• Tidak ada hasil yang ditemukan

08832323.2010.489587

N/A
N/A
Protected

Academic year: 2017

Membagikan "08832323.2010.489587"

Copied!
8
0
0

Teks penuh

(1)

Full Terms & Conditions of access and use can be found at

http://www.tandfonline.com/action/journalInformation?journalCode=vjeb20

Download by: [Universitas Maritim Raja Ali Haji] Date: 11 January 2016, At: 22:13

Journal of Education for Business

ISSN: 0883-2323 (Print) 1940-3356 (Online) Journal homepage: http://www.tandfonline.com/loi/vjeb20

Information Systems Security and Computer

Crime in the IS Curriculum: A Detailed Examination

C. Bryan Foltz & Janet S. Renwick

To cite this article: C. Bryan Foltz & Janet S. Renwick (2011) Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination, Journal of Education for Business, 86:2, 119-125, DOI: 10.1080/08832323.2010.489587

To link to this article: http://dx.doi.org/10.1080/08832323.2010.489587

Published online: 23 Dec 2010.

Submit your article to this journal

Article views: 145

(2)

ISSN: 0883-2323

DOI: 10.1080/08832323.2010.489587

Information Systems Security and Computer Crime

in the IS Curriculum: A Detailed Examination

C. Bryan Foltz

University of Tennessee at Martin, Martin, Tennessee, USA

Janet S. Renwick

University of Arkansas at Fort Smith, Fort Smith, Arkansas, USA

The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little time for additional topics.

Keywords: information assurance, information systems curricula, security

INTRODUCTION

Computer crime and misuse continues to be an issue in our society and is very common among college students (Carnevale, 2002; Cronan, Foltz, & Jones, 2006; Vaughn & Boggess, 1999). As a result, many universities attempt to protect themselves by using computer usage policies. These policies attempt to prevent misuse by explaining cor-rect and incorcor-rect usage of systems. However, many students (Cronan et al.) and faculty members (Foltz & Hauser, 2004) are unfamiliar with these policies.

Further, many universities simply fail to cover computer security and computer misuse topics within their curricu-lum. Previous research by Anderson and Schwager (2002) suggested that many information systems programs provide little or no coverage of this increasingly important topic.

Purpose

The purpose of this research is to further examine the extent to which information systems security and computer crime are covered in information systems programs around the United States. This work will both update and expand Anderson and Schwager’s (2002) study. Rather than examining a

self-Correspondence should be addressed to C. Bryan Foltz, PhD, University of Tennessee at Martin, College of Business and Public Affairs, Department of Computer Science & Information Systems, BA 226, Martin, TN 38238, USA. E-mail: foltz@utm.edu

reported list of coverage, this research examines the amount of time actually spent discussing given topics.

Information Systems Security and Computer Crime Coverage in the Information Systems Curriculum

Although the cost and frequency of information systems mis-use and computer crime is often studied—for example, the 2007 CSI Computer Crime and Security survey reported the cost of computer crime to respondents as$66,930,950

(Richardson, 2007)—these topics are underrepresented in many undergraduate information systems curricula today (Walters, 2007). Indeed, a recent survey of the core cur-ricula of undergraduate information systems programs in the United States did not mention information systems security at all (Kung, Yang, & Ahang, 2006). Further, a recent survey of the most popular textbooks used in introductory infor-mation systems courses found a surprising lack of depth of information systems security coverage (Sousa, MacDonald, & Fougere, 2005).

Previous research into the teaching of computer security has revealed various recommendations to include more com-puter security topics (Prichard & MacDonald, 2004; Vaughn & Boggess, 1999). Some studies have looked at the efficacy of particular programs or courses (National Security Agency, 2009). Anderson and Schwager (2002) found that many of the areas in the Certified Information Systems Security Pro-fessional (CISSP) common body of knowledge were consid-ered relevant to the IS curriculum. The authors concluded

(3)

120 C. B. FOLTZ AND J. S. RENWICK

that no required IS curriculums covered all of the CISSP se-curity issues. In fact, only 2% of curriculums covered 80% of the CISSP issues. Further, only 8% of elective curriculums covered all of the CISSP issues, whereas 22% of elective cur-riculums covered over 80% of the CISSP issues. The authors also found that the majority (70%) of respondents wanted se-curity integrated into other courses, although 32% felt that, if a security course were available, it should be required. However, the authors were unable to determine the extent to which these topics are actually being taught (Anderson & Schwager). Our study attempts to fill this void by collecting data from IS faculty regarding classroom coverage. Because of the evolving nature of the field, IS faculty often include topics from sources outside of textbooks. Rather than relying on measures of coverage within textbooks, we gathered data directly from faculty teaching IS courses.

