Course Outline

MISA 503 : Informatics: Security Implications of Cross-Disciplinary Computing

Preview Workflow

Viewing: MISA 503-WW : Informatics: Security Implications of Cross-Disciplinary Computing

Last approved: Wed, 20 Jan 2016 14:09:27 GMT

Last edit: Wed, 20 Jan 2016 14:09:26 GMT

MISA 503-WW
Campus
Worldwide
College of Business (WBUAD)
MISA
503
Informatics: Security Implications of Cross-Disciplinary Computing
3
Informatics is the study of natural and engineered information systems and how people and organizations use them to leverage what they know to solve problems and create opportunities. Countering the threats and hazards that face a modern information-based organization requires the same kind of interdisciplinary approach. Many "threat actors" are using an informatics frame of mind to consider, plan and conduct their attacks; this course challenges the information systems security and decision support assurance professionals to respond by applying that same informatics paradigm across the range of organizational processes and behaviors, from risk mitigation and management to strategic, tactical and operational planning.

Technology-focused information security approaches can often leave gaps and expose systems to information risks. This course helps students recognize that the majority of the more serious gaps are caused by people failing to make or carry out effective information security and assurance governance decisions. Students will learn why it is important to re-think information security and mission assurance from more of an ecological or socio-technical perspective. Then they apply that viewpoint to develop more resilient webs of interaction with other organizations and people to create and maintain a mutually safer and more secure cyber-ecology. Students will also learn to recognize opportunities to create such communities of trust and confidence, and accept the responsibility to do so. Students will see how this enables the organization and its people to make smarter, more ethically sound choices about technologies, incident response governance, and about the education of one's staff and one's marketplace. This requires a far more interdisciplinary approach than has been customary to date, and may end up redefining the CISO's job jar as more of the Chief Risk Officer instead.

1.Understand informatics as a unifying concept, discipline and management approach.2.Apply the socio-technical view of organizations and systems to examine the changing nature of the threats, hazards and information risks that organizations face, and the synergies these have with competitive advantage.3.Compare and contrast the informatics paradigm, with traditional views of information, systems and organizational security.4.Explain how the informatics paradigm can be adopted to implement a cross­disciplinary approach to organizational mission assurance, via information assurance and risk management.5.Apply the concept of networks of trust and confidence to show how organizational mission assurance depends upon effective risk management both internal and external to the organization.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

Readings on mission assurance, information security, organizational maturity models, and other related topics will be provided to students in the classroom.
Note that outside of the health care and public health professions, the current textbook marketplace does not provide a good, solid look at the informatics paradigm or provide case studies with which that paradigm can be assessed and applied. The course textbook amply illustrates that paradigm in the health care setting; additional readings, provided in the classroom, will guide the student in applying that paradigm across a variety of other industries, professions, and mission settings.

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Mike Wills - 2/24/2015
wills004@erau.edu
Wendi Kappers - 2/24/2015
KAPPERSW@erau.edu
Aaron Glassman - 2/24/2015
glassf10@erau.edu
Dr. Bobby McMasters - 2/24/2015
mcmas245@erau.edu
PO#NameDescription
1-5 Master of Science in Information Security and Assurance 1. Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security.
2. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face.
3. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures.
4. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes.
5. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization.
Key: 328