data protection and data security · intellectual property and how they are transformed by...

23
DATA PROTECTION AND DATA SECURITY Name of Lecturer: Assoc. prof. dr. D. Štitilis Faculty: Social Informatics Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Master Year of Study (if applicable): Not applicable Required prerequisites: None Learning Outcomes of the Course Unit: to understand the concept of privacy and personal data protection and legal regulation; to be aware of the main principles of personal data protection; to analyze and apply legal norms in the field of privacy and personal data protection; to be aware of legal data security issues. ECTS credits: 4,5 Contact hours per week: 3 Semester: Spring Planned Learning Activities and Teaching Methods: lectures, workshops and practical assignments. Assessment methods and Criteria: accumulative mark (consisting of written work, seminar evaluation and exam evaluation). Course content: Legal aspects of the protection of computer information are a compulsory subject of the speciality. Aim of the subject to provide knowledge about the legal aspects of privacy and personal data 9 protection, also legal aspects of ensuring confidentiality, integrity and availability of computer information (data security). Students are introduced to the concept of privacy and personal data protection. Relevant regulatory instruments regarding personal data protection in international and EU level are analyzed. The main principles of personal data protection are presented. Focus is made on legal issues of personal data protection in electronic communication sector (including internet), data protection in the judiciary sector, data protection in the workplace and other areas. General principles and concepts of data security are presented. Legal regulation of data security is analyzed as well as the recommendations on this issue provided by the European Union, OECD and international guidelines. Current situation of data security norms in European countries as well as in Lithuania is presented. Focus is made on legal regulation of data security in public and in private sector. Also, some technical and organisational ways to protect computer information are discussed. Reading list: (maximum 5 items) 1. Kuner C. European Data Protection Law. – Oxford: Oxford University Press, 2007. 2. Baibridge D. Data protection. – Emis Professional pub., 2005. 3. OECD Guidelines for the Security of Information Systems and Networks: Towards A Culture Of Security, 2002 // http://www.oecd.org 4. Data protection – European Commission // http://ec.europa.eu/justice_home/fsj/privacy/index_en.htm 5. Petrauskas R., Štitilis D., Rotomskis I., Paškauskas Z. International Legislative Regulation Provisions Concerning the Security of Information Systems and Information. Implementation of the Provisions in Lithuania. - Databases and Information Systems: Seventh International Baltic Conference on Databases and Information Systems. Communications, Materials of Doctoral Consortium. Vilnius, Technika, 2006. ISBN 9955- 28-013-1.

Upload: others

Post on 28-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

DATA PROTECTION AND DATA SECURITY

Name of Lecturer: Assoc. prof. dr. D. Štitilis Faculty: Social Informatics Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Master Year of Study (if applicable): Not applicable Required prerequisites: None Learning Outcomes of the Course Unit: to understand the concept of privacy and personal data protection and legal regulation; to be aware of the main principles of personal data protection; to analyze and apply legal norms in the field of privacy and personal data protection; to be aware of legal data security issues. ECTS credits: 4,5 Contact hours per week: 3 Semester: Spring Planned Learning Activities and Teaching Methods: lectures, workshops and practical assignments. Assessment methods and Criteria: accumulative mark (consisting of written work, seminar evaluation and exam evaluation). Course content:

Legal aspects of the protection of computer information are a compulsory subject of the speciality. Aim of the subject to provide knowledge about the legal aspects of privacy and personal data 9 protection, also legal aspects of ensuring confidentiality, integrity and availability of computer information (data security). Students are introduced to the concept of privacy and personal data protection. Relevant regulatory instruments regarding personal data protection in international and EU level are analyzed. The main principles of personal data protection are presented. Focus is made on legal issues of personal data protection in electronic communication sector (including internet), data protection in the judiciary sector, data protection in the workplace and other areas. General principles and concepts of data security are presented. Legal regulation of data security is analyzed as well as the recommendations on this issue provided by the European Union, OECD and international guidelines. Current situation of data security norms in European countries as well as in Lithuania is presented. Focus is made on legal regulation of data security in public and in private sector. Also, some technical and organisational ways to protect computer information are discussed. Reading list: (maximum 5 items)

1. Kuner C. European Data Protection Law. – Oxford: Oxford University Press, 2007. 2. Baibridge D. Data protection. – Emis Professional pub., 2005. 3. OECD Guidelines for the Security of Information Systems and Networks: Towards A

Culture Of Security, 2002 // http://www.oecd.org 4. Data protection – European Commission //

http://ec.europa.eu/justice_home/fsj/privacy/index_en.htm 5. Petrauskas R., Štitilis D., Rotomskis I., Paškauskas Z. International Legislative Regulation

Provisions Concerning the Security of Information Systems and Information. Implementation of the Provisions in Lithuania. - Databases and Information Systems: Seventh International Baltic Conference on Databases and Information Systems. Communications, Materials of Doctoral Consortium. Vilnius, Technika, 2006. ISBN 9955-28-013-1.

Page 2: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

CYBERCRIMES

Name of Lecturer: Assoc. prof. dr. D. Štitilis Faculty: Social Informatics Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Master Year of Study (if applicable): Not applicable Required prerequisites: None Learning Outcomes of the Course Unit: to understand the concept of cybercrimes and legal regulation; to be aware of the main features and types of cybercrimes; to analyze and apply legal norms in the field of cybercrime; to be aware of cybercrime prevention measures. ECTS credits: 6 Contact hours per week: 3 Semester: Autumn Planned Learning Activities and Teaching Methods: lectures, workshops and practical assignments. Assessment methods and Criteria: accumulative mark (consisting of written work, seminar evaluation and exam evaluation). Course content:

Cybercrimes and their investigation is an elective subject of the speciality. The subject aims at providing the knowledge on specific types of crimes: investigation of crimes for informatics and prevention thereof.

Students are introduced to the concept of the cybercrimes, their features, types, the planning of crime investigation is analysed as well as the phases of investigation. To ensure better learning of the material, an introduction is made to the ways of crime performance and its subjects. Analysis is made of the risks of the cyber crimes and caused damage. Legal regulation of the cyber crimes is analysed in the international level, in Lithuania and other foreign countries. Concept of digital evidences is presented, the problems pertaining to the assurance of their authenticity and origin, the specifics of collection and evaluation of digital evidences, possibilities of difficulties for searching of evidences, measures for avoiding them. Emphasis is made on the measures to prevent cybercrimes and the theoretical and practical aspects of their use in Lithuania and in the international context. Reading list:

1. Higgins G.E. Cybercrime: An Introduction to Emerging Phenomenon. – McGraw Hill, New York, 2010.

2. Brenner S.W. Cybercrime: Criminal Threats from Cyberspace. – Library of Congress, 2010. 3. Britz M.T. Computer Forensic and Cybercrime. – Upper Saddle River, New Yersey, 2009. 4. Coops B.J, Brenner S.W. Cybercrime and Jurisdiction: a Global Survey. – The Hague:

T.M.C. Asser Press, 2006. 5. Convention on Cybercrime, Budapest, 2001 // http://conventions.coe.int.

