Skip to content | Change text size

M O N A T A R

InfoTech Unit Avatar

FIT5006 Information conflict

Chief Examiner

This field records the Chief Examiner for unit approval purposes. It does not publish, and can only be edited by Faculty Office staff

To update the published Chief Examiner, you will need to update the Faculty Information/Contact Person field below.

NB: This view restricted to entries modified on or after 19990401000000

Unit Code, Name, Abbreviation

FIT5006 Information conflict (16 May 2006, 2:16pm) [InfoConflict (16 May 2006, 1:48pm)]

Reasons for Introduction

Reasons for Introduction (11 May 2006, 8:14pm)

A significant fraction of Masters graduates will occupy industry positions for much or all of their careers.Problems which they will confront repeatedly are that of security and integrity of data in the organisation's infrastructure, the prevalence of deceptive marketing material in IT product advertising and tender documents, and deceptive strategic play by competitors inside and outside their organisation. All of these problems fall into the category of Information Conflict problems, which if well understood can be managed effectively, and if not well understood, result in the organisation's exposure. As a result there is a strong case that this is material of very high value to a Masters graduate. The primary reason for introducing this subject is to fill the extant gap in Monash offerings, and provide a potentially attractive elective to Masters students. Other considerations include the availability of extant online courseware for the CSE468 Information Conflict module, which can be reused directly, the absence of any competing subjects in this category in Australia (the only other subject currently taught in this category globally is COSC 511 at Georgetown University, since 1996), and the potential for the subject to attract masters by coursework applicants with an interest in this area from overseas and outside Victoria.

Reasons for Change (16 May 2006, 12:55pm)

This is the first version of this unit.

Role of Unit (16 May 2006, 1:36pm)

The subject is an elective for Masters students and is intended to provide a graduate with understanding and analytical skills in Information Conflict in the industry environment.

Relationship of Unit (16 May 2006, 12:56pm)

The unit is an adaptation of CSE468 Information Conflict (honours module). It provides an introduction to Shannon's information theory which is valuable as a co-requisite to any units dealing with communications or information theoretical concepts, and an introduction to game theory which is which is valuable as a co-requisite to any units dealing with management technique. A proportion of the unit deals with the survey and analysis of issues arising from the competitive use of information in conflict situations, especially in industry/social environments,

Relevance of Unit (16 May 2006, 12:57pm)

The unit has relevance in several respects. The first is that it is unique in Australia and summarises most of the most recent research, and has the potential to attract Masters students. The second is that it promotes the Faculty's image in the community as being at the leading edge in Australia. The third is that establishes the Faculty as an entity with the capacity to produce advanced courses in high value niche areas, to differentiate the Faculty from competitors in the market.

The material is of direct practical relevance to graduates in the following courses:

Master of Computer Science

Master of Digital Communications

Master of Information Systems

Master of Network Computing

Master of Business Systems

Objectives

Statement of Objectives (16 May 2006, 1:16pm)

Knowledge and Understanding (Cognitive Domain Objectives)

At the completion of this subject you should have knowledge and understanding and be able to analyse: C1.The importance of Information Conflict to contemporary organisations C2.Concepts in information theory and game theory, basic information conflict strategies, compound strategies C3.The impact of information conflict in advertising, marketing, tender analysis, organisational security, computer security, and law enforcement C4.Evalute current and future developments and trends in Information Conflict C5.Understand the ethical and human/biological factors arising from Information Conflict.

Attitudes, Values and Beliefs (Affective Domain Objectives)

Have developed attitudes which allow you to: A1. Adopt a critical approach to the analysis of Information Conflict strategies A2. Willingness to apply ethical standards to Information Conflict strategies A3. Demonstrate ethically sound viewpoints with respect to the protection of organisations against the use of Information Conflict strategies. A4. Cooperate within groups and adopt and practise professional ethics that influence work behaviour.

Practical Skills (Psychomotor Domain Objectives)

None required. Existing mouse/keyboard skills will suffice. Have the skills to: P1. Apply information conflict concepts in the analysis of information conflict strategies P2. Apply information conflict analysis and design methods and techniques in the analysis of threats, risk and vulnerabilities to an organisation.

Relationships, Communication and TeamWork (Social Domain Objectives)

Relationships, Communication and TeamWork (Social Domain Objectives) S1. Students gain an understanding of the role of deception in dysfunctional team and organisational environments and how to defend against it.

Knowledge and Understanding (Cognitive Domain Objectives) (16 May 2006, 1:17pm)

At the completion of this subject you should have knowledge and understanding and be able to analyse: C1.The importance of Information Conflict to contemporary organisations C2.Concepts in information theory and game theory, basic information conflict strategies, compound strategies C3.The impact of information conflict in advertising, marketing, tender analysis, organisational security, computer security, and law enforcement C4.Evalute current and future developments and trends in Information Conflict C5.Understand the ethical and human/biological factors arising from Information Conflict.

