eduglopedia.org
 724

Michael J. Coles College of Business, Department of Information Systems

Kennesaw, Georgia, United States
Information Systems

Summary

The study of information systems helps you understand how people, data, and technology work together within the business context. You will be able to apply what you learn to increase the effectiveness of business processes, secure organizational data, and enhance an organization's overall competitiveness.

Enabling Strategy: IS for Business

Students in each of our programs graduate prepared to contribute to organizations of all sizes and purposes. They understand the business environment and how technology contributes to all aspects of organizational life. Our students are excited about what technology can do, have strong technical skills, and are ready to apply all they have learned to the next challenge. We offer a range of undergraduate and graduate programs:

  • BBA in Information Systems
  • BBA in Information Security and Assurance
  • MSIS
  • Dual MSIS/MBA
  • Undergraduate and graduate certificate programs in information security and assurance

We also focus our research and our application of theory in excellence nationally recognized center and two highly regarded labs:

  • BrainLab
  • Center for Information Security Education
  • Mobile Application Development (MAD) Lab
  • Visualization & Simulation Research

Bachelor Programs

Information security is the protection of the confidentiality, integrity, and availability of information while in transmission, storage, or processing. Information assurance concerns information operations that protect and defend information and information systems by ensuring availability, integrity, authentication, confidentiality, and nonrepudiation. This program spans both areas in its approach to the protection of information in the organization.

Information security and assurance is a fast growing industry, with a good employment outlook. If you enjoy critical thinking and problem solving, and can tolerate moments of stress, this may be a good career for you. Early career job titles include information technology specialist, data security administrator, information security analyst, information security specialist, information systems security analyst, and information technology security analyst.

"The National Security Agency and the Department of Homeland Security have designated Kennesaw State University as a National Center of Academic Excellence in Information Assurance/Cyber Defense Education with Focus Areas in 1) Security Policy Development and Compliance and 2) Systems Security Administration".

 

Required Courses

IS 3100 Information Systems Management 

ISA 3100 Principles of Information Security

ISA 3010 Security Script Programming

ISA 3200 Network Security

ISA 3210 Client Systems Security

ISA 3300 Management of Information Security in a Global Environment

ISA 4200 Perimeter Defense

ISA 4220 Server Systems Security

ISA 4810 Cyber Defense 

 

Optional Electives (Pick 2)

IS 3920 Application Development II

ISA 3710 International Issues in Information Security & Assurance

ISA 4330  Incident Response & Contingency Planning

ISA 4350 Management of Digital Forensics & eDiscovery

ISA 4700 Emerging Issues in Information Security

ISA 4805 Penetration Testing

ISA 4820 ISA Programs & Strategies

ISA 4400 Directed Study

ISA 4490 Special Topics in ISA 

Where information technology and business meet, information systems (IS) professionals apply technology to support and even drive business strategy. If you have a desire to take responsibility for technology, are logical, and like to solve problems, Coles College of Business will help you build on your strengths to become a technology leader.

 

Required Courses

IS 3100 Information Systems Management

IS 3020 Application Development I

IS 3040 IT Infrastructure

IS 3060 Systems Analysis & Design

IS 3220 Global IS Project Management

IS 3260 Web Development I

IS 3280 Data Management

IS 4880 IS Capstone Course 

 

Optional Electives (Pick 2)

IS 3080 Information Resource Management

IS 3560 Business Process Management

IS 3720 Advanced IT Project Management

IS 3740 Human Computer Interaction

IS 3760 Web Development II

IS 3920 Application Development II

IS 3940 Data Warehousing

IS 4540 Data Mining 

IS 4560 e-Business Systems

IS 4860 Global Information Systems Strategy

IS 4400 Directed Study

IS 4490 Special Topics

ISA 3330 Information Security Approach to Crisis Management

ISA 3710 International Issues in Information Security & Assurance

Master Programs

Step into a leadership role powered by IS analytics and business intelligence to bring business strategy to technology projects, and IT innovations to business challenges. 

Develop wide spectrum capabilities to understand, analyze and manage organizational issues from end-user computing to strategic implications of technology projects and combine your experiential knowledge of customers, the marketplace, and revenue cycles with the skills of IS analytics to become a compelling business decision maker. 

Irrespective of whether your experience and education are in technology or business - a Master of Science in Information Systems (MSIS) from Coles College will give you the most sought after skills of today to help you move forward in your career and become a more valuable team member.

