{"id":"https://openalex.org/W2120497937","doi":"https://doi.org/10.1109/msecp.2004.1264855","title":"Maximizing business information security's educational value","display_name":"Maximizing business information security's educational value","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2120497937","doi":"https://doi.org/10.1109/msecp.2004.1264855","mag":"2120497937"},"language":"en","primary_location":{"id":"doi:10.1109/msecp.2004.1264855","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msecp.2004.1264855","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078299741","display_name":"Michael R. Grimaila","orcid":"https://orcid.org/0000-0002-8355-7992"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M.R. Grimaila","raw_affiliation_strings":["Texas A and M University, USA","[Texas A&M University, Tx, USA]"],"affiliations":[{"raw_affiliation_string":"Texas A and M University, USA","institution_ids":[]},{"raw_affiliation_string":"[Texas A&M University, Tx, USA]","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5078299741"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":3.9454,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.94106763,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":"1","first_page":"56","last_page":"60"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.902999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9009000062942505,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.767086386680603},{"id":"https://openalex.org/keywords/certified-information-security-manager","display_name":"Certified Information Security Manager","score":0.6945623159408569},{"id":"https://openalex.org/keywords/information-security-standards","display_name":"Information security standards","score":0.6120802760124207},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6045427918434143},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5794185400009155},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.5771746635437012},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.5652246475219727},{"id":"https://openalex.org/keywords/business-continuity","display_name":"Business continuity","score":0.511637270450592},{"id":"https://openalex.org/keywords/information-security-audit","display_name":"Information security audit","score":0.5004217624664307},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.48327308893203735},{"id":"https://openalex.org/keywords/corporate-security","display_name":"Corporate security","score":0.4463452994823456},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4238990843296051},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.39319342374801636},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.37846246361732483},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30175673961639404},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.22258973121643066},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.19547632336616516},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.18981850147247314},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.09923195838928223}],"concepts":[{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.767086386680603},{"id":"https://openalex.org/C180823521","wikidata":"https://www.wikidata.org/wiki/Q1662502","display_name":"Certified Information Security Manager","level":5,"score":0.6945623159408569},{"id":"https://openalex.org/C139547956","wikidata":"https://www.wikidata.org/wiki/Q6031202","display_name":"Information security standards","level":5,"score":0.6120802760124207},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6045427918434143},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5794185400009155},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.5771746635437012},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.5652246475219727},{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.511637270450592},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.5004217624664307},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.48327308893203735},{"id":"https://openalex.org/C179681481","wikidata":"https://www.wikidata.org/wiki/Q5172490","display_name":"Corporate security","level":3,"score":0.4463452994823456},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4238990843296051},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.39319342374801636},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.37846246361732483},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30175673961639404},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.22258973121643066},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.19547632336616516},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.18981850147247314},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.09923195838928223},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msecp.2004.1264855","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msecp.2004.1264855","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.6000000238418579}],"awards":[],"funders":[{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W93289411","https://openalex.org/W1979807069","https://openalex.org/W2069240447","https://openalex.org/W2103345944","https://openalex.org/W2107426351","https://openalex.org/W4285719527","https://openalex.org/W6675446300"],"related_works":["https://openalex.org/W2584162156","https://openalex.org/W2741061559","https://openalex.org/W4386208045","https://openalex.org/W2185133343","https://openalex.org/W1585855485","https://openalex.org/W4244250244","https://openalex.org/W4230628385","https://openalex.org/W2188959920","https://openalex.org/W1919881717","https://openalex.org/W19906931"],"abstract_inverted_index":{"A":[0],"business":[1,57,147],"information":[2,26,48,113,148],"security":[3,14,23,27,49,72,94,126,149],"course's":[4],"goals":[5],"and":[6,20,33,43,75,77,84,102],"objectives":[7],"are":[8,115],"quite":[9],"different":[10],"from":[11],"most":[12],"traditional":[13],"courses,":[15],"which":[16],"focus":[17],"on":[18],"designing":[19],"developing":[21,145],"new":[22],"technologies.":[24],"Business":[25],"primarily":[28],"concerns":[29],"the":[30,38,104,122,131,135,154],"strategic,":[31],"tactical,":[32],"operational":[34],"management":[35],"issues":[36,52,80],"surrounding":[37],"planning,":[39,59,62,69],"analysis,":[40],"design,":[41],"implementation,":[42],"maintenance":[44],"of":[45,107,125],"an":[46],"organization's":[47],"program.":[50],"Core":[51],"include":[53],"asset":[54],"valuation,":[55],"auditing,":[56],"continuity":[58],"disaster":[60],"recovery":[61],"ethics,":[63],"organizational":[64],"communication,":[65],"policy":[66],"development,":[67],"project":[68],"risk":[70],"management,":[71],"awareness":[73],"education":[74],"training,":[76],"various":[78],"legal":[79],"such":[81],"as":[82],"liability":[83],"regulatory":[85],"compliance.":[86],"Because":[87],"businesses":[88],"can't":[89],"afford":[90],"to":[91,100,109,158],"mitigate":[92],"all":[93],"risks,":[95],"students":[96,153],"must":[97],"learn":[98],"methods":[99],"identify":[101],"justify":[103],"optimal":[105],"amount":[106],"expenditures":[108],"ensure":[110],"that":[111,151],"their":[112],"assets":[114],"sufficiently":[116],"protected.":[117],"Students":[118],"should":[119],"also":[120],"understand":[121],"technical":[123],"components":[124],"so":[127],"they":[128,137],"can":[129],"appreciate":[130],"problems":[132],"experienced":[133],"by":[134],"people":[136],"manage.":[138],"This":[139],"paper":[140],"describes":[141],"my":[142],"experiences":[143],"in":[144,160],"a":[146],"course":[150],"provides":[152],"knowledge":[155],"arid":[156],"experience":[157],"succeed":[159],"today's":[161],"competitive":[162],"information-intensive":[163],"corporate":[164],"environment.":[165]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