Model Curricula

In trying to evaluate present curricula, we first turned to the model curriculum in the field. The most recent model cur-riculum for Information Systems is IS 2002 (Gorgone, 2002). Published jointly by the Association for Computing Machin-ery (ACM), the Association for Information Systems (AIS), and the Association for IT Professionals (AITP), it is used for guidance by colleges and universities offering informa-tion systems as an undergraduate major. Representatives of each of these professional societies worked to develop this document as both a reflection of present practice and as a guide for the future. Faculty in computing programs across the United States provided input. This model curriculum rep-resents a high degree of consensus among a very diverse group of individuals.

IS 2002 lists computer security as a topic area in the “Fundamentals of IS” course. This course, often offered at the freshman level, is described as a prerequisite to upper level course work. It includes concepts such as systems theory, specification and design of information systems, object-oriented design, and procedural and nonprocedural programming languages, database, features of networks, and IS career paths. This course is clearly covering a large number of varied topics. In some programs, these topics are lumped together with the model curriculum course “Personal Productivity with IS Technology” in a single three-credit course. The introductory nature of this course suggests a low level of coverage for security topics.

IS 2002 also describes courses in “Electronic Business” and “Hardware and Software Systems.” These courses are also candidates for the inclusion of security-related topics.

Because the IS 2002 curricula was published in 2002, most of the input from the IS community was gained prior to the September 11, 2001 terrorist attacks. Unfortunately, those events have changed many aspects of society, including our emphasis on security. This study endeavors to assess the degree to which IS security issues are being addressed not

only in the model curriculum, but also in the actual curricula being delivered to students in Information Systems.

METHOD

In order to ascertain the coverage of security as a topic, we developed a web-based survey. Target subjects are IS faculty members in colleges of business. These individuals are actively involved in developing and delivering curriculum to information systems majors. Participants in the pilot study were solicited via personal e-mail and telephone. Comments from the pilot study were used to finalize the questions and format of the survey instrument. Responses from the pilot survey were not combined with those from the full study. For the broader study, participants were solicited through Internet discussion lists used by faculty in information systems, as well as via e-mail. Although responses were solicited via telephone for the pilot study, all responses for the main study were solicited via e-mail.

Survey Items

The survey items were based on the items in the common body of knowledge as defined by the CISSP examination. This certification is an indication of expertise in the area of information systems security and is highly regarded in the computing industry (Gregory, 2003). Other certifications such as GIAC, CISA, and CISM are also available, but are less well known. CISSP provides clearly stated areas within the applicable body of knowledge, which adapt well to our research methodology. It was also used as the basis of earlier research in this field (Anderson & Schwager, 2002).

One item of potential confusion related to CISSP’s inclu-sion of applications and systems development as an area in the common body of knowledge. Certainly, a knowledge of development techniques and how they are used would be an advantage to an IS security professional, and well-designed systems should, by their nature, be more secure. However, it does not seem that all of applications and systems de-velopment is intrinsically related to IS security. Anderson and Schwager (2002) remedied this by rewording this topic area as applications and systems development security. To avoid potentially confusing respondents, two questions were used on the present survey. The first focused on coverage of application and systems development, whereas the second question focused on application and systems development security.

The topic areas for coverage of IS security in curricula thus became

• Access Control Systems & Methodology

• Applications & Systems Development

• Applications & Systems Development Security

• Business Continuity Planning

(4)

• Cryptography

• Law, Investigation & Ethics

• Operations Security

• Physical Security

• Security Architecture & Models

• Security Management Practices

• Telecommunications, Network & Internet Security.

Likert-type scales were developed for each of these sub-ject areas, with responses ranging from 0 hr to more than 25 hr. Respondents were also asked whether their programs offered a course dedicated to computer security issues, either as an elective or graduation requirement. Other questions in-cluded the individual respondent’s position and the extent to which they were personally teaching security issues.

Hypotheses

The first research question involves the general coverage of computer security in undergraduate IS degrees.