The MSIS program offers students the unique flexibility to design their own areas of interst by taking a variety of elective courses, such as Business, Statistics, Leadership, Accounting, Professional Writing, Governance, and Information Systems. Students may decide to design custom concentrations in one of the following:

  • Information Security
  • Data Mining/Business Intelligence
  • Accounting/IT Auditing
  • Business/Global IT Management
  • Advanced IT Project Management
  • Leadership
  • Statistics/SAS

Since prior permission is required to take courses outside of the department, students should contact the program director before they register for non-MSIS courses.

Note: No more than six (6) credit hours may be taken outside the MSIS program.

Core Requirements (33 Credit Hours)
  • IS 8005 - Informatics (Must be completed in student’s first semester in MSIS)
  • IS 8060 - Information Systems Development Methods and Technologies
  • IS 8080 - Database Application Design and Implementation
  • IS 8100 - Advanced IT Project Management
  • IS 8200 - Legal and Ethical Issues in Information Systems
  • IS 8310 - Governance, Risk Management, and Compliance
  • IS 8400 - Enterprise Process Models
  • IS 8600 - Global IS Management
  • IS 8920 - IT Customer Relationship Management
  • IS 8935 - Business Intelligence - Traditional and Big Data Analytics
  • IS 8940 - Disaster Recovery/Business Continuity Planning
  • Note:  

    1. The Informatics course must be completed in the student’s first semester of coursework.
    2. The remaining 30 core credits can be earned in any sequence of the student’s choice.
    3. None of the flexible capstone experience courses can be taken before the student has completed at least 12 credit hours of MSIS coursework at KSU including summer semesters, if any.

 

Capstone Experience Elective Course (3 Credit Hours)

Only one of the following six options can be taken for credit toward the MSIS degree.

  • IS 8700 - Information Systems Policy and Strategy
  • IS 8900 - Special Topics in Information Systems
  • IS 8910 - Special Projects in Information Systems
  • IS 8916 - Cooperative Education
  • IS 8918 - Internship
  • IS 8990 - Thesis
  • Note:  None of the flexible capstone experience courses can be taken before the student has completed at least 12 credit hours of MSIS coursework at KSU including summer semesters, if any.  The thesis course in the flexible capstone experience can be taken only after a student has successfully completed 18 credit hours of MSIS coursework at KSU as described in the set of prerequisite courses for MSIS thesis (IS 8990).

Program Total (36 Credit Hours)

Acquire valuable skills necessary to be a technology leader in tomorrow’s global business environment.  The Coles College MBA-MSIS brings business strategy to technology projects and technological innovation to business challenges.  By blending best business practices and strategic technology skills, students acquire the knowledge necessary to become qualified and capable leaders for cutting-edge global organizations.

Courses are delivered at times and locations which are convenient for the working professional.  MBA courses are offered at both our Kennesaw Campus (one night a week, starting at 5pm or 8pm) and at the Coles College facilities at the Cobb Galleria complex (one night a week, starting at 6pm).  IS courses are offered on the Kennesaw Campus.

Curriculum

The Coles College MBA-MSIS consists of 51 hours of graduate study, including 27 hours of business administration courses and 24 hours of information systems courses. Students are required to take the core courses from both the MBA and MSIS programs, plus one elective MBA course.

Other Programs

The Certificate in Information Security Assurance is designed for students with an interest in information security and its application in the expanding field of technology. The certificate program emphasizes the skills and knowledge necessary to protect and inspect systems, and to detect and react to threats to the security of information in those systems.

Courses

ISA 3100 - Principles of Information Security

ISA 3200 - Network Security


ISA 3210 - Client Systems Security

ISA 3300 - Management of Information Security in a Global Environment

ISA 4330 - Incident Response and Contingency Planning

The IS certificate offers KSU students knowledge and experience with the latest tools and technologies. Topics include web technologies, database technologies, and electronic commerce. Students are required to receive at least a “C” in courses in order to receive the certificate.

The IS certificate requires one foundation course in IS, three 3-semester-hour approved IS courses, and one 3-semester-hour applied learning experience, for a total of 15 credit hours

This certificate is ideal for students who enjoy working with computers but do not wish to seek a degree in technology-related fields. It is also ideal for students who have already completed a bachelor’s degree and seek the latest IS expertise. Students with degrees in fields such as accounting, biology, foreign language, English, criminal justice, and sociology will find that the addition of these important IS skills will make them far more marketable.

 

Courses 

Required: 6 hours

 IS 2200

 Experimental Elective (3hrs)

 

Electives (3): 9 hours

 IS 3020

 IS 3080

 IS 3100

 IS 3220

 IS 3260

 IS 3280

 IS 3740

 IS 3760

 IS 4560

 ISA 3100

The graduate certificate program in information security and assurance is designed for both technology and non-technology graduate students.

