|Course set (UE) / Credits (ECTS) / Track / Specialization||Module :Information security management : 5 ECTS.|
|Discipline||Management Information Systems|
|Open for visitors||no|
|Laura GEORG SCHAFFNERemail@example.com|
|Working language :||English|
|Volume of contact hours :||27 h|
|Workload to be expected by the student :||108 h|
Track : Attendance
|LEARNING GOAL 1 : Students will master state-of-the-art knowledge and tools in management fields in general, as well as in areas specific to the specialized field of management.|
|Students will identify a business organization’s operational and managerial challenges in a complex and evolving environment.|
|Students will understand state-of-the-art management concepts and tools and use them appropriately.|
|Students will implement appropriate methodologies to develop appropriate solutions for business issues.|
|LEARNING GOAL 2 : Students will develop advanced-level managerial skills.|
|Students will work collaboratively in a team.|
|Students will participate in a decision-making process in a critical way.|
|Students will communicate ideas effectively, both orally and in writing, in a business context.|
|LEARNING GOAL 3 : Students will demonstrate their understanding of practices reflecting ethical, diversity and sustainable development values in business organizations.|
|Students will identify and analyze issues relating to diversity, ethics and sustainable development in their business context.|
|LEARNING GOAL 4: Students will study and work effectively in a multicultural and international environment.|
|Students will analyze business organizations and problems in a multicultural and international environment|
Securing the availability, confidentiality and integrity of information became key success factors for enterprises to create, preserve, and extend their competitiveness in the information age. Information Security is an integral part of Information Systems Management going beyond IS boundaries and touching issues of HR, Marketing or Risk Management. This course provides a comprehensive overview of relevant topics in the area starting with developing Security Management & Governance strategies, applying international Best-Practice Standards, designing Security Strategies and Architectures, explaining the logic of Security Infrastructure and learning about Security Processes. The course combines theories with practical examples, using a case study to deepen students understanding of the topic. The course will also contain a final chapter on discussing Security Ethics encouraging critical thinking while deploying security tools.
- Memorize the main theories/frameworks from InfoSec disciplines on Security Management and Governance, incl. HR Security, operational risk management etc.
- Apply the principles for design of security architectures
- Analyze Information Security Infrastructure elements to perform efficient and effective choices on their deployment.
- Generate unanswered questions that may provide fruitful venues for research
- Generate a qualitative research case study.
Session 1: Introduction :The role of Information Security in Companies
Session 2: Cyber Risk Management & Infonomics: The Value at Risk
Session 3: Security Governance
Session 4: Security Standards
Session 5: Security Strategies & Creating Security Awareness
Session 6: Privacy Design
Session 7: Outlook & Ethics
Management of Information Security, 5th Edition
Michael E. Whitman Michael J. Coles College of Business, Kennesaw State University/ Herbert J. Mattord Michael J. Coles College of Business, Kennesaw State University
ISBN-10: 130550125X | ISBN-13: 9781305501256
Laura Georg Schaffner, Information security governance: pending legal responsibilities of non-executive boards, September 2016, Journal of Management and Governance 21(4), DOI: 10.1007/s10997-016-9358-0
Behaviors such as
may lead to expulsion from the class/course.