i) Question Type The following are guidelines on the type of questions and their approximate weightings:

Size: px
Start display at page:

Download "i) Question Type The following are guidelines on the type of questions and their approximate weightings:"

Transcription

1 Purpose Information Systems Strategy [MS2] Examination Blueprint 2014/2015 The Information Systems Strategy [MS2] examination has been constructed using an examination blueprint. The blueprint, also referred to as the test specifications, outlines the content areas covered on the examination and the weighting allotted to each content area. This document also lists the topics, the level of competence for each topic, and the related learning objectives and competencies. In addition, information is provided on the proportion of each question type presented in the examination (that is, multiple choice, quantitative problems, and so on). Use Students should use the examination blueprint to prepare for the course examination. The blueprint may not include all the topics listed in the course materials; however, students are still responsible for acquiring a broad-based knowledge of all topics not listed in the blueprint since these topics will be tested in assignment and review questions. The topics not listed in the blueprint will also provide students with a greater depth of understanding of Management Information Systems concepts. Examination Objectives The objective of the four-hour comprehensive examination is to test CGA students on the prerequisite knowledge that is required for advancement into PA1: Issues in Professional Practice and PA2: Strategic Financial Management, so as to ensure that the students have the broad-based knowledge in Management Information Systems needed to function properly in the Association s capstone courses. Examination Guidelines for Questions i) Question Type The following are guidelines on the type of questions and their approximate weightings: Question Item Multiple-choice questions Short-answer and/or short case-type problems of both a qualitative and quantitative nature. Description Questions may take a conceptual basis or they may require technical or analytical skills to derive the correct solution. Questions may focus on technical or analytical aspects of the material. Short, integrative cases may be used to pull together related issues. For example, a problem may require students to outline alternatives, supporting their recommendations with numerical analysis. Percentage 20% 30% 70% 80% ii) Question Content The following table is organized according to content area and provides information on topics, learning objectives, weighting, competencies and levels of competence. The competencies applicable to a particular module are identified independent of the learning objectives. Examination sessions: March 2015; June 2015 Page 1 of 12

2 Table 1. Information Systems Strategy [MS2] Examination Blueprint Note: Competency codes (such as PK:FN:11) have been added to the column for all Level 4 and PACE examination blueprints. These codes are used to identify the competencies. They do not affect students use of the blueprint. Please see the CGA Competency Framework for more information. Content 1. Strategic importance of IS IS as an integral part of strategic planning 1.2 IS for competitive advantage 1.3 IS to achieve business transformation 1.4 IS and globalization 1.5 Managing IS human resources 1.6 IS s rapid pace of change 1.7 The ethics of information Evaluate the role of an IS strategy as part of an organization s overall strategic plan. Evaluate a company or industry using Porter s five forces and Barney s resourcebased view of the firm, and formulate several strategies that allow an organization to develop competitive advantage. Identify the types of strategies that produce a competitive advantage for an organization. Recommend how to leverage and use IS to create and maintain a competitive advantage. Recommend applications and processes through which IS can contribute to organizational and business transformation. Evaluate the benefits and limitations of IS in relation to the globalization of business. Explain the structure of the IS function and the kinds of people that work in a typical IS department. Explain the challenges in managing people who design and operate information systems and support the firm in using them. Discuss the human resource challenges in IS management and how these affect IS planning. Discuss the role of the CIO and understand its strategic significance. Assess the implications of managing rapid change. Explain how competencies in ethics and Examination sessions: March 2015; June 2015 Page 2 of 12 PK:IT:01: Advises on the development of IT strategy LD:SO:02: Evaluates the organization's strengths, weaknesses, opportunities, and threats LD:SO:03: Develops, implements, and updates the organization's strategic plan LD:SO:04: Evaluates and advises on the impact of specific changes in strengths, weaknesses, opportunities, and threats PK:IT:03: Aligns financial and related information systems with the organization's strategic and business plans LD:OE:04: Conducts business process reviews of existing systems, processes, and controls within the organization PK:MA:07: Recommends organizational improvements based on results from management accounting systems PK:BE:02: Advises on business decisions in the context of larger economic and geopolitical conditions LD:SO:06: Develops, implements, and updates the organization's operational plan in alignment with the strategic plan PK:BE:10: Advises on organizational structure LD:IT:01: Builds and motivates high-performance individuals and teams to achieve goals and objectives LD:IT:09: Aligns organizational goals and objectives with individual and team goals through the use of a performance management system LD:IT:10: Provides career planning, coaching, training and development opportunities to facilitate staff retention and succession planning PK:IT:04: Evaluates and advises on the impact of new technologies on business processes LD:SO:05: Manages change in the organization caused by internal and external factors

3 provision for CGAs professionalism equip CGAs to help make ethical strategic choices in business. Identify the ethical value added by accountants working in the IS area. Relate the role of accountants as information producers, analysts, and distributors to work in the IS and IT areas. PR:ET:04: Protects the public interest Examination sessions: March 2015; June 2015 Page 3 of 12

