Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Security | 2 |
| Crime Prevention | 2 |
| Teaching Methods | 2 |
| Banking | 1 |
| Case Method (Teaching… | 1 |
| Classroom Techniques | 1 |
| Corporations | 1 |
| Course Content | 1 |
| Crime | 1 |
| Criminals | 1 |
| Criminology | 1 |
| More ▼ | |
Source
| Journal of Information… | 1 |
Publication Type
| Guides - Classroom - Learner | 1 |
| Guides - Classroom - Teacher | 1 |
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 1 |
Audience
| Practitioners | 1 |
| Students | 1 |
| Teachers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Internal Revenue Service (Dept. of Treasury), Washington, DC. – 1994
This packet contains a textbook, an instructor's guide, and a student workbook for a course on conducting financial investigations to detect and solve crimes. The topics covered in the 11 chapters of the textbook and the ancillaries are the following: (1) why financial investigation?; (2) laws related to financial crimes; (3) evidence; (4) sources…
Descriptors: Banking, Classroom Techniques, Computer Security, Course Content

Peer reviewed
Direct link
