This course offered by Department of Business Administration of University of Piraeus.
Κατεύθυνση: Major in Communications & Networks
Network Oriented Information Systems
Learning Outcomes
The aim of this course is to explain the nature and basic characteristics of the Information Systems that are run and managed over a network. With the completion of the course, the student will be in position:
- to understand and become familiar with the key aspect for the design and development of network-oriented information systems.
- to know the main characteristics of the information systems, the required interfaces and the approaches to realize the network-oriented aspect of such information systems.
- to be able to implement network-oriented information systems, by utilizing programming techniques and methods.
Course Contents
- Information Systems and Networks.
- Portals, Middleware, Integration, Enterprise Application Integration, Enterprise Service Bus.
- Web Services, Service-Oriented Architectures, SOA governance.
- Organizational change, the impact of integrated network oriented IS on organizations.
- Enterprise Resource Planning applications, Customer Relationship Management systems, Supply Chain Management solutions, e-business applications.
Moreover, the EVDOXOS system is utilized to provide additional useful information to the students as well as exercises that respond to the corresponding thematic topics / sessions covered by the course.
Recommended Readings
- Papazoglou M. P. (2008): Web Services: Principles and Technology, Pearson, Prentice Hall.
- Josuttis N. (2007): SOA in Practice, O’Reilly.
Computer Networks II
Learning Outcomes
The aim of the course “Computer Networks II” is to complement the course “Computer Networks I”, in order for the students to deepen their knowledge in Computer Networks and their functions. In particular, through this course the students will get familiar with the operation of the data link layer, the Medium Access Control (MAC) sub-level and the Logical Link Control (LLC) sub-level.
Upon successful completion of the course, the students will be in position to:
- select and apply parity bit, CRC and hamming techniques,
- select and apply information retranslation techniques through the computer network,
- use the corresponding communication protocols,
- combine their knowledge in the field routing,
- use the most appropriate protocol according to the needs of the network, based on correction and retransmission techniques, thus developing a critical way of thinking.
Course Contents
- Section 1: Introduction to the functionality of the Data Link Layer (DLL), Medium Access Control (MAC) and Logical Link Control (LLC) layers, error control, error detection, error correction, retransmission techniques, error detection techniques.
- Section 2: Cyclic Redundancy Codes (CRC), error correction techniques.
- Section 3: Hamming techniques, Forward Error Correction (FEC), retransmission techniques.
- Section 4: Stop-and-Wait (S&W), Alternating Bit Protocol (ABP), Automatic Repeat Request (ARQ), sliding window techniques, Go Back N (GBN), Soptional Repeat (SRP).
- Section 5: MAC protocols; Aloha; Carrier Sense Multiple Access (CSMA); MAC protocols in Wireless Section 6: LANs/MANs/PANs; ΙΕΕΕ 802; x standards; LLC protocols; 802.2 standard.
- In addition, articles, web addresses for useful information, as well as exercises for practicing students are posted in the platform Evdoxos.
Recommended Readings
- Walrand J. (1997): Communication Networks, Prentice Hall.
- Russell T. (1997): Telecommunications protocols, McGraw-Hill.
Associated scientific Journals
- ΙΕΕΕ Computer Networks
- IEEE Communications Magazine
- EEE Access
- IEEE Wireless Communications
- International Journal of Network Management
- Transactions on Emerging Telecommunications Technologies
- EURASIP Journal on Wireless Communications and Networking
Mobile and Personal Communication Networks
Learning Outcomes
The course presents the architectures and functional characteristics of modern mobile communication networks. Emphasis is given on the networking physical and functional entities and their interoperability, the communication and signaling protocols, the fixed network infrastructure and the mobile services in 2nd generation (GSM), 3rd generation (UMTS) and 4th generation (LTE) networks.
Upon successful completion of the course, the students will be in position to:
- understand, analyze and evaluate the basic design options in the development, operation and maintenance of the different generations of mobile communication networks
- know the architecture and physical and functional entities of the different generations of mobile communication networks
- know of the basic functionalities of radio resource, handover, mobility and communication management of the different generations of mobile communication networks
- dimension cellular networks based on the offered traffic load and the desirable quality of service
Course Contents
- Overview of mobile communication networks with emphasis on 2nd generation GSM and 3rd generation UMTS systems.
- Network architecture (network subsystems, functional layers, physical architecture, radiocoverage, mobility).
- Radio resource management (functions and procedures for radio management, handover procedure, handover in multi-layer architecture).
- Mobility management (paging and location update procedures).
- Communication management (call control, call setup, call release, complementary services, message services).
- Systems and standards GSM, HSCSD, GPRS, UMTS and LTE. Signalling protocols (SS7).
- Location based services (architectures, methods).
