Share on
Summary
The study of information systems helps you understand how people, data, and technology work together within the business context. You will be able to apply what you learn to increase the effectiveness of business processes, secure organizational data, and enhance an organization's overall competitiveness.
Enabling Strategy: IS for Business
Students in each of our programs graduate prepared to contribute to organizations of all sizes and purposes. They understand the business environment and how technology contributes to all aspects of organizational life. Our students are excited about what technology can do, have strong technical skills, and are ready to apply all they have learned to the next challenge. We offer a range of undergraduate and graduate programs:
- BBA in Information Systems
- BBA in Information Security and Assurance
- MSIS
- Dual MSIS/MBA
- Ph.D. in Business Administration Information Systems
- Undergraduate and graduate certificate programs in information security and assurance
We also focus our research and our application of theory in excellence nationally recognized center and two highly regarded labs:
- BrainLab
- Center for Information Security Education
- Modular Agile Deployment Lab (MAD) Lab
- Visualization & Simulation Research
Bachelor Programs
Information security is the protection of the confidentiality, integrity, and availability of information while in transmission, storage, or processing. Information assurance concerns information operations that protect and defend information and information systems by ensuring availability, integrity, authentication, confidentiality, and nonrepudiation. This program spans both areas in its approach to the protection of information in the organization.
Information security and assurance is a fast growing industry, with a good employment outlook. If you enjoy critical thinking and problem solving, and can tolerate moments of stress, this may be a good career for you. Early career job titles include information technology specialist, data security administrator, information security analyst, information security specialist, information systems security analyst, and information technology security analyst.
"The National Security Agency and the Department of Homeland Security have designated Kennesaw State University as a National Center of Academic Excellence in Information Assurance/Cyber Defense Education with Focus Areas in 1) Security Policy Development and Compliance and 2) Systems Security Administration".
Required Courses
IS 3100 Information Systems Management
ISA 3100 Principles of Information Security
ISA 3010 Security Script Programming
ISA 3200 Network Security
ISA 3210 Client Systems Security
ISA 3300 Management of Information Security in a Global Environment
ISA 4200 Perimeter Defense
ISA 4220 Server Systems Security
ISA 4810 Cyber Defense
Optional Electives (Pick 2)
IS 3920 Application Development II
ISA 3710 International Issues in Information Security & Assurance
ISA 4330 Incident Response & Contingency Planning
ISA 4350 Management of Digital Forensics & eDiscovery
ISA 4700 Emerging Issues in Information Security
ISA 4805 Penetration Testing
ISA 4820 ISA Programs & Strategies
ISA 4400 Directed Study
ISA 4490 Special Topics in ISA
Where information technology and business meet, information systems (IS) professionals apply technology to support and even drive business strategy. If you have a desire to take responsibility for technology, are logical, and like to solve problems, Coles College of Business will help you build on your strengths to become a technology leader.
Required Courses
IS 3100 Information Systems Management
IS 3020 Application Development I
IS 3040 IT Infrastructure
IS 3060 Systems Analysis & Design
IS 3220 Global IS Project Management
IS 3260 Web Development I
IS 3280 Data Management
IS 4880 IS Capstone Course
Optional Electives (Pick 2)
IS 3080 Information Resource Management
IS 3560 Business Process Management
IS 3720 Advanced IT Project Management
IS 3740 Human Computer Interaction
IS 3760 Web Development II
IS 3920 Application Development II
IS 3940 Data Warehousing
IS 4540 Data Mining
IS 4560 e-Business Systems
IS 4860 Global Information Systems Strategy
IS 4400 Directed Study
IS 4490 Special Topics
ISA 3330 Information Security Approach to Crisis Management
ISA 3710 International Issues in Information Security & Assurance
Master Programs
The goal of the Master of Science in Healthcare Management and Informatics (MSHMI) program is to educate and produce a robust workforce that has the skills and knowledge of the intersecting domains of healthcare, management, and informatics. The MSHMI program is a premier interdisciplinary program spanning the Coles College of Business, Wellstar College of Health and Human Services, College of Science and Mathematics, and College of Computer Science and Software Engineering.