4 2. Information technology governance: Organization and planning for IS IT governance 2.2 Short- and long-range technology planning 2.3 Data and information management issues 2.4 IS economics 2.5 Developing an IS strategic plan Evaluate the critical decisions about IT that organizations make, and the different governance arrangements for making those decisions. Identify the roles of the financial manager and other stakeholders in IT governance. Assess the challenges of taking an IS plan from theory to practice. Assess the principal drivers of hardware and software decisions in organizations. Identify the specific issues in hardware and software planning. Evaluate the advantages and disadvantages of centrally determined technology standards. Relate the issues of data integrity, security, and integration as they apply to IS planning. Assess the business value of an information system from a financial perspective. Identify the four elements that make up the total cost of ownership of IS, and defend the importance of considering non-capital costs when evaluating IS acquisitions. Relate the relevance of Moore s Law and Metcalfe s Law to IS management. Evaluate the issues associated with IS planning and developing an IS strategic plan. Compare the scenario planning approach to more traditional approaches of structuring the planning process. PK:IT:01: Advises on the development of IT strategy LD:OE:03: Advises on issues of corporate governance PK:BE:10: Advises on organizational structure LD:SO:06: Develops, implements, and updates the organization's operational plan in alignment with the strategic plan PK:IT:02: Selects and uses appropriate business technology tools in the workplace PR:IA:03: Evaluates implications and assesses the appropriateness of solutions beyond the immediate or short term PR:SF:01: Anticipates and meets the needs and expectations of internal and external stakeholders PK:IT:07: Evaluates and advises on the safeguarding of IT assets to ensure organizational ability to meet business objectives PR:ET:06: Ensures confidentiality of stakeholder information LD:OE:02: Designs, evaluates, and reports on internal control systems to ensure organizational effectiveness PK:IT:03: Aligns financial and related information systems with the organization's strategic and business plans PR:IA:02: Evaluates the interrelationship of an issue on different functions of the organization and applies concepts and approaches within and across functional areas to develop integrative solutions PK:MA:03: Identifies, assesses, and advises on information required for management decision making Examination sessions: March 2015; June 2015 Page 4 of 12

5 3. Systems development overview and issues Systems development 3.2 Systems development methods and techniques 3.3 Make, buy, or subscribe decisions Identify and describe the six activities of systems development. State the factors that influence the success or failure of systems development. State the importance of systems development methodologies. Compare and contrast the waterfall method for developing systems with prototyping, rapid application development, end-user development, purchased applications, and outsourcing. Evaluate the factors to consider when choosing whether to make or buy an information system. PK:IT:05: Advises on the design, development, and implementation of IT projects including specific applications software LD:SO:08: Assumes leadership at various phases of planning, implementation, and evaluation PK:IT:06: Advises on implications of IT acquisitions and vendor selection PK:MA:06: Analyzes and evaluates information from management accounting systems, and makes decisions PR:CM:07: Facilitates resolution between differing viewpoints PK:BE:05: Prepares and advises on contract structure and enforcement policies 3.4 Acquisition of software and hardware Prepare a basic request for quotations and a basic request for proposal, and evaluate vendor proposals Vendor selection and contractual issues Determine the challenges in selecting vendors for information systems and approaches to minimizing problems in vendor relationships. Plan the contract negotiation process, and explain the key clauses in a hardware or software contract. 3.6 Project management Evaluate the issues and challenges in managing IS projects. Compare the techniques of PERT and Gantt charts and define their role in project management. Design simple PERT and Gantt charts 3.7 Feasibility and cost-benefit analyses Support a decision to continue or abandon a project using feasibility and cost-benefit analysis. Examination sessions: March 2015; June 2015 Page 5 of 12

6 4. Systems analysis and design Analysis and design overview 4.2 Systems analysis: Requirements gathering 4.3 Process modelling: Data flow diagrams 4.4 Data modelling: Entity relationship diagrams 4.5 Logic modelling: Structured English 4.6 Use case analysis 4.7 Systems design Distinguish between logical and physical models. Evaluate the steps in developing a system in particular the phases of analysis and design. Plan the requirements-gathering phase of systems analysis. Assess situational factors and choose between the different approaches to requirements gathering. Justify process modelling. Design a simple data flow diagram (DFD). Identify the way entity relationship (ER) diagrams can be used in data modelling. Design a simple entity relationship diagram. Represent processing flow using Structured English. Construct decision tables to document the processing logic of a set of procedures. Design a simple use case to support systems design. Analyze the primary decisions and activities in the systems design phase. Evaluate and discuss user interface in terms of design. PK:IT:02: Selects and uses appropriate business technology tools in the workplace PR:CM:02: Prepares information in formats appropriate for specific purposes PK:IT:05: Advises on the design, development, and implementation of IT projects including specific applications software PR:PS:01: Defines the scope of the problem PR:PS:02: Collects, selects, verifies, and evaluates information relevant to the problem PR:SF:01: Anticipates and meets the needs and expectations of internal and external stakeholders PR:IA:01: Aggregates information from a variety of sources and perspectives to assess the impact of issues on the organization PK:IT:02: Selects and uses appropriate business technology tools in the workplace PR:IA:02: Evaluates the interrelationship of an issue on different functions of the organization and applies concepts and approaches within and across functional areas to develop integrative solutions PR:CM:05: Follows up to ensure that communications are clearly understood PR:PS:03: Integrates and analyzes data for patterns, relationships, and trends PR:ET:01: Applies professional ethical standards PR:ET:02: Exercises integrity and a high level of professional judgment PR:ET:06: Ensures confidentiality of stakeholder information 4.8 Systems analysis and design in smaller organizations 4.9 Ethical issues in systems development Differentiate between the systems analysis and design phases of small and large projects. Assess the ethical issues of situations that arise during systems analysis and design. Examination sessions: March 2015; June 2015 Page 6 of 12

