eGovernment & Auctions Online
                                                                Prof. Enrico Ferro
                                                                 ECTS credits: 3


                     The course intends to provide a complete overview of the main aspects concerning the implementation of
                     information and communication technologies in the public sector.
                     The contents presented offer the opportunity to build a robust theoretical foundation as well as to acquire a
                     set of useful analytical tools. At the end of the course, students will be able to understand and manage the
                     intertwinement of technological, political and managerial aspects present in the implementation of
                     eGovernment projects.

                     Main topics covered in the course:
                     1. New Public Management and European Policy Framework
                     2. eGovernment Definition
                     3. Public eService Delivery and Digital Divide
                     4. Auction Theory and eProcurement
                     5. eDemocracy and eParticipation
                     6. Information Policy between markets and citizens’ rights
Gestione Didattica




                     Politecnico di Torino – Ufficio Master e Formazione Permanente                                              1
                     Corso Duca degli Abruzzi, 24 – 10129 Torino Italia
                     tel: +39 011 090 79 13 fax: +39 011 090 5730
                     e-mail: master.universitari@polito.it
Organization models and strategies for e-business
                                                          Prof. Marco Cantamessa
                                                               ECTS credits: 3


                     The course is based on the application of fundamental concepts of economics of innovation to the case of
                     e-business. The purpose is to provide students with the capability to understand the strategic implications
                     induced by e-business on industries and on individual firms.


                                                                          Contents:

                     “How innovation works” - Knowledge, innovation and organizational learning. Taxonomies of innovation,
                     with firm-level and industry-level implications (disruptive and non-disruptive innovations).The dynamics
                     of innovation (technological life-cycles, dominant designs and standards, strategy for standards-based
                     products).

                     “Innovation strategy” - Relationships between strategic management and innovation management.
                     Innovation strategy as competency growth (internal R&D, alliances, joint ventures, M&As, licensing
                     agreements, etc.). Sustainability of technology-based competitive advantage
                     “E-business as an innovation” - The impact of ICT and e-business on firms and on interfirm relationships
                     (business process unbundling and novel forms of industrial organization). Methods and tools for analyzing
                     and re-engineering value chains.
Gestione Didattica




                     Politecnico di Torino – Ufficio Master e Formazione Permanente                                           1
                     Corso Duca degli Abruzzi, 24 – 10129 Torino Italia
                     tel: +39 011 090 79 13 fax: +39 011 090 5730
                     e-mail: master.universitari@polito.it
Information systems for e-business
                                                              Prof. Marco Torchiano
                                                                  ECTS credits: 3


                                                                         Objectives
                     To understand the advanced technologies behind modern information systems such as service oriented
                     architecture, web services, COTS based systems. Enable the student to identify, evaluate, compare, and
                     select the components for assembling and information system.

                                                                           Grading
                     The course is based on a project conducted under the supervision of the teacher. The student will face a
                     real-world case study and propose a suitable information system solution. A final oral exam will treat the
                     topics presented during the course and their possible application to the case study.
                     The project weights 80% of the final grade, the final exam 20%.

                                                                        Course topics
                         •    Role of IS and definitions
                         •    Required concepts of BPM and organization
                         •    Service Oriented Architectures
                         •    COTS based development
                         •    Examples of COTS Acquisition
                         •    IS architectures
                         •    Typical examples of architectures
Gestione Didattica




                     Politecnico di Torino – Ufficio Master e Formazione Permanente                                               1
                     Corso Duca degli Abruzzi, 24 – 10129 Torino Italia
                     tel: +39 011 090 79 13 fax: +39 011 090 5730
                     e-mail: master.universitari@polito.it
Computer systems security
                                                             Prof. Diana Gratiela Berbecaru
                                                                     ECTS credits: 3

                     The goal of Computer systems security is to familiarize students with the security issues and technologies
                     involved in modern information systems, including computer systems and networks. The course introduces
                     first the subject of security of networked information systems, the basic terms used in this field and the
                     main cryptographic techniques staying at the basic of many security protocols nowadays. Subsequently,
                     students will gain an understanding of the various ways in which information systems can be attacked and
                     tradeoffs in protecting systems and networks.