 

Note: Currently enrolled graduate students can only count 3 of the 4 courses toward their existing degree. Students in a graduate certificate can only count 3 courses toward a graduate program.

 

Note: This certificate may be completed online.

 

It encompasses four existing courses:

 

Security Management

IS 8310 Governance, Risk Management, and Compliance

OR

IT 6823 Information Security Concepts & Administration

 

Security Technology

IS 8320 Information Security Technologies

 

Contingency Planning

IS 8330 Disaster Recovery/Business Continuity Planning

OR

IT 6583 Business Continuity Planning and Implementation

 

Elective

IS 8200 Legal and Ethical Issues in Information Systems

OR

IS 8305 Foundations of Information Security

Courses

Certificate in Information Security Assurance

Lecture

An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.

Notes: Offered as an online course.

 186
Lecture

This course provides a detailed examination of tools, techniques, and technologies used in the protection of information assets. This course is designed to provide a solid foundation in data communications and networking fundamentals and the security of networks and networking technologies.

Notes: Offered as an online course.

 134
Lecture

This course is an exploration of client computer system security and vulnerabilities, including client computer architectures, and operating systems. It provides the detailed technical coverage necessary to protect computer information system clients by presenting the knowledge of client platform computer hardware components, client network devices and interfaces, as well as the structure and usage of common client operating system software from an information security perspective. Additional learning regarding ongoing maintenance and operational issues of client computing systems will also be included.

Notes: Offered as an online course.

 122
Lecture

This course provides a detailed examination of the administration of the information security function beginning with the strategic planning process and including an examination of the policies, procedures, and staffing functions necessary to organize and administrate ongoing security functions in the organization. Subjects include security practices, security architecture security in light of international regulation, competition, and operating environments is emphasized througout the course.

Notes: Offered as an online course.

 146
Lecture

An examination of the detailed aspects of incident response and contingency planning consisting of incident response planning, disaster recovery planning, and business continuity planning. Developing and executing plans to deal with incidents in the organization is a critical function in information security. This course focuses on the planning processes for all three areas of contingency planning incident response, disaster recovery, and business continuity, and the execution of response to human and non-human incidents in compliance with these policies.

Notes: Offered as an online course.

 176

Information Security and Assurance

Lecture

This course will provide an overview of fundamentals of information systems technologies and their applicability to real world scenarios. Topics may vary as technology changes but the students will learn the tools of productivity. The course aims to improve communications skills appropriate to the business setting.

 173
Lecture

This course provides a study of secure programming and security scripting techniques. The course examines aspects of developing traditional computer software, applying additional controls and measures to prevent the development of vulnerable and exploitable code. The course then examines scripting techniques used in support of ongoing technical security functions.

Notes: Offered as an online course.

 146
Lecture

An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.

Notes: Offered as an online course.

 114
Lecture

This course provides a detailed examination of tools, techniques, and technologies used in the protection of information assets. This course is designed to provide a solid foundation in data communications and networking fundamentals and the security of networks and networking technologies.

Notes: Offered as an online course

 132
Lecture

This course is an exploration of client computer system security and vulnerabilities, including client computer architectures, and operating systems. It provides the detailed technical coverage necessary to protect computer information system clients by presenting the knowledge of client platform computer hardware components, client network devices and interfaces, as well as the structure and usage of common client operating system software from an information security perspective. Additional learning regarding ongoing maintenance and operational issues of client computing systems will also be included.

Notes: Offered as an online course.

 134
Lecture

This course provides a detailed examination of the administration of the information security function beginning with the strategic planning process and including an examination of the policies, procedures, and staffing functions necessary to organize and administrate ongoing security functions in the organization. Subjects include security practices, security architecture security in light of international regulation, competition, and operating environments is emphasized througout the course.

Notes: Offered as an online course.

 143
Lecture

This course is an interdisciplinary examination of detailed aspects of contingency planning and crisis management. It includes disaster recovery planning, business continuity planning, and a complete and detailed treatment of crisis management. Students will learn to develop and execute plans for implementing contingency operations when critical functions are disrupted.

 126
Course

A supervised work experience for a minimum of two semesters at a site in business, industry, or government, focusing on some aspect of information security and assurance. For junior- or senior-level students who wish to obtain on-the-job experience in Information Security and Assurance, in conjunction with their academic training. Students may take a cooperative study for multiple semesters, however only six credit hours are applicable toward the BBA in Information Security and Assurance as Business Electives. Contact the department office for additional information on the requirements and restrictions of the cooperative study.

Notes: Co-op credit can be used only in the “Business Electives” area of the BBA.