MODELS OF ELECTRONIC GOVERNMENT SERVICES

Name of Lecturer: Assoc. prof. dr. T. Limba Faculty: Social Informatics

Page 3: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): Not applicable Required prerequisites: None Learning Outcomes of the Course Unit: Capabilties to present the main models of electronic government, to analyze these models trough the different aspects of technological and management integration, to understand the practical use of the models for national ant local governance. ECTS credits: 4,5 Contact hours per week: 3 Semester: Spring Planned Learning Activities and Teaching Methods: lectures, workshops and practical assignments Assessment methods and Criteria: 30% of final evaluation consist the activities and participation during the seminars and workshops, written examination - 70% of final evaluation. Course content:

The models of electronic government services, that are created and being analyzed by worldwide scientists, aim at seeking solutions and their alternatives for more efficient public services provision. The years of establishment of the models being analyzed in this course reflecting the recent development trends of models of electronic government services show that the subject matter of the models of electronic government services is relevant and fairly new worldwide. Issues and their solutions concerning the efficient electronic government services provision occur worldwide and are stressed in this course. In many countries the models that are identified only hardly coordinate with the models of electronic government services or separate fragments of such models being applied in central and local self-government levels. That’s why the main reason and also the aim of this course – is to analyze in detail the recent models of electronic government services, the results of a survey of their implementation possibilities and disclose new, improved and more effective models of electronic government services that can meet the needs of customers better while providing electronic government services. Reading list: 1. CHEN, H., BRANDT, L., GREGG, V., TRAUNMULLER, R. (2008). Digital Government. E-

Government Research, Case Studies and Implementation. Springer Science+Business Media. p. 737 (ISBN-13: 978-0-387-71610-7)

2. CALDER, A., WATKINS, S. (2008). IT Governance. 4th edition. Saxon Graphics Ltd. p. 373. 3. GOLDKUHL, G.; PERSSON, A. (2006). Characteristics of Public E-services: Investigating the

E-diamoned Model. Accespted to the First International Pragmatic Web Conference, September. Stuttgart, Germany, p. 54–79.

4. GOLDKUHL, G.; PERSSON, A. (2006). From e-ladder to e-diamond – re-conceptualising models for public e-services. Proceedings of the 14

th European Conference on Information

Systems, Göteborg, p. 117–132.

5. BECKER, J.; ALGERMISSEN, L.; NIEHAVES, B. (2005). Processes in E-Government focus: A procedure model for process oriented reorganisation in public administration on the local level. Accepted to the First International Pragmatic Web Conference, September, p. 87–103.

ENTREPRENEURSHIP AND TECHNOLOGY

Name of Lecturer: Prof. dr. Mindaugas Kiškis Faculty: Social Informatics

Page 4: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Master Year of Study (if applicable): 1st year Required prerequisites: None Learning Outcomes of the Course Unit: The students shall learn about the concepts of entrepreneurship and how they are applied in practice. The students shall learn advanced methods how to identify economic opportunities, how to generate and evaluate business ideas. Skills for business plan development and advanced strategy exercise are provided. The students shall also develop skills to acknowledge capital sources and overseeing basic business processes. ECTS credits: 6 Contact hours per week: 3 Semester: Autumn Planned Learning Activities and Teaching Methods: lectures, workshops. online activities. Assessment methods and Criteria: accruing evaluation; written assignments contribute to final evaluation. Course content:

Technological entrepreneurship is emerging as the advanced form of entrepreneurship, which is one of the key activities in the modern society. Aim of this subject is to provide advanced knowledge on how the technologies affect and enable entrepreneurship, as well as specialized skills on developing technology oriented entrepreneurial ventures. The subject focuses on developing advanced practical skills in launching and evaluating technology based business ventures, fine-tuning specific technology oriented business models and strategies. The course covers technological intraprenership, advanced business process management in entrepreneurial technology ventures. Peculiarities for technology, especially internet based businesses, are reviewed and analysed. In addition, the newest scholarly work on technological entrepreneurship is presented. Reading list:

1. Thomas N. Duening, Robert A. Hisrich, Michael A. Lechter. Technology Entrepreneurship: Creating, Capturing, and Protecting Value. New York: Aspen, 2009.

INNOVATION AND INTELLECTUAL PROPERTY

Name of Lecturer: Prof. dr. Mindaugas Kiškis Faculty: Social Informatics Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): from 2nd year (2, 3 or 4 year) Required prerequisites: None Learning Outcomes of the Course Unit: The students shall learn about the phenomena of innovation and intellectual property, how they are interrelated and what role they play in the modern society. The students shall learn how to acknowledge and protect innovation, how intellectual property rights protect and defend innovation, what are vehicles and incentives for innovation. The students also develop skills to recognize intellectual property, as well as general creativity and innovation skills. ECTS credits: 6 Contact hours per week: 3

Page 5: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

Semester: Autumn Planned Learning Activities and Teaching Methods: lectures, workshops. online activities. Assessment methods and Criteria: accruing evaluation; written assignments contribute to final evaluation. Course content: Phenomena of innovation and intellectual property play central role in the modern knowledge society. The course focuses on providing basic understanding of these phenomena, including critical assessment of basic concepts, prevailing theories, survey of research into the social roles, as well as essential practical applications thereof. Students shall learn how to acknowledge innovation, what means and tools are available for fostering and protecting different innovations, what are intellectual property rights and what role they play in innovation processes, what other alternative protection mechanisms are available. The course focuses on both macro (societal) and micro (enterprise or individual) level and reviews different innovation techniques, vehicles and incentives for innovation. The students also develop skills to recognize valuable intellectual property, choose proper legal vehicle for protecting it, as well as general creativity and innovation skills. Reading list: 1. Christine Greenhalgh, Mark Rogers. Innovation, Intellectual Property, and Economic Growth. Princeton University Press, 2010.