Attitudes, Values and Beliefs (Affective Domain Objectives) (16 May 2006, 1:18pm)

Have developed attitudes which allow you to: A1. Adopt a critical approach to the analysis of Information Conflict strategies A2. Willingness to apply ethical standards to Information Conflict strategies A3. Demonstrate ethically sound viewpoints with respect to the protection of organisations against the use of Information Conflict strategies. A4. Cooperate within groups and adopt and practise professional ethics that influence work behaviour.

Practical Skills (Psychomotor Domain Objectives) (16 May 2006, 1:19pm)

Have the skills to: P1. Apply information conflict concepts in the analysis of information conflict strategies P2. Apply information conflict analysis and design methods and techniques in the analysis of threats, risk and vulnerabilities to an organisation.

Relationships, Communication and TeamWork (Social Domain Objectives) (16 May 2006, 1:19pm)

Relationships, Communication and TeamWork (Social Domain Objectives) S1. Students gain an understanding of the role of deception in dysfunctional team and organisational environments and how to defend against it.

Unit Content

Summary (16 May 2006, 2:18pm)

ASCED 029999 Information Technology not elsewhere classified

Information conflict is concerned with how information is used in disputes, disagreements, conflicts, and survival contests and with how the information technology infrastructure influences such situations. Important recent developments in the area include the definition of a theoretical basis for the discipline using Shannon's information theory, game theory and graph theory.

This unit is intended to provide an introduction to the basic theoretical concepts and an overview of various applications and their practical impact.

1 Introduction and overview

2 Shannon's information theory concepts

3 Basic game theory concepts

4 Four canonical strategies of information conflict vs Shannon's information theory

5 Compound information conflict strategies and using graphs to model these

6 Hypergames vs information conflict strategies -

7 Evolutionary nature of information conflict and biological examples

8 Classical deception techniques, perception management, propaganda, advertising

9 Forms of information conflict, Class I, II, III, IV information warfare, denial of service attack classification; Analysis and modelling of information conflict attacks and techniques

10 Information conflict vs copyright, privacy, spam, espionage, surveillance,hacking and cyberwar, viruses/worms, and identity theft

11 Information conflict vs basic concepts and risks in computer security and encryption

12 Problems arising in law enforcement and organisational security due to the proliferation of information conflict techniques

Handbook Summary (11 May 2006, 8:35pm)

Information conflict is concerned with how information is used in disputes, disagreements, conflicts, and survival contests and with how the information technology infrastructure influences such situations. Important recent developments in the area include the definition of a theoretical basis for the discipline using Shannon's information theory, game theory and graph theory.

This unit is intended to provide an introduction to the basic theoretical concepts and an overview of various applications and their practical impact.

Recommended Reading (11 May 2006, 8:36pm)

1 Dorothy E. Denning, Information Warfare and Security, ACMPress (Addison-Wesley), 1999, ISBN 0-201-43303-6.

2 Winn Schwartau, Information Warfare: Cyberterrorism : Protecting Your Personal Security in the Electronic Age, New York, NY: Thunder's Mouth Press, 1995, Second Edition.

3 In addition, selected research papers will be referenced and discussed throughout the topic.

Teaching Methods

Mode (11 May 2006, 8:36pm)

On campus only.

Strategies of Teaching (11 May 2006, 8:36pm)

Lectures and assignments. All cognitive and affective domain objectives are covered.

Teaching Methods Relationship to Objectives (16 May 2006, 1:23pm)

Lectures are used to deliver primary cognitive and affective domain inputs to students. The tutorials/assignments are employed to reinforce these, but also provide specific skills usable in industry environments by familiarising students with specific problems.

Lectures: C1-C5, A1-A4, P1-P2 Tutorial: C1-C5, A1-A4, P1-P2

Assessment

Strategies of Assessment (11 May 2006, 8:37pm)

Examination (3 hours): 60% - Practical work: 40%

Assessment Relationship to Objectives (16 May 2006, 1:40pm)

Examination (3 hours): 60% - Practical work: 40%

Assignments: C1-C5, A1-A4, Formal Assessment (Examination): C1-C5, A1-A4

Workloads

Workload Requirement (16 May 2006, 1:41pm)

2 hours lectures; 2 hours tutorial; 6 hours for practical work preparation or homework

Resource Requirements

Lecture Requirements (16 May 2006, 1:28pm)

High-tech lecture theatre for 2 hours per week for 13 weeks

Tutorial Requirements (16 May 2006, 1:29pm)

Tutorial room with projector for 2 hours per week for 13 weeks

Laboratory Requirements (16 May 2006, 1:29pm)

N/A

Staff Requirements (16 May 2006, 1:24pm)

1 EFT lecturer for 2 hours per week for 13 weeks. Plus tutorial assistance for hours proportional to enrolment.

Software Requirements (11 May 2006, 8:39pm)

None at this stage. The use of the GPL hypergame modelling tool HypANT may be feasible to support assignments.

