Module 3 Applications of Information Systems: Enterprise Systems



Similar documents
IT1105- Information Systems & Technology

Introduction to Cybersecurity Overview. October 2014

PG CERTIFICATE IN INFORMATION TECHNOLOGY MANAGEMENT (CASME&T)

IT1104- Information Systems & Technology (Compulsory)

Introduction to Cyber Security / Information Security

SISINF - Information Systems

Eighth Edition. New York University. Jane P. Laucfon. Azimuth Information PEARSON. Prentice Hall. Upper Saddle River, New Jersey 07458

INSIDE COVER - BLANK

Introduction to Information Systems. 2 hrs lecture 2 hrs lab

Courses Descriptions for BS.c. MIS Program. Main Major Courses (Bachelor Degree in Management Information System)

Organizations, Management, and the Networked Enterprise 33

BSc in Information Technology Degree Programme. Syllabus

Ursuline College Accelerated Program URSULINE COLLEGE

Diploma in IT Syllabus IT Service Management

Management Information Systems. B08. Interorganizational and Global Information Systems

Computer Information Systems

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Bellevue University Cybersecurity Programs & Courses

Department of Information Systems and Cyber Security

Anerkannt für Studiengang. Land Hochschule Kurstitel Ausland

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems

Fundamentals of Information Systems, Seventh Edition

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

Management Information System

Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content

SCADA SYSTEMS AND SECURITY WHITEPAPER

Global E-business and Collaboration

Information Systems Perspective 1. An Introduction to Information Systems in Organizations 2

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

Information, Network & Cyber Security

Management Information Systems

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

BUS 516 Computer Information Systems. Global E-business and Collaboration

EIGHTH EDITION. Stephen Haag DANIELS COLLEGE OF BUSINESS UNIVERSITY OF DENVER. Maeve Cummings COLLEGE OF BUSINESS PITTSBURG STATE UNIVERSITY

PART 1: Introduction to MIS 25. 1: Ml! 26 Q7 2021? 43

University of Massachusetts Dartmouth Charlton College of Business Information Technology for Small Business MIS 375.

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

E-Business, E-Commerce

BN2231 DECISION SUPPORT SYSTEMS

IS 300 Management Information Systems Summer II 2012 Department of Information System

MSc Information Technology - E521

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Bachelor of Information Technology (Network Security)

Lecture-2-The Strategic Role of Information Systems

(CSIS 2500 All Section ) Management Information Systems (3.0 Credits)

How To Understand The Social And Technical Perspective Of Information System Management

Certified Cyber Security Analyst VS-1160

Table of Content. TAG E-Solutions Brief information Our Products Educational Products Our Products Intellectual Property Products...

University of Massachusetts Dartmouth Charlton College of Business Information Technology for Small Business MIS 375 (Online Course)

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems

Internet tools and techniques at this level will be defined as advanced because:

Information Technology Division

The Security Theme: an introduction

Certified Cyber Security Analyst VS-1160

Certified Information Systems Auditor (CISA)

Alexander Nikov. 2. Information systems and business processes. Learning objectives

INFO What are business processes? How are they related to information systems?

Information Systems for Business Operations

Certificate in Cyber Security

Addressing Cyber Risk Building robust cyber governance

Technical Writing - A Practical Guide to Software Development Projects

The enemies ashore Vulnerabilities & hackers: A relationship that works

FACULTY OF ECONOMICS AND MANAGEMENT PROGRAMME ADMISSION QUALIFICATION LIST OF COURSES

Introduction to E-commerce

Computer Ethics. (Ethics) Ethics in Computer System (COMPUTER ETHICS AND COMPUTER SECURITY) Computer Ethics and Computer Security

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Security Practices for Online Collaboration and Social Media

Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application

How do we Police Cyber Crime?

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

The International MBA in Corporate Security Management (IMBASM) Distance Learning

MBA - AVIATION MANAGEMENT SESSION SUBJECT CODE : SUBJECT NAME

Cyber and data Policy wording

Hong Kong University of Science and Technology School of Business and Management Spring 2015

Information Systems and Technologies in Organizations

Global E-Business: How Businesses Use Information Systems

1. Global E Business and Collaboration. Lecture 2 TIM 50 Autumn 2012

Coffeyville Community College COURSE SYLLABUS FOR COMP 161 COMPUTER INFORMATION SYSTEMS. Mrs. Darla Thornburg

Master of Science in E-Business Department of Management Information Systems College of Business Administration 2013/ /1436

POLICIES TO MITIGATE CYBER RISK

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

College of Charleston School of Business DSCI : Management Information Systems Fall 2014

BSc in Information Systems & BSc in Information Technology Degree Programs

Flexible Core FC (Total 12 Credits) Analytical Skills People Skills PS. Credits

Business Models for Internet Based E-Commerce

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

MANAGEMENT INFORMATION SYSTEMS

(Instructor-led; 3 Days)

