eduglopedia.org
 1170

Information Systems

Information Systems

Summary

Luleå university of technology is located in the northern part of Sweden and Scandinavia. Luleå University of Technology is experiencing strong growth with world-leading competence in several areas of research. The university has 40 years of tradition excellent relations to the industry. Research is conducted in close cooperation with companies such as Bosch, Ericsson, Scania, LKAB, SKF and leading international universities. Luleå University of Technology has a total turnover of SEK 1,6 billion per year, have 1,700 employees and 16,000 students. 

At LTU, Information Systems (IS) is defined as an inter-disciplinary research subject, which covers design and use of information technology in relation to people, organizations and societies. IS –related research relates mainly to the strategic research area of Enabling ICT. Several research projects have recently focused on such areas as Digital Service Innovation, Information Security, and Sustainable Data and Information Management. The IS department is home to more than 10 PhD students and 10 IS researchers including 3 professors and international visiting staff.

Bachelor Programs

Digital service development programme has a close cooperation with industry which gives students the experience of working in real  projects and building future network. The programme focus on those who are interested in design, technology and economy with a focus on designing digital services of the future society. The programme rests on three legs: Design, business and technology. The programme focuses on how to make services appealing, how to do a digital service for-profit and how to create the technical platform for the digital service. Students acquire an understanding of user participation in innovation and how to involve them. This programme is only offered in the language of Swedish.

As a systems analyst, students develop, implement and improve information and communication in interaction between people, business and technology. The program can be read with an international profile and it will also remotely.  The program offers a great variation and students can choose their own profile including an international profile. As a student you learn how to develop information systems for a business, private or public. Students acquire expertise relating to programming, databases and design for different operation, but also an understanding of a business as whole and how an IT functions works. As an employee after the education, students can work with a variety of tasks depending on the profile. This programme is only offered in the language of Swedish. 

Master Programs

The program focuses in safeguarding organizational knowledge, information systems, and continuity of its ICT-services. The programme has existed since 2007 and attracts students from around the world. Students from within the EU/EEA and Switzerland will not be charged fees. Being a student in the international information security program means an active search for knowledge, problem solving, and critical analysis based on a scientific approach. The working methods vary between individual study, group work, seminars and lectures. The core courses of the program provide a socio-technical understanding of the field and the related challenges. The program also includes elective courses through which the student can specialize in security management or security engineering according to available courses and interests. The program consists of a total of 120 credits out of which 90 credits are compulsory courses at advanced level in the area of Information Security.

Courses

Master in Information Security

Lecture

The course covers the basic concepts, standards, purpose and implementation of client security architectures.  This course will give a narrow but in-depth focus, on client security architectures.  From a practical standpoint, the current state of the art is covered, which will assist the students to analyze and design security solutions.  Various scenarios will be covered and a methodology will help students apply the proper security solutions.  The future trends, from an academic and theoretical standpoint are covered, which will help the students understand what new functionality will be coming out, in the future.  The course will cover how to analyze client security architecture requirements towards an organization’s security policy.

 607
Lecture

The course will provide a general overview of different aspects of critical infrastructure protection in order to enable the students to understand the fundamental principles of this field. The course is designed to provide theoretical underpinnings as well as practical knowledge in the field of CIP, which will help to add more knowledge to student’s existing theoretical and practical skills and experiences.

 

 403
Lecture

The course (7,5 ECTS) deals with basic concepts within the area and defines the concepts knowledge and knowledge management. The creation of knowledge and the question whether all knowledge in an organization can be taken charge of and how that is possible are other important issues. The management of processes concerning the creation of new knowledge, dissemination and use of knowledge are also discussed. Considerations are also made on the use of IT for knowledge management.

The course adds a security perspective on how knowledge is used in an organization, for example competences within information security. Information and knowledge have a high accessibility in a computer-based environment; how is it possible to create and share knowledge safely and to utilize means for responding to identified knowledge security risks without losing the easiness of access to knowledge is an important question.

 301
Seminar

To be able to appreciate research and its special characteristics, different methods, models and theories focused on research and their role as guides for scientific argumentation, are discussed and used in this course. Three different approaches commonly used in information systems research will be explored: Action research, Interpretive Research, and Case Study Research. The students will develop knowledge in how to design a research approach from initial problem definition onwards to conclusions, discussions and reflections on research work. Steps in between are covered by theoretical and methodological analysis. Moreover, students will develop their skills in critical thinking and reflection on their learning process.

 442
Lecture

The course covers the basic concepts, standards, purpose and implementation of server security architectures.  The course will give a narrow but in-depth focus, on server security architectures.  From a practical standpoint, the current state of the art is covered, which will assist the students to analyze and design security solutions.  Various scenarios will be covered and a methodology will help students apply the proper security solutions.  The future trends, from an academic and theoretical standpoint are covered, which will help the students understand what new functionality will be coming out, in the future.  The course will cover how to analyze server security architecture requirements towards an organization’s security policy.  

 400
Seminar

The students are introduced to key terminology, models, concept and theories for strategic security and information systems management. Socio-technical perspectives are applied on problematic security situations and as an enabler to organizational change of attitudes and acceptance of information security. Information security and responsibilities is in this course particularly emphasized with a management perspective on technical, social, and organizational levels.

 466
Seminar

The course presents different aspects of current research and practice related to information security, by studying documents of scientific publications, field observation and through experience and perceptions of researchers and practitioners in the area. The course covers: IS research and information science prerequisites and nature; Information security research areas; Trends and debates within information security; Practitioners approach to information security and development trends

 461

People

Have you met...
People

Dr. Tero Päivärinta is Professor and Chair of Information Systems at the Luleå University of Technology, Sweden. His PhD from the University of Jyväskylä, Finland (2001), focused on enterprise document management. Before joining to the faculty at Luleå, he worked at University of Agder in 2002-2012, as a professor since 2007. Tero has published more than 70 refereed articles in international information systems conferences and journals, including European Journal of Information Systems, Information Systems Journal, Information & Organization, Information & Software Technology, JITTA, Communications of the AIS, Scandinavian Journal of Information Systems, Science of Computer Programming, and Transforming Government. His current research interests include systems and software development practices, enterprise content management, preservation of digital information, e-Government, and benefits realization of information systems. Throughout his career, Tero has worked with close interaction and joint knowledge creation with practitioners, both in industry and in the public sector.

 741

Ratings

Your rating for Information Systems

(in case you do not want to comment anonymously make sure you are logged in and uncheck this checkbox)
Overall ratings for Information Systems
 
Comments

Editors

Have you met...
People

Dr. Tero Päivärinta is Professor and Chair of Information Systems at the Luleå University of Technology, Sweden. His PhD from the University of Jyväskylä, Finland (2001), focused on enterprise document management. Before joining to the faculty at Luleå, he worked at University of Agder in 2002-2012, as a professor since 2007. Tero has published more than 70 refereed articles in international information systems conferences and journals, including European Journal of Information Systems, Information Systems Journal, Information & Organization, Information & Software Technology, JITTA, Communications of the AIS, Scandinavian Journal of Information Systems, Science of Computer Programming, and Transforming Government. His current research interests include systems and software development practices, enterprise content management, preservation of digital information, e-Government, and benefits realization of information systems. Throughout his career, Tero has worked with close interaction and joint knowledge creation with practitioners, both in industry and in the public sector.

 741
 
Feedback