INTELLECTUAL PROPERTY IN CYBERSPACE

Name of Lecturer: Prof. dr. Mindaugas Kiškis Faculty: Social Informatics Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Master Year of Study (if applicable): 1st year Required prerequisites: None Learning Outcomes of the Course Unit: The students shall learn about the basic concepts of intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic intellectual property, how to protect and to defend it. The students also develop skills to match legal and technical protection measures for intellectual property. ECTS credits: 6 Contact hours per week: 3 Semester: Autumn Planned Learning Activities and Teaching Methods: lectures, workshops. online activities. Assessment methods and Criteria: accruing evaluation; written assignments contribute to final evaluation. Course content:

Protection of intellectual property rights in cyberspace is one of the key areas faced by knowledge society. Aim of this subject is to provide specialised knowledge on the transformations of intellectual property and importance within the knowledge society, changes of the traditional forms for protection of intellectual property rights in the electronic environment, the principles for harmonisation, as well as non-legal protection forms thereof. The subject analyses the transformation of intellectual property institutes in the information society and disintegration in cyberspace. The course covers cyberspace implications of copyrights and related rights, as well as

Page 6: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

the industrial property. Violations to the intellectual property rights online, including file sharing, P2P, hacking etc., the basic forms of digital property, such as software, databases, content of the Internet and the ways and peculiarities for their legal protection are analysed. In addition, the newest intellectual property paradigms e.g. alternative intellectual-information property rights concepts and compensation systems are reviewed in a critical way.

Reading list: 1. Robert P. Merges, Peter S. Menell, Mark A. Lemley. Intellectual Property in the New Technological Age (5rd ed.). New York: Aspen, 2009.

BASIC ENTREPRENEURSHIP

Name of Lecturer: Prof. dr. Mindaugas Kiškis Faculty: Social Informatics Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): from 2nd year (2, 3 or 4 year) Required prerequisites: None Learning Outcomes of the Course Unit: The students shall learn about the basic concepts of entrepreneurship and how they are applied in practice. The students shall learn how to identify economic opportunities, how to generate and evaluate business ideas. Skills for business plan development and basic strategy exercise are provided. The students shall also develop skills to acknowledge capital sources and overseeing basic business processes. ECTS credits: 6 Contact hours per week: 3 Semester: Autumn Planned Learning Activities and Teaching Methods: lectures, workshops. online activities. Assessment methods and Criteria: accruing evaluation; written assignments contribute to final evaluation. Course content:

Entrepreneurship is one of the key activities in the modern society. Aim of this subject is to provide basic knowledge on how the technologies affect and enable entrepreneurship, as well as skills on developing technology oriented entrepreneurial ideas into successful business ventures. Emphasis on personal development and starting a business venture is provided. The subject focuses on developing basic practical skills in generating and evaluating technology centered business ideas, with specific focus on e-business development, launching an e-business websites, using of existing e-business platforms. The course covers technological implications to launching a new online business, as well as becoming more creative and innovative within the current engagement (going business). Peculiarities for technology, especially internet based businesses, are reviewed and analysed. Reading list:

1. Bruce R. Barringer, Duane Ireland. Entrepreneurship: Successfully Launching New Ventures (3rd Edition). Prentice Hall, 2009.

Page 7: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

LEADERSHIP IN INFORMATION SOCIETY

Name of Lecturer: dr. A. Skaržauskienė Faculty: Social Informatics

Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): Not applicable

Required prerequisites: None Learning Outcomes of the Course Unit:

On successful completion of this course the student will be able to:

• identify their personal leadership style, their group leadership style, and how to work with others effectively in a group setting.

• build their personal confidence level when working with others, networking, speaking in public, and presenting themselves to others

• create personal vision, values and goals.

ECTS credits: 6 Contact hours per week: 4 Semester: Autumn/Spring Planned Learning Activities and Teaching Methods: Class discussions, case study, guest speakers, modelling situations, games, cinemalogy, presentations, practical speech giving, social project. Assessment methods and Criteria: Essay, Presentation of selected topic Course content: This program explores leadership as a personal journey of discovery. By integrating current research with experiential activities, this program provides unique perspectives on students individual leadership style. The participants will gain proven techniques and best practices to help better manage and develop teams, handle adversity, and enhance your leadership potential. Leadership in Information Society course is an interactive course designed to give an understanding of the complexity and dynamics of being a leader in knowledge and information society. The main objective of the course is to develop qualities necessary for today’s leader and to give very practical insights in works and challenges of today’s leaders. Analyzing the successes and failures of real-life companies, the students will learn how to anticipate, evaluate, and proactively respond to external shifts, while examining how to balance innovation with performance. At the end of this course, a student should have a deeper knowledge about challenges of leaders in todays`s business landscape What is more, a student should develop one’s leadership skills and create personal Leadership development plan. Reading list: 1. Goleman, Daniel, Boyatzis, Richard, McKee, Annie, Primal leadership realizing the power of emotional intelligence, Boston: Harvard Business School Press, 2002, 2. Kellerman, Barbara, Bad leadership: what it is, how it happens, why it matters, Boston, Mass: Harvard Business School Press, 2004, 3. Kets de Vries, M.F.R .The Leadership Mystique. London: Pearson Education, 2001 4. Conger, Jay A., Kanungo, Rabindra N., Charismatic leadership in organizations, Thousand Oaks: SAGE Publications, 2003.

Page 8: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

CLUSTER MANAGEMENT TECHNOLOGIES

Name of Lecturer: dr. A. Skaržauskienė Faculty: Social Informatics

Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Bachelor/Master Year of Study (if applicable): Not applicable

Required prerequisites: None Learning Outcomes of the Course Unit:

It is expected that students will: - be able to promote knowledge in the area of competitiveness through Clusters Initiatives, with special emphasis on the European Union and increasing globalization - point out innovative methods and new technologies in cluster management. ECTS credits: 6 Contact hours per week: 4 Semester: Autumn/Spring Planned Learning Activities and Teaching Methods: Self-explanatory teaching methodology supported by cases, World-café discussions, Cinemalogy, Networked studies, Case studies, Practical implication of Methodology (game), Institutional visits Assessment methods and Criteria: Development of case study Course content: Clusters have become a prevalent component of national and regional economic development plans. Cluster policies and programs are now emerging in all corners of the world, bringing more resources and legitimacy to cluster construction. Clusters Initiatives, which take a wide variety of forms, are now an accepted part of economic development. The concept of clusters has emerged as a central idea in competitiveness and economic development over the latest decade in EU. The reasons for cluster formation and the benefits of clusters for productivity and innovation are becoming better known. Experimentation with new cluster management technologies and new types of partnerships linking industry clusters-government-academia is now going on around the world. A large and growing body of case studies has documented clusters, their characteristics, and their evolution over time. Purpose of the course is to get in-depth understanding of the topic and discuss cluster management initiatives and technologies in different countries.

