NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawrence, Cameron; Olson, Garrett; Douma, Bambi – Information Systems Education Journal, 2015
The widespread use of digital technologies such as smartphones, tablets, and notebook computers expose firms engaged in international business to risks that far exceed what most corporate technology users understand. This case study examines some of the technology-specific vulnerabilities managers face when engaged in international travel and…
Descriptors: Information Security, Computer Security, Global Approach, Travel
Internal Revenue Service (Dept. of Treasury), Washington, DC. – 1994
This packet contains a textbook, an instructor's guide, and a student workbook for a course on conducting financial investigations to detect and solve crimes. The topics covered in the 11 chapters of the textbook and the ancillaries are the following: (1) why financial investigation?; (2) laws related to financial crimes; (3) evidence; (4) sources…
Descriptors: Banking, Classroom Techniques, Computer Security, Course Content