Creativity to sustainability
Definitions and journey from creativity, innovation and enterprise to sustainability
Concepts of sustainability and sustainable development / key drivers / what the implications are for businesses; developing business strategies which meet current needs without compromising needs of those in the future; sustainability as a strategic imperative, embedding sustainable development in entrepreneurial thinking and practice
Why innovate? / Types of innovation; key policy developments in innovation in the UK; Role of SMEs in the economy / significance of innovation management to entrepreneurial businesses / innovative companies – best practice cases studies; creative cultures – barriers to achieving them, overcoming the challenges
The application of creativity and innovation in meeting the regulatory challenges of a sustainable business environment, and in seizing the opportunities arising out of this concept to build competitive advantage
Digital Business Environments
Digital business models and revenue models.
Digital business strategy process models and their use.
Online marketplace analysis.
The role of ‘Search’ and ‘Social’ ecosystems in the online environment.
Assessment of e-Procurement and digital supply chains.
Mobile platforms and location-based services.
Design approaches for online channels and touchpoints.
Privacy and trust issues.
Legal and regulatory frameworks for digital business.
The module simulates a contemporary commercial innovation cycle for Digital Media. The module has a non-traditional contact pattern, emulating the nature of innovation for the digital marketplace.
The first few weeks provide a wide range of underpinning in human issues in technology innovation models – from Griliches (1957) through Gaines & Shaw (1986) and Moore (1999) to the current approaches in design innovation discussed by the Directorate General for Enterprise and Industry of the European Commission and eusset.eu. The middle weeks involve lighter contact – principally group project supervision, in the course of planning and carrying out a group coursework based on industry standard methods in ISO 13407 (currently being amended to be ISO9241-210). A final 3-week phase prepares the learners and their groups to participate in “dragon’s den” type pitches to an audience including local entrepreneurs, and focus on defining, protecting and exploiting digital media intellectual property, the market appeal and the business model.
Thus learners will learn about defining, protecting and exploiting intellectual property, cost-modelling, business planning, concept development, pitching, and presentation. A final reflective phase will allow the learner to contrast their experience with past Edinburgh Napier commercial collaborations and spin-out activity, evaluating all of this in the context of both the MIT/Stanford approach to innovation in digital markets (e.g. Smith et al, 2001; Preston, 2004) and contrasting European human-centred approaches in (Mootee, 2007; McEwan et al, 2004, EUSSET.eu, 2008). This leads to being able to critique the effectiveness of state-initiatives (e.g. NESTA 2008) in Scotland to support digital markets in for example, Digital Media, ICT, Security and Sustainable Transport
Enterprise Information Systems with SAP
The aim of this module is to develop a deep understanding of enterprise information systems and their role in business processes. It includes
• Evaluation of the impact that Enterprise Information Systems can have within organisation business processes
• As an assessment of the impact that they have on the efficiency and effectiveness of organisations and supply chains
• Fundamentals of business intelligence, such as data warehousing and data mining
The module uses SAP R/3 to give students an appreciation of the nature of large scale integrated information systems, and to consider aspects of their use and characteristics. It also provides an opportunity to practise data analytical techniques.
Growth Venture Management
The module workshops will include;
· Entrepreneurial aspirations through case study examples
· Growth models to understand the phases of growth and seek evidence in organisations
· Identifying and reviewing examples of building growth businesses, and the role of the entrepreneur in the leadership of these businesses
· The growth of businesses will be evaluated by utilising the strategic management tools including strategic analysis, strategic choices and strategic implementation options
· Techniques in valuing a business using case studies
· The role of intrapreneurship in large organisations
· Strategies for raising finance for growth (guest speaker)
Management of Software Projects
Managing project start-up through project requirements evaluation and project planning techniques.
Comparing and contrasting big up front and appropriate design approaches
Comparative analysis of software project management approaches and Bodies of Knowledge (BoK) applied to software development projects
The assessment of project risk management approaches and metrics for project monitoring and control within an agile project management approach.