7 5. Systems implementation, testing, and support Systems installation and conversion 5.2 Testing in systems implementation 5.3 Quality assurance in system development 5.4 Systems maintenance 5.5 Systems enhancement and reengineering Recommend and defend a strategy for converting from an existing system to a new system, based on situational factors. Assess the advantages and disadvantages of the four different conversion strategies. Distinguish between the different methods of testing in systems implementation and formulate strategies to mitigate the limitations of testing. Identify the different characteristics of systems quality. Distinguish between quality assurance and quality control. Explain the basic tasks of systems maintenance. Defend the need for sufficient systems maintenance Assess a non-it manager s role in evaluating systems enhancements. PK:IT:05: Advises on the design, development, and implementation of IT projects including specific applications software PK:BE:06: Identifies, analyzes, and evaluates enterprise risk factors PK:BE:08: Implements and advises on measures to mitigate enterprise risk PR:PS:04: Generates and evaluates alternative solutions PK:IT:03: Aligns financial and related information systems with the organization's strategic and business plans PK:FA:06: Ensures the preparation of timely, reliable, and relevant financial information PK:IT:07: Evaluates and advises on the safeguarding of IT assets to ensure organizational ability to meet business objectives LD:OE:04: Conducts business process reviews of existing systems, processes, and controls within the organization PK:IT:04: Evaluates and advises on the impact of new technologies on business processes 5.6 Legacy system issues Relate the issues that surround legacy systems to the challenges of replacing them. 5.7 Measuring system benefits Assess the possible benefits of a new system and evaluate some strategies for measuring those benefits. Examination sessions: March 2015; June 2015 Page 7 of 12

8 6. Networks of networks: Internet, extranet, intranet, and Web The Internet as a business tool 6.2 Use of the Internet to streamline operations 6.3 Technologies to support decisions and virtual meetings 6.4 Intranet and extranet 6.5 Strategic uses of Internet technologies Evaluate the use of the Internet as a business tool for organizations. Analyze the ways in which the Internet streamlines business operations. Identify the different types of decision support technologies used by businesses and the situations they support. Distinguish between an intranet and an extranet and assess the advantages and disadvantages of each. Evaluate how the Internet contributes to cost reduction, differentiation, customer lock-in, and strategic alliances, and how it supports the value chain of an organization. PK:IT:02: Selects and uses appropriate business technology tools in the workplace PK:IT:04: Evaluates and advises on the impact of new technologies on business processes LD:SO:09: Evaluates the social costs and benefits of securing resources to meet the organization s objectives LD:OE:04: Conducts business process reviews of existing systems, processes, and controls within the organization PR:CM:01: Selects an appropriate medium to convey information, ideas, and results considering the need for confidentiality and privacy LD:SO:06: Develops, implements, and updates the organization's operational plan in alignment with the strategic plan 6.6 Web 2.0 and beyond Evaluate recent Internet and web trends and their impact on the organization, using Web 2.0 as an example. Examination sessions: March 2015; June 2015 Page 8 of 12

9 7. Electronic commerce and EDI E-business, e-commerce, and e-service 7.2 E-business opportunities and challenges 7.3 Planning e-commerce operations 7.4 Funding issues Distinguish between e-business, e-commerce, Internet commerce, web commerce, and electronic data interchange (EDI). Evaluate the rationale for e-business and distinguish between the different business models for e-business. Evaluate the principal challenges and opportunities presented by the Internet for incumbent and new businesses, and explain their relevance to managers making e-business decisions. Analyze the strategic and tactical decisions that form the core of e-commerce planning. Compare the different approaches to pricing and paying for goods and services on the Internet. Distinguish between the typical methods of securing the initial financing for e-commerce ventures. PK:IT:02: Selects and uses appropriate business technology tools in the workplace PK:IT:03: Aligns financial and related information systems with the organization's strategic and business plans PK:BE:03: Anticipates and recognizes market factors and stakeholders' interests, and adapts business decisions and processes PK:IT:05: Advises on the design, development, and implementation of IT projects including specific applications software PK:FN:01: Advises on financing to meet the organization's goals PK:IT:07: Evaluates and advises on the safeguarding of IT assets to ensure organizational ability to meet business objectives PK:TX:01: Determines and advises on taxpayer's regulatory requirements and exposure PK:BE:04: Advises on business decisions in the context of the legal framework PK:IT:04: Evaluates and advises on the impact of new technologies on business processes 7.5 Security, privacy, taxation, and jurisdictional issues Explain the importance of security for e- business operations and the key issues in assuring secure transaction processing. Outline the taxation and other jurisdictional issues presented by the spread of e-business. 7.6 Electronic data interchange and XML Explain the importance of XML to facilitating EDI. 7.7 Web-based reporting and XBRL Define and explain XBRL. Examination sessions: March 2015; June 2015 Page 9 of 12