Recommended Readings
- M. Theologou, “Mobile and Personal Communication Networks”, Tziola Publishers, (Greek).
- Holma and Toskala, “WCDMA for UMTS: Radio Access for Third Generation Mobile Communications”, Wiley.
- Holma and Toskala, “HSDPA/HSUPA for UMTS: High Speed Radio Access for Mobile Communications”, Wiley.
- Michel Mouly and Marie–Bernadette Pautet, “The GSM System for Mobile Communications”, Telecom Publishing.
Didactics of Informatics
Learning Outcomes
Upon successful completion of the course, the student will be able:
- to understand the specificities of ICT and digital technology teaching in school taking into consideration the issue of diversity in terms of characteristics, motivation, preferred way, place and learning time of learner audience.
- to describe the historical development of its computer science teaching with or without the use of educational software.
- to design learning scenarios for promoting computational thinking using learning strategies.
- to implementing applications with the use specialized software such as Jeroo, KarelRobot, Alice
- to design and develop digital games using platforms such as Scratch.
- to assess systematically the quality of educational software.
Course Contents
- Educational policies about the integration of information technology in Greece’s education system.
- The teaching of Informatics as a course subject in Greece: primaty and secondary education curricula, lesson plans, educational textbooks, in0-service teacher training workshops.
- Computer science didactic issues: traditional didactic approaches and approaches based on modern learning theories, learning difficulties in basic concepts of computer science, examples of lesson plans and activities.
- Computer-aided programming environments such as Jeroo, KarelRobot, Alice.
- Design and development of games with MIT Scratch tool.
- Laboratory experimentation with the development of simulation interactive games.
Recommended Readings
- UNESCO & IFIP (2002): Information and Communication Technology in Secondary Education – A Curriculum for Schools, Edited by Tom van Weert. Paris: UNESCO, 2002.
- Informatics for All Initiative (2018). Informatics Europe and ACM Europe, http://www.informatics-europe.org/component/phocadownload/category/10-reports.html?download=75:informatics_for_all_2018
- Stoffers AM., Diethelm I. (2014) Teacher Profiles for Planning Informatics Lessons. In: Gülbahar Y., Karataş E. (eds) Informatics in Schools. Teaching and Learning Perspectives. ISSEP 2014. Lecture Notes in Computer Science, vol 8730. Springer, Cham
- Michal Armoni. 2019. COMPUTING IN SCHOOLS: Why are we teaching this?: strings and beyond. ACM Inroads 10, 1 (February 2019), 30-32. DOI: https://doi.org/10.1145/3306136
Instructional Methods
Learning Outcomes
This course is designed to promote a fundamental understanding of the theoretical and applied knowledge related to instructional theories and models (principles, methods, strategies) for the design, development, implementation and evaluation of Technology Enhanced Learning Environments (TELE). The purpose of this course is to introduce students to the orchestrated elements of instruction.
At completion of the course, the students will be able:
- to understand the fundamental principles of instructional theories and models
- to analyze, design, develop and evaluate different types of instructional methods & strategies for an effective teaching.
- to demonstrate a knowledge of the ‘what’, ‘how’, and ‘when’, in the instructional design process in different disciplines.
- to integrate ICT educational technologies into activities for K-16 and business settings.
- to create an educational plan/scenarios for reflective thinking into educational practice.
- to create the appropriate orchestrated instructional methods and strategies for an effective teaching.
- to articulate a personal set of values, motivation, attitudes and a vision for the future classroom.
Course Contents
- Introduction to the concepts: Education – Learning – Instruction – Training.
- Principles of the learning processing in different Teaching Models (behavioral, cognitive and social constructivist principles & theories in specific instructional methods).
- Personal and psychological factors in learning and instruction (individual differences, self-efficacy beliefs, motivations, needs, attitudes, learning styles, cognitive learning styles on TELE).
- Models of teaching and instructional design (Gagne’s Nine Events of Instruction, Bruner, Pr/jBL, Kirkpatrick model).
- Taxonomies and learning objectives (Bloom’s Taxonomy).
- Formative, summative and authentic assessment.
- ICT in educational settings (synchronous and asynchronous learning, web 2.0 environments, authoring tools, AHLE, LMS, CMS, smart education, e-portfolios, educational games, gamification).
- ICT applications (lesson plans, educational scenarios, macro/micro scenarios).
- School and professional environment (interpersonal relationships, communication, ethics).
Recommended Readings
Joyce, B. R.; Weil, M.; Calhoun, E. (2015). Models of Teaching, 9th Edition, Pearson
Dell’Olio, J., & Donk, T. (2007). Models of teaching: Connecting student learning with standards. Thousand Oaks, CA: Sage Publications.