                     This course requires at least user knowledge of computers and Internet. Students with technical knowledge
                     of networks and network applications will perform some practical labs too.

                                                                           Topics:
                     - security of ICT systems: technological attacks (eavesdropping, spoofing, modification, denial of service
                     attacks ...) and non-technological attacks (social engineering); risk analysis.

                     - base techniques for ICT system protection: basic cryptographic terms, symmetric and asymmetric
                     encryption; integrity and authentication approaches; the public-key infrastructure (PKI) and digital
                     certificates;

                     - authentication systems: reusable and one-time passwords; symmetric and asymmetric challenge-
                     response; hardware authenticators; the Kerberos system.

                     - introduction to network security techniques: network access control (EAP, Radius); layer-3 security
                     (IPsec); insecurity of IP, ICMP, DNS and routing; firewall (FW); intrusion detection systems (IDS).

                     - security of Internet applications (principles): channel security (SSL, TLS); e-commerce security (SET,
                     SSL for web-based transactions); e-mail security (spamming, PGP, S/MIME).

                     By the end of this course, students will be able to:

                     - State the basic concepts in information security, including security models, and security mechanisms, as
Gestione Didattica




                     well as requirements and techniques for security management, including security policies, risk analysis,
                     and physical threats and controls.
                     - Explain concepts related to applied cryptography, including plain-text, cipher-text, symmetric
                     cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions,
                     and modes of encryption operations.
                     - Explain the concepts of malicious code, including virus, Trojan horse, and worms.
                     - Explain common vulnerabilities in computer programs, including buffer overflow vulnerabilities.
                     - Outline the requirements and mechanisms for identification and authentication.
                     - Explain issues about password authentication, including dictionary attacks (password guessing attacks),
                     password management policies, and one-time password mechanisms.


                     Politecnico di Torino – Ufficio Master e Formazione Permanente                                               1
                     Corso Duca degli Abruzzi, 24 – 10129 Torino Italia
                     tel: +39 011 090 79 13 fax: +39 011 090 5730
                     e-mail: master.universitari@polito.it
- Describe threats to networks, and explain techniques for ensuring network security, including encryption,
                     authentication, firewalls, and intrusion detection.
                     - Explain issues about widely-used channel security protocols (like the SSL/TLS protocol) and e-mail
                     protection techniques.
Gestione Didattica




                     Politecnico di Torino – Ufficio Master e Formazione Permanente                                           2
                     Corso Duca degli Abruzzi, 24 – 10129 Torino Italia
                     tel: +39 011 090 79 13 fax: +39 011 090 5730
                     e-mail: master.universitari@polito.it

More Related Content

PPT
SECURITY OF THE DIGITAL NATIVES - English version
PPTX
2011 curriculum ist110
PDF
Ikeepsafe Cyber Safety, Ethics and Security Competencies
PPTX
PDF
Privacy and Security in Multi-modal User Interface Modeling for Social Media
PDF
Research Agenda in Security Research
PPT
Informatics (Recruiting) Teri Slick
PDF
A Live Virtual Simulator for Teaching Cybersecurity
SECURITY OF THE DIGITAL NATIVES - English version
2011 curriculum ist110
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Privacy and Security in Multi-modal User Interface Modeling for Social Media
Research Agenda in Security Research
Informatics (Recruiting) Teri Slick
A Live Virtual Simulator for Teaching Cybersecurity

Similar to Course overview (20)

