成人大片

COMMGMT 2508 - Business Data & Cyber Security

North Terrace Campus - Semester 2 - 2021

Business Data & Cyber Security will prepare future professionals for negotiating the constantly changing use of data and information in a business world that requires constant cybersecurity awareness and vigilance. Value and vulnerability of business data for decision making and problem solving are a core focus. Information and cyber security awareness and methods are embedded throughout. Graduates of this course will have the skills required to apply cyber secure practices to their use of business data; analyse and communicate business information needs.

  • General Course Information
    Course Details
    Course Code COMMGMT 2508
    Course Business Data & Cyber Security
    Coordinating Unit Management
    Term Semester 2
    Level Undergraduate
    Location/s North Terrace Campus
    Units 3
    Contact Up to 3 hours per week
    Available for Study Abroad and Exchange Y
    Incompatible COMMGMT 7023
    Assessment Projects and reflective journal
    Course Staff

    Course Coordinator: Dr Cate Jerram

    Dr Cate Jerram
    10.34 Nexus 10
    # 34757
    cate.jerram@adelaide.edu.au
    Course Timetable

    The full timetable of all activities for this course can be accessed from .

  • Learning Outcomes
    Course Learning Outcomes
    On successful completion of this course students will be able to
    • Articulate the different roles of data, information, & knowledge in business & management.
    • Determine data and security needs to address specific business problems, and identify and communicate appropriate quality sources and resources.
    • Identify common cyber-attack vectors and the human factors that render them effective or ineffective.
    • Articulate the impacts of differing practices and legal and ethical issues around data, information and cyber security in personal, organisational, and international contexts.

    Course Mission Statement

    By the end of this course, students will have an understanding of, and have developed, strong personal and business cyber-hygiene practices and cyber-resilience understanding, and be able to communicate them.

    University Graduate Attributes

    This course will provide students with an opportunity to develop the Graduate Attribute(s) specified below:

    University Graduate Attribute Course Learning Outcome(s)
    Deep discipline knowledge
    • informed and infused by cutting edge research, scaffolded throughout their program of studies
    • acquired from personal interaction with research active educators, from year 1
    • accredited or validated against national or international standards (for relevant programs)
    1, 3, 4
    Critical thinking and problem solving
    • steeped in research methods and rigor
    • based on empirical evidence and the scientific approach to knowledge development
    • demonstrated through appropriate and relevant assessment
    2 - 4
    Teamwork and communication skills
    • developed from, with, and via the SGDE
    • honed through assessment and practice throughout the program of studies
    • encouraged and valued in all aspects of learning
    1, 2, 4
    Career and leadership readiness
    • technology savvy
    • professional and, where relevant, fully accredited
    • forward thinking and well informed
    • tested and validated by work based experiences
    1 - 4
    Intercultural and ethical competency
    • adept at operating in other cultures
    • comfortable with different nationalities and social contexts
    • able to determine and contribute to desirable social outcomes
    • demonstrated by study abroad or with an understanding of indigenous knowledges
    2 - 4
    Self-awareness and emotional intelligence
    • a capacity for self-reflection and a willingness to engage in self-appraisal
    • open to objective and constructive feedback from supervisors and peers
    • able to negotiate difficult social situations, defuse conflict and engage positively in purposeful debate
    2 - 4
  • Learning Resources
    Required Resources
    Students onsite must bring earphones and/or the ability to connect with the online class (laptop or tablet or mobile phone).

    Students will be researching and resourcing core materials, so there is no required text.

    Recommended Resources
    Will be found in the Reading Room on MyUni.
    Online Learning
    Business Data & Cyber Security is run on heutagogical principles, and is very much a research-based course, so there will be considerable online activity both in class and out.

    This is a mixed cohort class. That means there will be students attending both onsite and online only (from many time zones) simultaneously. Reminder - onsite students must bring earphones to class. As classes are delivered simultaneously to students on campus in Adelaide and to students with only online access, many classes and sessions will be delivered online. On-campus students
    must check schedules and watch announcements for sessions and classes when the academic will be online only and not in the classroom. On such occasions on-campus students are free to attend the online sessions in the class lab which remains reserved for the class as scheduled, or join online.

    When possible, sessions will be recorded. However – occasionally recordings fail. As much of the content is acquired through team research, presentation, discussion, and sharing - for the most part, online recorded sessions will not be very satisfactory replacements for live attendance, whether on-site or online.

  • Learning & Teaching Activities
    Learning & Teaching Modes
    BDCS will be taught in time blocks that will (usually) be comprised of 2-3 separate components each week of guest speakers, teaching teams, interactive lecture/workshop, and tutorial/computer lab.

    The time blocks within the 3-hour seminars are flexible, adjustable for guest speakers, and therefore erratic and unpredictable. When possible, the class will run as closely to 3 x 50 mins sessions with 10-minute breaks as can be managed - but this usually does not happen.
    Workload

    The information below is provided as a guide to assist students in engaging appropriately with the course requirements.