Analysis of software development process improvement approaches through Agile software standards and maturity models
Evaluation of software development teams and group dynamics as key factors in the successful delivery of projects
Utilisation of a tailored project management methodology such as Scrum or XP to manage the delivery of an assessment instrument
Knowledge capital; knowledge communities; coding knowledge; discourses of knowledge management.
The work for this module comprises the completion of an individual research project. Each student is assigned a personal Supervisor, and an Internal Examiner who monitors progress and feedback, inputs advice, examines the dissertation and takes the lead at the viva.
There are three preliminary deliverables prior to the submission of the final dissertation:
(1) Project proposal
(2) Initial Report including time plan and dissertation outline
Security Audit & Compliance
The aim of the module is to let you develop a deep understanding of the framework that information security operates in, and to give you an opportunity to express this in the form of professional written reports. Topics covered include:
• Overview of relevant laws and regulations: national and international, covering Data Protection, computer misuse and other legal issues.
• The relation between governance models and frameworks including: ISACA’s COBIT and ISO Standards (ISO27000 in particular)
• Role of the professions; difference between audit, forensics and security management. Professional ethics and codes of practice
• Risk management, contingency and continuity planning
• Understanding and application of the COBIT domains
Sources of Competitive Advantage
Initially the module deals with the big picture of business and some theoretical models of business, developing a conceptual framework within which to relate the more detailed aspects of the organisation's operations, always focusing on the need to build an efficient and effective organisation with a sustainable future.
It then focuses on the contribution of two specific functions - operations and information management - within the business by demonstrating the benefits that come from sharing information to deliver goods and services to customers in an integrated, seamless and customer focused way.
The module also emphasises the importance of finance as a prerequisite for business operations and as measure and indicator of successful performance.
It uses the concept of integrative business processes to demonstrate the benefits of taking a holistic view of the different functions in achieving the organisation's goals and creating competitive advantage
Work Based Learning
Strategic ICT and its impact on business improvement
Leadership in ICT business-led transformation
Business requirements for strategic ICT projects
Evaluation of current use of ICT and whether it is “fit for purpose”
Identification and mitigation of key risks in ICT projects
Planning for successful implementation of a strategic ICT project
Reflective practice – using different models and frameworks to maximise both personal and team performance
The aim of the module is to develop a deep understanding of advanced areas related to security that will allow graduates to act professionally in the design, analysis, implementation, evaluation, and reporting of security strategies. An outline of the main areas includes:
* Security Threats, Secure Infrastructures, Threat Detection.
* Encryption Techniques, Algorithms, Key Management and Exchange Methods, Weaknesses.
* Authentication Methods. Message hash (MD5, SHA), Digital Signatures, and Digital Certificates, MAC Methods, Biometrics, Claims-based Identity, Multi-factor Authentication, Kerberos. Advanced
* Secure Communications and Crypto-systems such as SSL.
* Intrusion Detection Systems. Techniques applied IDS using Snort, Distributed/Agent-based, Signature/ Anomaly detection and current research.
* Security in Network Architectures. Overview of Interconnected Security Systems. Domain Infrastructures. OS/Web Stacks. Password Security. Identity Infrastructures. Backups/File Synchronisation. Web/Data Infrastructures.
* Software Security. .NET Framework Security, Obfuscation, Role-based Security, Bugs vs Vulnerabilities vs Exploits, Malware, Software Threats, Compiled v Interpreted Languages. Run-time Environments. Sandboxing. Trusted Computing. Software Security Compliance Testing. Secure Coding, Good Practice.
* Wireless Security. Layered Security and Wireless Protocols. Encryption/Authentication Infrastructures. Challenge-based Protocols. Wireless Cyber Threats and Mitigation (such as DoS, Attack Vectors, and MITM).
* These are indicative only and reflect the course structure in the current academic year. Some changes may occur between now and the time that you study.