eduglopedia.org
 558

Operations and Management Information Systems, Business School

Accra, Ghana, Ghana
Information Systems

Summary

 About the University of Ghana Business School

The University of Ghana Business School (UGBS) was established in 1960 as the College of Administration by an Executive Instrument (E.I. 127). The School has evolved through three distinct stages to where it is today. In 1962 it was named School of Administration until 2004 when it was changed to UGBS. It has six distinct departments; Public Administration and Health Services Management (PAHSM), Accounting, Finance, Organisation and Human Resources Development (OHMS), Marketing and Customer Management (MCM), and Operations and Management Information Systems (OMIS). All departments offer undergraduate degrees. Graduate programmes offered include Master of Business Administration (MBA), Master of Public Administration (MPA), Master of Philosophy (MPhil) and Executive MBA degrees and Doctor of Philosophy (PhD) degrees.

The School also has an Executive Development Unit which offers training in diverse fields ranging from Front Desk Management to Corporate Strategy. It also has an Enterprises Development Centre (EDC) concerned with developing Small and Medium Scale Enterprises through research and training. The school has a well-resourced library and state-of-the-art facilities to aid research and teaching.

 

About the Department of Operations and Management Information Systems

There is no doubt that information and communication technologies (ICTs) have become a significant factor for achieving organizational efficiency and effectiveness. This has created a very high, global demand for professionals with the expertise to align ICTs with business strategies to achieve corporate objectives. Academics are also in high demand to research into ICT design, development and implementation in both the private and the public sector. With this underpinning its mission, the Department of Operations & Management Information Systems (OMIS) is founded on the interaction between the ICT and Management disciplines.   

OMIS is essentially a post-graduate Department, offering courses in PhD Information Systems, MBA in Management Information Systems, MPhil in Management Information Systems and MPhil in Operations Management. Faculty research interests cut across ICT and management: e-business, e-government, e-health, e-banking, ICT for Development and Operations Management.

Photos

Master Programs

This a rigorous 2-year programme which equips participants with the know-how in aligning information and communication technology tools with business processes to solve contemporary challenges. Courses taught include Systems Analysis and Design, Electronic Business, Management Informatics, Decision Analysis, Contemporary Application Development, Database Systems, and Legal and Social Implications of Informatics among others. In the second year, in addition to courses in Management Information Systems and other areas, students also write a two-semester long essay under supervision. The MBA programme is also available during the weekend for busy workers who cannot enrol for the regular MBA programme. It is structured the same way as the regular MBA programme however lectures are on Fridays from 6:00pm – 9:00pm and Saturdays from 7:30am – 8:30pm. 

Admission Requirements
The requirement is a good first degree (at least a Second Class Lower) from a recognised university with at least three (3) years relevant work experience. There is one admission in August every year. An entrance examination or interview may be conducted.

This is a rigorous 2-year programme aimed at providing advanced management information systems training to highly qualified degree holders. It is geared towards developing the research capacities of participant students and is positioned as a breeding programme for doctoral candidates in Information Systems. The emphasis is research and students spend the entire second year in the programme writing an MPhil thesis under supervision. MPhil Management Information Systems students take such courses as Theories in Information Systems, Technology Leadership and Knowledge Management, E-Business, Business Information Systems, and Systems Analysis and Design.

Admission Requirements
A good first degree (at least a Second Class Lower) in a relevant field of study from any recognised university and a minimum of three (3) years work experience. There is one admission in August every year. An entrance examination or interview may be conducted.

PhD Programs

The programme is a 4-year intensive research programme. PhD. candidates are admitted throughout the year and those without a Master of Philosophy in Information Systems usually undertake a one-year course in that specialty before being enrolled unto the PhD. programme. The main objectives of the PhD programme are to provide research training in IS and management to qualified masters degree holders for careers in academic and research-oriented institutions and contribute to information systems research in Ghana, Africa and the rest of the world. Students spend the first year taking courses such as Philosophy of Management Research, Advanced Quantitative Research Methods, Philosophy of Information Systems, Advanced Qualitative Research, Methods Information Systems Theories, Information Systems Development and Trends in Information Systems. The second to the fourth years are dedicated to writing a PhD. Thesis.

Admission Requirements
A relevant Masters degree in management information systems (IS) or relevant information technology related field from a recognised university is required. An entrance examination or interview may be conducted.

Courses

Master of Business Administration

Lecture
 

This course provides the student with a practical approach to systems analysis and design using a blend of traditional developments and current technologies. The course deals with fundamental concepts and issues essential to an analysis and understanding of the information requirements problem of enterprises for application systems development.

 

 

 199
Lecture

This course aims at exposing students to the ethical, social, and political issues raised by using information systems in organisations and society. It will explore the principles which guide decisions about ethical dilemmas and challenges to protection of individual privacy, intellectual property, data protection, and computer usage.

