Programme & Structure
The Programme
Information and Communication Technology (ICT) Systems have been a main driver of technological innovation during recent decades and now play a pivotal role in all aspects of modern life. Professionals who are experts in ICT Systems are therefore in constant demand. In order to really stand out in today’s job market ICT professionals need a combination of technical, managerial and interdisciplinary skills from different sectors of the economy, as well as exposure to an international environment. The International Hellenic University (IHU) offers just such a highly diverse graduate programme. In a fully English-speaking environment, our MSc in ICT Systems students learn to excel in their technical skills while also acquiring grounding in managerial skills as these apply in a number of different areas including healthcare, the financial sector and the green economy. The lecture series by leading academic instructors from Greece and abroad, together with projects and dissertation work, mean that students graduate well equipped and highly competitive at international level.
This programme is designed for those University graduates of Informatics/Computer Science, Electrical Engineering and also Natural Sciences departments, who wish to acquire a competitive edge in the rapidly converging information and telecommunication technologies market.
The Structure
The MSc in ICT Systems (full-time) is a 14-month programme taught over three terms. Lectures mainly take place on weekday evenings. The MSc in ICT Systems programme is also available in part-time mode over 26 months for those who cannot commit to a full-time programme either for work or other reasons.
Upon arrival at the IHU all students follow an intensive foundation course titled "Applied Mathematics in ICT" that aims to bring all incoming students to the same level with respect to some of the mathematics knowledge that is required to excel in the programme. During the first term, all students are required to attend five mandatory core courses. During the second term, all students follow a further three required courses and a combination of two elective courses. Finally, during the third term, work is dedicated exclusively to the Master's dissertation.
Applications are open!
Programme announcement
Programme brochure
Downloads
Courses
Courses
During the second term students tailor their programme further by choosing elective courses. The choice of elective courses must sum up to 12 ECTS (2 courses). Some of the elective courses may not be offered in a particular year, depending entirely on student demand.
1st Term Core Courses
During the first term, all MSc in ICT Systems students attend five (5) mandatory core courses that provide a thorough grounding in key functional areas of the ICT sector. These core courses sum up to a total of 30 ECTS units.
ICT Management
Instructor(s): | Prof. V. Peristeras |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims
The purpose of this course is to provide a broad understanding of the importance of ICT systems in the modern business environment so that the management makes the right decisions on issues relating to information systems. The course focuses on issues of information systems integration within the organization, information systems utilization according to the organization’s capabilities and its implications on processes and individuals, as well as information resources management. Topics covered include process analysis, project analysis, production planning and scheduling, ICT systems and new business models, quality management, supply chain management, capacity and facilities planning. The course also develops basic macroeconomic theory to enable managers to critically evaluate economic forecasts and policy recommendations and then applies these concepts in a series of case studies.
Learning Outcomes
Upon completing this course, students will:
- Develop analytical skills in planning, evaluating and supervising a project in ICT
- Develop skills in Evaluating and Sustaining Production Quality in ICT
- Understand some basic elements of Supply Chain Management
- Develop skills in Human Resource and Workforce allocation and management
- Broaden their experience through several case study examples
Content
- Process and Project Analysis
- Production Planning and Scheduling
- Quality Management
- ICT Systems and New Business Models; E-Commerce, Decision Making
- Capacity and Facilities planning
- Workforce Scheduling
- Project Valuation and Financing
- Case Studies
Reading
E. Turban, L. Volonino, Information Technology for Management, 8th Edition, 2010, John Wiley & Sons, Inc.
Oz E. Management Information Systems, Course Technology, 6th edition.
J. Laudon, K. Laudon, Essentials of Management Information Systems, Prentice Hall, 8th edition.
M.H. Sherif, Managing Projects in Telecommunication Services, Wiley-IEEE Press.
Web Programming
Instructor: | TBC |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims: During the past years, the World Wide Web has evolved into the primary communication medium on the planet. Its open architecture has allowed the introduction of countless Web applications, including personal pages, electronic stores, news portals, tourist services, social networks, blogs and forums, data stores, entertainment, and so on. Apparently, the ability of developing such applications is a powerful skill and Web programming is perhaps the most crucial step in obtaining this skill.
The main purpose of this course is to introduce the main methods for designing and developing Web applications. Students will become familiar with the fundamental features of the Internet and the World Wide Web and become familiar with the role of these elements in designing and implementing applications. Then development tools and platforms, methodologies, implementation strategies, technical data, user and data security data, etc. will be presented. The course also includes basic knowledge of user interface design for Web applications and creation of advanced information systems with support from database systems.
Learning Outcomes: On completion of the course students will be able to:
· Understand the principal protocols, architectures and standards for Internet and Web applications.
· Develop both client-side and server-side scripts,
· Use AJAX technologies,
· Adapt their web design to enhance reliability, efficiency and internationalization,
· Combine all the aforementioned skills for developing a rich Web application,
· Incorporate commonly used security protocols (SSL, HTTPS) in their information system design,
· Understand the basic principles and future directions of Web 2.0
Content:
· Introduction to the basic communication protocols TCP and IP. HyperText. The Web protocols HTTP/HTTPS. FTP and SMTP protocols. HTTP Servers and the CGI mechanism.
· Architecture and Components of Web-Based Applications (3-tier and multi-tier Client/Server systems, Web servers, Database servers).
· Introduction to HTML,
· Client-side scripting with Javascript,
· Server-side scripting with PHP,
· Integrating AJAX technologies with jQuery,
· Database support.
Reading:
· Taniar D., Rahayu J. W. (2004) Web information systems Hershey, PA: Idea Group Publishing.
· Vidgen R., Avison D., Wood B., Wood-Harper T. (2002) Developing Web Information Systems: From Strategy to Implementation, Butterworth-Heinemann Information Systems Series, Elsevier.
· M. Stepp, J. Miller, V. Kirst (2012) Web Programming Step-by-Step, Step-By-Step Publishing
Computer Networks
Instructor(s): | Prof. Periklis Chatzimisios |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims
This course will examine computer networks within the context of the Internet. We will study the fundamental principles, elements, and protocols of computer networks. We will investigate how the different protocols work, why they work that way, and their performance trade-offs. Using this knowledge, we will try to examine the way applications are deployed on the Internet and their performance trade-offs. In particular, we will try to examine some strategies that are commonly used to accelerate application level performance in the context of the operation of the Internet.
Learning Outcomes
On completing the course students will be able to:
- Explain the operation of a range of computer networking applications such as email, web, and peer-to-peer file-sharing
- Relate the architecture of the Internet to the underlying design principles
- Illustrate the operation of common routing protocols, queuing mechanisms, and congestion control mechanisms
- Develop elements of a network such as gateways and routers that conform to IETF standards with acceptable levels of simplification
- Explain the performance of a given set of routing protocols, queuing mechanisms, and congestion control mechanisms on an example network.
Content
- Introduction to Computer Networks
- Sockets Programming
- Protocol Stacks and Layering: Application Layer, Physical Layer, Link Layer Basics.
- Switching & Flow Control
- Ethernet and Bridging
- IP forwarding & addressing
- IP Packets & Routers
- Routing: RIP & OSPF, Routing: BGP, Multicast, DNS, IPv6, tunnelling, NAT, VPN, Virtual circuits, ATM, MPLS, Transport Intro.
- TCP & Congestion Control.
- TCP Performance
- Multimedia/QoS, QoS & Mobile (IP & TCP)
- Ad-hoc networks
- Web + CDNs + Caching, P2P
- Security - SSL, Security - firewalls, DoS
- Broadband access networks (xDSL,UWB, DOCSIS)
Reading
Kurose J. F., Ross K. W. (2007) Computer Networking: A Top-Down Approach, Addison Wesley, 6th edition.
Peterson L. L., Davie B. S. (2007) Computer Networks ISE: A Systems Approach, Morgan Kaufmann; 4th edition.
Stallings W. (2008) Data and Computer Communications, Pearson Education, 8th edition.
Advanced Database Systems
Instructor(s): | Prof. C. Tjortjis |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims
The course aims to familiarise students with contemporary database systems, as well as emerging database technologies. It discusses basic aspects of advanced database techniques and exposes tools and technologies that can be used along with “core” database systems. Students are expected to engage in practical database system design through a series of assignments and coursework. The emphasis in the lectures will be on general concepts and theoretical foundations. In addition to the theoretical concepts, the course will require students to use commercial database systems and develop a class project.
Learning Outcomes
Upon successful completion of this course students will be able to:
- Develop the logical model of a relational database
- Use essential SQL tools to program commercial database systems
- Understand advanced concepts of database management and architecture
- Organize, store and process data efficiently, using contemporary methods.
- Understand and apply emerging technologies, including Data Mining, Information Retrieval and XML.
- Undertake a practical database management project.
Content
- ER model, relational model, mapping ER to relational model and basic SQL
- Indexing, query processing and optimization
- Parallel, Distributed and Spatial databases and spatial query processing
- Hadoop ecosystem and mapreduce
- Data Warehousing and OLAP
- Data Mining and Business Intelligence
- Information Retrieval, Web Search and XML
Reading
Elmasri R., Navathe S. B., (2010), Fundamentals of Database Systems: Global Edition, 6th Edition, Pearson.
Garcia-Molina H., Ullman J., and Widom J., (2009), Database Systems: The Complete Book, 2nd edition, Pearson.
Silberschatz A., Korth H., and Sudarshan S., (2010), Database System Concepts, 6th Edition, McGraw-Hill.
Ramakrishnan R, Gehrke J. (2002), Database Management Systems, 3rd edition, McGraw-Hill Science/Engineering/Math.
Information Systems Security
Instructor(s): | Dr. Dimitrios Baltatzis |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims
This course provides an introduction to the foundational aspects of cybersecurity and computer security. Most modern organisations face security and privacy risks that threaten their valuable assets. It is imperative to design secure and privacy-aware information systems that protect against these threats. This course provides a wide range of skills and knowledge of existing technologies, security and privacy principles to develop the professional skills and experience needed for information systems security.
Learning Outcomes
On completing the course students will be able to:
- Develop the knowledge, understanding and skills to work as a computing security professional
- Learn the concepts, principles, techniques and methodologies you need to design and assess complex networks, systems and applications
- Develop the practical experience you need to plan, perform and direct security audits of information systems to the level required by standard security frameworks
- Develop the appropriate legal and ethical skills you need to be a security professional.
Content
- Information security –Security Policy
- Identification -Authentication
- Authorization –Access Control –Auditing -Accountability
- Malicious Attacks-Malware
- Hash Functions -Digital Signatures Public Key Infrastructure (PKI) -Digital Certificates
- Firewalls
- ISO 27001
- Application Security
Reading
- Computer Security, D. Gollmann, J. Wiley & Sons, third edition, 2011
- Security Engineering, R. Anderson, J. Wiley, second edition, 2008
- Cryptography and Network Security: Principles and Practice, W. Stallings, Prentice Hall, fifth edition 2010
- Practical Unix and Internet Security, S. Garfinkel, G. Spafford, O'Reilly & Associates, Inc., third edition, 2003
- Privacy-What Developers and IT Professionals Should Know, J.C.Cannon, Addison Wesley, 2005
2nd Term Core Courses
During the second term, all students are initially required to attend three (3) required courses which give a total of 18 ECTS.
Wireless Communications and Networks
Instructor(s): | Professor Periklis Chatzimisios |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims
The course aims at studying fundamental principles of current and forthcoming mobile and wireless networks. Building on the knowledge gained during the 1st term course on Computer Networks, it analyzes how the basic networking operations are affected by the additional challenges of mobile and wireless environments but also the particularities of novel networking paradigms that are currently in the phase of research or initial/experimental deployments. Hence, the course covers cellular networks (mobile macrocellular and local area ones), but also more distributed and user-driven networking and service paradigms such as wireless multihop and opportunistic networks, as well as participatory sensing and mobile crowdsensing.
Learning Outcomes
By successfully completing the course students are expected to have:
- understood the particular challenges that wireless and mobile (distributed) environments place on basic networking operations
- gained knowledge about fundamental design principles (e.g., cellular architecture, mobility management) that address these challenges and developped basic network design skills
- familiarized themselves with different cellular communication technologies and standards (3G, LTE, WLANs) for engineering mobile cellular networks
- developped a good a understanding of novel, highly distributed, wireless networking paradigms such as wireless ad hoc networks and opportunistic networks and the way networking is realized over them
- been exposed to the latest trends in the area of participatory sensing and mobile crowdsensing, which combine the power of the crowdsourcing principle with the growing functionality of smart mobile devices
Content
- Challenges for the operation of mobile and wireless networks
- user/device mobility, wireless environment
- Fundamental principles of mobile cellular networks:
- cellular architecture (frequency reuse, sectoring, capacity vs. coverage)
- mobility management (macro- and micro-mobility, handovers), location management
- Current cellular systems and standards:
- GSM/GPRS, 3G, LTE, WLANs
- Network-, transport- and application-layer adaptations for wireless environments
- Mobile IP, TCP enhancements, proxies
- Wireless multihop and ad hoc networks
- additional challenges due to their distributed operation
- routing metrics (ETX, WCETT) and routing protocol (DSDV, DSR, OLSR) solutions and tradeoffs
- transport solutions (non TCP solutions, hop-by-hop)
- Opportunistic networking (Delay Tolerant Networks)
- the store-carry-and-forward principle, intermittently connected networks
- forwarding and routing under deterministic mobility (controlled flooding vs. utility-based and socioaware approaches)
- Participatory networking and mobile crowdsensing
- smart spaces and pervasive computing
- sensor/smartphone selection, incentive provision, applications
Reading
Schiller J. (2003) Mobile Communications, Addison Wesley, 2nd edition.
Software Development Methodologies
Instructor(s): | Prof. Christos Tjortjis |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims
The ever growing penetration of computers in everyday life has led to the need to develop a vast number of software programs, which in turn resulted to the emergence of a large number of programming languages, frameworks, SDKs, paradigms and techniques. Being able to write functional and maintainable code entails good knowledge of the most important programming concepts, methodologies and techniques. This is even more necessary now because of the extended fragmentation of the programming market. This course aims to teach students popular principles, techniques, tools and methods used to develop software efficiently. Requirement analysis, UML, Object-oriented analysis, design and programming, usage of Application Programming Interfaces (APIs), software maintenance, project and version management are some of the topics covered through theory and practice.
Learning Outcomes
On completing the course students will be able to:
- Appreciate principles, concepts, and techniques used to develop software efficiently
- Demonstrate how to effectively apply software engineering methods, tools and techniques
- Plan, manage and collaborate on a Software Development group project
- Obtain the knowledge and skills required for effective management of the software maintenance process
- Have developed effective software engineering, management and communication skills
Content
- Software development principles, techniques, methods and tools
- Requirement analysis
- UML
- Object-oriented analysis, design and programming
- Application Programming Interfaces (APIs)
- Software maintenance and evolution
- Project and version management
Reading
D. Avison, G. Fitzgerald, Information Systems Development methodologies, techniques and tools, 4e, McGraw Hill, 2006.
A. Dennis, B.H. Wixom, D. Teagarden, Systems Analysis and Design: An Object-Oriented Approach with UML, Wiley, 4th ed., 2012.
S. Bennett, S .McRobb, R. Farmer, Object-Oriented Systems Analysis and Design, 4th ed., McGraw Hill, 2010,
B. Oestereich, Developing software with UML : object-oriented analysis and design in practice, 2nd ed. Addison Wesley, 2002.
M. O' Docherty, Object-Oriented Analysis & Design. Understanding System Development with UML 2.0, Wiley, 2005.
R.S. Pressman, Software Engineering- A Practitioner's Approach, 8th ed. McGraw Hill, 2014.
I. Sommerville, Software Engineering, 9E ed. Addison-Wesley, 2010.
Big Data and Cloud Computing
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims
The big data explosion has led to new computing paradigms, the most prevalent among them being cloud computing. Cloud computing is about vast computing resources on demand, that allow for centralized data storage and online access. Big data is a broad term that includes several concepts and tasks, such as data capture, storage, sharing, management and analysis. This course focuses mostly on the big data storage and management part, rather than the analysis as well as cloud service models, architectures and tools. Students will familiarize with modern big data and cloud technologies, understand the privacy and security concerns and learn about popular big data and cloud computing platforms.
Learning Outcomes
On completing the course students will be able to:
- Develop the knowledge, understanding and skills to work with Big data
- Deploy a structured lifecycle approach to data analytics problems
- Apply appropriate analytic techniques and tools to analyzing big data
- Understand Cloud Computing Concepts and Mechanisms
- Learn the concepts, principles, techniques and methodologies you need to manage cloud services and resources
Content
- Big data concepts, principles and practical applications
- Big data capture, storage, sharing, management and analysis
- Cloud Computing Concepts and Mechanisms
- Cloud Architectures
- Working with Clouds
- Managing Cloud Services and Resources
- Big data and cloud computing platforms
Reading
T. Erl, R. Puttini, Z. Mahmood, Cloud Computing: Concepts, Technology & Architecture, Pearson, 2013.
EMC Education Services (Editor), Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data, Wiley 2015.
In addition to these required courses, during the second term, students tailor the programme further to their own needs by choosing two elective courses, which give a total of 12 ECTS.
2nd Term Elective Courses
- Information Retrieval
- Knowledge Management in the Web
- Data Mining
- Digital Organisations: eCommerce and eGovernment
- Mobile Applications Development
- Internet of Things
- Consulting Project
Information Retrieval
Instructor: Prof. Panagiotis Bozanis
Teaching Hours and Credit Allocation: 30 Hours, 6 Credits
Course Assessment: Exam & Coursework
Aims
The course covers the basic principles and techniques of information retrieval, which is the process by which a computer system can respond to a query about a given topic. A successful and meaningful response requires efficient data organization and classification, as well as efficient indexing and clustering algorithms. The students will study all aspects of data organization and processing that allow for efficient information retrieval as well as the underlying computational models and tools.
Learning Outcomes
On completing the course, users will be able to:
- Understand key concepts of information retrieval techniques and be able to apply these concepts into practice.
- Apply information retrieval principles to locate relevant information in large collections of data.
- Understand and deploy efficient techniques for the indexing of document objects that are to be retrieved.
- Implement features of retrieval systems for web-based and other search tasks.
- Analyse the performance of retrieval systems.
Content
- Introduction to information retrieval.
- Retrieval Models.
- Dictionaries, term vocabulary and postings lists.
- Index construction and compression.
- Vector space model and classification.
- Support vector machines and machine learning on documents.
- Search systems.
- Latent semantic indexing.
- Link analysis.
- Evaluation.
Reading
- C.D. Manning, P. Raghavan and H. Schütze (2008), Introduction to Information Retrieval, Cambridge University Press.
- S. Büttcher, C.L. A. Clarke and G.V. Cormack (20016), Information Retrieval, Implementing and Evaluating Search Engines, MIT Press.
- Grossman, D.A., Frieder, O. (2004), Information Retrieval, Algorithms and Heuristics, Springer.
Knowledge Management in the Web
Instructor: | Dr. Dimitrios Karapiperis |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims
This course examines basic concepts of Knowledge and Knowledge Management, placing emphasis on knowledge encountered in the Web. At first, it briefly deals with the notion of knowledge and its sources, the architecture and Life Cycle of Knowledge Management Systems, how knowledge is captured, how knowledge is formally represented using various formalisms, such as frames, ontologies, deductive and production rules, representation, and finally how knowledge is used for reasoning with the above knowledge representation formalisms. The core theme of the course covers extensively information and knowledge representation and interchange technologies in the Web, such as information representation using XML, information processing using XPath/XSLT, metadata representation using RDF, vocabulary descriptions using RDF Schema, and finally, knowledge representation in the web, using ontologies (OWL), and rules (SWRL, OWL2 RL, RIF). During the course various knowledge management web systems and tools are demonstrated and practiced.
Learning Outcomes
On completing the course participants will:
- Acquire essential skills on Knowledge Management Systems
- Comprehend web Knowledge Management languages and technologies, including XML, XPath, XSLT, RDF, RDFS and OWL
- Experiment with creating their own Knowledge Management systems through a carefully selected series of assignments.
Content
- Basic concepts of Knowledge and Knowledge Management
- Architecture and Life Cycle of Knowledge Management Systems; Knowledge capture
- Knowledge representation and reasoning: Frames, Ontologies, Deductive and Production Rules
- Web Knowledge Management languages and technologies: XML, XPath, XSLT, RDF, RDF Schema and OWL
- Demonstration and practice of various web Knowledge Management systems (XML editors, XPath/XSLT processors, Ontology/Rule editors, Reasoners, Rule engines).
Reading
Antoniou G. and van Harmelen F. (2008), A Semantic Web Primer, 2nd Edition.
Awad E. M., Ghaziri H. M. (2004), Knowledge Management, Prentice Hall.
Gomez-Perez A., Corcho O., Fernandez-Lopez M. (2004), Ontological Engineering: with examples from the areas of Knowledge Management, e-Commerce and the Semantic Web, Springer-Verlag.
Holzner, Steven, XML: a beginner's guide : go beyond the basics with Ajax, XHTML, XPath 2.0, XSLT 2.0, and XQuery, McGraw-Hill, 2009.
Allemang, Dean, Semantic web for the working ontologist: modeling in RDF, RDFS and OWL, Morgan Kaufmann Publishers/Elsevier, 2008.
World Wide Web Consortium (W3C) Site: http://www.w3.org/
Data Mining
Instructor(s): | Prof. C. Tjortjis |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims
The course covers Knowledge Discovery in Databases (KDD) and Data Mining (DM) as a set of computational tools and technologies, which provide valuable assistance for business analysis and strategic business decision making. This is a hands-on course that provides an understanding of the key methods of data visualization, exploration, classification, prediction, and clustering. Students will learn how to apply various data mining techniques for solving practical problems and how to develop and use simple business analytics systems.
Learning Outcomes
By the end of this course you should be able to
- Organise and efficiently process any knowledge, either given a priori or extracted
- Understand the basic concepts of data mining
- Understand and apply various data mining approaches, including Classification, Clustering and Association Rules.
- Model complex problems
- Develop skills on a broad range of business intelligence problems
- Understand, evaluate and utilise knowledge extracted from large volumes of data.Identify the basic components and special characteristics of a business decision problem and develop a solution.
Content
- Introduction to Knowledge Discovery in Databases (KDD) and Data Mining (DM)
- Classification and Regression
- Clustering
- Association Rules
- Exploratory vs. Confirmatory analysis
- DM Systems, Data pre-processing and EvaluationBusiness use cases
Reading
J. Han and M. Kamber, Data Mining: Concepts and Techniques, 3rd ed., The Morgan Kaufmann Series in Data Management Systems, Morgan Kaufmann Publishers, 2011.
I. Witten, E. Frank, and M. Hall, “Data Mining: Practical Machine Learning Tools and Techniques”, 3rd Ed., Morgan Kaufmann, 2011.
J. Ledolter, Data Mining and Business Analytics with R, Wiley, 2013.
P.N. Tan, M. Steinbach, and V. Kumar, “Introduction to Data Mining” Int’l Ed., 1/e, Pearson Higher Education, 2006.
R. Sharda, D. Delen, E. Turban, Decision Support and Business Intelligence Systems Int’l Ed. 10/E, Pearson Higher Education, 2015.
M.H. Dunham, “Data Mining: Introductory and Advanced Topics”, Prentice Hall, 2003.
M.M. Gaber (ed.), Journeys to data mining: experiences from 15 renowned researchers, Springer, 2012
Digital Organisations: eCommerce and eGovernment
Instructor(s): | Prof. V. Peristeras |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims
The aim of this course is to broaden and expand knowledge of the concepts and techniques required for the design, operation and control of the modern upcoming e-commerce applications and e-government systems that are massively introduced by western governments to fight bureaucracy. The essential computing background to support such systems is presented, along with the individual requirements for a wide variety of modern life activities that can be performed online.
Learning Outcomes
On completing the course students will:
- Develop knowledge of the information and communication skills to support and develop this type of information systems
- Broaden their knowledge into e-commerce, covering business, marketing, organisational and payment security issues
- Explain the concepts, processes behind developing an e-learning facility
- Understand the technological, ethical, legal and practical requirements of an electronic government information system
Content
- Current and emerging business models
- The use of information and communications technology
- Mobile commerce
- E-marketing and e-business strategy
- E-consumer behaviour and advertisement
- Organisational and managerial challenges in the electronic environment
- E-Payment systems
- E-learning; security issues and the legal environment
- Understanding eGovernment
- eAdministration/G2G
- eCitizens/ eAccountability
- eDemocracy/eParticipation
- eServices/G2C & G2B
- Legislation for eGovernment
- Integrated eGovernment, Group Presentations
Reading
Laudon K., Guercio-Traver C. (2008) E-Commerce 2009: Business, Technology, Society, Prentice Hall, 5th edition.
Turban E., Lee J. K., King D., McKay J., Marshall P., (2008) Electronic Commerce 2008, Prentice Hall. Abramson M., Morin T. (2003) E-Government 2003, Rowman & Littlefield, Lanham, MD.
Heeks R. B. (2006) Implementing and Managing eGovernment: An International Text, Sage Publications, London
Mobile Applications Development
Instructor(s): | Leonidas Akritidis |
Teaching Hours and Credit Allocation: | 30 Hours, 6 Credits |
Course Assessment: | Exam & Coursework |
Aims: This course introduces the students to the basic concepts of mobile computing technologies. It presents the features of the current state-of-the-art mobile operating systems and describes the most important tools for developing applications in these devices. In the sequel, the course focuses on the Android API and performs a detailed walkthrough on how robust, effective and user-friendly applications can be built.
Learning Outcomes: The students will be given the opportunity to learn the basic design and development strategies for implementing mobile applications. The following list summarizes these strategies:
· Description of a typical mobile environment and how an app respects the underlying limitations,
· Introduction of the principles of the Android OS,
· Lifecycle of an Android app,
· Communications with external (re)sources,
· Database connectivity,
· Publicationof an application in PlayStore and other repositories.
Content: The content of the course includes:
· Mobile devices, hardware, power and battery, limitations.
· The Android Operating System, and its API. The Android Development Studio.
· User interface control elements: Views, Layouts and types, Viewgroups,
· Events and Handling.
· Menus and Dialogs.
· Communication with remote services over http.
· Database essentials. SQLite database.
Reading:
· Ian Darwin, “Android Cookbook: Problems and Solutions for Android Developers”, O’ Reilly, 2017.
· David Griffith, “Head First Android Development”, O’ Reilly, 2015.
- https://developer.android.com/
Internet of Things
Instructor(s): | Prof. Periklis Chatzimisios and Dr. Stavros G. Stavrinides |
Hours and Credit Allocation | : 30 Hours, 6 Credits |
Course Assessment | : Exam & Coursework |
Learning outcomes
On completing the course, students will be able to:
- Develop knowledge of embedded system & sensor networks.
- Acquire a solid overview of the forthcoming technologies in the Internet of Things.
- Understand the challenged faced by IoT devices in various application domains.
- Familiarize with different technologies and standards.
- Embedded systems and real-time operating systems.
- Programming languages for embedded systems.
- Sensor networking and technologies.
- Mobile sensing systems.
- Smart grid & Intelligent Transportation Systems.
Reading
- IoT from research and innovation to market development, Overmesant, P.Friess (ed.) Riverpress Publishers.
- The Internet of Things. Enabling Technologies, Platforms, and Use Cases, Pethuru Raj and Anupama C. Raman, CRC Press.
Consulting Project
Instructor(s): | Dr. Stavros G. Stavrinides |
Credit Allocation: | 6 Credits |
Course Assessment: | Final deliverable |
Aims
The Consulting Project will require students to apply knowledge gained in classroom into practice. Students will tackle real-life problems and challenges facing companies or organisations in order to provide actual business solutions. Following a procedure of specifications/requirements, design and implementation, students will prepare and present their concrete and practical solutions in a final deliverable report.
Learning Outcomes
On completing the course, students will be able to:
- Understand real-world problem faced by companies/firms and propose functional solutions.
- Develop critical thinking and ability to integrate data and information towards the optimal solution.
- Understand the structure, operational mode and challenges of real-world companies.
Content
- Understanding and recording a company’s needs and challenges.
- Project requirements.
- Data analysis, implementation and company feedback.
- Producing a deliverable.
Dissertation
Dissertation
During the third term, students work on their Masters Dissertation project, the thematic area of which is relevant to their programme of studies and their interests. The dissertation provides a good opportunity to apply theory and concepts learned in different courses to a real-world ICT problem or challenge. Students are supervised throughout their projects by a member of the academic faculty and the academic associates. After submission of the dissertation, students present their projects to classmates and faculty at a special event.
Career Paths
Career Paths
More than 70% of our graduates end up in good, relevant jobs within a year from graduation. A multitude of employment opportunities are envisaged for graduates of the MSc in ICT Systems programme. Indicatively they include:
- Managerial, technical and research positions in IT departments and IT companies
- Banking and other Financial Institutions
- Multinational Corporations and Small and Medium Enterprises (SMEs)
- e-Commerce and Health software companies
- Mobile network providers and broadband Internet providers
- Sensor networks and telematics companies
- Multimedia content providers and developers (Digital Radio, Television providers and Media)
- Governmental Telecommunication Regulatory Authorities
In addition to technical skills gained through study, our students benefit from the University's excellent Careers Office in order to attain essential soft skills (e.g. communication skills, interview preparation, CV writing etc.) to better prepare for the job market.