10 8. Managing telecommunications and networks Overview of telecommunications 8.2 Strategic uses of telecommunications 8.3 Network basics 8.4 Trends in network management 8.5 Network security issues Compare the different channels used in telecommunications networks. Justify the purpose of communication protocols, and list the most common protocols in use today. Analyze the strategic importance of telecommunications to the organization. Distinguish between the different ways of classifying networks and the kinds of networks that these approaches describe. Assess the benefits and limitations of a networked system. Evaluate the implications of the major trends in network management. Evaluate the key security challenges that relate to organizational networking. PK:IT:05: Advises on the design, development, and implementation of IT projects including specific applications software LD:SO:06: Develops, implements, and updates the organization's operational plan in alignment with the strategic plan PK:BE:06: Identifies, analyzes, and evaluates enterprise risk factors PK:IT:04: Evaluates and advises on the impact of new technologies on business processes PK:IT:07: Evaluates and advises on the safeguarding of IT assets to ensure organizational ability to meet business objectives PK:IT:02: Selects and uses appropriate business technology tools in the workplace LD:SO:09: Evaluates the social costs and benefits of securing resources to meet the organization s objectives 8.6 Planning and managing wireless networks Assess the benefits and limitations of WiFi networking. Compare three technological approaches to wireless networking in the organization and briefly explain their application. 8.7 Remote computing management issues Evaluate the social costs and benefits, management, and maintenance of remote computing and telecommuting. Examination sessions: March 2015; June 2015 Page 10 of 12

11 9. IS operational and security issues Outsourcing and outsourcing models 9.2 IS security: Threats and vulnerability 9.3 Dealing with security threats 9.4 Role of auditing in IS security 9.5 Ethical issues Evaluate the advantages and disadvantages of outsourcing information systems, and assess different outsourcing models. Evaluate the key factors to address when considering an outsourcing arrangement. Assess the different threats to information systems security, including physical and electronic threats and intentional and unintentional threats. Assess an organization s IS risks using the risk assessment framework. Design the critical elements of an organization s security plan. Justify the purpose and scope of a disaster recovery plan. Evaluate the role of auditing in a security plan. Identify the five key ethical challenges related to information technology and interpret different ethical principles, including the CGA-Canada Code of Ethical Principles and Rules of Conduct, in guiding decision making about these challenges. Assess the importance of stakeholder analysis and involvement in ethical decision making PK:IT:06: Advises on implications of IT acquisitions and vendor selection PR:SE:02: Knows when and how to refer to other professionals and experts PK:BE:05: Prepares and advises on contract structure and enforcement policies PK:IT:07: Evaluates and advises on the safeguarding of IT assets to ensure organizational ability to meet business objectives PK:BE:06: Identifies, analyzes, and evaluates enterprise risk factors PK:BE:08: Implements and advises on measures to mitigate enterprise risk PK:IT:08: Evaluates and advises on the development of IT disaster recovery plans PK:BE:09: Advises on the development of business continuity planning PK:AS:01: Evaluates and consults on the organization's internal and external reporting needs and related assurance requirements PR:ET:01: Applies professional ethical standards PR:ET:02: Exercises integrity and a high level of professional judgment LD:IT:01: Builds and motivates highperformance individuals and teams to achieve goals and objectives Examination sessions: March 2015; June 2015 Page 11 of 12

12 10. Human side of IS management Managing internal and external resources 10.2 Change management 10.3 End-user computing and training issues 10.4 Managing expectations 10.5 Social responsibility Assess the challenges in managing external partners, and describe the critical skills and activities managers must master to successfully manage internal and external resources. Assess the importance of change management to the development and implementation of information systems. Identify issues of change management in projects using the Lewin-Schein and Leonard-Barton models of change. Assess why people resist change and interpret how resistance to change is manifested. Evaluate the critical elements required to successfully manage change and reduce resistance. Distinguish between end-user computing and end-user development. Evaluate the different outcomes of user training and end-user support, and explain their importance to new and ongoing IS initiatives. Evaluate the different sources and methods of IS training and the process by which effective IS training in organizations is developed and implemented. Compare the different types of expectations users may have about information systems and the importance of the expectation gap, and evaluate how an expectation gap can be minimized. Assess the social responsibilities associated with developing and implementing information systems. PR:SE:02: Knows when and how to refer to other professionals and experts PR:CM:03: Communicates information in a timely, clear, and concise manner PR:CM:04: Projects a professional image in communications LD:SO:05: Manages change in the organization caused by internal and external factors PK:IT:05: Advises on the design, development, and implementation of IT projects including specific applications software LD:SO:08: Assumes leadership at various phases of planning, implementation, and evaluation LD:IT:06: Communicates need for changes in the way things are done LD:IT:04: Solicits and acts on input from individuals and teams in order to optimize individual and team effectiveness PR:SF:01: Anticipates and meets the needs and expectations of internal and external stakeholders PR:CM:07: Facilitates resolution between differing viewpoints LD:IT:01: Builds and motivates highperformance individuals and teams to achieve goals and objectives LD:IT:02: Leads and empowers individuals and teams to achieve the organization s goals and objectives LD:IT:10: Provides career planning, coaching, training and development opportunities to facilitate staff retention and succession planning LD:SO:09: Evaluates the social costs and benefits of securing resources to meet the organization s objectives PR:ET:04: Protects the public interest Examination sessions: March 2015; June 2015 Page 12 of 12