Graduates will be grounded in the knowledge base on healthcare management and informatics, including:
- Broad knowledge of the delivery and practice of healthcare in the US system along with the challenges and opportunities in the international landscape.
- Operational knowledge of the ethical, legal, security/privacy, and quality issues as they relate to healthcare management and informatics.
- Knowledge of the basic principles emphasizing the role of informatics as it relates to various complex problems covering the entire domain of healthcare from disease management, patients/providers, drug discovery, evidence based medicine, personalized medicine, etc.
- Knowledge of organizational behavior and management principles as they apply to the issues at the intersecting domain of healthcare, information systems, and informatics.
- Knowledge and skills associated with statistics, quantitative/qualitative research methods, and quality issues associated with healthcare management and informatics.
- Applied knowledge of computer science with respect to database design and management and data structures in the context of healthcare
- Knowledge of advanced scholarship so that students are capable of addressing critical issues in the domain via written and oral form.
Location of the program - main campus or other approved site
Core Requirements (33 Credit Hours)
- HMI 7510: Introduction to Healthcare Management and Informatics
- HMI 7770: Capstone in Healthcare Management and Informatics
- HMI 7560: Management and Application of Electronic Health Records
- HMI 7560: Management and Application of Electronic Health Records
- HMI 7570: Healthcare Processes and Workflows
- HMI 7590: Health Care Industry: Economics, Strategy, and Leadership
- HMI 7610: Management & Ethics of Leadership in Healthcare
- HMI 7620: Data Mining and Visualization in Healthcare
- HMI 7520: Data Analytics via SAS
- HMI 7540: Healthcare Information Systems Development
- HMI 7550: Database Systems in Healthcare
- HMI 7580: Governance, Risk Management and Compliance in Healthcare
Elective Course (3 credit hours)
- HMI 7530: Data Analytics via R
- IS 8100: Advanced IT Project Management
- IS 8200: Legal and Ethical Issues in Information Systems
- IS 8320: Information Security Technologies
- HMI 8900: Directed Study in Healthcare Management and Informatics
- HMI 8910: Special Topics in Healthcare Management and Informatics
- IS 8330: Disaster Recovery/Business Continuity Planning
- IT 6503: Foundations of Health Information Technology
- IT 7113: Data Visualization
- MGT 8040: Managing the Value Chain
- NURS 7753: Technology in Nursing Education and Practice I
- NURS 7794: Advanced Leadership and Policy in a Multicultural World
Step into a leadership role powered by IS analytics and business intelligence to bring business strategy to technology projects, and IT innovations to business challenges.
Develop wide spectrum capabilities to understand, analyze and manage organizational issues from end-user computing to strategic implications of technology projects and combine your experiential knowledge of customers, the marketplace, and revenue cycles with the skills of IS analytics to become a compelling business decision maker.
Irrespective of whether your experience and education are in technology or business - a Master of Science in Information Systems (MSIS) from Coles College will give you the most sought after skills of today to help you move forward in your career and become a more valuable team member.
The MSIS program offers students the unique flexibility to design their own areas of interst by taking a variety of elective courses, such as Business, Statistics, Leadership, Accounting, Professional Writing, Governance, and Information Systems. Students may decide to design custom concentrations in one of the following:
- Information Security
- Data Mining/Business Intelligence
- Accounting/IT Auditing
- Business/Global IT Management
- Advanced IT Project Management
- Leadership
- Statistics/SAS
Since prior permission is required to take courses outside of the department, students should contact the program director before they register for non-MSIS courses.
Note: No more than six (6) credit hours may be taken outside the MSIS program.
