Current Students
2025 unit information
Trimester 2: Burwood (Melbourne), Online, GIFT City (India)^Trimester 3: Burwood (Melbourne), Online
Nil
1 x 1.5 hour on-campus (livestreamed) lecture (recordings provided) and 1 x 1.5 hour on-campus seminar each week
1 x 1.5 hour class recorded lecture provided and 1 x 1.5 hour online seminar (recordings provided) each week
Students will on average spend 150 hours over the teaching period undertaking the teaching, learning and assessment activities for this unit.
This will include educator guided online learning activities within the unit site.
^GIFT City (India) offering is available to students enrolled at the GIFT City (India) campus only.
Organisations are increasingly relying on business analytics to make strategic decisions using the data they generate during day-to-day operations. Strategic value will only be obtained if the data is reorganised and made widely accessible at the enterprise level. When data is reorganised to meet this need, there is a real risk that the semantics of the data will be compromised, and that data integrity and security can be violated. Hence, students will learn how data can be captured and reorganised effectively to address these issues, and how to secure the data against threats. Specifically, this unit introduces students to a number of topics in data management (e.g.relational database management), big data systems, and information security. At the end of this unit, students will understand broad issues concerning data management at the enterprise level, gain basic skills in information modelling and querying databases, and understand the procedures and controls for achieving information security.
Alignment to Deakin Graduate Learning Outcomes (GLOs)
Analyse the various cybersecurity contexts within organisations to formulate appropriate strategic settings.
GLO1: Discipline-specific knowledge and capabilitiesGLO4: Critical thinking
Critically evaluate and justify the selection of appropriate security methodologies relevant to different types of data, considering the broader implications for information security management practices.
GLO1: Discipline-specific knowledge and capabilitiesGLO3: Digital literacyGLO4: Critical thinking
Apply relevant security policies and technologies in the creation of cybersecurity solutions that align with an organisation's business goals and aspirations.
GLO1: Discipline-specific knowledge and capabilitiesGLO5: Problem solving
Develop adaptive solutions for authentic and real-world security issues within an organisation's cybersecurity service management.
GLO4: Critical thinkingGLO5: Problem solving
The assessment due weeks provided may change. The Unit Chair will clarify the exact assessment requirements, including the due date, at the start of the teaching period.
The texts and reading list for MIS761 can be found via the University Library. Note: Select the relevant trimester reading list. Please note that a future teaching period's reading list may not be available until a month prior to the start of that teaching period so you may wish to use the relevant trimester's prior year reading list as a guide only.
Fees and charges vary depending on the type of fee place you hold, your course, your commencement year, the units you choose to study and their study discipline, and your study load.
Tuition fees increase at the beginning of each calendar year and all fees quoted are in Australian dollars ($AUD). Tuition fees do not include textbooks, computer equipment or software, other equipment or costs such as mandatory checks, travel and stationery.
Estimate your fees
For further information regarding tuition fees, other fees and charges, invoice due dates, withdrawal dates, payment methods visit our Current Students website.