EM4S4M05
Program
PGE
PGE 2A - Marketing digital
PGE 2A - Marketing digital
UE
Information security management
Semester
B
Discipline
Information systems management
Contact hours
27 H
Number of spots
45
Open to visitors
Yes
Language

Coordinator
Laura GEORG SCHAFFNER

List of lecturers
Lecturer(s) | Contact hours - lecture | |
---|---|---|
Laura GEORG SCHAFFNER | laura.g.schaffner@em-strasbourg.eu | 27 h |
Pedagogical contribution of the course to the program
LEARNING GOAL 1 : Students will master state-of-the-art knowledge and tools in management fields in general, as well as in areas specific to the specialized field of management. |
---|
Students will identify a business organization’s operational and managerial challenges in a complex and evolving environment. |
Students will understand state-of-the-art management concepts and tools and use them appropriately. |
Students will implement appropriate methodologies to develop appropriate solutions for business issues. |
LEARNING GOAL 2 : Students will develop advanced-level managerial skills. |
Students will work collaboratively in a team. |
Students will communicate ideas effectively, both orally and in writing, in a business context. |
LEARNING GOAL 3 : Students will demonstrate their understanding of practices reflecting ethical, diversity and sustainable development values in business organizations. |
Students will identify and analyze issues relating to diversity, ethics and sustainable development in their business context. |
LEARNING GOAL 4: Students will study and work effectively in a multicultural and international environment. |
Students will analyze business organizations and problems in a multicultural and international environment |
Description
Securing the availability, confidentiality and integrity of information became key success factors for enterprises to create, preserve, and extend their competitiveness in the information age. Information Security is an integral part of Information Systems Management going beyond IS boundaries and touching issues of HR, Marketing or Risk Management. This course provides a comprehensive overview of relevant topics in the area starting with developing a real-life security framework incl. Security Management & Governance strategies, applying international Best-Practice Standards, designing Security Strategies and Architectures, explaining the logic of Security Infrastructure and learning about Security Processes. The course combines theories with practical examples, using a case study to deepen students understanding of the topic. The course will also contain a final chapter on discussing Security Ethics encouraging critical thinking while deploying security tools.Teaching methods
Face-to-face
- Lectures- E-learning
- Other :
In group
- Exercises- Oral presentations
- Projects
- Case studies/texts
Interaction
- Discussions/debates- Games (educational, role play, simulation)
Others
No items in this list have been checked.Learning objectives
Cognitive domain
Upon completion of this course, students should be able to- - (level 1) Memorize the main theories/frameworks from InfoSec disciplines on Security Management and Governance, incl. HR Security, operational risk management etc.
- - (level 3) Apply the principles for design of security architectures
- - (level 3) produce a qualitative research case study.
- - (level 4) Analyze Information Security Infrastructure elements to perform efficient and effective choices on their deployment.
- - (level 5) Generate unanswered questions that may provide fruitful venues for research
Affective domain
Upon completion of this course, students should be able toNone affective domain have been associated with this course yet
Outline
Session 1: Introduction :The role of Information Security in Companies Session 2: Cyber Risk Management Session 3: Infonomics: The Value at Risk Session 4: CISO in Practice Session 5: Security Governance & Metrics Session 6: Global Security Standards Session 7: Security Strategies & Creating Security Awareness Session 8: Privacy Design w/ RGPD Session 9: Outlook & EthicsNo prerequisite has been provided
Knowledge in / Key concepts to master
None.Teaching material
Mandatory tools for the course
- Computer- Other :
Documents in all formats
- Newspaper articles
- Case studies/texts
Moodle platform
- Upload of class documents- Interface to submit coursework
- Assessments
Software
No items in this list have been checked.Additional electronic platforms
No items in this list have been checked.Recommended reading
Course Book: Management of Information Security, 6th Edition Michael E. Whitman Michael J. Coles College of Business, Kennesaw State University/ Herbert J. Mattord Michael J. Coles College of Business, Kennesaw State University ISBN-10: 130550125X | ISBN-13: 9781305501256 592 Pages
No reading material has been provided.
EM Research: Be sure to mobilize at least one resource
Textbooks, case studies, translated material, etc. can be enteredLaura Georg Schaffner, Information security governance: pending legal responsibilities of non-executive boards, September 2016, Journal of Management and Governance 21(4), DOI: 10.1007/s10997-016-9358-0
Assessment
List of assessment methods
Intermediate assessment / continuous assessment 1Class no. 2,3,4,5,6,7
Written (10 Min.) / Individual / English / Weight : 50 %
Details : Each session starts with a short quiz in moodle revisiting the content of the previous session as well as posing questions on the prepared material of the class of the day. Unexcused absences result in a reduction of 1 pt of the final grade. Excused absences can be compensated through bonus questions from quizzes of other sessions.
This evaluation is used to measure LO1.1, LO1.2, LO1.3, LO3.1
Written (10 Min.) / Individual / English / Weight : 50 %
Details : Each session starts with a short quiz in moodle revisiting the content of the previous session as well as posing questions on the prepared material of the class of the day. Unexcused absences result in a reduction of 1 pt of the final grade. Excused absences can be compensated through bonus questions from quizzes of other sessions.
This evaluation is used to measure LO1.1, LO1.2, LO1.3, LO3.1
Intermediate assessment / continuous assessment 2Class no. 2,3,4,5,6,7
Written and oral (20 Min.) / Group / English / Weight : 50 %
Details : Groups of minimum of 2 students present their results of an ongoing course project at every session. The presentation must be made available to the class 2 days before the session.
This evaluation is used to measure LO1.1, LO1.2, LO1.3, LO2.1, LO2.3, LO4.2
Written and oral (20 Min.) / Group / English / Weight : 50 %
Details : Groups of minimum of 2 students present their results of an ongoing course project at every session. The presentation must be made available to the class 2 days before the session.
This evaluation is used to measure LO1.1, LO1.2, LO1.3, LO2.1, LO2.3, LO4.2