Core Requirements (33 Credit Hours)- IS 8005 - Informatics (Must be completed in student’s first semester in MSIS)
- IS 8060 - Information Systems Development Methods and Technologies
- IS 8080 - Database Application Design and Implementation
- IS 8100 - Advanced IT Project Management
- IS 8200 - Legal and Ethical Issues in Information Systems
- IS 8310 - Governance, Risk Management, and Compliance
- IS 8400 - Enterprise Process Models
- IS 8600 - Global IS Management
- IS 8920 - IT Customer Relationship Management
- IS 8935 - Business Intelligence - Traditional and Big Data Analytics
- IS 8940 - Disaster Recovery/Business Continuity Planning
-
Note:
- The Informatics course must be completed in the student’s first semester of coursework.
- The remaining 30 core credits can be earned in any sequence of the student’s choice.
- None of the flexible capstone experience courses can be taken before the student has completed at least 12 credit hours of MSIS coursework at KSU including summer semesters, if any.
Capstone Experience Elective Course (3 Credit Hours)
Only one of the following six options can be taken for credit toward the MSIS degree.
- IS 8700 - Information Systems Policy and Strategy
- IS 8900 - Special Topics in Information Systems
- IS 8910 - Special Projects in Information Systems
- IS 8916 - Cooperative Education
- IS 8918 - Internship
- IS 8990 - Thesis
-
Note: None of the flexible capstone experience courses can be taken before the student has completed at least 12 credit hours of MSIS coursework at KSU including summer semesters, if any. The thesis course in the flexible capstone experience can be taken only after a student has successfully completed 18 credit hours of MSIS coursework at KSU as described in the set of prerequisite courses for MSIS thesis (IS 8990).
Acquire valuable skills necessary to be a technology leader in tomorrow’s global business environment. The Coles College MBA-MSIS brings business strategy to technology projects and technological innovation to business challenges. By blending best business practices and strategic technology skills, students acquire the knowledge necessary to become qualified and capable leaders for cutting-edge global organizations.
Courses are delivered at times and locations which are convenient for the working professional. MBA courses are offered at both our Kennesaw Campus (one night a week, starting at 5pm or 8pm) and at the Coles College facilities at the Cobb Galleria complex (one night a week, starting at 6pm). IS courses are offered on the Kennesaw Campus.
Curriculum
The Coles College MBA-MSIS consists of 51 hours of graduate study, including 27 hours of business administration courses and 24 hours of information systems courses. Students are required to take the core courses from both the MBA and MSIS programs, plus one elective MBA course.
PhD Programs
The PhD Program in Business Administration seeks to educate and train individuals to become outstanding scholars who excel in research, teaching and leadership positions at other academic institutions. The program is developed to provide significant flexibility, while providing the necessary skills to peruse research for publishing in highly rated peer reviewed journals. The research in Information Systems lies at the intersection of business and technology. The department has highly active publishing faculty in the areas of IS training, healthcare, security, data analytics among other areas.
Who considers a KSU PhD
- Academic professionals, such as lecturers and adjuncts, who wish to establish a stronger academic presence and pursue a tenure-track position.
- Working professionals who wish to establish an academic presence, pursuing either faculty or administrative position
Profies of existing students and alumini avaliable on the website.
Other Programs
The Certificate in Information Security Assurance is designed for students with an interest in information security and its application in the expanding field of technology. The certificate program emphasizes the skills and knowledge necessary to protect and inspect systems, and to detect and react to threats to the security of information in those systems.
Courses
ISA 3100 - Principles of Information Security
ISA 3200 - Network Security
ISA 3210 - Client Systems Security
ISA 3300 - Management of Information Security in a Global Environment
ISA 4330 - Incident Response and Contingency Planning
The IS certificate offers KSU students knowledge and experience with the latest tools and technologies. Topics include web technologies, database technologies, and electronic commerce. Students are required to receive at least a “C” in courses in order to receive the certificate.
The IS certificate requires one foundation course in IS, three 3-semester-hour approved IS courses, and one 3-semester-hour applied learning experience, for a total of 15 credit hours
This certificate is ideal for students who enjoy working with computers but do not wish to seek a degree in technology-related fields. It is also ideal for students who have already completed a bachelor’s degree and seek the latest IS expertise. Students with degrees in fields such as accounting, biology, foreign language, English, criminal justice, and sociology will find that the addition of these important IS skills will make them far more marketable.