Proposition 1: IS undergraduate curricula includes instruction on computer security. IS undergraduate cur-ricula includes courses that are required of all IS graduates, those that are elective, and non-IS courses. Subsequently, this proposition was broken down to the three following hypothe-ses.

Hypothesis 1a:

H0: IS undergraduate curricula will not include

classroom hours on computer security in required courses.

Ha:IS undergraduate curricula will include classroom

hours on computer security in required courses.

Hypothesis 1b:

H0:IS undergraduate curricula will not include

class-room hours on computer security in IS elective courses.

Ha:IS undergraduate curricula will include classroom

hours on computer security in IS elective courses.

Hypothesis 1c:

H0:IS undergraduate curricula will not include

class-room hours on computer security in non-IS classes.

Ha:IS undergraduate curricula will include classroom

hours on computer security in non-IS classes.

In addition, the various topical areas are examined to de-termine what areas of computer security are covered in the curriculum.

As computer security increases its mainstream status in industry, a corresponding shift should occur in IS curricula. This should reflect in anticipated changes over the next five years. This leads to the second proposition and associated hypotheses.

Proposition 2: Over the next five years, computer security will become more a part of required IS under-graduate curricula.

Hypothesis 2a:

H0: IS faculty members will not project a need for

more coverage of IS security in required courses over the next five years.

Ha:IS faculty members will project a need for more

coverage of IS security in required courses over the next five years.

Hypothesis 2b:

H0:IS faculty members will not project a decrease in

the coverage of IS security in elective courses over the next five years.

Ha:IS faculty members will project a decrease in the

coverage of IS security in elective courses over the next five years.

Hypothesis 2c:

H0:IS faculty members will project no change in the

coverage of IS security in non-IS courses over the next five years.

Ha: IS faculty members will project a change in the

coverage of IS security in non-IS courses over the next five years.

Curriculum changes, however, do not come without chal-lenges. IS faculty teach in a subject area that requires con-stant updating as technology changes. They also struggle with balancing course requirements in general education, general business, and other areas within the IS major. These conditions lead to proposition 3 and associated hypotheses.

Proposition 3: IS faculty see the need to increase the level of instruction on computer security but are challenged to do so.

Hypothesis 3a:

H0:IS faculty will not see a need to shift instruction

on computer security from elective courses to required courses.

Ha:IS faculty will see a need to shift instruction on

computer security from elective courses to required courses.

Hypothesis 3b:

H0:IS faculty expertise is not a challenge in including

computer security in the curriculum.

Ha: IS faculty expertise is a challenge in including

computer security in the curriculum.

Hypothesis 3c:

H0:IS curricula are not challenged to include computer

security because the curriculum is already full.

Ha: IS curricula are challenged to include computer

security because the curriculum is already full.

(5)

122 C. B. FOLTZ AND J. S. RENWICK

FIGURE 1 Accreditation.

RESULTS

Survey responses were solicited using a combination of tech-niques. Responses were initially requested on the ISWorld listserv. This listserv reaches over 5,000 individuals, presum-ably faculty in IS programs around the world. In addition, an initial mailing was sent to a list of 2,829 faculty e-mails gleaned from AACSB-accredited university web sites. Be-cause this list was a few years old, many of the addresses were obsolete. We received 418 read receipts from identifi-able addresses from this initial contact. A follow-up note was sent to these individuals approximately two weeks following the initial request.

From this effort 63 responses were received, 61 of which were usable. Forty-three of the respondents identified them-selves with their return e-mail address asking for a copy of the preliminary results. This indicates both a high level of interest as well as a lack of concern for anonymity among the respondents.

Fifty of the responses were from AACSB-accredited col-leges of business. Twelve were accredited by ABET. Three responses indicated they were accredited by ACM. These results are shown in Figure 1.

Program sizes were predominately small. Almost half of respondents (of 57 providing program size responses) were from programs that had 0–24 graduates in 2006, shown in Figure 2.

Proposition 1: Degree of Coverage

IS faculty were asked to estimate the total number of hours spent on IS security in their curriculum. The results are shown in Figure 3.

FIGURE 2 Program size.

FIGURE 3 Estimated hours on computer security.

By taking the midpoints of the ranges, the means of each of these areas were calculated. These are shown in Table 1. Null hypotheses 1a, 1b, and 1c were rejected and support was given to the alternate hypotheses, suggesting that security issues are taught in IS courses.

Topic Areas

In addition to asking about the total number of hours covering IS security, respondents were also asked more specifically about topical areas within security, as discussed previously. The means of the responses are shown in Table 2.

There are several interesting results shown here. The sub-ject area receiving the most coverage is applications and sys-tems development. This area, however, is not completely sub-sumed in IS security, as shown by the different responses for applications and systems development versus applications and systems development security. This indicates a degree of ambiguity as to what IS security includes. Areas receiving the least attention include physical security and operations security in both required and elective courses.

Secondly, it is worthy of note that the sum of these areas significantly exceeds the summary results shown in Table 5. We did not ask about topical coverage in non-IS courses. It does show, however, that more time is spent on secu-rity topics in elective courses versus those required of all students.

TABLE 1

Estimated Hours on Computer Security: Means

Total hours (Summary question)

M(using

midpoints) SD n p

IS required 10.82 9.06 59 <.001

IS elective 15.78 11.87 54 <.001

Non-IS 3.11 5.74 50 <.001

(6)

TABLE 2

Estimated Hours for IS Courses, by Subject Area

Required Elective

Subject area value n value n Total

Access control systems & methodology

3.68 51 5.30 47 8.97

Applications & systems development

17.38 58 12.19 50 29.57

Applications & systems development security

5.20 59 5.16 50 10.36

Business continuity planning 3.25 56 6.12 47 9.37

Cryptography and the use of encryption

3.13 57 6.34 48 9.48

Law, investigation, and ethics 4.99 58 5.57 50 10.56

Operations security 3.07 56 5.15 49 8.22

Physical security 2.74 56 4.00 49 6.74

Security architecture and models 3.76 56 6.71 50 10.47

Security management practices 4.34 57 6.71 51 11.05

Telecommunications, network, and internet security

7.58 58 10.03 51 17.61

Sum 59.12 73.28 132.40

Sum (without “Applications & systems development”)

41.74 61.09 102.83

Proposition 2: Adequacy of Coverage and Need for Change

Respondents were asked whether present coverage of com-puter security was adequate or if it should be changed. The respondents resoundingly indicated that current coverage is inadequate and should be increased. These results are shown in Figure 4. Fully 73% of respondents feel that coverage of security issues should be increased in presently required IS courses.

In an effort to see where the coverage of computer security is going, respondents were asked to predict what change they believe should happen over the next five years. Results are shown in Figure 5.

FIGURE 4 Adequacy of coverage.

FIGURE 5 Predicted change over the next five years.

TABLE 3

Percentage for Increase, by Time Period

Course Present n Next 5 years n

Required 73% 60 87% 60

Elective 65% 54 70% 53

Non-IS 52% 48 71% 48

With increased focus on security issues, Hypothesis 3a predicted that coverage of computer security issues would shift from elective courses to required courses. We felt that IS faculty would desire to increase security coverage in re-quired courses while at the same time decreasing the time spent in elective courses. This belief was partially correct: respondents reported a desire for increased coverage in re-quired courses, but did not report an accompanying desire for decreased coverage in elective courses. To the contrary, respondents saw the need for increases in all areas. A strong majority (87%) saw the need for increased coverage of com-puter security in the required IS curriculum over the next five years. This is accompanied by a full 70% desiring an increase in coverage in elective courses. Figure 5 and Table 3 summarize these results.

TABLE 4

Reasons for Lack of Coverage, Distribution of Opinions

Value

Faculty expertise

Curriculum full

1 Strongly disagree 2 1

2 Disagree 13 10

3 Slightly disagree 6 9

4 Slightly agree 13 9

5 Agree 19 13

6 Strongly agree 8 18

Total 61 60

Weighted average 3.95 4.28

(7)

124 C. B. FOLTZ AND J. S. RENWICK

TABLE 5 Summary of Results

Hypothesis Result

Proposition 1: IS undergraduate curricula includes instruction on computer security.