PDF
ICT Quality Assurance
PDF
Rmit course
DOCX
MIS 300 Management Information Systems Concepts and Applications .docx
DOC
Itgs scheme 2011-2012
PDF
Syllabus
PPT
INT529 zero lecture.pptdsfsdffewwretetrtetretr
PDF
Opim662 Syllabus
PPTX
Thinking Aloud: University Enterprise Architecture Themes and Horizons
PPTX
Ireland - The location of choice for International Payments firms
PDF
Introtounikold
PDF
system analysis and design
PPTX
E government avoiding a Dot Gov Bubble
PDF
Department of Applied Informatics
DOCX
2.Applications of ICT Commerce Department.docx
PDF
eCommerce session 3 MOGHIMI
PDF
Oil and gas cyber security nov 2012
PDF
Gwea Framework 1.2 Ea Forum 30 June 09
PDF
Establishing a Common Ground for IA Practice and Education
PDF
Establishing a Common Ground for IA Practice and Education
ICT Quality Assurance
Rmit course
MIS 300 Management Information Systems Concepts and Applications .docx
Itgs scheme 2011-2012
Syllabus
INT529 zero lecture.pptdsfsdffewwretetrtetretr
Opim662 Syllabus
Thinking Aloud: University Enterprise Architecture Themes and Horizons
Ireland - The location of choice for International Payments firms
Introtounikold
system analysis and design
E government avoiding a Dot Gov Bubble
Department of Applied Informatics
2.Applications of ICT Commerce Department.docx
eCommerce session 3 MOGHIMI
Oil and gas cyber security nov 2012
Gwea Framework 1.2 Ea Forum 30 June 09
Establishing a Common Ground for IA Practice and Education
Establishing a Common Ground for IA Practice and Education
Ad

Recently uploaded (20)

PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
DOCX
search engine optimization ppt fir known well about this
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
search engine optimization ppt fir known well about this
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Build Your First AI Agent with UiPath.pptx
Custom Battery Pack Design Considerations for Performance and Safety
TEXTILE technology diploma scope and career opportunities
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Improvisation in detection of pomegranate leaf disease using transfer learni...
4 layer Arch & Reference Arch of IoT.pdf
Training Program for knowledge in solar cell and solar industry
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
The influence of sentiment analysis in enhancing early warning system model f...
Early detection and classification of bone marrow changes in lumbar vertebrae...
NewMind AI Weekly Chronicles – August ’25 Week IV
Module 1 Introduction to Web Programming .pptx
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Convolutional neural network based encoder-decoder for efficient real-time ob...
Ad