Reading list: 1. Landabaso, M. (2002). Cluster in Less Favoured Regions: policy options in planning and implementation. Unpublished paper, EU Commission, DG REGIO B3, Brussels. 2. Porter, M.E. (1990). The Competitive Advantage of Nations. London, Macmillan. 3. Porter, M.E.; Stern, S. (2001). Innovation: Location Matters. MIT Sloan Management Review. 4. Sölvell, Ö.; Lindqvist, G.; Ketels, C. (2003) The Cluster Initiative Greenbook Stockholm: Ivory Tower, www.cluster-research.org. http://www.intercluster.eu http://www.cluster-excellence.eu/ http://www.clusterobservatory.eu/ http://www.proinno-europe.eu/node/

Page 9: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

E-COMMERCE LAW

Name of Lecturer: Assoc. prof. dr. I. Rotomskis Faculty: Social Informatics Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): 2-5 Required prerequisites: None Learning Outcomes of the Course Unit:

It is expected that student will: Be able to promote understanding legal environment of e-commerce. Be able to analyze the legal processes of e-commerce Be able to apply legal norms in the relations arising from e-commerce

ECTS credits: 6 Contact hours per week: 3 Semester: Autumn Planned Learning Activities and Teaching Methods: lectures, workshops. Assessment methods and Criteria: Individual papers, presentation on selected topics, discussion and active participants Course content:

Legal regulation of the electronic commerce and electronic signature is a compulsory subject for the speciality. Aim of the subject is introduce students to the electronic commerce as well as the ways of communication between the contracting parties. Special attention is given to the aspects of legal regulation of electronic commerce, to the experience of the European Union states and international organisations in regulating the contractual relations in the electronic environment. Principles for legal regulation of electronic commerce are analysed as well as the application of principles of the international private law for electronic commerce, the economic and technological assumptions. Students are familiarised with the peculiarities of legal regulation of electronic commerce: form of an electronic contract, legal recognition of electronic data notifications, participants in electronic commerce, their obligations and responsibility, international nature of electronic commerce. Special focus is made on the peculiarities of electronic signature, its legal regulation and it value of evidencing. Introduction is made to the legal regulation for signing of electronic documents in the world context and in Lithuania. Special attention is paid to the taxation of electronic commerce. Reading list: 1. Forder J., Svantesson D. Internet and e-commerce law. – New York: oxford University Press, 2008. – 264 p. 2. United Nations Commission on International Trade Law (UNCITRAL) Model Law on Electronic Commerce with Guide to Enactment. 1996 and 2001 versions. http://www.uncitral.org/en-index.htm 3. Mann R. J., Winn J. K. Electronic commerce. New York. Aspen Law & Business, 2005 4. GUIDEC General Usage for International Digitally Ensured Commerce. http://www.iccwbo.org/home/guidec/guidec.asp 5. Schneider G.P. Electronic Commerce. Thompson/Course technology, 2006

Page 10: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

ICT IMPLEMENTATION IN HEALTHCARE SECTOR (E-HEALTH)

Name of Lecturer: Rasa Juciūtė - Rotomskienė Faculty: Social Informatics Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Masters Year of Study (if applicable): N/a Required prerequisites: None Learning Outcomes of the Course Unit: general awareness of organisational change and peculiarities of technological change in healthcare sector; ability to understand ICT implementation in a wider organisational context, gained insights for critical thinking of ICT implementation in the public sector ECTS credits: 6 Contact hours per week: 3 Semester: Spring Planned Learning Activities and Teaching Methods: lectures and workshops Assessment methods and Criteria: participation and an effective work at workshops (30%) and an exam (70%). Course content: An overall aim of the subject is to introduce students to organisational change in general and the specifics of technological change in healthcare organisations in particular. Plenty of recent paradoxical evidence suggests that even substantial investments into ICTs for health, does not necessarily result in desired organisational changes or deliver expected benefits and therefore ‘return on investments’ (in their broadest meaning) as an ultimate goal. Here it is worth to remember that usually the technology, systems and processes can be changed at will without any adverse reaction from the technology or systems. Reaction to change, however, comes from the people involved, and dealing with those people to secure effective, managed change is the most difficult part of the change management process. Learning content of the subject will cover an overview of the e-Health development at EU and the national levels of the EU member states, organising and organisational change theories, peculiarities of the implementation of large and complex ICTs projects in healthcare sector, change complexity and sustainability aspects and technological change management approaches as well as analysis of national e-health strategies and processes in selected EU member states. It is expected that the subject will equip students with knowledge and specific insights enabling to build broader understanding of organisational change context for healthcare and so contribute to the overall development of critical thinking in the area concerned. Reading list: 1. Buchanan, D. A., Fitzgerald, L., & Ketley, D. (1997). The Sustainability and Spread of

Organisational Change. Routledge Taylor & Francis Group. 303 p. 2. Green, M. & Crowther, D. (2006). Organisational theory. Charted Institute of Personnel and development. 205 p. 3. Harrison, A. (2001). Making the Right Connections. King’s Fund Publishing. 205 p. 4. The Challenges of Complex IT Projects. The report of a working group from The Royal Academy of Engineering and The British Computer Society, April 2004, Published by The Royal Academy of Engineering. http://www.bcs.org/upload/pdf/complexity.pdf (Accessed 17.01.2011.) 5. Achieving Efficiency improvements in the Health Sector through the Implementation of

Information and Communication Technologies. (2010). Final Report. OECD. Directorate for

Page 11: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

Employment, Labour and Social Affairs. http://ec.europa.eu/health/eu_world/docs/oecd_ict_en.pdf (Accessed 17.01.2011.).