CORE CLASSES: IS 6410 Information Systems Analysis and Design IS 6420 Database Theory and Design IS 6440 Networking & Servers (3)

What is Cyber Liability

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Introduction to Management Information Systems

Bachelor of Science in Business Administration - Information Systems and Technology Major

Global E-Business and Collaboration

Introduction. Clarification of terminology

Transcription:

Contents Module 1 Introduction to MIS Define management information systems and explain its key attributes Describe information as an asset and explain its core attributes Explain how information technology is changing the way organisations conduct business Define information systems and understand its components Explain the need and importance of MIS in the modern business context Explain the business information value chain Describe the challenges and opportunities for MIS in a globalised environment Module 2 Information Systems and Organisations Understand the concept of information systems (IS) Identify the technical and behavioural approaches to information systems Describe the role of information systems in organisations Explain the economic and behavioural impact of information systems on organisations Identify the major types of information systems in an organisation Understand the importance of TPS and OAS in an organisation Understand the meaning and types of business intelligence systems, including MIS, DSS, and ESS Explain the relationship between the various information systems Describe the components and applications of group decision support systems (GDSS) Module 3 Applications of Information Systems: Enterprise Systems Define enterprise systems and state their applications Explain the uses of enterprise software Describe supply chain management systems Discuss the various enterprise systems used in customer relationship management Identify the different types of knowledge management systems 1 Management Information Systems

Identify the various applications of enterprise software in the manufacturing and service sectors Module 4 Systems Analysis and Design Describe the concept, need, and role of systems analysis and design Explain the concept of system development life cycle Describe the traditional system building approaches Identify the alternative system building approaches Module 5 Organisations and Information Technology Explain the use and value of information technology for organisations Explain the benefits of using information technology for strategic advantage Define computer networking and list the various types of computer networks Explain network topologies and list the communication devices used on these networks Describe the relationship between application software, system software, and the operating system Understand the need for communication networks and explain how organisations connect to them Explain the features and architecture of the Internet, intranets and extranets Describe the business value of telecommunication networks Module 6 Business Intelligence: Databases and Information Management Understand the traditional file management system and its limitations Explain the contemporary approaches to database management Explain the various types of database management systems Explain the components and capabilities of DBMS Explain the need for data warehousing and identify the process to maintain a data warehouse Explain the need and concept of data mining Module 7 Information Systems: Threats and Security Identify the different types of threats to information systems 2 Management Information Systems

Assess the security risks to information systems from the Internet and Wi Fi networks Assess the security risks to information systems and business data from malicious software Assess the security risks to information systems and business data from hackers and cyber criminals Describe how effective control can help organisations secure their information systems State the importance of identity management and intrusion detection systems Describe the use of firewalls in protecting information systems Describe how to secure the wireless networks of an organisation Identify the methods of ensuring system availability Identify the security issues for Cloud computing and the mobile digital platform Module 8 E commerce Explain the need for e commerce in the running of a business Explain the unique features of e commerce in comparison to traditional commerce List the advantages and disadvantages of e commerce Understand the different kinds of e commerce transactions Describe the various e commerce systems or business models Explain the various revenue models for e commerce transactions Identify the various essential e commerce processes Explain the considerations and requirements for creating an active Web store or e commerce Web site Identify the security threats faced by the participants of e commerce activities Module 9 Ethical and Social Dimensions Understand the importance of ethics with respect to information systems Describe ethics and how it affects the information systems Explain the concept of intellectual property rights, trade secrets, copyright, and patents Identify the challenges to intellectual property rights Understand the different kinds of computer crime and abuse Describe personal privacy and the laws protecting personal privacy Understand the global threats of cyber terrorism and cyber warfare 3 Management Information Systems

Instructor Resources Lecture Slides Teaching Notes Test and Quizzes Video Cases Student Resources Video Resources Study Guides Flash Cards Model Question Papers with Solutions Video Cases A Fitting Problem (Fox Lake Country Club) Calculating Your Handicap (Fox Lake Country Club) Will You Querry Me? (Fox Lake Country Club) White Wetting (Fox Lake Country Club) Tea Off Time (Fox Lake Country Club) Something Borrowed Something Blew (Fox Lake Country Club) Tests and Quizzes Assignments Module 01: Management Information Systems Module 02: Information Systems and Organisations Module 03: Applications of Information Systems: Enterprise Systems. Module 04: Systems Analysis and Design Module 05: Organisations and Information Technology Module 06: Business Intelligence Databases and Information Management Module 07: Information Systems: Threats and Security Module 08: E commerce Module 09 : Ethical and Social Dimensions Gradebook Roster 4 Management Information Systems

Forums Polls Wiki 5 Management Information Systems