Proposals for Postgraduate Students to Reinforce Information Security Management Inside ITIL®

Proposals for Postgraduate Students to Reinforce Information Security Management Inside ITIL®

Elena Ruiz Larrocha, Jesús M. Minguet, Gabriel Díaz, Manuel Castro, Alfonso Vara, Sergio Martín, Elio San Cristobal
ISBN13: 9781466626485|ISBN10: 1466626488|EISBN13: 9781466626799
DOI: 10.4018/978-1-4666-2648-5.ch008
Cite Chapter Cite Chapter

MLA

Larrocha, Elena Ruiz, et al. "Proposals for Postgraduate Students to Reinforce Information Security Management Inside ITIL®." Enhancing the Modern Organization through Information Technology Professionals: Research, Studies, and Techniques, edited by Ricardo Colomo-Palacios, IGI Global, 2013, pp. 115-125. https://doi.org/10.4018/978-1-4666-2648-5.ch008

APA

Larrocha, E. R., Minguet, J. M., Díaz, G., Castro, M., Vara, A., Martín, S., & San Cristobal, E. (2013). Proposals for Postgraduate Students to Reinforce Information Security Management Inside ITIL®. In R. Colomo-Palacios (Ed.), Enhancing the Modern Organization through Information Technology Professionals: Research, Studies, and Techniques (pp. 115-125). IGI Global. https://doi.org/10.4018/978-1-4666-2648-5.ch008

Chicago

Larrocha, Elena Ruiz, et al. "Proposals for Postgraduate Students to Reinforce Information Security Management Inside ITIL®." In Enhancing the Modern Organization through Information Technology Professionals: Research, Studies, and Techniques, edited by Ricardo Colomo-Palacios, 115-125. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2648-5.ch008

Export Reference

Mendeley
Favorite

Abstract

This paper is complementary to the previous work published and awarded as Best Student Paper at the International Conference EDUCON 2010 (sponsored by the IEEE Education Society): “Filling the gap of Information Security Management inside ITIL®: proposals for postgraduate students”. This paper reviews and updates those different proposals made at UNED, for post-graduate students, at the area of IT Services Management and tries to fill the gap of the treatment due in ITIL® (Information Technology Infrastructure Library) to Information Security Management. The treatment given to Information Security Management in ITIL, both versions 2 and 3, are analyzed. The different post-graduate courses offered that fill these methodologies and the opinions and evaluations of the students are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.