerce includes a project with multiple papers about information privacy, trust, and ethical concerns in the context of advanced emerging technologies.
Summary
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.