Courses
Required: 6 hours
IS 2200
Experimental Elective (3hrs)
Electives (3): 9 hours
IS 3020
IS 3080
IS 3100
IS 3220
IS 3260
IS 3280
IS 3740
IS 3760
IS 4560
ISA 3100
The graduate certificate program in information security and assurance is designed for both technology and non-technology graduate students.
Note: Currently enrolled graduate students can only count 3 of the 4 courses toward their existing degree. Students in a graduate certificate can only count 3 courses toward a graduate program.
Note: This certificate may be completed online.
It encompasses four existing courses:
Security Management
IS 8310 Governance, Risk Management, and Compliance
OR
IT 6823 Information Security Concepts & Administration
Security Technology
IS 8320 Information Security Technologies
Contingency Planning
IS 8330 Disaster Recovery/Business Continuity Planning
OR
IT 6583 Business Continuity Planning and Implementation
Elective
IS 8200 Legal and Ethical Issues in Information Systems
OR
IS 8305 Foundations of Information Security
Courses
Information Security and Assurance
This course will provide an overview of fundamentals of information systems technologies and their applicability to real world scenarios. Topics may vary as technology changes but the students will learn the tools of productivity. The course aims to improve communications skills appropriate to the business setting.
This course provides a study of secure programming and security scripting techniques. The course examines aspects of developing traditional computer software, applying additional controls and measures to prevent the development of vulnerable and exploitable code. The course then examines scripting techniques used in support of ongoing technical security functions.
Notes: Offered as an online course.
An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.
Notes: Offered as an online course.
This course provides a detailed examination of tools, techniques, and technologies used in the protection of information assets. This course is designed to provide a solid foundation in data communications and networking fundamentals and the security of networks and networking technologies.
Notes: Offered as an online course
This course is an exploration of client computer system security and vulnerabilities, including client computer architectures, and operating systems. It provides the detailed technical coverage necessary to protect computer information system clients by presenting the knowledge of client platform computer hardware components, client network devices and interfaces, as well as the structure and usage of common client operating system software from an information security perspective. Additional learning regarding ongoing maintenance and operational issues of client computing systems will also be included.
Notes: Offered as an online course.
This course provides a detailed examination of the administration of the information security function beginning with the strategic planning process and including an examination of the policies, procedures, and staffing functions necessary to organize and administrate ongoing security functions in the organization. Subjects include security practices, security architecture security in light of international regulation, competition, and operating environments is emphasized througout the course.
Notes: Offered as an online course.
This course is an interdisciplinary examination of detailed aspects of contingency planning and crisis management. It includes disaster recovery planning, business continuity planning, and a complete and detailed treatment of crisis management. Students will learn to develop and execute plans for implementing contingency operations when critical functions are disrupted.
A supervised work experience for a minimum of two semesters at a site in business, industry, or government, focusing on some aspect of information security and assurance. For junior- or senior-level students who wish to obtain on-the-job experience in Information Security and Assurance, in conjunction with their academic training. Students may take a cooperative study for multiple semesters, however only six credit hours are applicable toward the BBA in Information Security and Assurance as Business Electives. Contact the department office for additional information on the requirements and restrictions of the cooperative study.
Notes: Co-op credit can be used only in the “Business Electives” area of the BBA.
A supervised work experience for one semester at a site in business, industry or government, focusing on some aspect of information security and assurance. For sophomore-, junior-, or senior-level students who wish to obtain on-the-job training experience in Information Security and Assurance, in conjunction with their academic training. Students can earn between one and six credit hours toward their degree programs subject to the programs’ restrictions. Contact the department office for additional information on the requirements and restrictions for the internship.
Notes: Internship credit can be used only in the “Business Electives” area of the BBA.
