Course syllabus

Informatics, Information Systems Theories, Second Cycle, 7.5 credits

Course code: IK408A Credits: 7.5
Main field of study: Informatics Progression: A1F
    Last revised: 12/03/2019
Education cycle: Second cycle Approved by: Head of school
Established: 16/11/2018 Reading list approved: 12/03/2019
Valid from: Autumn semester 2019 Revision: 1

Aims and objectives

General aims for second cycle education

Second-cycle courses and study programmes shall involve the acquisition of specialist knowledge, competence and skills in relation to first-cycle courses and study programmes, and in addition to the requirements for first-cycle courses and study programmes shall

  • further develop the ability of students to integrate and make autonomous use of their knowledge
  • develop the students' ability to deal with complex phenomena, issues and situations, and
  • develop the students' potential for professional activities that demand considerable autonomy, or for research and development work.

(Higher Education Act, Chapter 1, Section 9)

Course objectives

After completion of the course the students shall
1. Understand concepts of science and it's philosophical directions in information systems research.
2. Understand the role of theories in research.
3. Be able to theorize information systems and IT artefacts.
4. Reflect on the relevance of socio-technical perspectives and theories in information systems research.

Main content of the course

The course is comprised of following four modules :

1. Overview of philosophy of science and major philosophical directions, with special reference to information systems research. In this module, students will be introduced to the basic concepts of philosophical science, its branches and the major philosophical assumptions, such as positivism, interpretivism, critical, pragmatism with examples from information systems research. (Addressing goal 1).

2. Exploration of the nature of theory, and types of theories in information systems research. (Addressing goal 2).

3. Introducing the characteristics of the information systems and IT artefacts and its applications in information systems research. Here, students will theorize information systems and IT artefacts and reflect on how they are understood during the design process. (Addressing goal 3).

4. Examining the relevance of socio-technical perspectives and theories in information systems research. This also includes investigating merits and shortcomings of socio-technical perspectives and theories. (Addressing goal 4).

Teaching methods

The course combines different teaching methods where the purpose is to activly engage the students in discussions, and critical thinking. The employed teaching methods are anchored in flipped classroom and case-based learning. The flipped classroom means focusing on exploring topics in greater depth and creating meaningful learning opportunities in class time, while content delivery is made outside of the classroom. Case-based learning means that scenarios from research are used to as a point of departure for in class activities and assignments. In this course the focus will be on seminar activities, student presentations and active discussion. Student will present a brief analysis of chosen research articles. Hence, the students will take part in co-creation of course content.

The course employs seminar-based teaching, with literature discussions. Students will do presentations of socio-technical perspectives and theories and their role for information systems research. Students will also analyse research papers in which key theories are used. This is combined with lectures, where students will actively discuss with the presenters, based on their reading of the papers. Students will also do individual written assignments, which will be an analysis of two articles from the course literature.

Students who have been admitted to and registered on a course have the right to receive tuition and/or supervision for the duration of the time period specified for the particular course to which they were accepted (see, the university's admission regulations (in Swedish)). After that, the right to receive tuition and/or supervision expires.

Examination methods

Examination 1, 1 credits (Code: A001)
Overview of philosophy of science and major philosophical directions. Individual, active participation in seminars, where students discuss/debate by taking the stance of different theoretical perspectives of the given research papers.

Examination 2, 2 credits (Code: A002)
Introduction to theory, types of theories in information systems research, including socio-technical perspectives. Presentations by student groups.

Examination 3, 1.5 credits (Code: A003)
Introduction to information systems and IT artefacts and their applications in research. Presentations on the assigned papers by student groups.

Examination 4, 3 credits (Code: A004)
Written examination. Individual analysis of assigned articles.


For students with a documented disability, the university may approve applications for adapted or other forms of examinations.

For further information, see the university's local examination regulations (in Swedish).

Grades

According to the Higher Education Ordinance, Chapter 6, Section 18, a grade is to be awarded on the completion of a course, unless otherwise prescribed by the university. The university may prescribe which grading system shall apply. The grade is to be determined by a teacher specifically appointed by the university (an examiner).

According to regulations on grading systems for first- and second-cycle education (vice-chancellor's decision 2019-01-15, ORU 2019/00107), one of the following grades is to be used: fail, pass, or pass with distinction. The vice-chancellor or a person appointed by the vice-chancellor may decide on exceptions from this provision for a specific course, if there are special reasons.

Grades used on course are Fail (U), Pass (G) or Pass with Distinction (VG).

Examination 1
Grades used are Fail (U) or Pass (G).

