Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ludwig Slusky is active.

Publication


Featured researches published by Ludwig Slusky.


Journal of Information Privacy and Security | 2012

Students Information Security Practices and Awareness

Ludwig Slusky; Parviz Partow-Navid

Abstract As cyber threats continue to grow at an exponential rate, the need for training in information security awareness spreads far beyond the Information Technology college curriculum. Information Security proliferates into various domains of knowledge and becomes more context-aware. Consequently, the training in information awareness at a college level must cater more specifically to students practices. This paper presents the results of the Information Security survey conducted among students of the College of Business and Economics at California State University, Los Angeles in spring 2011. The survey revealed several characteristics of students practices and their awareness of risks and countermeasures related to computer skills, mobile computing, loss and encryption of data, online social networking, awareness training, correlation between practice and awareness, and others. The survey also revealed that the major problem with security awareness is not due to a lack of security knowledge, but in the way the students apply that knowledge in real-world situations. Simply, the compliance with information security awareness is lower than the understanding of it. The findings discussed in this paper are provided to assist colleges in designing curriculum that includes more context-based Information Security training.


Information & Software Technology | 1987

Integrating software modelling and prototyping tools

Ludwig Slusky

Abstract Innovative computer-aided software engineering (CASE) tools and new software methodologies have had a significant impact on the software system development cycle. As a result, it is important to assess the variety of systems development methodologies and CASE products, and to construct principles of an integrated framework of methods and tools for rapid system development based on conceptual modelling and prototyping. This paper discusses CASE tools, prototyping, and an integrated system development approach, based on an evolution of four successive phases: conceptualization, logical modelling, prototyping, and migration into a final system. It also classifies CASE tools into categories and clarifies their relationship within the integrated framework. In addition, the different categories of prototypes are discussed.


Archive | 2009

Cloud computing and computer forensics for business applications

Ludwig Slusky; Parviz Partow-Navid; Mohit Doshi


T.H.E. Journal Technological Horizons in Education | 1999

Learning Java INTERNATIONALLY Using WebCT

Parviz Partow-Navid; Ludwig Slusky


Archive | 2008

Federal Public-Key Infrastructure

Ludwig Slusky; Parviz Partow-Navid


Archive | 2009

Challenges of Change Management in E-Learning

Parviz Partow-Navid; Ludwig Slusky


Archive | 2008

Change Management and Distance Education

Parviz Partow-Navid; Ludwig Slusky


Archive | 2007

IT Security Policy in Public Organizations

Parviz Partow-Navid; Ludwig Slusky


EdMedia: World Conference on Educational Media and Technology | 2016

Human Factors of Cybersecurity Awareness

Ludwig Slusky; James A. Goodrich


Accounting and Finance Research | 2013

Information Security Risks and Countermeasures in CPA Practices

Ludwig Slusky; Rick Stephan Hayes; Richard Lau

Collaboration


Dive into the Ludwig Slusky's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

James A. Goodrich

California State University

View shared research outputs
Top Co-Authors

Avatar

Richard Lau

California State University

View shared research outputs
Top Co-Authors

Avatar

Rick Stephan Hayes

California State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge