This course syllabus is discontinued or replaced by a new course syllabus.

Logotype Örebro universitet

Örebro University School of Business

Course Syllabus


Informatics, Information Security Management - Application Areas, Second Cycle, 10.5 Credits


Course Code: IK407A Subject Area: Field of Technology
Main Field of Study: Informatics Credits: 10.5
    Subject Group (SCB): Informatics/Computer and Systems Sciences
Education Cycle: Second Cycle Progression: A1F
Established: 2017-11-17 Last Approved: 2018-09-27
Valid from: Spring semester 2019 Approved by: Head of School


Aims and Objectives

General aims for second cycle education

Second-cycle courses and study programmes shall involve the acquisition of specialist knowledge, competence and skills in relation to first-cycle courses and study programmes, and in addition to the requirements for first-cycle courses and study programmes shall
- further develop the ability of students to integrate and make autonomous use of their knowledge
- develop the students' ability to deal with complex phenomena, issues and situations, and
- develop the students' potential for professional activities that demand considerable autonomy, or for research and development work.

(Higher Education Act, Chapter 1, Section 9)

Course Objectives

1. Based on theories on project management have the ability to plan a project to solve an information security problem in a specific case.

2. Be able to analyze, assess and propose relevant theories, methods, models and techniques to manage an information security problem in a specific case.

3. Be able to use relevant theories, methods, models and techniques to manage an information security problem in a specific case.

4. Be able to account for and critically reflect on the implementation of a project to solve an information security problem in a specific case, in relation to the previously chosen theories, methods, models and techniques.


Main Content of the Course

In the course information security skills that have been acquired earlier will be applied and developed in a project. The project is conducted in cooperation with external partners who provide problems. The project is a group assignment where focus is on planning, problem solving and proposing a solution to an information security problem. Tools for problem solving are suitable methods, models and techniques that the student have been provided with during the course of the information security education. Additional new tools may be applied depending on the case, supervision resources and agreements with the responsible teacher.

The course consists of the following modules:
1) To initiate and plan projects - scope, time plan, resource management, project quality and risk management. This entails identifying and analyzing the problem focused in the project work. (Addressing goal 1)
2) Theoretical studies. This entails theoretical studies on the basis of information security problems i a specific case. (Addressing goal 2)
3) Implementation of the proposed project, based on the earlier proposed theories, methods and tools, in a specific case. (Addressing goal 3)
4) Presentation and reflection on the implementation of the information security project in a specific case. (Addressing goal 4)


Teaching Methods

The employed teaching methods are anchored in flipped classroom and case-based learning. Flipped classroom means focusing on exploring topics in greater depth and creating meaningful learning opportunities in class time, while content delivery is made outside of the classroom. Case-based learning means that scenarios from real-world examples are used to as a point of departure for in class activities and assignments. In this course these teaching methods are implemented through online lectures, individual readings, information searching, seminars, student presentations and supervision.

Students who have been admitted to and registered on a course have the right to receive tuition and/or supervision for the duration of the time period specified for the particular course to which they were accepted (see, the university's admission regulations (in Swedish)). After that, the right to receive tuition and/or supervision expires.


Examination Methods

Examination 1, 1.5 Credits. (Code: 0110)
Oral and written group presentation of project plan (Assesses goal 1)
Examination 2, 2 Credits. (Code: 0120)
Oral and written group presentation of relevant theories, methods, models and techniques (Assesses goal 2)
Examination 3, 3 Credits. (Code: 0130)
Oral and written presentation of solution of an information security problem (Assesses goal 3)
Examination 4, 4 Credits. (Code: 0140)
Individual written report on the project implementation. The report is based on the work performed in parts 1,2 and 3 (Assesses goal 4)

For further information, see the university's local examination regulations (in Swedish).


Grades

According to the Higher Education Ordinance, Chapter 6, Section 18, a grade is to be awarded on the completion of a course, unless otherwise prescribed by the university. The university may prescribe which grading system shall apply. The grade is to be determined by a teacher specifically appointed by the university (an examiner).

According to regulations on grading systems for first- and second-cycle education (vice-chancellor's decision 2010-10-19, reg. no. CF 12-540/2010), one of the following grades is to be used: fail, pass, or pass with distinction. The vice-chancellor or a person appointed by the vice-chancellor may decide on exceptions from this provision for a specific course, if there are special reasons.

Grades used on course are Fail (U), Pass (G) or Pass with Distinction (VG).

Examination 1
Grades used are Fail (U) or Pass (G).
Examination 2
Grades used are Fail (U) or Pass (G).
Examination 3
Grades used are Fail (U) or Pass (G).
Examination 4
Grades used are Fail (U), Pass (G) or Pass with Distinction (VG).


FINAL GRADE
The final grade will be translated into the ECTS grading scale.

In order to receive the grade Pass, the student must be awarded Pass on all examinations. In order to receive the grade Pass with Distinction, the student must be awarded Pass with Distinction on Examination 4 and awarded Pass on all other examinations.


For further information, see the university's local examination regulations (in Swedish).


Specific entry requirements

Informatics, Basic Course 30 Credits, 30 Credits at intermediate course level within Informatics and successful completion of at least 15 Credits at advanced course level within Informatics. Alternatively Business Administration, Basic Course, 30 Credits, Business Administration, Intermediate Course, 30 Credits and successful completion of at least 15 Credits at advanced course level within Business Administration. Alternatively 30 Credits within G1N in Computer Science and 45 Credits within G1F in Computer Science.
In addition, successful completion of at least 22,5 Credits in the first semester of the Master's Programme in Information Systems - Information Security Management, successful completion of the course Informatics, Applied Information Security Management, Second Cycle, 12 Credits and successful completion of the course "English B/English 6" from the Swedish Upper Secondary School or equivalent is required.

For further information, see the university's admission regulations (in Swedish).


Transfer of Credits for Previous Studies

Students who have previously completed higher education or other activities are, in accordance with the Higher Education Ordinance, entitled to have these credited towards the current programme, providing that the previous studies or activities meet certain criteria.


For further information, see the university's local credit transfer regulations (in Swedish).


Other Provisions

Remaining tasks should be completed as soon as possible according to the teacher's instructions.


Reading List and Other Teaching Materials

Required Reading

The course relies in part on literature from previous courses in the program. Additional reading will be added to based on the students own searches, and selected in relation to the project work.


Additions and Comments on the Reading List

.


See this Course Syllabus as PDF