 125
Course

A supervised work experience for one semester at a site in business, industry or government, focusing on some aspect of information security and assurance. For sophomore-, junior-, or senior-level students who wish to obtain on-the-job training experience in Information Security and Assurance, in conjunction with their academic training. Students can earn between one and six credit hours toward their degree programs subject to the programs’ restrictions. Contact the department office for additional information on the requirements and restrictions for the internship.

Notes: Internship credit can be used only in the “Business Electives” area of the BBA.

 125
Lecture

This course explores emerging international issues in information security and assurance. It provides content about the interaction between the organization, society, and public agencies across national boundaries. It examines the role of people versus technical security as currently debated by contemporary organizations from multiple cultures and nations. Each semester, the specifics of this course will be developed to leverage the current international information security landscape and the context of the scheduled course offering.


 104
Lecture

A detailed examination of the techniques, tools, and technologies used to support the protection of an organization’s electronic perimeter. The course will examine the evaluation, selection, deployment, and administration of firewall, virtual private network, intrusion detection and prevention systems, and other applications used to guard organizational information from external attacks.

Notes: Offered as an online course.

 149
Lecture

This course is an exploration of server computer system security and vulnerabilities, including server computer architectures, and operating systems. It provides the detailed technical coverage necessary to protect computer information system servers by presenting the knowledge of server platform computer hardware components, server network devices and interfaces, as well as the structure and usage of common server operating system software from an information security perspective. Additional learning regarding ongoing maintenance and operational issues of server computing systems will also be included.

Notes: Offered as an online course.

 146
Lecture

An examination of the detailed aspects of incident response and contingency planning consisting of incident response planning, disaster recovery planning, and business continuity planning. Developing and executing plans to deal with incidents in the organization is a critical function in information security. This course focuses on the planning processes for all three areas of contingency planning incident response, disaster recovery, and business continuity, and the execution of response to human and non-human incidents in compliance with these policies.

Notes: Offered as an online course.

 117
Lecture

This course focuses on the detection, isolation and response to security breaches and attacks. It provides a detailed examination of the entire computer forensic process and presents specific procedures required to respond to a computer crime incident. Subjects include recognizing unauthorized access, identifying file anomalies, and traffic monitoring.

Notes: Offered as an online course.

 154
Lecture

This course explores emerging issues in information security and assurance, and the role of organizational information security in state, regional and national policy. It provides content about the interaction between the organization, society, and public agencies. It examines the role of people versus technical security ideals currently debated by contemporary organizations.

 173
Lecture

This course contains a detailed examination of real world information security knowledge, enabling recognition of vulnerabilities, exploitation of system weaknesses, and implementation of safeguards against threats. Through hands-on exercises and a final project students will learn the art of penetration testing. Students who complete this course will be equipped with the knowledge necessary to analyze and evaluate systems security.

 113
Lecture

This course discusses the hardware/software tools and techniques associated with the protection of computer systems and networks. Students learn how to protect network resources as deployed in a typical organization. Course topics include policy and practice associated with the protection of communication resources, intrusion detection systems, firewalls, and use of various tools for system and network protection.

 137
Lecture

The course integrates learning from all managerial ISA courses and encourages the student to develop skills in synthesis and communication (both written and oral) as well as teaching new material about the role of the CISO and the strategic and tactical planning and operation of the information security department in a variety of organizations. A research paper will be prepared and presented in the course. Outside speakers will supplement the course and provide the student additional, outside perspective on the information security industry.

 167

Information Systems

Lecture

This course will provide an overview of fundamentals of information systems technologies and their applicability to real world scenarios. Topics may vary as technology changes but the students will learn the tools of productivity. The course aims to improve communications skills appropriate to the business setting.

 173
Lecture

This course will provide students with the knowledge and skills needed to develop applications in a development environment. It covers .NET and .NET 2.0 technologies. This is the first course in the .NET development platform. Students will learn how to develop applications using Microsoft Visual Studio .NET development environment.

 141
Lecture

This course provides foundation skills on information technology infrastructure. Topics include hardware; software; communications including LAN, WAN, and wireless network; transaction support; facilities for business continuity and security; infrastructure management best practices; service level agreements; and risk management including compliance, sourcing, disaster planning, auditing, controls, and standards.

 136
Lecture

An introduction to the basic concepts underlying systems analysis and design, and the application of those techniques in the development of business information systems. The student will learn how to develop information systems based on user requirements and specifications. The course will expose the students to UML and other graphic modeling processes.

 129
Lecture

Information Resource Management (IRM) constantly strives to improve its commitment to incorporate new technologies to advance the organization. The focus of this course is on management of information systems resources, technologies and people. Covers strategic planning of information resources investments, operations, and support; management of human, technological, and financial resources; management of end-user computing; IS functional organization and the CIO; and organizing information resources for efficient and effective services.