ICT IMPLEMENTATION IN ORGANISATIONS

Name of Lecturer: Rasa Juciūtė - Rotomskienė Faculty: Social Informatics Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Masters Year of Study (if applicable): N/a Required prerequisites: None Learning Outcomes of the Course Unit: general awareness of organisational change and peculiarities of technological change in organisations; ability to understand ICT implementation in a wider organisational context, gained insights for critical thinking of ICT implementation in the public sector ECTS credits: 6 Contact hours per week: 3 Semester: Spring Planned Learning Activities and Teaching Methods: lectures and workshops Assessment methods and Criteria: participation and an effective work at workshops (30%) and an exam (70%). Course content: An overall aim of the subject is to introduce students to organisational change in general and the specifics of technological change in organisations in particular. Plenty of recent paradoxical evidence suggests that even substantial investments into ICTs in the public sector, does not necessarily result in desired organisational changes or deliver expected benefits and therefore ‘return on investments’ (in their broadest meaning) as an ultimate goal. Here it is worth to remember that usually the technology, systems and processes can be changed at will without any adverse reaction from the technology or systems. Reaction to change, however, comes from the people involved, and dealing with those people to secure effective, managed change is the most difficult part of the change management process. Learning content of the subject will cover organising and organisational change theories, peculiarities of the implementation of large and complex ICTs projects, specifics that is presupposed by ICTs-led changes in the private as well as the public sector, complexity and sustainability aspects and technological change management approaches. It is expected that the subject will equip students with knowledge and specific insights enabling to build broader understanding of organisational change context and so contribute to the overall development of critical thinking in the field concerned. Reading list: 1. Buchanan, D. A., Fitzgerald, L., & Ketley, D. (1997). The Sustainability and Spread of

Organisational Change. Routledge Taylor & Francis Group. 303 p. 2. Green, M. & Crowther, D. (2006). Organisational theory. Charted Institute of Personnel and development. 205 p. 3. Ennals, R. (1995). Executive Guide to Preventing Information Technology Disasters. Spinger-Verlag Limited. 187 p.

Page 12: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

4. The Challenges of Complex IT Projects. The report of a working group from The Royal Academy of Engineering and The British Computer Society, April 2004, Published by The Royal Academy of Engineering. http://www.bcs.org/upload/pdf/complexity.pdf (accessed 17.01.2011.) 5. Dunleavy, P., Margetts, H., Bastow, S., and Tinkler, J. (2008) Digital Era Governance: IT

Corporations, the State, and E-Government. Oxford University Press. 290 p.

E-GOVERNMENT AND E-DEMOCRACY

Name of Lecturer: prof. dr. R. Petrauskas Faculty: Social Informatics Department, Contact Details: Electronic business, [email protected] Language of instruction: English Level of Course Unit: Bachelor or Master Year of Study (if applicable): Not applicable Required prerequisites: None Learning Outcomes of the Course Unit:

At the end of the course students will be able: • to understand main terms and to describe e-government and e-democracy development and

principles; • to define impact of information-communication technologies on public sector

modernization; • to analyze e-government and e-democracy implementation aspects and future perspectives.

ECTS credits: 6 Contact hours per week: 3 Semester: Spring Planned Learning Activities and Teaching Methods: lectures, discussions, case study, workshops. Assessment methods and Criteria: accumulative mark (consisting of written work and exam evaluation). Course content: E-Government terms, definitions, models and historical background of e-Government phenomena. Integration of modern ICT for better governance. Analysis of e-Government strategies, e. public services delivery. E-signature, interoperability and citizens portals for e-government. Good practice examples and benchmarking of e-Government.: similarities and disparities between countries in developing e-Government. ICT and political processes, definition, main principles of e-democracy. Models, tools and problems of e-participation, digital divide, e-inclusion, e-accessibility. Public e-consultations, e-forums, e-petitions, e-voting and e-elections. Good practice examples in e-democracy. Use of web 2.0 (blogs, wikis, social networks etc.) technologies in e-Democracy domain. Future of e-Government and e-Democracy: scenarios and research agenda. Reading list: 1. Richard Heeks. Implementing and Managing e-Government. SAGE Publications Ltd, 2006. 2. Roadmapping eGovernment research: visions and measures towards Innovative Governments in 2020: results from the EC-funded Project eGovRTD2020, IST-2004-027139 / Cristiano Codagnone and Maria A. Wimmer (editors). Via San Lucio : eGovRTD2020 Project Consortium, 2007 3. USA e-Government strategy. White House, USA, 2002. www.usa.gov/Topics/Includes/Reference/egov_strategy.pdf

Page 13: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

4. Subhash Bhatnagar. Unlocking E-Government Potential SAGE Publications Inc 2009. 5. Enciclopedia of digital government. Eds.Ari-Veikko Anttiroiko, Matti Malkia. Idea Group Reference, Hershey, London, Melbourne, Singapore 2007.

INFORMATION MANAGEMENT

Name of Lecturer: prof. dr. d. Dzemydienė Faculty: Social Informatics

Department, Contact Details: Informatics and Software systems, [email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): Not applicable

Required prerequisites: None Learning Outcomes of the Course Unit: Knowing and mastering of applications of data bases and information management systems and information communication technologies application domains of specialities (e.g. for public administration and legal information domains), applied web services and information systems with search engines possibilities in internet and intranet and in portal infrastructure. ECTS credits: 6 Contact hours per week: 2 Semester: Autumn/Spring Planned Learning Activities and Teaching Methods: Lectures and practical work with computer programs Assessment methods and Criteria: test, colloquium, practical works with computers and examination Course content: (up to 10 sentences)

The proper selection of information technologies and the skills of their mastering allow us to realize up-to date management more efficiently. The Course is devoted to introduce with advantages and challenges of information and communication technologies and information systems for management.

Students will have special theoretical knowledge about changes of information management using new information technologies and practical work with information analysis and decision making techniques. Special attention is given to applications of data bases and information management systems for public administration and legal information domains; web services and interoperable information systems with portal infrastructure for distance collaboration for management and governance; internet service providers; geographical information systems; wireless technologies and their applications in public administration; computer’s programs for analyzing web data. Reading list: (maximum 5 items) 1. Mike Chapple. Your Guide to Databases. 2006. http://databases.about.com/mbiopage.htm 2. Baltzan P., Phillips A. Business Driven Information Systems. McGraw-Hill/Irwin. 2008, p. 455. 3. Wiig, K. M. People – Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success. Elsevier Inc.2004, p. -312. 4. Evans B. Business technology: Sweet Home. Information Week. 2005. 5. Cliff T. Ragsdale. Spreadsheet Modeling and Decision Analysis: A practical Introduction to

Page 14: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

Management Science. 4edition. USA: South-Western Thomson Learning. 2004.