This course explores emerging international issues in information security and assurance. It provides content about the interaction between the organization, society, and public agencies across national boundaries. It examines the role of people versus technical security as currently debated by contemporary organizations from multiple cultures and nations. Each semester, the specifics of this course will be developed to leverage the current international information security landscape and the context of the scheduled course offering.
A detailed examination of the techniques, tools, and technologies used to support the protection of an organization’s electronic perimeter. The course will examine the evaluation, selection, deployment, and administration of firewall, virtual private network, intrusion detection and prevention systems, and other applications used to guard organizational information from external attacks.
Notes: Offered as an online course.
This course is an exploration of server computer system security and vulnerabilities, including server computer architectures, and operating systems. It provides the detailed technical coverage necessary to protect computer information system servers by presenting the knowledge of server platform computer hardware components, server network devices and interfaces, as well as the structure and usage of common server operating system software from an information security perspective. Additional learning regarding ongoing maintenance and operational issues of server computing systems will also be included.
Notes: Offered as an online course.
An examination of the detailed aspects of incident response and contingency planning consisting of incident response planning, disaster recovery planning, and business continuity planning. Developing and executing plans to deal with incidents in the organization is a critical function in information security. This course focuses on the planning processes for all three areas of contingency planning incident response, disaster recovery, and business continuity, and the execution of response to human and non-human incidents in compliance with these policies.
Notes: Offered as an online course.
This course focuses on the detection, isolation and response to security breaches and attacks. It provides a detailed examination of the entire computer forensic process and presents specific procedures required to respond to a computer crime incident. Subjects include recognizing unauthorized access, identifying file anomalies, and traffic monitoring.
Notes: Offered as an online course.
This course explores emerging issues in information security and assurance, and the role of organizational information security in state, regional and national policy. It provides content about the interaction between the organization, society, and public agencies. It examines the role of people versus technical security ideals currently debated by contemporary organizations.
This course contains a detailed examination of real world information security knowledge, enabling recognition of vulnerabilities, exploitation of system weaknesses, and implementation of safeguards against threats. Through hands-on exercises and a final project students will learn the art of penetration testing. Students who complete this course will be equipped with the knowledge necessary to analyze and evaluate systems security.
This course discusses the hardware/software tools and techniques associated with the protection of computer systems and networks. Students learn how to protect network resources as deployed in a typical organization. Course topics include policy and practice associated with the protection of communication resources, intrusion detection systems, firewalls, and use of various tools for system and network protection.
The course integrates learning from all managerial ISA courses and encourages the student to develop skills in synthesis and communication (both written and oral) as well as teaching new material about the role of the CISO and the strategic and tactical planning and operation of the information security department in a variety of organizations. A research paper will be prepared and presented in the course. Outside speakers will supplement the course and provide the student additional, outside perspective on the information security industry.
Information Security and Assurance Certificate
An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.
Notes: Offered as an online course.
This course provides a detailed examination of tools, techniques, and technologies used in the protection of information assets. This course is designed to provide a solid foundation in data communications and networking fundamentals and the security of networks and networking technologies.
Notes: Offered as an online course.
This course is an exploration of client computer system security and vulnerabilities, including client computer architectures, and operating systems. It provides the detailed technical coverage necessary to protect computer information system clients by presenting the knowledge of client platform computer hardware components, client network devices and interfaces, as well as the structure and usage of common client operating system software from an information security perspective. Additional learning regarding ongoing maintenance and operational issues of client computing systems will also be included.
Notes: Offered as an online course.
This course provides a detailed examination of the administration of the information security function beginning with the strategic planning process and including an examination of the policies, procedures, and staffing functions necessary to organize and administrate ongoing security functions in the organization. Subjects include security practices, security architecture security in light of international regulation, competition, and operating environments is emphasized througout the course.
Notes: Offered as an online course.
An examination of the detailed aspects of incident response and contingency planning consisting of incident response planning, disaster recovery planning, and business continuity planning. Developing and executing plans to deal with incidents in the organization is a critical function in information security. This course focuses on the planning processes for all three areas of contingency planning incident response, disaster recovery, and business continuity, and the execution of response to human and non-human incidents in compliance with these policies.
