Lecturer(s)
|
|
Course content
|
An integral part is modeling on a network of computers (PC) laboratory lessons with selected practical applications of information systems in crisis management - when students become familiar with selected software applications for ICT for geographic information systems (QGIS and ArcGIS), applications Emoff and Emoff and territorial crisis management systems and Practis application as a simulation module of ICT in crisis management. Main topics: - Use of system theories and cybernetics as "science of management and communication of information in living and non-living organisms". - Introduction to information systems - basic concepts, definitions, importance of information systems. - Information and communication technologies (ICT) - classification, basic types, tasks of individual types of ICT. - ICT structure and its creation. - The role of ICT in ATK, ASŘ and KB in crisis management. - Development trends of ICT, ASŘ and specifics of crisis management modeling. - Mission of ICT in crisis management - for modeling of crisis management and risks for intelligent robotic devices in this area (ICT). - Application of EMOFF and EMOFF municipality - description of applications, their structure, tasks in crisis management, basics of control, testing in crisis management. - Application PRACTIS - module of simulations, importance of simulations in crisis management, creation of scenarios of activities, testing within information system of crisis management. - Geographical information systems - theoretical basics of the issue, role of geographic information systems in crisis management, GIS portal FRS CR, digital flood plan, digital bases of water management data. - Application QGIS and ArcGIS - description of applications, basics of control, spatial analysis, processing of outputs for crisis management. - Information support of crisis management - importance of information support in crisis management, management and control of information support, role of information systems, SW application Krizkom, Situnet. - Case studies - correction and solution of assigned tasks.
|
Learning activities and teaching methods
|
Lecturing, Exercises on PC, Practice exercises, Teamwork, Text analysis, Individual work of students, E-learning
- Term paper
- 50 hours per semester
- Preparation for examination
- 30 hours per semester
- Home preparation for classes
- 40 hours per semester
- Preparation for course credit
- 10 hours per semester
- Participation in classes
- 20 hours per semester
|
prerequisite |
---|
Knowledge |
---|
Students build on the theoretical foundations of informatics and system conception of ICT in ASC. They will extend their knowledge of the environment of technical cybernetics and the importance of cyberspace for solving and modeling of system crises and crisis management on models of modern technical (HW) software (SW) of the laboratory. |
Students build on the theoretical foundations of informatics and system conception of ICT in ASC. They will extend their knowledge of the environment of technical cybernetics and the importance of cyberspace for solving and modeling of system crises and crisis management on models of modern technical (HW) software (SW) of the laboratory. |
learning outcomes |
---|
Describe an information system, its structure, and its individual components |
Describe an information system, its structure, and its individual components |
Explain procedures leading to the smooth operation of a workstation |
Explain procedures leading to the smooth operation of a workstation |
Define the role of software and hardware in the context of information and cyber security |
Define the role of software and hardware in the context of information and cyber security |
Comprehensively explain process and activity modeling |
Comprehensively explain process and activity modeling |
Characterize means for ensuring the physical security of information and cyber infrastructure |
Characterize means for ensuring the physical security of information and cyber infrastructure |
Skills |
---|
Ensure smooth operation of a workstation |
Ensure smooth operation of a workstation |
Administer a wireless router, including its security |
Administer a wireless router, including its security |
Securely access the internet environment using modern technologies |
Securely access the internet environment using modern technologies |
Critically analyze the level of physical security of information and cyber infrastructure |
Critically analyze the level of physical security of information and cyber infrastructure |
Ensure smooth operation of a wireless computer network, including interference prevention |
Ensure smooth operation of a wireless computer network, including interference prevention |
teaching methods |
---|
Knowledge |
---|
Exercises on PC |
Exercises on PC |
Individual work of students |
Individual work of students |
Teamwork |
Teamwork |
Text analysis |
Text analysis |
Practice exercises |
Practice exercises |
E-learning |
E-learning |
Lecturing |
Lecturing |
assessment methods |
---|
Oral examination |
Essay |
Essay |
Analysis of the student's performance |
Analysis of the student's performance |
Grade (Using a grade system) |
Grade (Using a grade system) |
Oral examination |
Recommended literature
|
-
AUSTIN, Robert F., David P. DISERA a Talbot J. BROOKS. GIS for critical infrastructure protection. Boca Raton, 2016. ISBN 978-1-4665-9934-5.
-
BAWDEN, David a Lyn ROBINSON. Úvod do informační vědy. Doubravník, 2017. ISBN 978-80-88123-10-1.
-
BOTEK, Zdeněk. Základy informačních technologií. Zlín, 2013. ISBN 978-80-7454-313-5.
-
Josef Požár. Manažerská informatika. Praha, 2003. ISBN 80-7251-139-4.
-
Lukáš, Luděk. Informační management v bezpečnostních složkách. 1. vyd. Praha : Ministerstvo obrany České republiky, 2008. ISBN 978-80-7278-460-8.
-
Štědroň, Bohumír. Manažerské řízení a informační technologie. 1. vyd. Praha : Grada, 2007. ISBN 978-80-247-2052-4.
-
WALLACE, Patricia. Introduction to information systems. Boston: Pearson, 2015. ISBN 978-1-292-07110-7.
|