1a H0: IS undergraduate curricula will not include classroom hours on computer security in required courses. Rejected

Ha: IS undergraduate curricula will include classroom hours on computer security in required courses. Supported

1b H0: IS undergraduate curricula will not include classroom hours on computer security in IS elective courses. Rejected

Ha: IS undergraduate curricula will include classroom hours on computer security in IS elective courses. Supported

1c H0: IS undergraduate curricula will not include classroom hours on computer security in non-IS classes. Rejected

Ha: IS undergraduate curricula will include classroom hours on computer security in non-IS classes. Supported

Proposition 2: Over the next five years, computer security will become more a part of required IS undergraduate curricula.

2a H0: IS faculty members will not project a need for more coverage of IS security in required courses over the next five years. Rejected

Ha: IS faculty members will project a need for more coverage of IS security in required courses over the next five years. Supported

2b H0: IS faculty members will not project a decrease in the coverage of IS security in elective courses over the next five years. Supported

Ha: IS faculty members will project a decrease in the coverage of IS security in elective courses over the next five years. Rejected

2c H0: IS faculty members will project no change in the coverage of IS security in non-IS courses over the next five years. Rejected

Ha: IS faculty members will project a change in the coverage of IS security in non-IS courses over the next five years. Supported

Proposition 3: IS faculty see the need to increase the level of instruction on computer security but are challenged to do so.

3a H0: IS faculty will not see a need to shift instruction on computer security from elective courses to required courses. Supported

Ha: IS faculty will see a need to shift instruction on computer security from elective courses to required courses. Rejected

3b H0: IS faculty expertise is not a challenge in including computer security in the curriculum. Rejected

Ha: IS faculty expertise is a challenge in including computer security in the curriculum. Supported

3c H0: IS curricula are not challenged to include computer security because the curriculum is already full. Rejected

Ha: IS curricula are challenged to include computer security because the curriculum is already full. Supported

Proposition 3: Reasons for Lack of Coverage

Hypotheses 3b and 3c addressed the challenges that faculty face in including IS security. Respondents tended to agree with the statements “The lack of faculty expertise in security makes it difficult to incorporate this topic in our curriculum” and “our curriculum is already full and there isn’t sufficient time to incorporate security issues.” Most respondents felt that a lack of time in the curriculum presented a greater challenge than lack of faculty expertise; however, 65% of respondents felt that a lack of expertise was an issue as well. Results are shown in Table 4

CONCLUSION

Results of this survey reveal some very interesting patterns. First of all, there was an overwhelming consensus among IS faculty that IS security needs to be addressed and that the present curricula are not meeting those needs, especially in the required courses (73% of respondents felt security is-sue coverage should be increased in currently required IS courses). Further, most respondents suggested a need for increased security coverage during the next five years in re-quired, elective, and non-IS courses. There is less consensus, however, as to what should actually be included in IS secu-rity coverage. The topical areas presently receiving the most attention include Applications and systems development and telecommunications, network and internet security, with each receiving more than seventeen hours of instruction. These are significantly greater than any other topic area. Security

man-agement practices, law, investigation and ethics, and security architecture and models are in a second tier, receiving 10–12 hrs of instruction. The area receiving the least attention is physical security. An extension of this project would be to further refine recommendations for IS security curriculum.

Another interesting result is the disparity between re-ported security coverage in the classroom. Respondents were asked to report the total hours spent on security as well as the number of hours spent on specific areas of security. Respon-dents reported a total of 26.6 hrs for instruction in security, the sum of hours spent on specific areas greatly exceeded this (the sum of hours reported is 102.83 after the removal of the Applications and systems development item). This in-consistency suggests that either respondents are unsure of the coverage within their own curriculum or that there is a large degree of overlap between these topic areas.

Unfortunately, respondents also noted that present curric-ula leave little time for additional topics. This lack of time may hinder efforts to add new material to the curriculum. The challenges of IS security, however, are an important is-sue that we and our students will continue to face. The need for additional instruction in this area cannot be disregarded. It is perhaps time to look to new teaching methods and ap-proaches to learning to increase both the breadth and depth of our student’s educational experience. While we cannot con-tinually add more content, we can make an effort to maximize their learning in a changing world.

This study extended previous research by providing a glimpse inside IS program classrooms. Whereas previous work looked primarily at external sources such as textbook reviews, catalogs, and external recommendations, our study

(8)

endeavored to ask faculty directly what was presently being taught. Our results go beyond textbooks to reflect what fac-ulty are including from more up-to-date resources. As the field of information systems continues to develop, it contin-ues to be important for faculty to remain current in the field and incorporate this knowledge in their teaching.