 181
Lecture

Illustrates how to effectively use, manage, and participate in the development of information technology applications that support common business processes. Focuses on the interdependence among an organization’s management, business processes, and information systems. Provides hands-on experience in developing a business information system.

 147
Lecture

In this course, students will be exposed to the basic principles of Global Project Management, effective teamwork and collaboration. It will prepare students to understand key issues in global project management such as project initiation, planning, scheduling, budgeting, risk analysis, quality management and communicating and collaborating across political and cultural boundaries. Tools such as Microsoft Project will be used to develop and track Information Systems projects.

 155
Lecture

This course presents introductions to many of the basic concepts, issues and techniques related to designing, developing and deploying Web sites. During the course, students will learn about Web design, HTML, basic scripting, Dynamic HTML, and Cascading Style Sheets (CSS). Students will learn how to create sites both manually and through the use of Web site development software tool such as a text editor, Dreamweaver, and Adobe Photoshop.

 158
Lecture

This course introduces the student to the properties, logic, design, implementation, and access to business databases. Particular emphasis is placed on the relational approach to database management and processing, which focuses more on the logical nature of a database than its physical characteristics. Relational database programming assignments are drawn from the fields of business and government.

 206
Other course

A supervised credit-earning work experience for a minimum of two academic semesters with a previously approved business firm, private agency, or government agency. For sophomore, junior, or senior students who wish to obtain on-the-job experience in conjunction with their academic education.

Notes: Co-op credit can be used only in the “Business Electives” area of the BBA.

 130
Other course

A supervised credit-earning work experience for one academic semester with a previously approved business firm, private agency, or government agency. A research paper is required to receive credit. For junior and senior students who wish to participate in an on-the-job experience in which they may apply their academic education. The work experience may not be with a current employer. The course will be graded on an S/U basis. The number of credit hours applicable to degree requirements is limited.

Notes: Internship credit can be used only in the “Business Electives” area of the BBA.

 136
Lecture

The course addresses the methods and techniques required to analyze, design, implement, automate, and evaluate business processes. It introduces key concepts, process design principles, and approaches to business process management. Students learn to analyze organizational performance from a process perspective and identify, document, model, assess, and improve core business processes. The course will include hands-on exercises in an ERP system to demonstrate business process integration.The challenges and approaches to organizational change, domestic and offshore outsourcing, and inter-organizational processes will be discussed.

 157
Lecture

This course will explore advanced concepts related to IT Project Management (PM) including project selection and integration of the knowledge areas of PMBOK. Topics necessary for excellence such as PM methodologies an program management will be emphasized. We will elaborate on case studies of companies that manage global IT portfolios and have benchmarked best practices. Students will work in groups on exercises using automated project management tools for scheduling, budgeting, and resource allocation.

 177
Lecture

A comprehensive introduction to the principles and techniques that impact human interaction with computers. Topics include the foundations of human-computer interaction, building a graphical user interface, human-centered software evaluation, human-centered software development, graphical user-interface design, graphical user-interface programming, HCI aspects of multimedia, and HCI aspects of collaboration and communication. Major research and the building of a working graphical user interface are included.

 154
Lecture

The architectural model for computer-based application intense software systems centers around component development and deployment. This course will explore concepts related to the development of dynamic component-based web systems including web page connectivity to database systems and the development and utilization of Web Services. Web services include the ability to integrate code written in different programming languages and the emerging platforms, architectures, and technologies (such as XML, SOAP, and WSDL) that have arisen to support the next generation of software systems. Specifically students in this course will have an opportunity to directly interact with an Integrated Development Environment (such as Microsoft’s .NET) and will be required to develop and implement dynamic Web pages and Web services.

 148
Lecture

This development course provides an advanced development environment using information systems technologies and their applicability to real world application scenarios. Students will complete projects and assignments designed to explore advanced object oriented programming languages in the context of application development for mobile, personal computer, and/or sever devices. Students will use modern application and/or web development technology tools in various environments such as agile, mobile, and social and dynamic development.

Notes: Offered as an online course.

 172
Lecture

This course provides an overview of planning, designing, building, populating a successful data warehouse and business intelligence system. Topics covered in this course include business requirement analysis, dimensional modeling, physical design, extraction-transformation-load (ETL) design and development, Analysis Service Online Analytical Processing (OLAP) database, and data mining.