Notes: Offered as an online course.
Information Systems
This course will provide an overview of fundamentals of information systems technologies and their applicability to real world scenarios. Topics may vary as technology changes but the students will learn the tools of productivity. The course aims to improve communications skills appropriate to the business setting.
This course will provide students with the knowledge and skills needed to develop applications in a development environment. It covers .NET and .NET 2.0 technologies. This is the first course in the .NET development platform. Students will learn how to develop applications using Microsoft Visual Studio .NET development environment.
This course provides foundation skills on information technology infrastructure. Topics include hardware; software; communications including LAN, WAN, and wireless network; transaction support; facilities for business continuity and security; infrastructure management best practices; service level agreements; and risk management including compliance, sourcing, disaster planning, auditing, controls, and standards.
An introduction to the basic concepts underlying systems analysis and design, and the application of those techniques in the development of business information systems. The student will learn how to develop information systems based on user requirements and specifications. The course will expose the students to UML and other graphic modeling processes.
Information Resource Management (IRM) constantly strives to improve its commitment to incorporate new technologies to advance the organization. The focus of this course is on management of information systems resources, technologies and people. Covers strategic planning of information resources investments, operations, and support; management of human, technological, and financial resources; management of end-user computing; IS functional organization and the CIO; and organizing information resources for efficient and effective services.
Illustrates how to effectively use, manage, and participate in the development of information technology applications that support common business processes. Focuses on the interdependence among an organization’s management, business processes, and information systems. Provides hands-on experience in developing a business information system.
In this course, students will be exposed to the basic principles of Global Project Management, effective teamwork and collaboration. It will prepare students to understand key issues in global project management such as project initiation, planning, scheduling, budgeting, risk analysis, quality management and communicating and collaborating across political and cultural boundaries. Tools such as Microsoft Project will be used to develop and track Information Systems projects.
This course presents introductions to many of the basic concepts, issues and techniques related to designing, developing and deploying Web sites. During the course, students will learn about Web design, HTML, basic scripting, Dynamic HTML, and Cascading Style Sheets (CSS). Students will learn how to create sites both manually and through the use of Web site development software tool such as a text editor, Dreamweaver, and Adobe Photoshop.
This course introduces the student to the properties, logic, design, implementation, and access to business databases. Particular emphasis is placed on the relational approach to database management and processing, which focuses more on the logical nature of a database than its physical characteristics. Relational database programming assignments are drawn from the fields of business and government.
A supervised credit-earning work experience for a minimum of two academic semesters with a previously approved business firm, private agency, or government agency. For sophomore, junior, or senior students who wish to obtain on-the-job experience in conjunction with their academic education.
Notes: Co-op credit can be used only in the “Business Electives” area of the BBA.
A supervised credit-earning work experience for one academic semester with a previously approved business firm, private agency, or government agency. A research paper is required to receive credit. For junior and senior students who wish to participate in an on-the-job experience in which they may apply their academic education. The work experience may not be with a current employer. The course will be graded on an S/U basis. The number of credit hours applicable to degree requirements is limited.
Notes: Internship credit can be used only in the “Business Electives” area of the BBA.
The course addresses the methods and techniques required to analyze, design, implement, automate, and evaluate business processes. It introduces key concepts, process design principles, and approaches to business process management. Students learn to analyze organizational performance from a process perspective and identify, document, model, assess, and improve core business processes. The course will include hands-on exercises in an ERP system to demonstrate business process integration.The challenges and approaches to organizational change, domestic and offshore outsourcing, and inter-organizational processes will be discussed.
This course will explore advanced concepts related to IT Project Management (PM) including project selection and integration of the knowledge areas of PMBOK. Topics necessary for excellence such as PM methodologies an program management will be emphasized. We will elaborate on case studies of companies that manage global IT portfolios and have benchmarked best practices. Students will work in groups on exercises using automated project management tools for scheduling, budgeting, and resource allocation.
