Course syllabus

Informatics, Information Security Management - Application Areas, Second Cycle, 10.5 credits

Course code: IK437A Credits: 10.5
Main field of study: Informatics Progression: A1F
Last revised: 13/09/2023    
Education cycle: Second cycle Approved by: Head of school
Established: 01/11/2019 Reading list approved: 13/09/2023
Valid from: Spring semester 2024 Revision: 2

Learning outcomes

1. Based on theories on project management have the ability to plan a project to solve an information security problem in a specific case.

2. Be able to analyze, assess and propose relevant theories, methods, models and techniques to manage an information security problem in a specific case.

3. Be able to use relevant theories, methods, models and techniques to manage an information security problem in a specific case.

4. Be able to account for and critically reflect on the implementation of a project to solve an information security problem in a specific case, in relation to the previously chosen theories, methods, models and techniques.

Content

In the course information security skills that have been acquired earlier will be applied and developed in a project. The project is conducted in cooperation with external partners who provide problems. The project is a group assignment where focus is on planning, problem solving and proposing a solution to an information security problem. Tools for problem solving are suitable methods, models and techniques that the student have been provided with during the course of the information security education. Additional new tools may be applied depending on the case, supervision resources and agreements with the responsible teacher.

The course consists of the following modules:
1) To initiate and plan projects - scope, time plan, resource management, project quality and risk management. This entails identifying and analyzing the problem focused in the project work. (Addressing goal 1)
2) Theoretical studies. This entails theoretical studies on the basis of information security problems i a specific case. (Addressing goal 2)
3) Implementation of the proposed project, based on the earlier proposed theories, methods and tools, in a specific case. (Addressing goal 3)
4) Presentation and reflection on the implementation of the information security project in a specific case. (Addressing goal 4)

Examinations and grades

Examination 1, 1.5 credits (Code: A001)
Grades used are Fail (U) or Pass (G).

Examination 2, 2 credits (Code: A002)
Grades used are Fail (U) or Pass (G).

Examination 3, 3 credits (Code: A003)
Grades used are Fail (U) or Pass (G).

Examination 4, 4 credits (Code: A004)
Grades used are Fail (F), Sufficient (E), Satisfactory (D), Good (C), Very Good (B) or Excellent (A).


According to the Higher Education Ordinance, Chapter 6, Section 18, a grade is to be awarded on the completion of a course, unless otherwise prescribed by the university. The university may determine which grading system is to be used. The grade must be determined by a teacher specifically nominated by the university (the examiner).

In accordance with university regulations on grading systems for first and second-cycle courses and study programmes (Vice-Chancellor’s decision ORU 2018/00929), one of the following grades is to be used: fail (U), pass (G) or pass with distinction (VG). For courses included in an international master’s programme (60 or 120 credits) or offered to the university’s incoming exchange students, the A to F grading scale is to be used. The vice-chancellor, or a person appointed by them, may decide on exceptions from this provision for a specific course, if there are special grounds for doing so.

The grades used on this course are Fail (F), Sufficient (E), Satisfactory (D), Good (C), Very Good (B) or Excellent (A).

Comments on grades

For an approved final grade on the course, an approved result is required for all examinations. The letter grades A-E are weighted into a final grade based on the examinations of the entire course.

Modes of assessment

Examination 1, 1.5 credits (Code: A001)
Oral and written group presentation of project plan (Assesses goal 1)

Examination 2, 2 credits (Code: A002)
Oral and written group presentation of relevant theories, methods, models and techniques (Assesses goal 2)

Examination 3, 3 credits (Code: A003)
Oral and written presentation of solution of an information security problem (Assesses goal 3)

Examination 4, 4 credits (Code: A004)
Individual written report on the project implementation. The report is based on the work performed in parts 1.2 and 3 (Assesses goal 4)

For students with a documented disability, the university may approve applications for adapted or other modes of assessment.

For further information, see the university's local examination regulations.

Specific entry requirements

Informatics, Basic Course 30 Credits, 30 Credits at intermediate course level within Informatics and successful completion of at least 15 Credits at advanced course level within Informatics. Alternatively Business Administration, Basic Course, 30 Credits, Business Administration, Intermediate Course, 30 Credits and successful completion of at least 15 Credits at advanced course level within Business Administration. Alternatively 30 Credits within G1N in Computer Science and 45 Credits within G1F in Computer Science.

In addition, the student needs to have successfully completed at least two of the following courses: Informatics, Introduction to Information Security, Second, second cycle, 7.5 credits (A1N), Informatics, Regulatory Aspects of Information Security, second cycle, 7.5 credits (A1N), Informatics, Social Aspects of Information Security, second cycle, 7.5 credits (A1N), Informatics, Introduction to IT Security, second cycle, 7.5 credits (A1N). The applicant must also have qualifications corresponding to the course "English 6" or "English B" from the Swedish Upper Secondary School.

For further information, see the university's admission regulations.

Other provisions

The course is offered in English and therefore all examinations will be conducted in English.

Students who have been admitted to and registered on a course have the right to receive tuition and/or supervision for the duration of the time period specified for the particular course to which they were accepted (see, the university's admission regulations (in Swedish)). After that, the right to receive tuition and/or supervision expires.

Reading list and other learning resources

Required Reading

The course relies in part on literature from previous courses in the program. Additional reading can be added based on the students own searches and needs that come up during the project work.