 137
Lecture

Data Mining is the process of extracting useful information from data sets. It involves exploring and analyzing data sets to discover meaningful and valuable information. This course covers major data mining techniques including but not limited to data visualization, association analysis, classification, clustering, trend analysis, prediction, neural networks, text and web mining, and their applications in business. Various data analysis and data mining tools will be used to create analytical applications and achieve data mining goals.

 149
Lecture

Information systems that enable electronic transactions and communication have redefined the ways that firms compete, interact with value chain partners, and relate to customers. In the near future, all business will be e-business, and every organization will be required to effectively implement e-business solutions. This course explores enterprise e-business applications and the issues organizations encounter as they leverage Internet technologies to enhance communication and transactions with stakeholders.

 127
Lecture

This course will discuss contemporary global IT issues with respect to the role of information systems in providing organizational competitive advantage. Strategic IT planning and the evaluation process to ensure proper alignment of technology to business goals are also explained.

 134
Lecture

This course is one of the capstone courses in the IS curriculum. In this course the students will apply the concepts learned in earlier courses to develop Information Systems projects. Tools such as VB.Net/ASP.NET will be used to develop the project and Microsoft Project will be used to develop and track project schedule.

 134

Information Systems Certificate

Lecture

An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.

Notes: Offered as an online course.

 186
Lecture

Illustrates how to effectively use, manage, and participate in the development of information technology applications that support common business processes. Focuses on the interdependence among an organization’s management, business processes, and information systems. Provides hands-on experience in developing a business information system.

 147
Lecture

This course will provide an overview of fundamentals of information systems technologies and their applicability to real world scenarios. Topics may vary as technology changes but the students will learn the tools of productivity. The course aims to improve communications skills appropriate to the business setting.

Notes: Offered as an online course.

 137
Lecture

This course will provide students with the knowledge and skills needed to develop applications in a development environment. It covers .NET and .NET 2.0 technologies. This is the first course in the .NET development platform. Students will learn how to develop applications using Microsoft Visual Studio .NET development environment.

 103
Lecture

Information Resource Management (IRM) constantly strives to improve its commitment to incorporate new technologies to advance the organization. The focus of this course is on management of information systems resources, technologies and people. Covers strategic planning of information resources investments, operations, and support; management of human, technological, and financial resources; management of end-user computing; IS functional organization and the CIO; and organizing information resources for efficient and effective services.

 109
Lecture

In this course, students will be exposed to the basic principles of Global Project Management, effective teamwork and collaboration. It will prepare students to understand key issues in global project management such as project initiation, planning, scheduling, budgeting, risk analysis, quality management and communicating and collaborating across political and cultural boundaries. Tools such as Microsoft Project will be used to develop and track Information Systems projects.

 112
Lecture

This course presents introductions to many of the basic concepts, issues and techniques related to designing, developing and deploying Web sites. During the course, students will learn about Web design, HTML, basic scripting, Dynamic HTML, and Cascading Style Sheets (CSS). Students will learn how to create sites both manually and through the use of Web site development software tool such as a text editor, Dreamweaver, and Adobe Photoshop.

 99
Lecture

This course introduces the student to the properties, logic, design, implementation, and access to business databases. Particular emphasis is placed on the relational approach to database management and processing, which focuses more on the logical nature of a database than its physical characteristics. Relational database programming assignments are drawn from the fields of business and government.

Notes: Offered as an online course.

 183
Lecture

A comprehensive introduction to the principles and techniques that impact human interaction with computers. Topics include the foundations of human-computer interaction, building a graphical user interface, human-centered software evaluation, human-centered software development, graphical user-interface design, graphical user-interface programming, HCI aspects of multimedia, and HCI aspects of collaboration and communication. Major research and the building of a working graphical user interface are included.

 125
Lecture

The architectural model for computer-based application intense software systems centers around component development and deployment. This course will explore concepts related to the development of dynamic component-based web systems including web page connectivity to database systems and the development and utilization of Web Services. Web services include the ability to integrate code written in different programming languages and the emerging platforms, architectures, and technologies (such as XML, SOAP, and WSDL) that have arisen to support the next generation of software systems. Specifically students in this course will have an opportunity to directly interact with an Integrated Development Environment (such as Microsoft’s .NET) and will be required to develop and implement dynamic Web pages and Web services.

 160
Lecture

Information systems that enable electronic transactions and communication have redefined the ways that firms compete, interact with value chain partners, and relate to customers. In the near future, all business will be e-business, and every organization will be required to effectively implement e-business solutions. This course explores enterprise e-business applications and the issues organizations encounter as they leverage Internet technologies to enhance communication and transactions with stakeholders.

 100

Master of Science in Information Systems

Lecture

This course will provide students with a study of the application of computer and statistical techniques to the management of information, and the science and art of turning data into information. This course requires the student to further refine technical research and authoring skills, report writing and presentations, computer-based statistical analyses and information organization and presentation.