BASICS OF SOFTWARE PROGRAMMING

Name of Lecturer: lecturer Ramūnas Dzindzalieta, prof. dr. Dalė Dzemydienė Faculty: Social Informatics

Department, Contact Details: Informatics and Software Systems, [email protected]; [email protected] Language of instruction: English

Level of Course Unit: Bachelor Year of Study (if applicable): Not applicable

Required prerequisites: None

Learning Outcomes of the Course Unit:

Students completing this course unit should:

Have a clear understanding of the basic principles of the Java programming language Be able to design and code small Java programs, Be able to test and debug simple Java programs. Have a clear understanding of the need for a development process. ECTS credits: 6 Contact hours per week: 3

Semester:Spring Planned Learning Activities and Teaching Methods: lectures, workshops and practical assignments, distance learning, networked learning. Assessment methods and Criteria: Assessment of Learning outcomes

Learning outcome is assessed by examination. Learning outcome is assessed by examination and in the laboratory. Course content:

This course is designed for software programming backgrounds. We need to express our algorithms in a way the computer can understand them. Algorithm design and analysis can help for business informatics students. We need to create algorithms and analyze them. Students for careers are introducing in system and network programming, computer architecture design, scientific and engineering applications, and software development. An algorithm is a set of instructions, or recipe, for solving a problem. Computer Science is the study of algorithms for solving problems. The core area of studying is software programming is one of the main subjects in computer science. Software programming is important for students of informatics, as well as of business informatics. The programming language will be learning is Java in the course, which is relatively new (Sun released the first version in May, 1995). Java is an example of a high-level language; other high-level languages you might have heard of are Pascal, C, C++. The course consists of :

1. An Introduction to Java Programming . 2. Object-Oriented Programming and Java

3. Java Basics 4. Working with Objects 5. Arrays, Conditionals, and Loops

Page 15: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

6. Creating Classes and Applications in Java

7. Packages and Interfaces 8. Methods 9. Threads 10. Exceptions 11. Java Applet / Swing Basics 12. Managing Simple Events and Interactivity

13. User Interfaces with the Java Abstract Windowing Toolkit 14. Graphics, Fonts, and Color 15. Multithreading

For the practical consideration of programming such as language basics (including variable, arrays, date types, operators, and control flows) how to write the classes, interfaces and inheritance (describe the way in which you can derive one class from another, how a subclass can inherit fields and methods from a super class) and an introduction to the swing graphic user interface (GUI) toolkit. Reading list:

1. Doug Lea, Concurrent Programming in Java™: Design Principles and Pattern, 2nd Edition, ISBN-13: 978-0-201-31009-2, Prentice Hall, 2000 2. Joshua Bloch, Effective Java, 2nd Edition, ISBN-10: 0-321-35668-3, Prentice Hall, 2008 3. David J. Eck, Introduction to Programming Using Java, Fifth Edition, 2009 4. Title: Introduction to Java programming (6th edition) Author: Liang, Y. Daniel ISBN:

0132221586 Publisher: Pearson Education Edition: 6th Year: 2006 5. Title: Absolute Java (3rd edition) Author: Savitch, Walter J.ISBN: 0321505042 Publisher: Pearson Education Edition: 3rd Year: 2007 6. Lippman S. B., Lajoie J., Moo B. „C++ Primer“. Addison-Wesley Professional, 2005, p.-

912 7. Skiena S. S. Revila M. A. Programming challenges. Springer. 2003, p. -359.

BUSINESS AND FINANCE INFORMATION SYSTEMS

Name of Lecturer: prof. dr. D. Dzemydiene, lecturer M. Kalinauskas Faculty: Social Informatics Department, Contact Details: Informatics and Software Systems, [email protected]; [email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): Not applicable Required prerequisites: None Learning Outcomes of the Course Unit:

� Student is able to explain working principles with different types of information systems. � Student is able describe relationships between different types of information systems. � To explain the importance of financial data in organization

Page 16: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

� To draw business process schemes � To describe IS application areas in organization. � To solve practical problems related with business process management � To use web-based information systems and databases in order to find financial data. � To calculate the cost of IS adoption in organization. To measure its effectiveness. � To use different business IS applications in practice.

ECTS credits: 6 Contact hours per week: 3 Semester: Spring Planned Learning Activities and Teaching Methods:

40% of study time is dedicated for lectures, 60% of study time is dedicated for individual work (individual studies, seminars, workshops, distant learning environments). Specific features of information search on the Internet will be covered on lectures, practical assignments and presentations will be done on seminars and workshops. Some specific tasks will take place in distant learning information systems.

Assessment methods and Criteria: Knowledge and skills are measured on the basis of: • Independent work of students while working with financial databases. • The results of seminars. Ability to draw business process schemes. To find the bottlenecks

in process flow. • The quality of performance at the workshops on the reference of presenting certain topics

about social aspects of financial and business IS usage in organization. Course content:

The course of Business and Finance Information Systems is designed for innovative students who want to know more about business oriented technologies and their technological, managerial and social impacts. Information systems, specified software applications, databases are essential in nowadays organization. Only fast, flexible and technologically advanced organizations can gain competitive advantage in global business environment. Global nature of the internet combined with powerful databases and information systems allows people to access information more quickly, store massive amounts of data on the web, to facilitate exchange of information. Sometimes it is hard to find specific informational resources in this enormous digital space. Information systems help to distribute information among different organization levels, to filter it or to make better managerial decisions according to the output data of business oriented applications. Modeling business processes and knowing fundamentals of databases helps students to understand the complexity and variety of ways how nowadays business gain its benefits by implementing various IT elements into organization. Finance data are crucial to the effective workflow of organizations daily processes. All levels of business information systems use finance information as a core element for measuring company’s productivity. The main aim of the course is to introduce student to various aspects of finance and business information systems in the company by applying different types of information systems. Reading list: 1. Barry, Chriss. Information systems development: challenges in practice, theory, and education. New York (N.Y.) : Springer, 2009. 2. Kelly Rainer, Jr., Efraim Turban. Introduction to information systems. Hoboken (N.J.) : John Wiley, 2009. 3. John Jeston, Johan Nelis. Business process management : practical guidelines to successful implementations. Amsterdam : Elsevier : Butterworth-Heinemann, 2008. 4. Pressman R. Software Engineering: A Practitioner’s Approach. –6th edition., McGraw Hill, 2005. 5. Baltzan P., Phillips A. Business Driven Information Systems. McGraw-Hill/Irwin. 2008.

Page 17: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

BUSINESS INFORMATION TECHNOLOGIES

Name of Lecturer: Prof. Dr. Dalė Dzemydienė, Marius Kalinauskas Faculty: Social Informatics

Department, Contact Details: Informatics and Software Systems, [email protected], [email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): not applicable

Required prerequisites: none Learning Outcomes of the Course Unit:

� Student is able to explain information flow in different levels of organization. � Student is able explain differences among different types of information systems. � To define term of information technology in the context of business environment. � To draw business process schemes � To describe IT application areas in organization. � To solve practical problems using spreadsheet programs and database management systems. � To use E-business software in the company. � To use internet resources in business optimization (e-marketing, Search engine

optimization). ECTS credits: 6 Contact hours per week: 3 Semester: Autumn Planned Learning Activities and Teaching Methods:

40% of study time is dedicated for lectures, 60% of study time is dedicated for individual work (individual studies, seminars, workshops, distant learning environments). Specific features of information search on the Internet will be covered on lectures, practical assignments and presentations will be done on seminars and workshops. Some specific tasks will take place in distant learning information systems.