The following are guidelines on the type of questions and their approximate weightings:

The following are guidelines on the type of questions and their approximate weightings: Purpose Advanced Management Accounting [MA2] Examination Blueprint 2014-2015 The Advanced Management Accounting [MA2] examination has been constructed using an examination blueprint. The blueprint, also

More information

Financial Accounting: Consolidations & Advanced Issues [FA4] Examination Blueprint 2014/2015

Financial Accounting: Consolidations & Advanced Issues [FA4] Examination Blueprint 2014/2015 Purpose Financial Accounting: Consolidations & Advanced Issues [FA4] Examination Blueprint 2014/2015 The Financial Accounting: Consolidations & Advanced Issues [FA4] examination has been constructed using

More information

Department of Management

Department of Management Department of Management Course Student Learning Outcomes (ITM and MGMT) ITM 1270: Fundamentals of Information Systems and Applications Upon successful completion of the course, a student will be able

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

ACCOUNTING INFORMATION SYSTEMS

ACCOUNTING INFORMATION SYSTEMS ACCOUNTING INFORMATION SYSTEMS Controls and Processes SECOND EDITION LESLIE TURIHIER WILEY MODULE 1 Introduction to AIS INTRODUCTION Defines business processes, AIS, and all foundational concepts.

More information

Documents and maintains supporting information for transactions and events receipts and invoices

Documents and maintains supporting information for transactions and events receipts and invoices CGA Competency List The following list defines and provides examples of the competencies required of a newly certified CGA. It is derived from the results of the Association's 2002-03 large-scale practice

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey

More information

Competency Requirements for Executive Director Candidates

Competency Requirements for Executive Director Candidates Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives

More information

Chapter. Developing Business / IT Strategies. Copyright 2008, The McGraw-Hill Companies, Inc. All rights reserved.

Chapter. Developing Business / IT Strategies. Copyright 2008, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Developing Business / IT Strategies McGraw-Hill/Irwin Copyright 2008, The McGraw-Hill Companies, Inc. All rights reserved. 2-2 Learning Objectives Discuss the role of planning in the business

More information

B126 Business Administration Project Management MTCU code - 60200 Program Learning Outcomes

B126 Business Administration Project Management MTCU code - 60200 Program Learning Outcomes B126 Business Administration Project Management MTCU code - 60200 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes The graduate has reliably demonstrated the ability to 1. evaluate

More information

ASAE s Job Task Analysis Strategic Level Competencies

ASAE s Job Task Analysis Strategic Level Competencies ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management

More information

SENIOR INFORMATION SYSTEMS MANAGER

SENIOR INFORMATION SYSTEMS MANAGER CITY OF PORTLAND Multiple SENIOR INFORMATION SYSTEMS MANAGER FLSA Status: Union Representation: Exempt Nonrepresented DEFINITION To plan, manage, supervise and coordinate information systems activities

More information

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives AUD105-2nd Edition Auditor s Guide to IT - 20 hours Objectives More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types

More information

CGA Competency Framework

CGA Competency Framework CG Competency Framework 2010 cademic Year Revised July 2009 Contents Introduction to the CG Competency Framework.... 3. Purpose.of.the.Competency.Framework.... 3. Competency.Groups.....4. Required.Proficiency.Levels.....5.

More information

Content Specification Outlines Certified Management Accountant (CMA) Examinations

Content Specification Outlines Certified Management Accountant (CMA) Examinations Effective January 1, 2015 Content Specification Outlines Certified Management Accountant (CMA) Examinations The content specification outlines presented below represent the body of knowledge that will

More information

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc. Table of Contents PART I. IS Audit Process. CHAPTER 1. Technology and Audit. Technology and Audit. Batch and On-Line Systems. CHAPTER 2. IS Audit Function Knowledge. Information Systems Auditing. What

More information

Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems

Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems Brief Contents 1 Introduction Part One: Information Technology Infrastructure 2 Information Technology Foundations 3 Networks and Telecommunications 4 Database Management Part Two: Business Integration

More information

i) Question Type The following are guidelines on the type of questions and their approximate weightings:

i) Question Type The following are guidelines on the type of questions and their approximate weightings: Purpose Financial Accounting: Assets [FA2] Examination Blueprint 2014/2015 The Financial Accounting: Assets [FA2] examination has been constructed using an examination blueprint. The blueprint, also referred

More information

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information

More information

Information Technology Strategic Plan 2014-2017

Information Technology Strategic Plan 2014-2017 Information Technology Strategic Plan 2014-2017 Leveraging information technology to create a competitive advantage for UW-Green Bay Approved December 2013 (Effective January 2014 December 2017) Contents

More information

CISM ITEM DEVELOPMENT GUIDE

CISM ITEM DEVELOPMENT GUIDE CISM ITEM DEVELOPMENT GUIDE Updated January 2015 TABLE OF CONTENTS Content Page Purpose of the CISM Item Development Guide 3 CISM Exam Structure 3 Writing Quality Items 3 Multiple-Choice Items 4 Steps

More information

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is

More information

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and

More information

IT2404 Systems Analysis and Design (Compulsory)

IT2404 Systems Analysis and Design (Compulsory) Systems Analysis and Design (Compulsory) BIT 1 st YEAR SEMESTER 2 INTRODUCTION This is one of the 4 courses designed for Semester 1 of Bachelor of Information Technology Degree program. CREDITS: 04 LEARNING

