Objectives and competences
Objectives:
• get acquainted with the role and definition of informatics and information security,
• get acquainted with and understand IT as a tool for achieving goals in logistics processes
• get acquainted with, understand and can explain risks, the importance of backup, the problem of computer intrusions and the problem of information security incident management,
• understand the value of protection and investments in the logistics processes implementation,
• get acquainted with and be able to use the method of assessing the quality of software solutions to support the operation of logistics processes.
Competences:
• are capable of critical handling in crisis situations (such as: failure of WMS operation in a highly computerized warehouse or from intrusion into QMS system and alienation of sensitive information or by blocking proper operation of WMS),
• are capable to critically evaluate risks and anticipate the necessary financial resources for the purpose of information security investments in order to achieve the required and appropriate information security,
• are capable to evaluate and assess the level of protection importance, for example of WMS, of which they are "owners", and are also "responsible" for,
• are capable to critically assess the value of protection (investment) in the required availability, integrity and confidentiality of information resources, which is "calculated" on the basis of risk management principles and carried out in accordance with the IT investment plan,
• are capable to evaluate and assess the software solutions quality, on the basis of which they make a decision to introduce an appropriate software solution,
• as users (and responsible persons) of software solutions are capable to critically assess all three levels of the latter: 1) software product with all its specifics, 2) the ability to operate in an (already existing) IT system and 3) the prism of user ergonomics and experience
Content (Syllabus outline)
1. Basics of informatics and information security
a) Definitions of some most used expressions from the field of informatics.
b) Using IT a a tool to achieve the organization’s goals
c) IT support operational decisions and guidance in decision-making processes.
2. Cyber security and security planning
a) Understanding risk management
b) Importance and good practices when performing backup
c) Understanding the problem of computer intrusion
d) Understanding and analyzing the problem of information security incidents
3. Investments in IT
a) Understanding It Investments In The Implementation of Logistics Processes
b) Understanding IT Investment Management with Val IT
4. Quality assessment of software solutions to support the operation of Logistics
a) Standard ISO/IEC 12207:1995 with amandments
b) Standard ISO/IEC 90003:2004
c) Standard ISO/IEC 25000:2005, ISO/IEC 25051:2006 in ISO/IEC 25062/2006
Learning and teaching methods
Theoretical lectures, practical exercises, individual work, seminar papers, moderated debates, trainings.
Lectures: students understand the theoretical frameworks of the course. Part of the lecture course is in a classroom while the rest is in the form of e-learning (e-lectures may be given via video-conferencing or with the help of specially designed e-material in a virtual electronic learning environment).
Tutorials: Students enhance their theoretical knowledge and are able to apply it. Part of the seminar is in a classroom while the rest is in the form of e-learning (e-tutorials may be given via video-conferencing or with the help of specially designed e-material in a virtual electronic learning environment).
Intended learning outcomes - knowledge and understanding
Upon completion, the student will be able to:
• comprehend and explain the importance of informatics and information security in organizations,
• recognize the importance of backup for organizations as a basic and simplest approach to ensuring the availability and integrity of information,
• dentify, explain and distinguish between risks, computer intrusions and information security incidents,
• comprehend, analyze, address, structure and manage IT investments,
• integrate, differentiate and evaluate different software solutions.
Intended learning outcomes - transferable/key skills and other attributes
Transferable /Key Skills and other attributes:
• students gain the ability to apply theoretical knowledge to practical (professional) examples.
Readings
• Jereb, B. (2019). Informatika in informacijska varnost: repetitorij (1. izd.). Univerzitetna založba; Fakulteta za logistiko. http://press.um.si/index.php/ump/catalog/book/385
• Jereb, B., Kukovič, D., & Štrubelj, G. (2015). Uporaba računalniških orodij za podporo pisarniškemu poslovanju: izbrana poglavja. Fakulteta za logistiko
• Jereb, B. (2014). Upravljanje tveganj. Univerza v Mariboru,Fakulteta za logistiko.
• Jereb, B. (2015). Večparametrski odločitveni model za logistike z dodanimi večpredstavnimi vsebinami: visokošolski učbenik z recenzijo. Fakulteta za logistiko. http://labinf.fl.uni-mb.si/vecparametrski-odlocitveni-model/
Prerequisits
No limitations
Additional information on implementation and assessment • Successful completion of e-lectures is a prerequisite for entering the exam.15%
• Successful completion of e-tutorial is a prerequisite for entering the exam.15%
• Seminar work.10%
• Written examination.60%