{"title":"Information Security for Small Business Course Proposal and Design","authors":"Wenjuan Xu","doi":"10.18844/gjit.v13i1.8495","DOIUrl":null,"url":null,"abstract":"These days small businesses deploy different information systems to be more competitive and efficient, at the same time , which leads to different cyber attacks. To reduce the possible infrastructure damage and financial loss, business owners need to be aware of and recognize these various attacks, and know how to reduce or prevent them. \nIn this paper, to help with the local small business owners, we propose an information security course especially designed for educating the business owners in cyber security for small business-related fields. This paper examines the course design details including the course structure, main contents, different exercises and main challenges. ","PeriodicalId":188272,"journal":{"name":"Global Journal of Information Technology: Emerging Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global Journal of Information Technology: Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18844/gjit.v13i1.8495","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
These days small businesses deploy different information systems to be more competitive and efficient, at the same time , which leads to different cyber attacks. To reduce the possible infrastructure damage and financial loss, business owners need to be aware of and recognize these various attacks, and know how to reduce or prevent them.
In this paper, to help with the local small business owners, we propose an information security course especially designed for educating the business owners in cyber security for small business-related fields. This paper examines the course design details including the course structure, main contents, different exercises and main challenges.