Note This course is required of all MSIS students in their first semester.

 158
Lecture

This course examines the Systems Development Life Cycle and the technologies used to implement high-quality information systems. A variety of modeling techniques will be used by students to articulate client requirements and convert them into implementable specifications. Prototyping and methodology engineering will be covered.

 166
Lecture

This course examines contemporary strategies for the design and implementation of applications supported by back-end database systems. Topics include data administration, data mining, user-interface design, reporting, data integrity issues, and distributed databases. Relational and object-oriented technologies are covered.

 135
Lecture

Implementation and reflection of project management principles for Information Systems projects. Students will analyze case studies and readings that address project risk management, project portfolio management, project management for global teams, integrated project teams, and virtual project teams. Project management software will be used to facilitate team projects and project reporting.

 220
Lecture

This course is a case based survey of contemporary legal and ethical issues faced by IS professionals. Topics include a review of applicable statutes and regulations that impact the IS organization. Students will conduct on-line research and explore ethical issues at the leading edge of the organization’s technology frontiers.

Note Offered as an online course.

 114
Lecture

This course includes detailed examinations of critical information security and information systems requirements for governance, risk management, and compliance planning. It includes an examination of policies, procedures, and staffing functions necessary to organize and administrate ongoing security functions in the organization to support secure business and information system operations. Subjects to be covered include IT/InfoSec Governance, security planning and practices, legal and regulatory compliance, continuity planning, and disaster recovery planning.

 175
Lecture

Modern information systems contain many vendor-supplied components that must be selected, integrated, tested, and installed. This course analyzed current practices in systems integration, including enterprise resource planning (ERP), supply chain management (SCM), customer relationship management (CRM), and data integration. Further, this course explores the impact of enterprise models on work practices and the role of systems in transforming global organizations and markets.

 114
Lecture

This course examines the concepts and issues inherent in global/international IT. The global IS economy is characterized by an environment where customer and supplier organizations can buy or sell IS products and services from/to anywhere on the globe. This new environment is largely fostered by the spread of the Internet, global software development standards, global software packages, and fewer trade restrictions, U.S. organizations now regularly source software development, software maintenance, systems upgrades, platform transitions, help desks, and other IS-related work globally. In this course, students will use case studies and readings to analyze, interpret, and discuss companies that compete in the global IT environment.

 136
Lecture

A capstone course, which integrates the program’s coursework into comprehensive, IS policies and procedures, which support the organization’s mission. Students will review and evaluate actual corporate IS strategies in a case-study format.

Note Offered as an online course.

 125
Lecture

In this course, applications such as customer relationship management, enterprise resource planning, and supply chain management in the context of e-business are explored. Business cases are an integral part of this coursework, and provide real-world contexts for the exploration and understandings of the strategic objectives, sources of revenue, core competencies, market competitiveness, critical success factors, and IT infrastructures required for successful implementation of e-business initiatives.

 194
Lecture

Business Intelligence centers on collecting, analyzing and understanding attributes and descriptors of events, and actions of stakeholders of an organization and use the insights to strategize actions such as responding to customer complaints etc. Students learn BI analytics including big data analytics in the way they provide value to an organization. Contemporary BI and Big Data technologies are discussed and explained.

 103
Lecture

A detailed study of strategic and tactical planning for non-standard operations resulting from events beyond the organization’s control. Disaster Recovery and Business Continuity Planning prepares the student to develop and execute plans to enable the organization to recover operations and continue critical business functions in the event of a disaster. This course includes an overview of incident response planning as a possible precursor to Disaster Recovery and Business Continuity and also examines Crisis Management planning.

Note Offered as an online course.

 138
Lecture

This course provides a student an independent academic and/or applied research opportunity in the information systems area under the guidance of a faculty supervisor. The topic of research and method/s of scholastic inquiry are jointly agreed by the faculty supervisor and the graduate student.

 131

Master's Information Security and Assurance Certificate

Lecture

This course examines the Systems Development Life Cycle and the technologies used to implement high-quality information systems. A variety of modeling techniques will be used by students to articulate client requirements and convert them into implementable specifications. Prototyping and methodology engineering will be covered.

 124
Lecture

This course is a case based survey of contemporary legal and ethical issues faced by IS professionals. Topics include a review of applicable statutes and regulations that impact the IS organization. Students will conduct on-line research and explore ethical issues at the leading edge of the organization’s technology frontiers.

Note Offered as an online course.