A comprehensive introduction to the principles and techniques that impact human interaction with computers. Topics include the foundations of human-computer interaction, building a graphical user interface, human-centered software evaluation, human-centered software development, graphical user-interface design, graphical user-interface programming, HCI aspects of multimedia, and HCI aspects of collaboration and communication. Major research and the building of a working graphical user interface are included.
The architectural model for computer-based application intense software systems centers around component development and deployment. This course will explore concepts related to the development of dynamic component-based web systems including web page connectivity to database systems and the development and utilization of Web Services. Web services include the ability to integrate code written in different programming languages and the emerging platforms, architectures, and technologies (such as XML, SOAP, and WSDL) that have arisen to support the next generation of software systems. Specifically students in this course will have an opportunity to directly interact with an Integrated Development Environment (such as Microsoft’s .NET) and will be required to develop and implement dynamic Web pages and Web services.
This development course provides an advanced development environment using information systems technologies and their applicability to real world application scenarios. Students will complete projects and assignments designed to explore advanced object oriented programming languages in the context of application development for mobile, personal computer, and/or sever devices. Students will use modern application and/or web development technology tools in various environments such as agile, mobile, and social and dynamic development.
Notes: Offered as an online course.
This course provides an overview of planning, designing, building, populating a successful data warehouse and business intelligence system. Topics covered in this course include business requirement analysis, dimensional modeling, physical design, extraction-transformation-load (ETL) design and development, Analysis Service Online Analytical Processing (OLAP) database, and data mining.
Data Mining is the process of extracting useful information from data sets. It involves exploring and analyzing data sets to discover meaningful and valuable information. This course covers major data mining techniques including but not limited to data visualization, association analysis, classification, clustering, trend analysis, prediction, neural networks, text and web mining, and their applications in business. Various data analysis and data mining tools will be used to create analytical applications and achieve data mining goals.
Information systems that enable electronic transactions and communication have redefined the ways that firms compete, interact with value chain partners, and relate to customers. In the near future, all business will be e-business, and every organization will be required to effectively implement e-business solutions. This course explores enterprise e-business applications and the issues organizations encounter as they leverage Internet technologies to enhance communication and transactions with stakeholders.
This course is one of the capstone courses in the IS curriculum. In this course the students will apply the concepts learned in earlier courses to develop Information Systems projects. Tools such as VB.Net/ASP.NET will be used to develop the project and Microsoft Project will be used to develop and track project schedule.
Information Systems Certificate
An introduction to the various technical and administrative aspects of Information Security and Assurance. This course provides the foundation for understanding the key issues associated with protecting information assets, determining the levels of protection and response to security incidents, and designing a consistent, reasonable information security system, with appropriate intrusion detection and reporting features.
Notes: Offered as an online course.
Illustrates how to effectively use, manage, and participate in the development of information technology applications that support common business processes. Focuses on the interdependence among an organization’s management, business processes, and information systems. Provides hands-on experience in developing a business information system.
This course will provide an overview of fundamentals of information systems technologies and their applicability to real world scenarios. Topics may vary as technology changes but the students will learn the tools of productivity. The course aims to improve communications skills appropriate to the business setting.
Notes: Offered as an online course.
This course will provide students with the knowledge and skills needed to develop applications in a development environment. It covers .NET and .NET 2.0 technologies. This is the first course in the .NET development platform. Students will learn how to develop applications using Microsoft Visual Studio .NET development environment.
Information Resource Management (IRM) constantly strives to improve its commitment to incorporate new technologies to advance the organization. The focus of this course is on management of information systems resources, technologies and people. Covers strategic planning of information resources investments, operations, and support; management of human, technological, and financial resources; management of end-user computing; IS functional organization and the CIO; and organizing information resources for efficient and effective services.
