This module is a resource for lecturers

Core reading

The following readings are (mostly open source) required readings that should be completed before taking a class based on this Module:

  • Adams, Anne, Martina Angela Sasse, and Peter Lunt. (1997). Making passwords secure and usable. In: People and Computers XII - Proc. of the 7th International Conference on Human-Computer Interaction (HCI'97), Springer.
  • Arora, Ashish, Anand Nandkumar, and Rahul Telang. (2006). Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Information Systems Frontiers, Vol. 8 (5), 350-362.
  • Beebe, Nicole Lang and V. Srinivasan Rao. (2005). Using Situational Crime Prevention Theory to Explain the Effectiveness of Information Systems Security. Proceedings of the 2005 SoftWars Conference, Las Vegas, NV, Dec 2005.
  • Collins, J. D., Vincenzo A. Sainato, and David N. Khey. (2011). Organizational Data Breaches 2005-2010: Applying SCP to the Healthcare and Education Sectors. International Journal of Cyber Criminology Vol. 5(1), 794-810.
  • Cornish, Derek B., & Clarke, R. V. G. (2003). Opportunities, precipitators, and criminal decisions: A reply to Wortley's critique of situational crime prevention. In: Martha J. Smith and Derek B. Cornish (Guest Eds.). Theory for practice in situational crime. Willan.
  • Dali, Alex and Christopher Lajtha. (2012). ISO 31000 Risk Management - "The Gold Standard." EDPACS, Vol. 45(5), 1-8.
  • Eloff, M. M. and J. H. P. Eloff. (2002). Human Computer Interaction: An Information Security Perspectives. In: M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi and Heba K. Aslan. Security in the Information Society: Visions and perspectives. Springer.
  • ENISA. (2017). Hardware Threat Landscape and Good Practice Guide , Version 1.
  • Luko, Stephen N. (2013). Risk Management Terminology. Quality Engineering, Vol. 25 (3), 292-297.
  • NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity . National Institute of Standards and Technology.
  • UNODC. (2010). Handbook on the crime prevention guidelines: Making them work .
Next: Advanced reading
Back to top