 116
Lecture

This course includes detailed examinations of critical information security and information systems requirements for governance, risk management, and compliance planning. It includes an examination of policies, procedures, and staffing functions necessary to organize and administrate ongoing security functions in the organization to support secure business and information system operations. Subjects to be covered include IT/InfoSec Governance, security planning and practices, legal and regulatory compliance, continuity planning, and disaster recovery planning.

 145
Lecture

Detailed examinations of the application of technical controls to protect the confidentiality, integrity and availability of information and information assets. Includes tools, techniques and technologies in the protection of information from internal and external threats. Topics covered include: firewall configurations, hardening operating systems, intrusion detection systems and virtual private networks.

 157
Lecture

A detailed study of strategic and tactical planning for non-standard operations resulting from events beyond the organization’s control. Disaster Recovery and Business Continuity Planning prepares the student to develop and execute plans to enable the organization to recover operations and continue critical business functions in the event of a disaster. This course includes an overview of incident response planning as a possible precursor to Disaster Recovery and Business Continuity and also examines Crisis Management planning.

Note Offered as an online course.

 124
Lecture

This course covers the fundamentals of computing security, access control technology, cryptographic algorithms, implementations, tools and their applications in communications and computing systems security. Topics include public key infrastructure, operating system security, database security, network security, web security, firewalls, security architecture and models, and ethical and legal issues in information security.

 151

MBA/MSIS Dual Degree Program

Lecture
This course provides managers with an overview of key accounting issues, with an emphasis on concepts, tools, and international perspectives that will provide direct benefits in the workplace. Areas covered include reporting performance to stakeholders outside the entity, using accounting information inside the entity to make decisions and control behavior, and ensuring the reliability of accounting information.

Note This course may not be used in the MAcc program.
 121
Lecture

An overview of models and techniques that guide a manager’s decisions regarding resource allocation. Topics include economic profit and value creation, optimization techniques, analysis of costs, transfer pricing, choice under uncertainty, foundations of risk management, real options, revenue management, statistical estimation of demand, and models of strategic decisions.

 113
Lecture

The study of financial management as it affects the value of the firm in a competitive business environment. The course focuses on capital investment strategies, cost of capital, rate of return, capital replacement, valuation, and risk taking. The emphasis is on how finance theory translates into practice.

 108
Lecture

This course will provide students with a study of the application of computer and statistical techniques to the management of information, and the science and art of turning data into information. This course requires the student to further refine technical research and authoring skills, report writing and presentations, computer-based statistical analyses and information organization and presentation.

 126
Lecture

In this introduction course, students learn the principles, applications and management of computer information systems. Criteria to assess the valuee, risks, and costs associated with computer information systems and how these technologies bring measurable strategic and tactical advantages are analyzed. Issues relating to successful organizational adoption as well as ethical, moral, social, and legal aspects of computer information systems in business processes are discussed. Business cases bolster the theories from text and provide real-world contexts for exploration, understanding and analysis of strategic objectives including those relating to successful implementation of computer information systems in ERP, Supply Chain, CRM, and E-business.

 167
Lecture

Implementation and reflection of project management principles for Information Systems projects. Students will analyze case studies and readings that address project risk management, project portfolio management, project management for global teams, integrated project teams, and virtual project teams. Project management software will be used to facilitate team projects and project reporting.

 120
Lecture

This course is a case based survey of contemporary legal and ethical issues faced by IS professionals. Topics include a review of applicable statutes and regulations that impact the IS organization. Students will conduct on-line research and explore ethical issues at the leading edge of the organization’s technology frontiers.

 104
Lecture

Modern information systems contain many vendor-supplied components that must be selected, integrated, tested, and installed. This course analyzed current practices in systems integration, including enterprise resource planning (ERP), supply chain management (SCM), customer relationship management (CRM), and data integration. Further, this course explores the impact of enterprise models on work practices and the role of systems in transforming global organizations and markets.

 99
Lecture

This course addresses emerging technologies, how they evolve, how to identify them, and the effect of international, political, social, economic, and cultural factors on them. This course describes the business impacts of disruptive technologies, international perspectives on emerging technologies, and forecasting methodologies, such as monitoring, expert opinion, trend analysis, and scenario construction.

 171
Lecture

This course examines the concepts and issues inherent in global/international IT. The global IS economy is characterized by an environment where customer and supplier organizations can buy or sell IS products and services from/to anywhere on the globe. This new environment is largely fostered by the spread of the Internet, global software development standards, global software packages, and fewer trade restrictions, U.S. organizations now regularly source software development, software maintenance, systems upgrades, platform transitions, help desks, and other IS-related work globally. In this course, students will use case studies and readings to analyze, interpret, and discuss companies that compete in the global IT environment.