Expected learning outcomes
- The students shall primarily understand the socio-technical ICT evolution that has taken place over the last thirty years, and that has also led to a widening vulnerability gap between what we can do with ICT and what we can cost effective control with ICT.
- The students have developed a broad systems theory perspective connected to practical cases so they will have the insight to understand past present and current trends in cyber crime.
- The student is capable of analyzing existing theories, methods and interpretations in the field of information security and socio-technical modeling and the individual, organization, national and international level.
- The student can use relevant systems sciences and socio-technical theory in independent research and development in information security .
- The student is capable of applying his/her information security and forensics knowledge and skills in new fields, in order to accomplish advanced tasks and projects.
- The student is capable of discussing professional problems, analyses and conclusions in the information security organization and management, both with specialists and with general audience.
- The student is capable of contributing to innovation and innovation processes in information security, and socio-technical modeling and analysis for information security, forensic readiness and incident response.
- Introduction to Systems Thinking, and Socio-technical modeling and analysis
- Technology adoption, security and cybercrime
- Overview of the information-security landscape and cybercrime trends
- How to conduct a security root-cause analysis of a crime within an organization or business.
- Strategic, Tactical and Operational areas in Information security organization and risk Management.
Teaching Methods (additional text)
Others (Essay/Article writing)
Others (Independent study)
Lectures will be held to review the most important aspects of the reading material. Exercises will be used to discuss case work.
The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement.
The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC’s learning management system (ClassFronter).
Form(s) of Assessment
Written exam, 2 hours
Form(s) of Assessment (additional text)
- Written exam – 2 hours, counts 50 %
- Assessment of the written essay/article, counts 50 % (the student will conduct a simple socio-technical analysis)
In order to achieve a grade in the course, both parts must be passed.
Alphabetical Scale, A(best) – F (fail)
Evaluated by an internal examiner. An external examiner will be used every 4th year.
Re-sit August 2016 for the Written exam.
The following literature are the primary references
- Systems Thinking, System Dynamics: Managing Change and Complexity (2007) by Kambiz E. Maani, Robert Y. Cavana, 2 Ed Pearsons, ISBN-10: 1877371033 | ISBN-13: 978-1877371035
- Roadmap to Information Security: For IT and Infosec Managers (2011) by Michael E. Whitman, Herbert J. Mattord, Cengage Learning, 1 Ed, ISBN-10: 1435480309, ISBN-13: 978-1435480308
- Presentation material, compendium and selected papers
This course is based on and overlapping the existing IMT4152 Socio-technicalSecurity Risk Modeling and Analysis 1.