More information

Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content

Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content Unit Title: Information Systems Applications for Business Unit Reference Number: H/601/3904 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18 Learning Outcome 1 The learner will: Understand

More information

Roles within ITIL V3. Contents

Roles within ITIL V3. Contents Roles within ITIL V3 Roles are employed in order to define responsibilities. In particular, they are used to assign Process Owners to the various ITIL V3 processes, and to illustrate responsibilities for

More information

Revised Body of Knowledge And Required Professional Capabilities (RPCs)

Revised Body of Knowledge And Required Professional Capabilities (RPCs) Revised Body of Knowledge And Required Professional Capabilities (RPCs) PROFESSIONAL PRACTICE Strategic contribution to organizational success RPC:1 Contributes to the development of the organization s

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG

COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG Information on a Course offered by Division of Business Course Title: (English) Accounting Information Systems (Chinese) Course Code: BUS20282

More information

CAFM APPLICATION and CRITERIA. Give yourself a competitive edge

CAFM APPLICATION and CRITERIA. Give yourself a competitive edge CAFM APPLICATION and CRITERIA Give yourself a competitive edge The Certified Aboriginal Financial Manager (CAFM) designation is the preferred credential for Aboriginal finance and management positions

More information

Procurement Capability Standards

Procurement Capability Standards IPAA PROFESSIONAL CAPABILITIES PROJECT Procurement Capability Standards Definition Professional Role Procurement is the process of acquiring goods and/or services. It can include: identifying a procurement

More information

Prequalification Education, Assessment of Professional Competence and Experience Requirements of Professional Accountants

Prequalification Education, Assessment of Professional Competence and Experience Requirements of Professional Accountants 9 First Issued July 1991 Revised October 1996 Prequalification Education, Assessment of Professional Competence and Experience Requirements of Professional Accountants CONTENTS Preface Introduction...

More information

Module 6 Documenting Processes and Controls

Module 6 Documenting Processes and Controls A logical place to begin any comprehensive evaluation of internal controls is at the top entity-level controls that might have a pervasive effect on the organization. This includes a consideration of factors

More information

PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

HHSN316201200042W 1 QSSI - Quality Software Services, Inc

HHSN316201200042W 1 QSSI - Quality Software Services, Inc ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

PACE: The Qualification Program for Certified General Accountants

PACE: The Qualification Program for Certified General Accountants PACE: The Qualification Program for Certified General Accountants Delivering accounting and financial knowledge, professionalism and leadership for today and tomorrow PACE: It s Synonymous with CGAs What

More information

Business Subject Matter Requirements. Part I: Content Domains for Subject Matter Understanding and Skill in Business

Business Subject Matter Requirements. Part I: Content Domains for Subject Matter Understanding and Skill in Business Business Subject Matter Requirements Part I: Content Domains for Subject Matter Understanding and Skill in Business Domain 1. Business Management Candidates demonstrate an understanding of the purpose

More information

ISM Online Course Offerings

ISM Online Course Offerings CERTIFICATION (CPSM and CPSD ) ISM Online Course Offerings 3968 Bridge Review Online Course 21 CEHs This course is designed as a review for current C.P.M. holders as part of their preparation for taking

More information

CORE CONCEPTS OF. Thirteenth Edition. Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada

CORE CONCEPTS OF. Thirteenth Edition. Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada CORE CONCEPTS OF Accounting Information Systems Thirteenth Edition Mark G. Simkin, PhD. Professor Department of Information Systems University of Nevada Jacob M. Rose, Ph D. Trustee Professor Department

More information

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS

More information

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge

More information

IT1104- Information Systems & Technology (Compulsory)

IT1104- Information Systems & Technology (Compulsory) INTRODUCTION - Information Systems & Technology (Compulsory) This is one of the 4 courses designed for Semester 1 of Bachelor of Information Technology (BIT) Degree program. Information Systems and Technology

More information

Certification Exam Objectives: PK0-003

Certification Exam Objectives: PK0-003 Certification Exam Objectives: PK0-003 INTRODUCTION The CompTIA Project + examination is designed for business professionals involved with projects. This exam will certify that the successful candidate

More information

Project Management Professional (PMP) Boot Camp

Project Management Professional (PMP) Boot Camp Project Management Professional (PMP) Boot Camp According to the Project Management Institute, the world's leading association for the project management profession: "PMP Certification is the profession's

More information

Change Management Best Practices

Change Management Best Practices General Change Management Best Practices Practice Area Best Practice Criteria Organization Change management policy, procedures, and standards are integrated with and communicated to IT and business management

More information

SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article A.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen

More information

PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview

PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview Sante Torino PMI-RMP, IPMA Level B Head of Risk Management Major Programmes, Selex ES / Land&Naval Systems Division

More information

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen

More information

Management Information Systems

Management Information Systems University of Illinois Springfield 1 Management Information Systems Master of Science Graduate Certificates 3 Bachelor of Science (http://catalog.uis.edu/undergraduate-students/ cbam/mis/#bachelorstext)

More information

ELEVENTH EDITION. Brigham Young University. Arizona State University. Pearson Education International

