Expected learning outcomes
The students shall primarily understand the evolution that has taken place within ICT during the last ten years that has led us toward a vulnerable society, and what vulnerability means in such a broad context. The students shall get sufficient insight to identify, evaluate and implement countermeasures that can protect businesses and organisations.
This includes knowledge of the following items:
- how ICT systems are designed and are used in industrial production, in public and private service provision, and in the infrastructure of the society
- why ICT systems and administrative infrastructures can be described as scale-free networks and which consequences scale-freeness has on vulnerability and robustness
- classical reliability theory, including the reliability of software and networks.
- Introduction to the concept of risk as it is used in technology, insurance and finance.
- Causes of increased risk: overoptimistic belief in market growth, numerical illiteracy, insufficient knowledge of statistics and probability calculus, and the theories of Kahneman and Tversky (anchoring and prospect theory).
- Design and operations of distributed ICT systems, including telecommunications technology and distributed processing.
- Classic reliability theory for hardware and software.
- The theory of random graphs (networks) and their properties with particular emphasis on scale-free graphs. The main concepts of combinatorial complexity and computability are introduced.
- Scale-free networks of the society (technical, administrative and social) and their impact on the vulnerability of the society are identified.
Form(s) of Assessment
Written exam, 3 hours
Alphabetical Scale, A(best) – F (fail)
Ordinary re-sit examnination.
Jan A Audestad, E-Bombs and E-Grenades: The Vulnerability of the Computerized Society , HiG, 2009 (Available via Fronter)
- Related articles