Volume 8
Volume 8, Number 52 |
July 16, 2010 |
Abstract: One of the most important topics for today’s information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and cases. Posting and review of this research with a blog served as a successful springboard for discussion and analysis of relevant privacy and security issues. The course was piloted in the spring of 2008 and received strong positive feedback. The course was successfully run again in 2009. Review of the process and implications for educators is presented.
Keywords: privacy, security, legal and regulatory environment of IT, ethics
Download this issue: ISEDJ.8(52).Peslak.pdf (Adobe PDF, 24 pages, 1180 K bytes)
Preview the contents: Peslak.j.txt (ASCII txt, 69 K bytes)
Recommended Citation: Peslak (2010). An Exploration of the Legal and Regulatory Environment of Privacy and Security through Active Research, Guided Study, Blog Creation, and Discussion. Information Systems Education Journal, 8 (52). http://isedj.org/8/52/. ISSN: 1545-679X. (A preliminary version appears in The Proceedings of ISECON 2009: §4352. ISSN: 1542-7382.)