ELEVENTH EDITION. Brigham Young University. Arizona State University. Pearson Education International ELEVENTH EDITION \ Brigham Young University Arizona State University Pearson Education International :id j - EF CONTENTS Parti Conceptual Foundations of Accounting Information Systems 23 CHAPTER 1 Accounting

More information

Module 6 Essentials of Enterprise Architecture Tools

Module 6 Essentials of Enterprise Architecture Tools Process-Centric Service-Oriented Module 6 Essentials of Enterprise Architecture Tools Capability-Driven Understand the need and necessity for a EA Tool IASA Global - India Chapter Webinar by Vinu Jade

More information

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners PwC Contents Page 1 IT Services for Biomedical Research and Healthcare 2 Chief Information Officer (CIO) Support 3 5 3 Imaging

More information

Health Information Management Systems Technology and Analysis (HIMSTA) Domains, Competencies and Modules. The Curriculum.

Health Information Management Systems Technology and Analysis (HIMSTA) Domains, Competencies and Modules. The Curriculum. Health Information Management Systems Technology and Analysis (HIMSTA) Domains, Competencies and Modules Introduction: The Curriculum The outline below frames the 14 modules of this curriculum within their

More information

CLASSIFICATION SPECIFICATION FORM

CLASSIFICATION SPECIFICATION FORM www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information

More information

CHAPTER 12: INFORMATION SYSTEMS IN BUSINESS

CHAPTER 12: INFORMATION SYSTEMS IN BUSINESS CHAPTER 12: INFORMATION SYSTEMS IN BUSINESS Multiple Choice: 1. A computer system performs all of the following basic functions EXCEPT: A. output. B. input. C. acquisition. D. processing. Answer: C Reference:

More information

COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG. Information on a Course offered by Division of Business

COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG. Information on a Course offered by Division of Business COMMUNITY COLLEGE OF CITY UNIVERSITY CITY UNIVERSITY OF HONG KONG Information on a Course offered by Division of Business Course Title: (English) Information Management (Chinese) Course Code: BUS20119

More information

RELATIONAL DIAGRAM OF MAIN CAPABILITIES. Strategic Position position (A) Strategic Choices choices (B) Strategic Action action (C)

RELATIONAL DIAGRAM OF MAIN CAPABILITIES. Strategic Position position (A) Strategic Choices choices (B) Strategic Action action (C) Business Analysis (P3) September 2015 to August 2016 Syllabus AIM FR (F7) BA (P3) AB (F1) APM (P5) PM (F5) To apply relevant knowledge, skills, and exercise professional judgement in assessing strategic

More information

PMI Risk Management Professional (PMI-RMP) Exam Content Outline

PMI Risk Management Professional (PMI-RMP) Exam Content Outline PMI Risk Management Professional (PMI-RMP) Exam Content Outline Project Management Institute PMI Risk Management Professional (PMI-RMP) Exam Content Outline Published by: Project Management Institute,

More information

Maintaining the Relevance of the Uniform CPA Examination

Maintaining the Relevance of the Uniform CPA Examination Invitation to Comment Maintaining the Relevance of the Uniform CPA Examination Issued: September 2, 2014 Comments Due: December 2, 2014 AICPA Board of Examiners Please submit all comments via the online

More information

TECHNOLOGY SOLUTIONS ANALYST I/II

TECHNOLOGY SOLUTIONS ANALYST I/II CITY OF HAYWARD TECHNOLOGY SOLUTIONS ANALYST I/II DEFINITION To provide professional information technology support to an assigned operating department including business systems analysis, system hardware

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

Managing Information Resources and IT Security

Managing Information Resources and IT Security Managing Information Resources and IT Security Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic

More information

Contents. Section 4 Information Systems in Organisations 195. Section 5 Information: Policy, Strategy and Systems 287

Contents. Section 4 Information Systems in Organisations 195. Section 5 Information: Policy, Strategy and Systems 287 Contents Section 4 Information Systems in Organisations 195 Section 5 Information: Policy, Strategy and Systems 287 Appendix A AQA Specification Summary 350 iv Table of Contents SECTION 4 Chapter 36 Organisational

More information

min exp years min educ

min exp years min educ labor_type_name Applications Systems Analyst/Programmer - Entry Applications Systems Analyst/Programmer - Mid Applications Systems Analyst/Programmer - Sr Business Analyst min exp years description 1.

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

Does it state the management commitment and set out the organizational approach to managing information security?

Does it state the management commitment and set out the organizational approach to managing information security? Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of

More information

This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed by the IIBA.

This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed by the IIBA. Red River College Course Learning Outcome Alignment with BABOK Version 2 This alignment chart was designed specifically for the use of Red River College. These alignments have not been verified or endorsed

More information

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT

INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT INFORMATION SYSTEMS AND TECHNOLOGY MANAGEMENT UNDERGRADUATE Bachelor's programs Bachelor of Business Administration with a concentration in information systems and technology management (http:// bulletin.gwu.edu/business/undergraduate-programs/

More information

Manag. Roles. Novemb. ber 20122

Manag. Roles. Novemb. ber 20122 Information Technology Manag gement Framework Roles and Respo onsibilities Version 1.2 Novemb ber 20122 ITM Roles and Version History Version ed By Revision Date Approved By Approval Date Description of

