Notice
As part of Phase 3 of our return to campus plan, most units will now run tutorials, seminars and other small group activities on campus, and most will keep an online version available to those students unable to return or those who choose to continue their studies online.
To check the availability of face-to-face and online activities for your unit, please go to timetable viewer. To check detailed information on unit assessments visit your unit's iLearn space or consult your unit convenor.
Unit convenor and teaching staff |
Unit convenor and teaching staff
Unit Convenor and Lecturer
Ali Amrollahi
Moderator
Yvette Blount
|
---|---|
Credit points |
Credit points
10
|
Prerequisites |
Prerequisites
ACCG250 or ACCG2050 or PICT201 or PICT2001
|
Corequisites |
Corequisites
|
Co-badged status |
Co-badged status
|
Unit description |
Unit description
Every person in an organisation is responsible for safe guarding customer data in this era of increasing cyber threats. This unit is designed for students to gain an understanding of the regulatory environment, governance (including cyber governance) and ethical issues relating to cyber security. The objective of the unit is for students to understand the governance and ethical issues in the constantly evolving cyber security environment created by new digital technologies. |
Information about important academic dates including deadlines for withdrawing from units are available at https://www.mq.edu.au/study/calendar-of-dates
On successful completion of this unit, you will be able to:
Late Submission(s): Late assessment must also be submitted through Turnitin. No extensions will be granted. There will be a deduction of 10% of the total available marks made from the total awarded mark for each 24 hour period or part thereof that the submission is late (for example, 25 hours late in submission incurs a 20% penalty). Late submissions will not be accepted after solutions have been discussed and/or made available. This penalty does not apply for cases in which an application for Special Consideration is made and approved. Note: applications for Special Consideration Policy must be made within 5 (five) business days of the due date and time.
Name | Weighting | Hurdle | Due |
---|---|---|---|
Class Participation | 10% | No | Each week |
Report | 40% | No | 23:59 Friday of Week 6 |
Debate | 10% | No | 23:59 Friday of Week 8 |
Critical assessment of new technologies | 40% | No | 23:59 Friday of Week 13 |
Assessment Type 1: Participatory task
Indicative Time on Task 2: hours
Due: Each week
Weighting: 10%
Students are expected to actively participate in class discussions and activities. The quality of participation will be assessed by staff using the criteria outlined in the assessment guide.
Assessment Type 1: Report
Indicative Time on Task 2: 35 hours
Due: 23:59 Friday of Week 6
Weighting: 40%
Students will write a report to the Senior Executive team on how contextual elements of a business, including human resources and organisational culture can contribute to an information security program. Students will be given a collection of internal corporate documents which they will have to analyse to determine the long-term security objectives. The students will prepare a written report which they upload to iLearn.
Assessment Type 1: Debate
Indicative Time on Task 2: 20 hours
Due: 23:59 Friday of Week 8
Weighting: 10%
Students will debate a current cyber security business problem / challenge. Students will prepare a 6-10 minute video of their ethical, financial and legal arguments for- or against- the matter and upload their video to iLearn. Each student will then be randomly allocated to another (opposing) student’s video and have 24-hours to prepare a 3-5 minute rebuttal video which they will also upload to iLearn.
Assessment Type 1: Report
Indicative Time on Task 2: 35 hours
Due: 23:59 Friday of Week 13
Weighting: 40%
Students will apply governance and ethical frameworks to critically assess a proposal to introduce disruptive technologies into a business. The report should cover both information security and ethical aspects of the new technology
1 If you need help with your assignment, please contact:
2 Indicative time-on-task is an estimate of the time required for completion of the assessment task and is subject to individual variation
Required Text: |
Whitman, Michael E., and Herbert J. Mattord. Management of information security (6th Edition). Cengage, 2018. |
Unit Web Page: |
available on iLearn |
Technology Used and Required: |
Students will require access to a computer and to the Internet so as to undertake research and to prepare their answers for their assessment tasks. You will need a mobile phone with a camera or a GoPro (or equivalent) to record your debate videos. Software: iLearn, VLC Media Player, Microsoft Office, Adobe Acrobat Reader, Internet Browser, Email Client Software, Adobe Premiere Pro can be used to edit videos. |
Delivery format and other details: |
The timetable for classes can be found on the University website at: http://timetables.mq.edu.au Students must attend all tutorials. Students must attend the tutorial in which they are enrolled and may not change tutorials without the prior permission of the course convenor. |
Recommended Readings: |
There are many cybersecurity sources of information online. A few worth looking at include:
|
Other Course Materials: |
Will be made available on iLearn |
Week 1 |
Introduction |
Week 2 |
Governance Frameworks and Standards (1) |
Week 3 |
Governance Frameworks and Standards (2) |
Week 4 |
Culture and People |
Week 5 |
Information security policy |
Week 6 |
Security program |
Week 7 |
Analysing Cyber Risks |
Week 8 |
Treating Cyber Risks |
Week 9 |
Legal and Compliance |
Week 10 |
Cybersecurity Ethics |
Week 11 |
Security maintenance and technologies |
Week 12 |
Current Issues and future trends in Cybersecurity |
Week 13 |
Review and Conclusion |
Macquarie University policies and procedures are accessible from Policy Central (https://policies.mq.edu.au). Students should be aware of the following policies in particular with regard to Learning and Teaching:
Students seeking more policy resources can visit Student Policies (https://students.mq.edu.au/support/study/policies). It is your one-stop-shop for the key policies you need to know about throughout your undergraduate student journey.
To find other policies relating to Teaching and Learning, visit Policy Central (https://policies.mq.edu.au) and use the search tool.
Macquarie University students have a responsibility to be familiar with the Student Code of Conduct: https://students.mq.edu.au/admin/other-resources/student-conduct
Results published on platform other than eStudent, (eg. iLearn, Coursera etc.) or released directly by your Unit Convenor, are not confirmed as they are subject to final approval by the University. Once approved, final results will be sent to your student email address and will be made available in eStudent. For more information visit ask.mq.edu.au or if you are a Global MBA student contact globalmba.support@mq.edu.au
Macquarie University provides a range of support services for students. For details, visit http://students.mq.edu.au/support/
Learning Skills (mq.edu.au/learningskills) provides academic writing resources and study strategies to help you improve your marks and take control of your study.
The Library provides online and face to face support to help you find and use relevant information resources.
Students with a disability are encouraged to contact the Disability Service who can provide appropriate help with any issues that arise during their studies.
For all student enquiries, visit Student Connect at ask.mq.edu.au
If you are a Global MBA student contact globalmba.support@mq.edu.au
For help with University computer systems and technology, visit http://www.mq.edu.au/about_us/offices_and_units/information_technology/help/.
When using the University's IT, you must adhere to the Acceptable Use of IT Resources Policy. The policy applies to all who connect to the MQ network including students.