IMT4152 Socio-technical Security Risk Modeling and Analysis 1
Expected learning outcomes
- In this course the student will build on the knowledge and skills obtained in the Socio-technical Risk Modeling and Analysis 1 course and apply them to both theoretical and empirical case studies.
- The students will be expected to go beyond surface knowledge of socio-technical security analysis to understand and be able to predict systemic security risk of ICT systems.
- The students will learn how to create and present their own case studies and scenarios in information security.
- The student is capable of analyzing existing theories, methods and interpretations in the field of information security organization and management and socio-technical modeling and working independently on solving theoretical and practical problems.
- The student can use relevant systems sciences and socio-technical theory in independent research and development in information security organization and management.
- The student is capable of performing critical analysis of various literature sources and applying them in structuring and formulating scientific reasoning information security organization and management.
- The student is capable of carrying out an independent research or case project in information security and management under supervision, following the applicable ethical rules.
- The student is capable of analyzing relevant professional and research ethical problems in information security organization and management.
- The student is capable of applying his/her information security knowledge and socio-technical modeling skills in new fields, in order to accomplish advanced tasks and projects.
- The student is capable of discussing professional problems, analyses and conclusions in the information security organization and management, both with specialists and with general audience.
- The student is capable of contributing to innovation and innovation processes in information security and socio-technical modeling and analysis for information security management.
- Socio-technical security systems modeling and analysis past present and future.
- Culture and Structure for Organizational Behavior with Information Security organization and management
- Case studies and scenario design in information security organization and management
- Example of Socio-technical security analysis, international, national, industrial.
- Strategic , Tactical and Operational Information security and Risk Management.
Teaching Methods (additional text)
Seminars will be the teaching method used in the course and will be designed help the student to both choose and discuss their individual work with the written assignment and case study in the course.
The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC’s learning management system (ClassFronter).
Form(s) of Assessment
Written exam, 3 hours
Form(s) of Assessment (additional text)
- Written exam – 3 hours, counts 50 %
- Casework – oral presentation, counts 50 %
In order to achieve a grade in the course, both parts must be passed.
Alphabetical Scale, A(best) – F (fail)
Internal examiner. An external examiner is used every 4th year. Next time in the school-year 2015/2016.
Ordinary re-sit. (Written Assignment Case Study)
Casework – must be approved. Students must participate in discussions in class and in analysing casework from other students.
Essential of Organizational Behavior, Robins and Judge , Global Edition (10)??
Information Security, Contemporary Cases, Marie Wright and John Kakalik, Jones and Bartlett Publishers
Compendium: Latest Articles on Socio-technical security analysis.
Case Study Research, Robert K Yin.
Socio-technical Design and Social Network Systems Vol 1 and Vol 2 , Brian Whitworth and Adlo de Moor.