Library Requirements (16 May 2006, 1:46pm)

The recommended texts may be difficult to source in Australia so several library copies are desirable.

1 Dorothy E. Denning, Information Warfare and Security, ACMPress (Addison-Wesley), 1999, ISBN 0-201-43303-6.

2 Winn Schwartau, Information Warfare: Cyberterrorism : Protecting Your Personal Security in the Electronic Age, New York, NY: Thunder's Mouth Press, 1995, Second Edition.

Teaching Responsibility (Callista Entry) (11 May 2006, 8:40pm)

Dr Carlo Kopp;

Prerequisites

Prerequisite Units (11 May 2006, 8:40pm)

None

Prerequisite Knowledge (16 May 2006, 1:38pm)

Literacy in IT concepts is required

Basic concepts in algebra, students must have the ability to relate these to physical reality.

Students will need to have a minimal conceptual understanding of graph theory concepts such as vertices / links as graph based models are used for representing compound strategies.

Basic concepts in probability theory are desirable. The student should understand what a random variable is, and know about probability distributions. This is useful to understanding some models.

Corequisites (11 May 2006, 8:42pm)

None

Prohibitions (16 May 2006, 1:42pm)

CSE 468 Information Conflict

Level (16 May 2006, 1:45pm)

Level 5

Proposed year of Introduction (for new units) (16 May 2006, 1:38pm)

Semester 1, 2007

Location of Offering (11 May 2006, 8:41pm)

Clayton Campus

Faculty Information

Proposer

Carlo Kopp

Contact Person (16 May 2006, 1:44pm)

Carlo Kopp

Unit Coordinator (16 May 2006, 1:44pm)

Carlo Kopp

Approvals

School:
Faculty Education Committee:
Faculty Board:
ADT:
Faculty Manager:
Dean's Advisory Council:
Other:

Version History

11 May 2006 Carlo Kopp Initial Draft; modified UnitName; modified ReasonsForIntroduction/RIntro; modified ReasonsForIntroduction/RRole; modified ReasonsForIntroduction/RRelation; modified ReasonsForIntroduction/RRelevance; modified UnitObjectives/ObjText; modified UnitObjectives/ObjCognitive; modified UnitObjectives/ObjAffective; modified UnitObjectives/ObjPsychomotor; modified UnitObjectives/ObjSocial; modified UnitContent/Summary; modified UnitContent/Summary; modified UnitContent/HandbookSummary; modified UnitContent/RecommendedReading; modified Teaching/Mode; modified Teaching/Strategies; modified Teaching/Objectives; modified Assessment/Strategies; modified Assessment/Objectives; modified Workload/WorkHours; modified ResourceReqs/LectureReqs; modified ResourceReqs/TutorialReqs; modified ResourceReqs/StaffReqs; modified ResourceReqs/SoftwareReqs; modified ResourceReqs/LibraryReqs; modified ResourceReqs/SchoolReqs; modified Prerequisites/PreReqUnits; modified Prerequisites/PreReqKnowledge; modified LocationOfOffering; modified Prohibitions; modified Corequisites; modified FacultyInformation/FIContact
11 May 2006 Carlo Kopp modified ReasonsForIntroduction/RRelevance
12 May 2006 Carlo Kopp
16 May 2006 Carlo Kopp modified ReasonsForIntroduction/RChange; modified ReasonsForIntroduction/RRelation; modified ReasonsForIntroduction/RRelevance; modified UnitObjectives/ObjText; modified UnitObjectives/ObjAffective; modified UnitObjectives/ObjText; modified UnitObjectives/ObjCognitive; modified UnitObjectives/ObjAffective; modified UnitObjectives/ObjPsychomotor; modified UnitObjectives/ObjSocial; modified Classification; modified UnitContent/Summary; modified Teaching/Objectives; modified Teaching/Objectives; modified ResourceReqs/StaffReqs; modified Assessment/Objectives; modified ResourceReqs/LectureReqs; modified ResourceReqs/TutorialReqs; modified ResourceReqs/LabReqs; modified ReasonsForIntroduction/RRole; modified Prerequisites/PreReqKnowledge; modified DateOfIntroduction; modified Assessment/Objectives; modified Workload/WorkHours; modified Prohibitions; modified FacultyInformation/FIContact; modified FacultyInformation/FICoordinator; modified Level; modified ResourceReqs/LibraryReqs; modified Abbreviation
16 May 2006 Carlo Kopp
16 May 2006 Gayle Nicholas modified UnitName; modified UnitContent/Summary
16 May 2006 Gayle Nicholas

This version: