Track: Business Networks
Networks have become a ubiquitous form of or- ganising, particularly in the business context. In this track, you will discuss questions such as: What is the motivation of firms to engage in in- ter-organizational cooperation? In what kind of relationships do companies enter? What are viable network business models? How does successful cooperation and coopetition work? How can networks be managed?
Beyond this, you will immerse yourself in the foundations of information security to be able to understand this central threat for businesses and their networks.
Inter-Organizational Systems (Winter Term)
Networks have become ubiquitous forms of or- ganizing in and between economy, public ad- ministration and society at large. On the backdrop of this development, this module in- troduces interorganizational systems and net- works in a business context, yet with linkages to public administration (e.g. customs) and so- cial networks. It aims to explore the contingen- cies and strategies that lie behind the evolution and use of interorganizational information in- frastructures and applications. Participants be- come familiar with major streams of literature (theories and methods) about corporate net- works, interorganizational systems and infra- structures.
Network Economics (Summer Term)
The purpose of the course is to introduce basic concepts of networks and network studies. While exploring different phenomena of net- works, different methodological approaches and studies on networks will be covered. Em- phasis is put on simple models lending them- selves to rigorous solutions. Participants immerse in the notion that network graphs form the social and economic fabric of an informati- on society, and grasp the emergent properties of design choices in the Internet technology. The course takes a more formal/quantitative approach. Key themes:
• Graph Theory and Social Networks
• Game Theory
• Network Models of Markets with Intermediaries
• Network Dynamics: Population Models
• Network Dynamics: Structural Models
• IT Strategy Theory
Information Security (Summer Term)
This lecture covers the foundations of informa- tion security including the specification of pro- tection goals, adversary models, security mechanisms (e.g., identification, access con- trol) and cryptographic primitives to enforce protection goals in distributed systems (e.g., symmetric and asymmetric encryption, integrity protection). Security mechanisms will be dis- cussed both from the perspective of a system operator, who protects a larger distributed sys- tem, as well as from the end users’ point of view, who may wish to use security technology to self-protect against untrustworthy system operators.