An interdisciplinary approach to information systems security education: A case study

Sohail Anwar, Ryoo Jungwoo, Harpal Dhillon, David Barnes

Research output: Contribution to journalConference articlepeer-review

2 Scopus citations


Society is becoming increasingly dependent upon multi-user distributed information systems. Computer/communication networks facilitate increased productivity in organizations, but these systems also make the information, and information technology assets within the organizations vulnerable in the context of cyber security. Therefore, the designers and users of information technology and other production/logistic functions in these organizations have to be knowledgeable about the cyber security threats, and appropriate responses necessary for protecting the information assets. This growing awareness has led to a demand for information systems security education and training, not only in the information systems domain, but also in practically all engineering and technology activity areas. This manuscript offers a perspective of how Penn State University-Altoona College, an undergraduate institution in Pennsylvania is taking steps to integrate ISA education into its fouryear electromechanical engineering technology program. The college realizes that it is highly important for its engineering students to be knowledgeable about information systems security since engineers are now expected to have at least a basic understanding of current threats, the constant change in the nature of those threats, how these threats affect product development, personal safety, employee productivity, and organizational expenses.

Original languageEnglish (US)
JournalASEE Annual Conference and Exposition, Conference Proceedings
StatePublished - 2007
Event114th Annual ASEE Conference and Exposition, 2007 - Honolulu, HI, United States
Duration: Jun 24 2007Jun 27 2007

All Science Journal Classification (ASJC) codes

  • General Engineering


Dive into the research topics of 'An interdisciplinary approach to information systems security education: A case study'. Together they form a unique fingerprint.

Cite this