    The University expects full-time students (i.e. those taking 12 units per semester) to devote a total of 48 hours per week to their studies.
    • This means that students are expected to commit approximately 12 hours per week to this course (including class time and the research, collaboration, online, & study time outside of your regular classes).
    • Students are required to attend all class sessions.
    • Students are required to complete class preparation (posted in MyUni) before the start of class.
    • A considerable proportion of this course will be in team-mode. It is recognised that outside commitments can mean that team-work is challenging in terms of compatible scheduling, but much of the teamwork can be managed online, so full participation in out-of-class teamwork is expected.
    Learning Activities Summary
    The 12-week schedule is extremely flexible and subject to sudden changes, depending on availability of guest speakers. Therefore, the following is only a loose guideline, indicative of topics, but not necessarily of the order in which they will be worked. A more accurate - but still flexible - schedule can be found in the course MyUni site.

    Each of the 12 weeks will incorporate, as learning activities, a combination of some or all of:
    • Guest speaker
    • Teaching Teams
    • Workshop
    • Research and problem-solving activities
    • Class discussion and debate.
    Session Topics
    Class 1 Intro & Overview
    Data in Business
    Data Evolution
    Class 2 Provenance & Transparency
    Data & Ethical Issues
    Data and Government
    Data and Business
    Class 3 Data & Privacy
    Data Ownership & Sharing Data
    Open Data
    Class 4 Data, Technology & Platforms
    Data Analysis & Analytics
    Big Data
    Data, AI and ML
    Class 5 Data for Decision-Making: Operations
    Data for Decision-Making: Management
    Class 6 Data for Decision-Making: Strategy & Policy
    Data Strategy & Structure
    Data for Decision-Making: Future
    Class 7 Committing to Data Value
    Data at Risk
    Human Aspects of Data at Risk (HACS)
    Class 8 Common Cyber Security Attack Vectors
    Common Cyber Security Defences
    Class 9 The KAB of HACS
    Class 10 Social Engineering & Human Vulnerability to SE Attacks 1
    Class 11 Social Engineering & Human Vulnerability to SE Attacks 2
    Securing Employee Compliance to Cyber Security Policy
    Class 12 Communicating Internally:
    - Data Value & Needs
    - Cyber Security Needs

    Communicating Externally:
    - Data Value & Needs
    - Cyber Security Needs
    Swotvac Journal completion & Submission
    Specific Course Requirements
    As this class has a mixed cohort (simultaneous on-site and online students),
    • onsite students are expected to bring earphones or other means of being able to communicate with online classmates from the class lab;
    • all cohorts are expected to make the extra effort required to communicate across technological and other challenges, including consideration for students in other time zones.
    There is an extremely challenging administrative maangement load in this course, and students are required to carefully read provided instructions and course advice before contacting a course academic for information already supplied. ie:

    Before contacting a course academic with a question:
    • Read the course outline.
    • Read the assessment descriptions.
    • Read the rubrics (all the cells).
    • Read all announcements as they arrive.
    • Check the FAQ section.
    • Check past announcements.
    • Check the Discussion Boards: Course Admin and Social.
  • Assessment

    The University's policy on Assessment for Coursework Programs is based on the following four principles:

    1. Assessment must encourage and reinforce learning.
    2. Assessment must enable robust and fair judgements about student performance.
    3. Assessment practices must be fair and equitable to students and give them the opportunity to demonstrate what they have learned.
    4. Assessment must maintain academic standards.

    Assessment Summary
    Assessment Task Coll/Indiv Weighting Word Count/Time Due Learning Outcomes
    Teaching Team

    Team 30

    30 min in class

    Materials negotiated.
    To be negotiated CLO 1 - 4

    Independent Research Project

    Individual 35 Specific
    to medium.
    2pm on Friday of Week 13. CLO 1 - 4
    Reflective Journal Individual 35 13 entries weekly
    [300 - 800 words ea entry]
    Weekly at commencement of class (in personal journal site)
    and
    2 pm on Monday of week 14 (collated and submitted in Turnitin.
    CLO 1 - 4
    Assessment Related Requirements
    This course has a strong focus on collaboration without collusion.

    Collaboration (working with others, seeking help from others, helping others, using materials and sources from others - including publications, online material, classmates...) is encouraged so long as it is acknowledged.
    Collusion (using other person’s work or help, unacknowledged, with or without their consent) is considered cheating, plagiarism, dishonourable, and deserving of a Fail grade.

    Please collaborate. Acknowledge all collaboration and sources.
    Do not cheat or collude.

