• Introduction to the concept of Shareholder Value
• Understanding of sourcing strategies (outsourcing and offshoring)
• Integration of security services and mechanisms in sourcing strategies
• Apply a Business-Driven Enterprise Security Architecture
IV2023 Value Based Risk Management 7.5 credits
This course has been discontinued.
Decision to discontinue this course:
No information inserted
Information per course offering
Course offerings are missing for current or upcoming semesters.
Course syllabus as PDF
Please note: all information from the Course syllabus is available on this page in an accessible format.
Course syllabus IV2023 (Autumn 2009–)Content and learning outcomes
Course contents
Intended learning outcomes
This course in IS/IT Risk Management focuses on the need to move information security from a cost to an asset. In order to be able to transform security from a cost center to a profit center, it is a precondition to understand business contexts in general and the sourcing strategies (outsourcing and offshoring) in particular.
Literature and preparations
Specific prerequisites
Course in security informatics on level C or D (year 3-5).
Literature
Preliminary:
Sherwood et al: Enterprise Security Architecture – A Business Driven Approach, CMP Books, 2005, 1-57820-318-x
The report “India and China – from an Information Security Perspective”, C Magnusson, the Confederation of Swedish Enterprise, 2006-09.
The report "Corporate Governance, Internal Control and Compliance - From an Information Security Perspective", the Confederation of Swedish Enterprise, September 2007.
The reports can be downloaded from the web of the Confederation of Swedish Enterprise.
Examination and completion
Grading scale
Examination
- PRO1 - Assignments, 7.5 credits, grading scale: A, B, C, D, E, FX, F
Based on recommendation from KTH’s coordinator for disabilities, the examiner will decide how to adapt an examination for students with documented disability.
The examiner may apply another examination format when re-examining individual students.
If the course is discontinued, students may request to be examined during the following two academic years.
Examiner
Ethical approach
- All members of a group are responsible for the group's work.
- In any assessment, every student shall honestly disclose any help received and sources used.
- In an oral assessment, every student shall be able to present and answer questions about the entire assignment and solution.