Future researchers should continue to examine IS security curricula content as well as how it relates to other fields such as computer science and information technology. As an evolving field, information systems must continue to examine content and coverage for currency. It should also endeavor to more clearly define topical areas in IS security. As mentioned previously, results suggest that either faculty members are unsure of the IS security coverage within their own curriculum or there is significant overlap between the topic areas. Further, the inclusion of these various IS secu-rity topic areas within the curriculum should be evaluated. Given the limited time available within the existing curricula and the importance of covering IS security, the model curricula needs to be revised to reflect these developments in the field.

REFERENCES

Anderson, J., & Schwager, P. (2002). Security in the information systems curriculum: Identification and status of relevant issues.Journal of Com-puter Information Systems,42(3), 16–23.

Carnevale, D. (2002, March 4). Software piracy seems rampant among students in a survey at 2 universities.The Chronicle of Higher

Educa-tion. Retrieved from http://chronicle.com/article/software-piracy-seems-rampant/114903

Cronan, T. P., Foltz, C. B., & Jones, T. (2006). Piracy, computer crime, and IS misuse at the university.Communications of the ACM,49(6), 84–90. Foltz, C. B., & Hauser, R. (2004). Faculty awareness of computer

secu-rity regulations.Proceedings of the Decision Sciences Institute, 4501– 4506.

Gorgone, J., Davis, G. B., Valacich, J. S., Topi, H., Feinstein, D. L., & Longenecker, H. E. (2002). IS 2002: Model curriculum and guidelines for undergraduate degree programs in information systems. Communi-cations for the Association for Information Systems,11. Retrieved from http://aisel.aisnet.org/cais/vol11/iss1/1

Gregory, P. (2003, January 24). Are security certifications worth it? Com-puterworld. Retrieved from http://www.comCom-puterworld.com/s/article/ 77849/Are security certifications worth it

Kung, M., Yang, S. C., & Ahang, Y. (2006). The changing information systems (IS) curriculum: A survey of undergraduate programs in the United States.Journal of Education for Business,81, 291–300. National Security Agency. (2009).National centers of academic

excel-lence. Retrieved from http://www.nsa.gov/ia/academic outreach/nat cae/ index.shtml

Prichard, J. J., & MacDonald, L. E. (2004). Cyber terrorism: A study of the extent of coverage in computer security textbooks.Journal of Information Technology Education,3, 279–289.

Richardson, R. (2007).2007 CSI computer crime and security survey. New York, NY: Computer Security Institute.

Sousa, K. J., MacDonald, L. E., & Fougere, K. T. (2005). Computer security in the introductory business information systems course: An exploratory study of textbook coverage. Journal of Education for Business, 81, 15–20.

Vaughn, J. R., & Boggess, J. E. III. (1999). Integration of computer secu-rity into the software engineering and computer science programs.The Journal of Systems and Software,49, 149–153.

Walters, L. M. (2007). A draft of an information systems security and control course.Journal of Information Systems,21(1), 123–148.

Gambar

FIGURE 3Estimated hours on computer security.
TABLE 2
TABLE 5

Referensi

Garis besar

Dokumen terkait

SA and SP faculty members are now required to pro- duce a qualifying level of scholarly output that is expected to create an impact that is aligned with their business school ’

Blog of the latest food security and price research and updates Members Atrium Private forum for policymakers and researchers News Latest media coverage on food situation around

Required Courses Every student in the program is required to complete the following 12 courses for a total of 36 credits: • STAT 512 Applied Regression Analysis 3 credits • BIOS 515

Required Courses Every student in the program is expected to complete the following courses Core Courses 21 credit hours: E 520 Optimization Theory in Economic Analysis 3 credits

30 credit hours 10 classes Five classes from the School of Liberal Arts, including LAMP seminars Five classes from the Kelley School of Business Required Liberal Arts courses: ECON

Over the next few years, as the student body grew, the need for better athletic facili- Continued on Page 6 Accredidation of Business School is turned down By Lauren Stiefel "If we

Federal Member for Isaacsfor completing his official duties New Members Welcome to all New Members, I hope to have a list for the NEXT ISSUE Saturday Section Over the winter the

To ensure the objectivity of the study results, the research process is defined by: Strategies For Real Estate And Facilities Software Over The Next Five Years N = 285 Note: Data