In this course, students will be exposed to the basic principles of Global Project Management, effective teamwork and collaboration. It will prepare students to understand key issues in global project management such as project initiation, planning, scheduling, budgeting, risk analysis, quality management and communicating and collaborating across political and cultural boundaries. Tools such as Microsoft Project will be used to develop and track Information Systems projects.
This course presents introductions to many of the basic concepts, issues and techniques related to designing, developing and deploying Web sites. During the course, students will learn about Web design, HTML, basic scripting, Dynamic HTML, and Cascading Style Sheets (CSS). Students will learn how to create sites both manually and through the use of Web site development software tool such as a text editor, Dreamweaver, and Adobe Photoshop.
This course introduces the student to the properties, logic, design, implementation, and access to business databases. Particular emphasis is placed on the relational approach to database management and processing, which focuses more on the logical nature of a database than its physical characteristics. Relational database programming assignments are drawn from the fields of business and government.
Notes: Offered as an online course.
A comprehensive introduction to the principles and techniques that impact human interaction with computers. Topics include the foundations of human-computer interaction, building a graphical user interface, human-centered software evaluation, human-centered software development, graphical user-interface design, graphical user-interface programming, HCI aspects of multimedia, and HCI aspects of collaboration and communication. Major research and the building of a working graphical user interface are included.
The architectural model for computer-based application intense software systems centers around component development and deployment. This course will explore concepts related to the development of dynamic component-based web systems including web page connectivity to database systems and the development and utilization of Web Services. Web services include the ability to integrate code written in different programming languages and the emerging platforms, architectures, and technologies (such as XML, SOAP, and WSDL) that have arisen to support the next generation of software systems. Specifically students in this course will have an opportunity to directly interact with an Integrated Development Environment (such as Microsoft’s .NET) and will be required to develop and implement dynamic Web pages and Web services.
Information systems that enable electronic transactions and communication have redefined the ways that firms compete, interact with value chain partners, and relate to customers. In the near future, all business will be e-business, and every organization will be required to effectively implement e-business solutions. This course explores enterprise e-business applications and the issues organizations encounter as they leverage Internet technologies to enhance communication and transactions with stakeholders.
Master of Science in Information Systems
This course will provide students with a study of the application of computer and statistical techniques to the management of information, and the science and art of turning data into information. This course requires the student to further refine technical research and authoring skills, report writing and presentations, computer-based statistical analyses and information organization and presentation.
Note This course is required of all MSIS students in their first semester.
This course examines the Systems Development Life Cycle and the technologies used to implement high-quality information systems. A variety of modeling techniques will be used by students to articulate client requirements and convert them into implementable specifications. Prototyping and methodology engineering will be covered.
This course examines contemporary strategies for the design and implementation of applications supported by back-end database systems. Topics include data administration, data mining, user-interface design, reporting, data integrity issues, and distributed databases. Relational and object-oriented technologies are covered.
Implementation and reflection of project management principles for Information Systems projects. Students will analyze case studies and readings that address project risk management, project portfolio management, project management for global teams, integrated project teams, and virtual project teams. Project management software will be used to facilitate team projects and project reporting.
This course is a case based survey of contemporary legal and ethical issues faced by IS professionals. Topics include a review of applicable statutes and regulations that impact the IS organization. Students will conduct on-line research and explore ethical issues at the leading edge of the organization’s technology frontiers.
Note Offered as an online course.
This course includes detailed examinations of critical information security and information systems requirements for governance, risk management, and compliance planning. It includes an examination of policies, procedures, and staffing functions necessary to organize and administrate ongoing security functions in the organization to support secure business and information system operations. Subjects to be covered include IT/InfoSec Governance, security planning and practices, legal and regulatory compliance, continuity planning, and disaster recovery planning.
Modern information systems contain many vendor-supplied components that must be selected, integrated, tested, and installed. This course analyzed current practices in systems integration, including enterprise resource planning (ERP), supply chain management (SCM), customer relationship management (CRM), and data integration. Further, this course explores the impact of enterprise models on work practices and the role of systems in transforming global organizations and markets.