Examination 2
Grades used are Fail (U) or Pass (G).

Examination 3
Grades used are Fail (U) or Pass (G).

Examination 4
Grades used are Fail (U), Pass (G) or Pass with Distinction (VG).

For further information, see the university's local examination regulations (in Swedish).

Comments on grades

In order to be awarded the grade Pass, the student has to get Pass on all examination parts. In order to be awarded Passed with Distiniction, the student has to be awarded the grade Pass with Distinction on Examination 4 as well as Pass on all other examination parts.

The final grade will be translated into the ECTS grading scale.

Specific entry requirements

Informatics, Basic Course 30 Credits, 30 Credits at intermediate course level within Informatics and successful completion of at least 15 Credits at advanced course level within Informatics. Alternatively Business Administration, Basic Course, 30 Credits, Business Administration, Intermediate Course, 30 Credits and successful completion of at least 15 Credits at advanced course level within Business Administration. Alternatively 30 Credits within G1N in Computer Science and 45 Credits within G1F in Computer Science.

In addition, the student need to have at least 15 Credits of courses in information security that corresponds to successful completion of at least 15 Credits in the first semester of the Master's Programme in Information Systems - Information Security Management i.e. successful completion of at least 15 Credits of courses: Informatics, Introduction to Information Security, Second, second cycle, 7.5 credits (A1N), Informatics, Regulatory Aspects of Information Security, second cycle, 7.5 credits (A1N), Informatics, Social Aspects of Information Security, second cycle, 7.5 credits (A1N), Informatics, Introduction to IT Security, second cycle, 7.5 credits (A1N). The applicant must also have qualifications corresponding to the course "English 6" or "English B" from the Swedish Upper Secondary School.

For further information, see the university's admission regulations (in Swedish).

Transfer of credits for previous studies

Students who have previously completed higher education or other activities are, in accordance with the Higher Education Ordinance, entitled to have these credited towards the current programme, providing that the previous studies or activities meet certain criteria.

For further information, see the university's local credit transfer regulations (in Swedish).

Other provisions

Remaining tasks should be completed as soon as possible according to the teacher's instructions.

Reading list and other teaching materials

Required Reading

Braa, Kristin & Vidgen, Richard (1999)
Interpretation, intervention and reduction in the organizational laboratory: a framework for in-context information systems research
Information and Organization, 9(1): 25-47 [Article in periodical]

Dhillon, Gupreet & James Backhouse (2005)
Current directions in IS security research: towards socio-organizational perspectives
Information Systems Journal, Vol. 11, pp. 127-153. [Article in periodical]

Gregor, Shirley (2006)
The nature of theory in Information Systems
MIS Quarterly, Sep2006, 30(3), 611-642 [Article in periodical]

Hirschheim, Rudy & Klein, Heinz K. (1989)
Four Paradigms of Information Systems Development
Communications of the ACM, Vol. 32, Issue 10, pp. 1199-1216 [Article in periodical]

Lee, Allen, Thomas, Manoj & Baskerville, Richard (2015)
Going back to basics in design science: from the information technology artifact to the information systems artifact
Info Systems Journal. Vol 25, 5-21 [Article in periodical]

Mingers, John & Leslie P Willcocks (2005)
Social Theory and Philosophy of Information Systems
Wiley, ISBN/ISSN: 978-04-70-01121-8, 472 pages

Orlikowski , Wanda & Lacono, Suzanne (2001)
Research Commentary: Desperately Seeking the 'IT' in IT Research--A Call to Theorizing the IT Artifact
Information Systems Research, 2001, 12(2), 121- 135 [Article in periodical]

Sutton, Robert & Staw, Barrt (1995)
What Theory is Not
Administrative Science Quarterly, 1995, 40(3), 371-384 [Article in periodical]

Weick, Karl (1995)
What theory is not, theorizing is
Administrative Science Quarterly, 1995, 40(3), 385-390.5 [Article in periodical]

Additional Reading

Alter, Steven (2015)
The concept of 'IT artifact'has outlived its usefulness and should be retired now
Information Systems Journal 25.1 (2015): 47-60 [Article in periodical]

Iivari, Juhani (2016)
Information system artefact or information system application: that is the question
Information Systems Journal [Article in periodical]

Matook, Sabine & Susan A. Brown (2016)
Characteristics of IT artifacts: a systems thinking-based framework for delineating and theorizing IT artifacts
Information Systems Journal [Article in periodical]

Additions and Comments

The course teacher(s) will suggest additional reasearch papers. Approximately 50 pages. Additional mandatory reading will also be added in relation to the lectures. Approximately 50 pages.