Upon completion of this course, the course participants are expected to be able to:
LO1: Be aware of testing techniques, software tools and information systems development methodology that offer testing and enhance security, trust and software/total quality of information systems in general.
LO2: Analyse and evaluate security and other risks (e.g. in various lifecycle phases, project management) by utilising scientific thinking, pattern/antipattern knowledge and expertise in order to facilitate decision making and trust.
LO3: Create appropriate testing procedures and trust management techniques (e.g. use cases, test cases, patterns/antipatterns) and utilize them with problem solving strategies, in different application domains i.e. in business innovation, online identity management and other.
LO4: Have knowledge of and use appropriately (ethically and professionally) a variety of testing methods, techniques and tools and provide argumentation and justification on their suitability, e.g. black-box testing v white-box testing in anti-phishing technology design.
LO5: Understand and critically discuss the strengths and limitations of testing techniques, and security testing in particular in different application domains, e.g. risk analysis, trust management, use of social media, computer crime and the list can go on.
LO6: Systematize knowledge acquired from a variety of examined case studies of safety-critical systems, i.e. railway accidents, Arianne-5, nuclear plants, design of the Olympic games information systems, airline flight security, online identity construction, where testing, security and trust were proved to be critical software design factors.
LO7: Model (and experiment with) scientific concepts related to testing, security and trust with greater precision and consistency by utilizing social computing theories and computational models for more accurate analysis and prediction.
LO8: Evaluate and enhance understanding and social/situational awareness of security and trust situations in society by formal and non-formal means of security modeling and assessment, e.g. rich pictures, antipatterns.
The course’s main objectives are that i) the students become acquainted with a variety of testing techniques and ii) the interconnections of testing to the concepts and quality features of security of software and trust of information systems.
By email: eleni.berki(at)uta.fi. Enrolment starts on 6 October 2014 and ends on 19 October 2014.
The course is suitable for following programmes: 1) Information Systems, 2) Software Development
Kurssi soveltuu syventäviksi opinnoiksi seuraavissa maisteriopinnoissa: 1) Tietojärjestelmät, 2) Ohjelmistokehitys (engl.)