Primary Navigation
Want to create or adapt books like this? Learn more about how Pressbooks supports open publishing practices.
Book Contents Navigation
Acknowledgement of Country
About the Author
Accessibility Information
Acknowledgements
Introduction
MODULE 1: IT GOVERNANCE FRAMEWORKS
MODULE 2: CYBERSECURITY & DATA PROTECTION
MODULE 3: DATA BREACH PREPARATION & RESPONSE
MODULE 4: CYBERSEC INCIDENT MANAGEMENT MATURITY MODEL
MODULE 5: META-COGNITION, ETHICAL DECISION MAKING, ETHICAL THEORIES
MODULE 6: INTELLECTUAL PROPERTY & COPYRIGHT
MODULE 7: LEGAL GOVERNANCE, CYBER FORENSICS, CYBER INTELLIGENCE
MODULE 8: IMPACT OF IT ON SOCIETY
MODULE 9: CYBER LOSS PROCESS & CYBER INSURANCE
MODULE 10: E-GOV & DIGITAL TRANSFORMATION
Appendix A: List of Acronyms
Appendix B: Applying the Ethical Decision Model
Appendix C: Common scenarios
Appendix D: Software licensing
Appendix E: Propaganda techniques
Appendix F: Military technology
Appendix G: Select Bibliographies
Versioning History
David acknowledges the support of Griffith University in the preparation of this text.
Previous/next navigation
InfoTech Governance, Policy, Ethics & Law Copyright © 2025 by David Tuffley is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where otherwise noted.