• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2022 ■ William Bailey
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos

Case Study Instructions

Two case studies and one reading are available in the course pack for purchase from HBP: https://hbsp.harvard.edu/import/960764 

The third case study can be found via the link in the syllabus.

Case Study Process:

  • Individual preparation: The goal of is to prepare you to contribute during our first class’ group discussion meeting. Your work answering case study questions before class will prepare you to learn from what others say.  To fully benefit from the interchange of ideas about the case’s problem, however, you must possess a good understanding of the facts of the case and have your own ideas. Studying the case and doing your homework will prime you to react to what others say.  This is how we learn.
    • Post your answers to the questions as a PDF document to Canvas according to the schedule listed in the syllabus.  Your analysis should be single-spaced pages using 11 point Times New Roman font with one-inch margins, and the entire document should be limited to 3 pages (including the diagram for your answer to question Do not prepare a separate cover page, instead put your name, the class section number (e.g. MIS5206.701), and the case name in the top-left corner of the header. Add page numbers in the footer of the document.  Your assignment should be saved as a PDF formatted file to Canvas, your PDF file should be named Case2-YourName.pdf

 

  • Group discussion: During class you will meet in small groups and have an informal group discussion. The goal of your group’s discussion will be to give and to take. Come to the discussion with your own ideas, and leave with better understanding. By pooling your insights with the others in your group you advance your own analysis. Discussions within small groups also helps those uncomfortable talking in large classes, providing opportunities to express their views and gain feedback.

 

  • Class discussion: We will then have a class discussion which will advance learning from the case.  This will help provide a context for gaining more knowledge and learning concepts that help form your intellectual toolkit that you will develop in class and apply in practice.

 

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in