Explores how information systems and analytical tools help organisations to innovate, optimise and deliver value. Examines how the development and implementation of systems and technologies coordinate and manage information, people, and processes within data governance and privacy frameworks.
An introduction to the various layers that make up a modern computer system: encoding of data and instructions, hardware, low-level programming, operating systems, applications and communications.
Fundamental programming techniques and processes, such as conditionals, iteration, recursion, functions, testing and debugging. Efficient ways to organise and manipulate data, including sorting and searching algorithms. Writing software that uses and implements common abstract data types such as lists, stacks, queues, dictionaries and trees.
Basic mathematical tools and methods needed for computer science are introduced. Elementary mathematical skills for defining, analysing and reasoning with abstract objects used in programming are developed. Topics include integers and rational numbers, strings and sets, methods of proof (including induction), algorithms and functions, and elementary introductions to graphs, trees, counting and probability.
An introduction to computers and computer programming in a high-level language. The role of computers and computer professionals in society is also introduced. The course is intended for students who may wish to advance in Computer Science or in Information Systems and Operations Management.
This course investigates the pillars of information security and risk analysis, providing students with the technical and linguistic skills necessary to understand how cyber threats and vulnerabilities are controlled and mitigated by state and non-state actors. Students will become familiar with the political, social, and economic governance of cyberspace, while exploring notions such as security, privacy, transparency, and confidentiality. The exploration of methods employed for information security, such as encryption, will be assessed in relation to ethical considerations. The course comprises the analysis of a variety of case-studies to allow students to interlink theory and practice, and envision the dynamics and impacts of cybersecurity on real-life scenarios.