Assessment methods and Criteria: Knowledge and skills are measured on the basis of: • Independent work of students while working with databases, their ability to integrate them

with other IT applications. • The results of seminars. Ability to draw business process schemes. • The quality of performance at the workshops on the reference of presenting certain topics

about social aspects of IT usage in business Course content:

Usage of information technologies in business environment has become one of the crucial factors which allowed companies to increase their productivity, profits and competitive abilities. Nevertheless, the potential of technical and managerial innovations is still growing, therefore qualified specialists are needed to design, create and maintain IT products for business. Course of business information technologies covers two main aspects: Knowing and understanding which technologies and innovations have biggest impact in today’s business and prospective in nearby future, plus practical plot of sophisticated business related applications creation and planning. Students will learn project management and budget planning skills, leadership techniques, basic legal knowledge of creating and developing IT projects, also certain methods of software planning, architectural components layout, maintenance organizing and product related problem solving. Some aspects of telecommunication technologies, internal and external networks and business-driven information systems will be covered as well.

Page 18: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

Reading list: 1. George Beekman, Michael J. Quinn, Mike Quinn. Tomorrow's Technology and You,

Complete, Prentice Hall, 2007. 2. P. Rob, C. Coronel. Database Systems: Design, Implementation and Management, Course

Technology Ptr., 2006. 3. Zoran Stojanovic. Flexible Enterprise Distributed Systems Development. Vilnius. Technika,

2006. 4. Pressman R. Software Engineering: A Practitioner’s Approach. –6th edition., McGraw Hill,

2005. 5. Baltzan P., Phillips A. Business Driven Information Systems. McGraw-Hill/Irwin. 2008.

DATA STRUCTURES AND ALGORITHMS

Name of Lecturer: lecturer Mykolas Okulič-Kazarinas, assistant Dainius Dzindzalieta Faculty: Social Informatics Department, Contact Details: Informatics and Software Systems, [email protected],

[email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): not applicable Required prerequisites: none Learning Outcomes of the Course Unit:

On successful completion of the course student should be able to: Understand common data structures and algorithms Understand algorithm representation schemes Understand some fundamental typical algorithms (ordering etc.)

ECTS credits: 6 Contact hours per week: 2 Semester: Autumn/Spring Planned Learning Activities and Teaching Methods: lectures, workshops and practical

assignments, distance learning Assessment methods and Criteria:

Programming exercises, Examination Course content:

Data structures and algorithms is one of the main subjects in computer science, as well it is useful for students of business informatics, since it provides the link between a computer and the user. In the course various data structures and algorithms are considered and their usage in business is shown. The interesting implementation of data structures and algorithms is compared among some different programming languages, so that the student can understand the main ideas. Nowadays, the graph theory is getting more and more important, so the introduction to graph theory, it's terminology, operations with graphs, graph storage structures and networks is given. For the practical consideration of data structures such as arrays, linear linked lists, trees and the practical usage in business, games, animation and etc. is considered. Various types of sorting and searching techniques such as bubble, selection, insertion, binary sort.

Reading list:

Page 19: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

1. Michael T. Goodrich, and Roberto Tamassia. Data Structures & Algorithms in Java. Fourth edition. Hoboken, New Jersey: John Wiley & Sons, 2006. ISBN-13 978-0-471-73884-0 http://ww0.java4.datastructures.net/

2. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest. Introduction to algorithms.

MIT Press, McGraw-Hill in Cambridge, Mass, New York, 1999. ISBN-10 0262031418 http://openlibrary.org/books/OL18372918M/Introduction_to_algorithms

3. Cliff T. Ragsdale. Spreadsheet Modeling and Decision Analysis: Practical Introduction to Management Science, 2000.

4. A. Aho, J. Hopkroft, J. Ulman. Data structures and algorithms Addison-Wesley 2004 5. Michael T. Goodrich, and Roberto Tamassia. Data Structures & Algorithms in Java, fifth

edition. Hoboken, New Jersey: John Wiley & Sons, 2010. ISBN-13 978-0-470-38326-1.

MANAGEMENT OF TECHNOLOGICAL INNOVATION

Name of Lecturer: Dr. Austė Kiškienė Faculty: Social Informatics

Department, Contact Details: Informatics and Software Systems, [email protected] Language of instruction: English Level of Course Unit: Master degree studies Year of Study (if applicable): Not applicable Required prerequisites: Student must have basic knowledge in the field of business management and economics. Learning Outcomes of the Course Unit:

Students will improve their knowledge in the field of: • technology transfer and commercialisation (models and methods); • product (and services) development models and methods; • practical application of technological innovation management techniques in business

activities; • management of innovative projects.

ECTS credits: 6 Contact hours per week: 3 Semester: Autumn/Spring Planned Learning Activities and Teaching Methods: Lectures, seminars, group and individual work Assessment methods and Criteria: The assessment of this course consists of the cumulative score for the student's work during the seminars (40 % of the final assessment) and a written exam (60 % of the final assessment). Seminars’ score is based on the evaluation of student’s individual report (on a topic from the course program) and his/hers active participation in discussions and group work. During final exam student has to answer two questions from the course program. Course content: Objective of the course is to provide students with the knowledge on technological innovation management theory and practical implementation of technological innovation in organizations. Course content is comprehensive and has an interdisciplinary structure. The course deals with theoretical aspects of technological innovation management, discusses the basic concepts and processes. It analyzes the management of technological innovation, such components as technology

Page 20: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

transfer, knowledge-based economy, technological innovation, technological innovation-friendly environment and others. The practical dimension of the course focuses on real case studies and team project work. The course also deals with the state's role in promoting technological innovation in business enterprises. Course aims to equip students with theoretical and practical knowledge of specific innovative activity, in which the main source of innovation is scientific or technological knowledge. Students will acquire skills in practical application of technological innovation management techniques in business activities, know and be able to choose the proper method of technology acquisition, know and be able to ensure the proper implementation of technological innovations in business enterprise, will be able to manage innovative projects.

Reading list: (maximum 5 items) 1. Shilling M. A. Strategic management of technological innovation. Boston: McGraw Hill, 2005. 2. O’Sullivan D, Dooley L. Applying innovation. Thousand Oaks; London: SAGE Publications, 2009. 3. Galavan R, Murray J., Markide C (eds.). Strategy, Innovation and Change: Challenges for Management. Oxford; New York: Oxford University Press, 2008. 4. Speser P. L. The Art and Science of Technology Transfer. Wiley, 2006. 5. Shane S. Academic Entrepreneurship. University Spinoffs and Wealth Creation. Edward Elgar Publishing Limited, 2005.