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data CRISC Glossary Term Access control Access rights Application controls Asset Authentication The processes, rules and deployment mechanisms that control access to information systems, resources and physical

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Position: Director of Learning Technologies Incumbent: Responsible to: Principal Direct Reports: 3 Status: Full-time Classification: Fixed-term contract (5 years) Preamble Pulteney

More information

Foundation of Supply Management Certified Professional in Supplier Diversity (CPSD )

Foundation of Supply Management Certified Professional in Supplier Diversity (CPSD ) CPSD Exam 1 Specification Foundation of Supply Management Certified Professional in Supplier Diversity (CPSD ) Table of Contents Foundation of Supply Management Exam 1 Contracting and Negotiation: 1-A-1

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

DOCTOR OF PHILOSOPHY DEGREE. Educational Leadership Doctor of Philosophy Degree Major Course Requirements. EDU721 (3.

DOCTOR OF PHILOSOPHY DEGREE. Educational Leadership Doctor of Philosophy Degree Major Course Requirements. EDU721 (3. DOCTOR OF PHILOSOPHY DEGREE Educational Leadership Doctor of Philosophy Degree Major Course Requirements EDU710 (3.0 credit hours) Ethical and Legal Issues in Education/Leadership This course is an intensive

More information

9. Did the Agency's Executive/Investment Committee approve this request?

9. Did the Agency's Executive/Investment Committee approve this request? Electronic Medical Record (EMR) Exhibit 300: Part I: Summary and Justification (All Capital s) I.A. Overview 1. Date of Submission: 2. Agency: Department of State 3. Bureau: M/MED Medical Director 4. Name

More information

Information Technology Project Management (ITPM)

Information Technology Project Management (ITPM) FUNCTIONAL AREA 10 Project Management (ITPM) Incumbents in this functional area direct information technology system solution and/or improvement projects for cost, time, scope, risk, and quality. They

More information

lclinical Informatics: Evaluation,

lclinical Informatics: Evaluation, 1 Clinical Informatics: Evaluation, Selection, Implementation, and Management of Electronic Health Records lclinical Informatics: Evaluation, Marisa L Wilson DNSc MHSc RN-BC Selection, Implementation,

More information

COMMUNIQUE. Information Technology (IT) Governance Guidance

COMMUNIQUE. Information Technology (IT) Governance Guidance COMMUNIQUE 14-COM-002 July 14, 2014 Information Technology (IT) Governance Guidance The Credit Union Prudential Supervisors Association (CUPSA) has established an IT Risk Working Group to focus on IT governance

More information

How To Be An Architect

How To Be An Architect February 9, 2015 February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 3 Typical Common Responsibilities for the ure Role... 4 Typical Responsibilities for Enterprise ure...

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of

More information

Business Systems Analyst Job Family

Business Systems Analyst Job Family Promotion Criteria Entry level requires several years of work experience, either in a business area, or programmer with involvement in business systems. Demonstrated ability to learn and apply technology.

More information

PMP Examination Tasks Puzzle game

PMP Examination Tasks Puzzle game PMP Examination Tasks Puzzle game Here is a great game to play to test your knowledge of the tasks you will be tested on in the actual examination. What we have done is take each of the domain tasks in

More information

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience

More information

Subdomain Weight (%)

Subdomain Weight (%) CLINICAL NURSE LEADER (CNL ) CERTIFICATION EXAM BLUEPRINT SUBDOMAIN WEIGHTS (Effective June 2014) Subdomain Weight (%) Nursing Leadership Horizontal Leadership 7 Interdisciplinary Communication and Collaboration

More information

INFORMATION SYSTEM AUDITING AND ASSURANCE

INFORMATION SYSTEM AUDITING AND ASSURANCE CHAPTER INFORMATION SYSTEM AUDITING AND ASSURANCE As more and more accounting and business systems were automated, it became more and more evident that the field of auditing had to change. As the systems

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

CBE Learning Goals for all Bachelor's Programs

CBE Learning Goals for all Bachelor's Programs CBE Learning Goals for all Bachelor's Programs Concepts associated with the economic environment of organizations; o Domestic economic environment Demonstrate an understanding of the concepts of scarcity

More information

Annual Assessment Report, 2012-2013 College of Business Administration Sharyn Gardner, Assessment Director

Annual Assessment Report, 2012-2013 College of Business Administration Sharyn Gardner, Assessment Director Annual Assessment Report, 2012-2013 College of Business Administration Sharyn Gardner, Assessment Director The Sacramento State College of Business Administration (CBA) is accredited by the AACSB and thus

More information

Information Technology Engineers Examination. Systems Auditor Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Systems Auditor Examination. (Level 4) Syllabus Information Technology Engineers Examination Systems Auditor Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 2.0 May

More information

WHITEPAPER. The Case for Mobile Management Outsourcing

WHITEPAPER. The Case for Mobile Management Outsourcing The Case for Mobile Management Outsourcing Mobile and wireless technologies have fundamentally changed the way we do business and increased productivity in companies of all sizes Mobile and wireless technologies

More information

APES GN 30 Outsourced Services

APES GN 30 Outsourced Services APES GN 30 Outsourced Services Prepared and issued by Accounting Professional & Ethical Standards Board Limited ISSUED: March 2013 Copyright 2013 Accounting Professional & Ethical Standards Board Limited

More information