    Assessment Detail

    Team Teaching    30%     in-class assessment (marked individually)

    • Individuals will be allocated teams.
      • Many teams will be mixed-cohort.
    • Teams will be allocated a specific topic & delivery date.
    • Teams will document their research, planning, and materials on their team website.
    • Teams will research their specified topics.
    • Teams will determine and designate their ‘audience’.
    • Teams will plan an active / interactive session to teach their topic to the class.
    • Teams will prepare a lesson plan according to the supplied template and their designated audience’s requirements.
    • Teams will upload class preparation requirements to the class share-site at least 5 days before the class.
    • Teams will upload class materials to the class share-site before the class.
    • Teams will deliver their interactive class lived on the allocated day during class.
      • (Online students are recommended to pre-record their session as much as possible for backup against Internet difficulties on the day).
    • All individuals in each team will complete and submit an Individual Contribution to Team (IC2T) report.
      • These are confidential documents. Individuals will not discuss or share their IC2T with other team members or anyone other than the academic.
    • All individuals in teams will participate as appreciative-critical audience for other teams’ research presentations.
    • All individuals in teams will provide appreciative-critical feedback to other teams.

    Independent Research Project      35%

    Negotiated topic and medium. Final due: 2pm on Friday of Week 13.
    • Individuals will select a topic or security problem to research (from the list provided).
    • Individuals will negotiate the refined sub-topic or focused security problem with the academic.
    • Individuals will conduct secondary research on their topic [note: no primary research without prior approval].
    • Individuals will negotiate the medium by which they will report their research.
    • Individuals will create their final research report and submit through the appropriate portal for their chosen medium.
      • Written reports must be submitted through TurnItIn.
      • Reports using a non-document based medium will require a transcript submitted through TurnItIn.

    Reflective Journal      35%

    Weekly entries of 300-800 words each. Final due: 2 pm on Monday of week 14.
    Commencing in week one, each individual will maintain a reflective journal analysing, synthesising, and critiquing their learning, and reflecting on application to other courses and future employment.

    • Individuals will create a Journal page in their private website in MyUni.
    • The journal page will be named and structured according to instructions.
    • Individuals will write up their journal entry every week after the week’s class and prior to the following week’s class. Journals must be up-to-date each week or as negotiated after absence or late arrival.
      • Individuals enrolling late will watch recordings of previous classes and write journal entries on those classes.
      • Individuals who miss a week’s class will watch recordings of the missed classes and write journal entries on those classes.
    • Each entry will only briefly summarise the content and activity of the week, and will focus reflection on analysis, synthesis, and critique of their learning, on application to their other courses and future employment, and plan actions to build personal growth and self-development based on their reflection. They will also reflect on actions and activities undertaken as part of their reflection and learning.
    • Individuals will write their final (13th) entry after completing their Independent Research Project, and include a whole-of-semester’s-learning reflection in the 13th entry.
    • By the Monday of week 14, Individuals will refine and polish all 13 entries and paste, as a single document in the submission portal through Turnitin.
    Submission
    Written assessments will be submitted through Turnitin on MyUni.

    Course Grading

    Grades for your performance in this course will be awarded in accordance with the following scheme:

    M10 (Coursework Mark Scheme)
    Grade Mark Description
    FNS   Fail No Submission
    F 1-49 Fail
    P 50-64 Pass
    C 65-74 Credit
    D 75-84 Distinction
    HD 85-100 High Distinction
    CN   Continuing
    NFE   No Formal Examination
    RP   Result Pending

    Further details of the grades/results can be obtained from Examinations.

    Grade Descriptors are available which provide a general guide to the standard of work that is expected at each grade level. More information at Assessment for Coursework Programs.

    Final results for this course will be made available through .

  • Student Feedback

    The University places a high priority on approaches to learning and teaching that enhance the student experience. Feedback is sought from students in a variety of ways including on-going engagement with staff, the use of online discussion boards and the use of Student Experience of Learning and Teaching (SELT) surveys as well as GOS surveys and Program reviews.

    SELTs are an important source of information to inform individual teaching practice, decisions about teaching duties, and course and program curriculum design. They enable the University to assess how effectively its learning environments and teaching practices facilitate student engagement and learning outcomes. Under the current SELT Policy (http://www.adelaide.edu.au/policies/101/) course SELTs are mandated and must be conducted at the conclusion of each term/semester/trimester for every course offering. Feedback on issues raised through course SELT surveys is made available to enrolled students through various resources (e.g. MyUni). In addition aggregated course SELT data is available.

  • Student Support
  • Policies & Guidelines
  • Fraud Awareness

    Students are reminded that in order to maintain the academic integrity of all programs and courses, the university has a zero-tolerance approach to students offering money or significant value goods or services to any staff member who is involved in their teaching or assessment. Students offering lecturers or tutors or professional staff anything more than a small token of appreciation is totally unacceptable, in any circumstances. Staff members are obliged to report all such incidents to their supervisor/manager, who will refer them for action under the university's student鈥檚 disciplinary procedures.

The 成人大片 is committed to regular reviews of the courses and programs it offers to students. The 成人大片 therefore reserves the right to discontinue or vary programs and courses without notice. Please read the important information contained in the disclaimer.