NETWORKED ORGANIZATIONS

Name of Lecturer: Dr. Saulius Norvaišas Faculty: Social Informatics Department, Contact Details: Informatics and Software Systems, [email protected]

Language of instruction: English Level of Course Unit: Bachelor degree studies Year of Study (if applicable): 2 Required prerequisites: None Learning Outcomes of the Course Unit:

Explain the role of Organizations in a Networked Era

Understand main principles of networked organization management Know how to organize and develop anonymous self managing team

ECTS credits: 6 Contact hours per week: 3 Semester: Spring Planned Learning Activities and Teaching Methods:

Lectures, seminars, group and individual work Assessment methods and Criteria:

Anonymous brainstorming project participation assessment Course content:

The combined forces of the Internet, global communication, and advances in information technology make the form of networked organization more feasible, effective and necessary. The aim of the course is to introduce main principles of networked organization management and prepare professionals who can successfully supervise them. The students learn to start up a networked organization and to use networked organization technology to improve the

Page 21: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

situation analysis and strategic planning for enhancing performance of the organization. Students are trained to arrange optimal organizational structure (including adaptive regulation), to work effectively in anonymous self managing teams, develop skills in decision generating and decision making, they also must learn basic self-managing skills for effective personal communicate, to develop the whole team including training in group problem solving, to map ideas, to give and receive feedback, to monitor action plans.

Reading list:

1. Grabowski M., Ayyalasomayajula P., et al. Leading indicators of safety in virtual organizations, Safety Sciene No. 45, 2007 2. Sviokla J., Schneider A., et al. The Rise of the Networked Organization, 2007 3. Cavalla D., The role of virtual organizations in the 21st century,

PSTT Vol. 2, No. 11, November 1999 4. Norvaišas S. Knowledge Aggregation in Networked Organization.

Information Technologies for Business, Kaunas, 159-163, 2004 5. Norvaišas S., Petrauskas R. Models in Networked organizations. Modelling and simulation

of Business Systems, Int. conf., Kaunas, 190-194, 2003

MATHEMATICAL LOGIC

Name of Lecturer: Assoc. Prof. Dr. Mantas Valužis Faculty: Social Informatics

Department, Contact Details: Mathematical modeling, [email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): Not applicable

Required prerequisites: Learning Outcomes of the Course Unit:

The basics of discrete mathematics are necessary for learning of data structures, algorithm theory and similar disciplines. After this course student knows basic notions and laws of mathematical logic and can be able to detect a cause-effect principle, to formulate the exercises and to create a logic framework in management systems and business exercises. ECTS credits: 4,5 Contact hours per week: 3 Semester: Spring Planned Learning Activities and Teaching Methods: Lectures, workshops and practical assignments Assessment methods and Criteria: Two colloquium works (during the semester) 50% of final assessment Exam 50% of final assessment Course content:

This course is introductory. The aim of this course is to introduce students to the basics of mathematical logic. After learning of this course students should be able to apply the simple facts of mathematical logic in their programming tasks or in creating their algorithms. This course is mandatory.

Page 22: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

Mathematical logic is necessary basic for students who specialize in informatics or similar areas of science, requiring analytical thinking and logic argumentation of decisions and solutions. In such way additional objective of this course is to add some mathematical knowledge. That is intended to complement the specialty items needed for studies of mathematical knowledge base, develop the ability to formulate the tasks to be performed and the algorithm or their application to business process management. During the practical assignments mathematical packages as MAPLE or MAXIMA can be used. Reading list:

1. A. Krylovas, E. Paliokas. Discrete Mathematics. Vilnius, Technika, 2006. 2. S. G. Simpson. Mathematical Logic. The Pennsylvania State University, Department of

Mathematics. http://www.math.psu.edu/simpson/, 2008. 3. Althoen S. C., R. J. Bumcrat. Introduction to Discrete Mathematics. Boston, 1988. 4. K. H. Rosen. Discrete Mathematics and its applications. Random House, inc., N.Y., 1988. 5. S. Roman. An Introduction to Discrete mathematics. N.Y., 1986.

DISCRETE STRUCTURES

Name of Lecturer: Assoc. Prof. Dr. Mantas Valužis Faculty: Social Informatics

Department, Contact Details: Mathematical modeling, [email protected] Language of instruction: English Level of Course Unit: Bachelor Year of Study (if applicable): Not applicable

Required prerequisites: Not required Learning Outcomes of the Course Unit:

The basics of discrete mathematics are necessary for learning of data structures, algorithm theory and similar disciplines. After this course student knows basic notions and facts and can be able to apply the elements of set theory, combinatorics, graph theory and coding theory to creation of simplest algorithms. ECTS credits: 4,5 Contact hours per week: 3 Semester: Spring Planned Learning Activities and Teaching Methods: Lectures, workshops and practical assignments Assessment methods and Criteria: Two colloquium works (during the semester) 50% of final assessment Exam 50% of final assessment Course content:

This course is aimed to introduce students to discrete mathematics framework. After this training students should be able to formulate the tasks and be able to foreground the algorithms and programming. In addition, the student becomes clear that scientific understanding of the structure of the industry and can independently continue to discuss the topics dealt with in this course. Subject is optional, taught at the Faculty of Social Science with Business Studies program's first course in the second semester.

Discrete mathematical methods are necessary knowledge base for students studying informatics, as set out in the course of this theoretical material can be used as means of interpretation and creating algorithms. That is intended to develop the ability to deal with business

Page 23: DATA PROTECTION AND DATA SECURITY · intellectual property and how they are transformed by cyberspace and other electronic technologies. The students shall learn how to identify electronic

management systems design (programming) problems with theoretical knowledge. During the workshops mathematical packages (Maple, Maxima, etc.) can be used.

Reading list:

1. A. Krylovas, E. Paliokas. Discrete Mathematics. Vilnius, Technika, 2006. 2. J. A. Bondy, U. S. R. Murty. Graph theory with applications. North-Holland, 1982. 3. Althoen S.C., Bumcrat R.J. Introduction to Discrete Mathematics. Boston, 1988. 4. Rosen K. H. Discrete Mathematics and its applications. Random House, inc., N.Y., 1988. 5. Stant D. F. Discrete Mathematics in Computer Science. Springer Verlag, Berlin, 1991.