Course overview

  • 1. eGovernment & Auctions Online Prof. Enrico Ferro ECTS credits: 3 The course intends to provide a complete overview of the main aspects concerning the implementation of information and communication technologies in the public sector. The contents presented offer the opportunity to build a robust theoretical foundation as well as to acquire a set of useful analytical tools. At the end of the course, students will be able to understand and manage the intertwinement of technological, political and managerial aspects present in the implementation of eGovernment projects. Main topics covered in the course: 1. New Public Management and European Policy Framework 2. eGovernment Definition 3. Public eService Delivery and Digital Divide 4. Auction Theory and eProcurement 5. eDemocracy and eParticipation 6. Information Policy between markets and citizens’ rights Gestione Didattica Politecnico di Torino – Ufficio Master e Formazione Permanente 1 Corso Duca degli Abruzzi, 24 – 10129 Torino Italia tel: +39 011 090 79 13 fax: +39 011 090 5730 e-mail: [email protected]
  • 2. Organization models and strategies for e-business Prof. Marco Cantamessa ECTS credits: 3 The course is based on the application of fundamental concepts of economics of innovation to the case of e-business. The purpose is to provide students with the capability to understand the strategic implications induced by e-business on industries and on individual firms. Contents: “How innovation works” - Knowledge, innovation and organizational learning. Taxonomies of innovation, with firm-level and industry-level implications (disruptive and non-disruptive innovations).The dynamics of innovation (technological life-cycles, dominant designs and standards, strategy for standards-based products). “Innovation strategy” - Relationships between strategic management and innovation management. Innovation strategy as competency growth (internal R&D, alliances, joint ventures, M&As, licensing agreements, etc.). Sustainability of technology-based competitive advantage “E-business as an innovation” - The impact of ICT and e-business on firms and on interfirm relationships (business process unbundling and novel forms of industrial organization). Methods and tools for analyzing and re-engineering value chains. Gestione Didattica Politecnico di Torino – Ufficio Master e Formazione Permanente 1 Corso Duca degli Abruzzi, 24 – 10129 Torino Italia tel: +39 011 090 79 13 fax: +39 011 090 5730 e-mail: [email protected]
  • 3. Information systems for e-business Prof. Marco Torchiano ECTS credits: 3 Objectives To understand the advanced technologies behind modern information systems such as service oriented architecture, web services, COTS based systems. Enable the student to identify, evaluate, compare, and select the components for assembling and information system. Grading The course is based on a project conducted under the supervision of the teacher. The student will face a real-world case study and propose a suitable information system solution. A final oral exam will treat the topics presented during the course and their possible application to the case study. The project weights 80% of the final grade, the final exam 20%. Course topics • Role of IS and definitions • Required concepts of BPM and organization • Service Oriented Architectures • COTS based development • Examples of COTS Acquisition • IS architectures • Typical examples of architectures Gestione Didattica Politecnico di Torino – Ufficio Master e Formazione Permanente 1 Corso Duca degli Abruzzi, 24 – 10129 Torino Italia tel: +39 011 090 79 13 fax: +39 011 090 5730 e-mail: [email protected]
  • 4. Computer systems security Prof. Diana Gratiela Berbecaru ECTS credits: 3 The goal of Computer systems security is to familiarize students with the security issues and technologies involved in modern information systems, including computer systems and networks. The course introduces first the subject of security of networked information systems, the basic terms used in this field and the main cryptographic techniques staying at the basic of many security protocols nowadays. Subsequently, students will gain an understanding of the various ways in which information systems can be attacked and tradeoffs in protecting systems and networks. This course requires at least user knowledge of computers and Internet. Students with technical knowledge of networks and network applications will perform some practical labs too. Topics: - security of ICT systems: technological attacks (eavesdropping, spoofing, modification, denial of service attacks ...) and non-technological attacks (social engineering); risk analysis. - base techniques for ICT system protection: basic cryptographic terms, symmetric and asymmetric encryption; integrity and authentication approaches; the public-key infrastructure (PKI) and digital certificates; - authentication systems: reusable and one-time passwords; symmetric and asymmetric challenge- response; hardware authenticators; the Kerberos system. - introduction to network security techniques: network access control (EAP, Radius); layer-3 security (IPsec); insecurity of IP, ICMP, DNS and routing; firewall (FW); intrusion detection systems (IDS). - security of Internet applications (principles): channel security (SSL, TLS); e-commerce security (SET, SSL for web-based transactions); e-mail security (spamming, PGP, S/MIME). By the end of this course, students will be able to: - State the basic concepts in information security, including security models, and security mechanisms, as Gestione Didattica well as requirements and techniques for security management, including security policies, risk analysis, and physical threats and controls. - Explain concepts related to applied cryptography, including plain-text, cipher-text, symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption operations. - Explain the concepts of malicious code, including virus, Trojan horse, and worms. - Explain common vulnerabilities in computer programs, including buffer overflow vulnerabilities. - Outline the requirements and mechanisms for identification and authentication. - Explain issues about password authentication, including dictionary attacks (password guessing attacks), password management policies, and one-time password mechanisms. Politecnico di Torino – Ufficio Master e Formazione Permanente 1 Corso Duca degli Abruzzi, 24 – 10129 Torino Italia tel: +39 011 090 79 13 fax: +39 011 090 5730 e-mail: [email protected]
  • 5. - Describe threats to networks, and explain techniques for ensuring network security, including encryption, authentication, firewalls, and intrusion detection. - Explain issues about widely-used channel security protocols (like the SSL/TLS protocol) and e-mail protection techniques. Gestione Didattica Politecnico di Torino – Ufficio Master e Formazione Permanente 2 Corso Duca degli Abruzzi, 24 – 10129 Torino Italia tel: +39 011 090 79 13 fax: +39 011 090 5730 e-mail: [email protected]