Information Society and Security
2009-2010 - IMT4481 - 5 ECTS

Expected learning outcomes

The students shall primarily understand the evolution that has taken place within ICT during the last ten years that has led us toward a vulnerable society, and what vulnerability means in such a broad context. The students shall get sufficient insight to identify, evaluate and implement countermeasures that can protect businesses and organisations.

This includes knowledge of the following items:

  • how ICT systems are designed and are used in industrial production, in public and private service provision, and in the infrastructure of the society
  • why ICT systems and administrative infrastructures can be described as scale-free networks and which consequences scale-freeness has on vulnerability and robustness
  • classical reliability theory, including the reliability of software and networks.


  • Introduction to the concept of risk as it is used in technology, insurance and finance.
  • Causes of increased risk: overoptimistic belief in market growth, numerical illiteracy, insufficient knowledge of statistics and probability calculus, and the theories of Kahneman and Tversky (anchoring and prospect theory).
  • Design and operations of distributed ICT systems, including telecommunications technology and distributed processing.
  • Classic reliability theory for hardware and software.
  • The theory of random graphs (networks) and their properties with particular emphasis on scale-free graphs. The main concepts of combinatorial complexity and computability are introduced.
  • Scale-free networks of the society (technical, administrative and social) and their impact on the vulnerability of the society are identified.

Teaching Methods


Form(s) of Assessment

Written exam, 3 hours

Grading Scale

Alphabetical Scale, A(best) – F (fail)

Re-sit examination

Ordinary re-sit examnination.

Coursework Requirements


Teaching Materials

Jan A Audestad, E-Bombs and E-Grenades: The Vulnerability of the Computerized Society , HiG, 2009 (Available via Fronter)

- Related articles