Course Offerings
Explore foundational concepts of information security and privacy, including information value, classifications, threats, liabilities and risk management, identity and access controls (IAM), trust frameworks, technology for network, web, software and cloud security; and privacy laws and regulations.
ISP 381: Information and Privacy in Society
Examine how information is socially and culturally variable and fluid, changing throughout history and differing from place to place. Explore the anthropological study of information; societal norms; and individual, device, communal, and organizational information strategies.
Explore an overview of how information and public policy relate to each other. Examine key information policy areas including privacy, surveillance, theft, health information, business-to-business relationships, and the co-evolution of personal data and information technologies.
Explore an organizational perspective on the management and governance of information. Examine business practices and governance mechanisms for minimizing risks and maximizing returns of information.
Explore framing messages and the impact on people, organizations, risks and privacy; effective crisis management communications; communication and business continuity planning; time management; sense making processes in organizational crisis; and reputation management.
Explore and evaluate the risks and benefits related to information in multiple sectors including financial services, healthcare, consumer services, government, education, and energy.
Study the characteristics of information and the technologies, stakeholders, and questions involved in managing, protecting, and securing information.
ISP 386: Information Security
Explore the enrollment and authentication for cyber and physical access and transactions, cryptography, biometrics, device identity security, and security culture.
Explore knowledge and data management, storage, and mining. Examine information representation and algorithms. Discuss information security and privacy applications in all market sectors for enrollment, authentication, operational use, fraud detection, and fraud prevention.
Examine laws and other policy instruments related to information security and privacy, different classes of protected personal information, and multiple genres of legal information and legal writing. Explore legal requirements and social responsibilities as they pertain to data protection and the prevention of different types of fraud and information crimes.
ISP 388L: Professional Experience and Project
Study practical problems, current phenomenon, or professional issues in an institutional setting.
ISP 189: Individual Studies
In-depth study of a problem or topic related to Information Security and Privacy. Individual Instruction. May be repeated for credit. ISP 189 is worth 1 hour of semester credit. Students wanting 2 or 3 hours of credit should take ISP 289 or INF 389 respectively.
ISP 289: Individual Studies
In-depth study of a problem or topic related to Information Security and Privacy. Individual Instruction. May be repeated for credit. ISP 289 is worth 2 hours of semester credit. Students wanting 1 or 3 hours of credit should take ISP 189 or INF 389 respectively.
ISP 389: Individual Studies
In-depth study of a problem or topic related to Information Security and Privacy. Individual Instruction. May be repeated for credit. ISP 389 is worth 3 hours of semester credit. Students wanting 1 or 2 hours of credit should take ISP 189 or INF 289 respectively.
ISP 398R: Master's Report
Preparation of a report to fulfill the requirement for the master's degree under the report option.
Examine theory and practical applications of data and artificial intelligence governance related to information security, privacy, compliance, and ethics. Explore optimization of technical and human dimensions for information risk management. Explore pervasive and emerging risks, risk assessments of data architectures and analytics, and regulations, controls, and governance to protect and safeguard information assets.
Examine established and emerging laws and public policy related to information security and privacy. Examine different classes of protected information and case studies documenting compliance and violation of legal and public policy protections. Explore legal requirements, corporate responsibilities and social responsibilities as they pertain to data protection and the prevention of different types of fraud and information crimes.