Joyce, B. R.; Weil, M.; Calhoun, E. (2015). Models of Teaching, 9th Edition, Pearson
Elliott S, Kratochwill T, Littlefield-Cook J, Travers J. (2008).Educational Psychology: Effective Teaching, Effective Learning,Brown & Benchmark Pub.
Reggie, K., Fox, R., Chan F. T. , Tsang P. (2008). Enhancing Learning Through Technology: Research on Emerging Technologies and Pedagogies. World Scientific
Roblyer M.D. (2009). Integrating Educational Technology into Teaching, 5thed., Allyn & Bacon.
Sawyer, R. K. (2006). The Cambridge Handbook of the Learning Sciences, Cambridge University Press.
Slavin R., E. (2008). Educational Psychology: Theory and Practice, 9thed.,Allyn & Bacon.
Snowman, J. Biehler, R. (2008). Psychology Applied to Teaching, 12th Edition, Hougton & Mifflin.
Woolfolk, A. (2010). Educational Psychology,11thed., Allyn & Bacon.
Digital Innovation Management and Entrepreneurship
This course focuses on the interconnection between entrepreneurial thinking and innovation. Upon successful completion of the course, the student will be able to:
- understand the differences between innovation and entrepreneurship and how the two work in conjunction to create dynamic startups.
- learn how to analyze markets when searching for potential segments to target
- select among strategies that could aid in growing customer base through inbound and outbound marketing
- recognize business innovation opportunities
- create a business plan around a minimum viable product
Course Contents
- Methods and tools of enhancing innovativeness and creativity (Mindmapping, SixHats, SCAMPER)
- Why startups are not smaller versions of large companies. Why Do Startups Fail
- How do you find your customer archetype? Types of Customers & Types of Business Models
- Relationship between Value Proposition and Customer Segments
- Customer Acquisition Models and Customer Acquisition Cost (CAC)
- How do you make your money? Revenue Stream and Pricing Revenue Streams
- What is most important for the business? Financial Resources & Financial Planning
- Intellectual Property – Patents & Trademarks
- Presenting your startup–pitching for funds(seed & venture capital, angels, etc)
- Business plan competitions and accelerator programs
Recommended Readings
- Adedeji, B. & Rahman, M. (2018). Innovative Teaching Methods and Entrepreneurship Education: A Review of Literature. Journal of Research in Business, Economics and Management 10 (1), 1807-1813
- Ghulam, N., Liñán, F., Fayolle, A., Krueger, N. y Walmsley, A. (2017). The Impact of Entrepreneurship Education in Higher Education: A Systematic Review and Research Agenda. Academy of Management Learning and Education, 16 (2), 277-299.
- Lindberg, O. J., Olofsson, A.D., Fransson, G., Hansson, A. (2017): Developing awareness of digital competence and skills through dialogue: a methodological reflection, The International Academy of Technology, Education and Development, p. 5679-5686.
Business Process Management
Learning Outcomes
The objective of this course is to present fundamental principles of Business Process Management (BPM) and to study various methods and techniques for analyzing, modeling, automating, executing and optimizing business processes. The course will incorporate a laboratory component with well-known BPM software tools that allow students to practice some of the principles addressed.
Upon successful completion of this course student will be able to:
- Create business process models by using BPMN based modelling tools
- Execute business processes by using Business Process Management Systems
- Analyze the performance of existing business processes and improve business processes that are not sufficient according to certain criteria
- Create business process management strategies and business processes implementation plans within organizations
Course Content
- Business process definition, intra- and inter-organizational processes. Process-oriented organizations. Build processes’ business models. Virtual enterprises. Business processes and workflows.
- Process analysis techniques. Qualitative process analysis (e.g. Pareto analysis, value-added analysis, root-cause analysis). Quantitative process analysis (e.g. queuing analysis, simulation). Performance metrics (time, cost, quality).
- BPM life cycle. Discover, analyze, model, monitor, map, simulate, deploy. Business Process Reengineering-BPR and Business Process Improvement- BPI methodologies. Business Process modeling tools.
- The BPMN standard for business process modelling.
- Business process automation. Conceptual and executable process models.
- Business Processes Management Systems-BPMS (e.g. structure, architecture, standards).
- Process and activity life cycles. Workflow-based applications.
- Business processes and workflows, workflow categories, workflow dimensions, workflow management, workflow functional requirements, workflow specifications and execution languages.
- Workflow management using a specific BPMS software tool.
- Process Analytics. Metrics for evaluating business processes’ performance. Monitoring of standard metrics and process specific, user dined metrics.
- BPM methodologies (e.g. Six Sigma, Lean).
- Service-oriented and process-oriented information systems.
Suggested Bibliography
- John Jeston and Johan Nelis (2008): Business Process Management, Second Edition: Practical Guidelines to Successful Implementations, Butterworth-Heinemann, Boston, ISBN: 0750669217.
- Artie Mahal (2010): How Work Gets Done: Business Process Management, Basics and Beyond, Technics Publications, New Jersey, ISBN: 193550407.
- Matias Weske, (2010): Business Process Management: Concepts, Languages, Architectures, Springer, New York, ISBN: 3642092640.
- Simha Magal and Jeffry Word (2009): Essentials of Business Processes and Information Systems, Wiley, New York, ISBN: 0470418540.
- Howard Smith and Peter Fingar (2003): Business Process Management: The third wave. Meghan Kiffer, ISBN: 0929652339.
- Mark McDonald, (2010): Improving Business Processes, Harvard Business Review Press, Boston, ISBN: 142212973.
- Business process management Journal, Emerald.
- International Journal of Business Process Integration and management, Inderscience Publishers.
Network Management
Learning Outcomes
- Upon successful completion of the course, the students will be able to:
- select the adoption of appropriate models and protocols for network management, depending on their technical characteristics
- design solutions for the initial design and the development of computer networks, in the context of specific business objectives and technical requirements/problem
- analyze, recognize, and assess design issues in wireless sensor networks
- identify and evaluate technical and business conditions and clauses to monitor the required level of service in networks through a service level agreement (SLA).
During the laboratory practice, the student exercises to monitor and control the operation of remote network elements with the utilization of specific protocols.
Course Contents
•The architecture of the Internet, Review of basic concepts of networks and network protocols
•Subnetting and Hierarchical Routing
•Software Defined Networking (SDN), Network Function Virtualization (NFV)
•Data center networking
•Role of management systems, Introductory management concepts, Management functions: configuration, fault, accounting, performance and security management, Management levels: element management, network management, service management, business management
•Management entities and managed nodes, Design and development of management applications
•SNMP Protocol (Simple Network Management Protocol), Management Information Base (MIB), MIB-II
•RMON (Remote network Monitoring)
•NETCONF protocol
•Web-based Management
•ISO/OSI management standard
•TMN management model
•Design of fixed and wireless access networks
•Design Issues of Wireless Sensor Networks
•Network performance monitoring through a Service Level Agreement
Furthermore, in the platform eclass /Aristarchus lecture notes and laboratory exercises are posted for the students.
Recommended Readings
•Miliou Amalia N., Nikopolitidis Petros, Pomportsis Andreas S. (2007): Management of computer networks, A. Tziola & Sons Publications
•Development and Management of Computer Networks, Fouliras Panagiotis, Greek Academic Electronic Books – “Kallipos” Repository
•Computer Networking: A Top-Down Approach, James Kurose, Keith Ross, Pearson Education Limited
•P.Oppenheimer (2010): Top-Down Network Design, 3rd Edition, Cisco Press
•Sudhir Dixit, Ramjee Prasad, Wireless IP and Building the Mobile Internet (Artech House Books, 2003)
•Nathan Muller, LANs TO WANs: The Complete Management Guide, (Artech House Books, 2003)
•Matthew Liotine, Mission-Critical Network Planning, (Artech House Books, 2003)
•Nihal Kularatna, Dileeka Dias, Essentials of Modern Telecommunications Systems (Artech House Books, 2004)
Knowledge and Competence Management
Learning Outcomes
Students will be able:
- to know and understand the key concepts of knowledge management and competence management.
- to analyse, assess and select systems that support the management of organisational knowledge and the management of professional competences.
- to know, understand and apply international and European standards for modelling and describing Individual and Organisational Competences.
Course Contents
- Knowledge Management:
- Introduction to Knowledge Management
- The Nature of Knowledge: What is Knowledge, Alternative Views of Knowledge, Different Types of Knowledge, Locations of Knowledge
- Knowledge Management Methods and Tools: KM Processes, KM Systems, KM Infrastructure
- Organizational Impacts of Knowledge Management
- Factors Influencing Knowledge Management
- Case Studies: Professional Knowledge and Professional Practices Management through Online Professional Communities
- Competence Management:
- Introduction to Competence Management
- Definition of Competence. Competence vs Competency
- Competence Models: Definition and Methods for developing Competence Models
- Case Studies:
- Individual Non-Professional Competences: the European Digital Competence Framework for Citizens (DigComp 2.1)
- Individual Professional Competences: the UNESCO ICT Competency Framework for Teachers (ICT-CFT).
- Organizational Competences: the European Framework for Digitally-Competent Educational Organisations (DigCompOrg)
Recommended Readings
- Textbook in Greek (provided for free)
- Additional Open Access Educational Resources available through the course management system