Skip to main content

ITEC 8202 - IT Leadership Simulator II: Developing Proactive and Reactive Security Plans: Welcome & Course Readings

Welcome to your course guide

Please find your required library readings below. If you have problems with the links below, please contact the Library. If you have APA questions about these materials, please contact the Writing Center.

ITEC 8202 Required Course Readings

The links are for required readings found in the Walden databases ONLY. For all other readings, see your course resources.

Enter your myWalden user name and password at the prompt. 


Augustin, T. (2002). Expected utility within a generalized concept of probability—A comprehensive framework for decision making under ambiguity. Statistical Papers, 43(1), 5–22.


Burns, M. (2007). Performing a gap analysis. CA Magazine, 140(9), 16.

Forcht, K. A., & Ayers, W. C. (2000). Developing a computer security policy for organizational use and implementation. Journal of Computer Information Systems, 41(2), 52.

González-Herrero, A., & Smith, S. (2008). Crisis communications management on the web: How Internet-based technologies are changing the way public relations professionals handle business crises. Journal of Contingencies and Crisis Management, 16(3), 143–153.

González-Herrero, A., & Smith, S. (2010). Crisis communications management 2.0: Organizational principles to manage crisis in an online world. Organization Development Journal, 28(1), 97–105.

Griffin, J. (2010). Implementing a data governance initiative. Information Management, 20(2), 27.

Guo, K. H., Yuan, Y., Archer, N. P., & Connelly, C. E. (2011). Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28(2), 203–236.

Heath, R. L., Lee, J., & Ni, L. (2009). Crisis and risk approaches to emergency management planning and communication: The role of similarity and sensitivity. Journal of Public Relations Research, 21(2), 123–141.

Hey, J. D., Lotito, G., & Maffioletti, A. (2010). The descriptive and predictive adequacy of theories of decision making under uncertainty/ambiguity. Journal of Risk and Uncertainty, 41(2), 81–111.

Johnson, R. (2011). The security audit journal—Decoded. System iNEWS, (384), 19–24.

Kadam, A. W. (2007). Information security policy development and implementation. Information Systems Security, 16(5), 246–256.

Laurent, W. (2006). Governance gap analysis. Information Management, 16(8), 30.

Radi, A., Kartit, A., Regragui, B., El Marraki, M., & Ramrami, A. (2011). An enhanced three levels security policy. Journal of Theoretical & Applied Information Technology, 23(1), 39–50.

Scuro, R. R. (2006). Gap analysis: The best way to discover your own best practice. Proceedings of the IIE Annual Conference (pp. 1–17).

Tontini, G., & Picolo, J. D. (2010). Improvement gap analysis. Managing Service Quality, 20(6), 565–584.

Trček, D., Trobec, R., Pavešić, N., & Tasič, J. F. (2007). Information systems security and human behaviour. Behaviour & Information Technology, 26(2), 113–118.

Wester, M. (2009). Cause and consequences of crises: How perception can influence communication. Journal of Contingencies and Crisis Management, 17(2), 118–125.

Other Readings

Optional or supplemental readings may or may not be available in the library. Find further information about optional readings here.

If you have questions about your required course textbooks, please contact Customer Care at