 129
Lecture

the expertise of addressing the complex issues that lie at the intersection of business and technology. Students will be trained to lead their future organisations in developing and executing technology strategies and managing the change associated with technology adoption. Second, the course will explore the theoretical concepts and practical aspects of knowledge and organisational learning in organisations. Technology leadership is primarily supported by strategies to manage knowledge in organisations

 252
Lecture

The course will provide a comprehensive understanding of the strategic value of information technology to the organisation, and the strategic use of information technology to provide competitive advantage to an enterprise. The students will be introduced to strategic information systems planning and how the implications new technologies have on their employees and the organisation as a whole. Through real-world case studies, they will evaluate the internal (e.g., processes, political and organisational culture) and external (e.g., laws, global concerns, and cultural issues) environments that organisations compete in and plan accordingly. 

 147
Lecture

This course will introduce the process for the management of information security, and creating a solid enterprise-wide information security policy and practice. This course will provide students the managerial-level understanding of information security and practice. Readings, demos, lectures, case studies and real world events will be discussed with the intent of bridging theory with practice, law and ethics. The case studies will also offer the opportunity to evaluate the socio-cultural and socio-technical challenges of managing internet security in developing economies and in transnational transactions. The course topics includes: introduction to information security and architecture, network and distributed systems security, web security, network threats, vulnerabilities and risks, encryption and virtual private network, e-mails security, web services security, risk on internet, database security, wireless security, detection of the attack, incident response, and security improvement.

 

 

Additional topics covered include an overview of computer crimes, types of security breaches (computer and human), information warfare, mobile phone security, cyber terrorism and protection of critical infrastructures. The student will have an in-depth understanding of the steps required to build and maintain an information security department, and the depth of technical understanding to be able to communicate effectively with information security teams.

 171
Lecture

The course is intended to provide students with a practical hands-on experience in developing software for real-life requirements problem. Students will therefore be introduced to software-development techniques used to create medium-scale interactive application systems. The focus will be on the use of object-oriented and procedural software engineering methodologies in data definition and measurement, abstract data type construction and use in developing screen editors, reports and other IS applications using data structure including indexed files, and use of libraries to create well-designed graphical user interfaces.

 160
Lecture

The course aims to develop a critical appreciation of research work in Information Systems and of the methodologies employed in that research. It would also provide the skills appropriate to the successful design and conduct of an applied research project on a relevant Information Systems topic.

 

 

Topics to be treated include: The research process; study of methodologies appropriate to the conduct of research in various aspects of information systems; inquiry into emerging issues in information systems; information systems research frameworks; the appropriate use of statistical data analysis in information systems research projects; qualitative and quantitative research in information systems; the design of information systems research proposals; and the use of research software tools. The student will engage in a mini-research project to obtain a first-hand experience in applying the theories and methods taught in the course.

 166
Lecture

The course will explore the role of the Internet and related technologies in sharing business information, conducting transactions and maintaining relationships. It provides an understanding of how electronic business has affected all aspects of the corporate world.

 

This course consists of two components: a theoretical component to provide a conceptual basis for electronic commerce applications, and experiential learning through case study of e-business adoption and usage in firms in both developing and developed economies. The students will learn the tools and techniques to analyse, design, implement and manage the use of electronic commerce between businesses, consumers and government. The students will develop an understanding of the roles of people, infrastructure, business processes and technologies to develop successful electronic e-business applications and how e-business can accommodate the increased rate of change created by social, economic, political and technical developments. 

 

 

Topics to be discussed include electronic business models, Internet marketing, marketing on the web, e-commerce hardware and software, Web 2.0, social networking and virtual communities, payment systems for electronic commerce  and  the environment of electronic commerce: legal, ethical, and tax issues.

 157
Lecture

The course addresses data needs of functions such as marketing, finance, and production.

Students will be equipped with advanced skills needed to design, develop and use database, data warehousing and data mining systems for effective decision support.  Topics to be covered include: data integration, data quality, data schemes, data and system security, privacy-enhancing technologies and digital asset protection.

 

This course provides students with the key concepts and tools to turn raw data into information and knowledge repositories useful for business intelligence. The course will explore how to use statistical and modern data mining techniques in studying interrelationships between technology and health, education and governance. Problems considered will include such standard marketing research activities as customer segmentation and customer preference as well as more recent issues in measuring service quality, evaluating health data and citizen perspectives on governance and policy issues.

 

 

Students will also be equipped with skills to use Microsoft Excel and SPSS applications alongside the theoretical concepts to solve real-world case scenarios. 

 148

Master of Philosophy (MIS)

Lecture
 

This course provides the student with a practical approach to systems analysis and design using a blend of traditional developments and current technologies. The course deals with fundamental concepts and issues essential to an analysis and understanding of the information requirements problem of enterprises for application systems development.

 

 

 199
Lecture

This course aims at exposing students to the ethical, social, and political issues raised by using information systems in organisations and society. It will explore the principles which guide decisions about ethical dilemmas and challenges to protection of individual privacy, intellectual property, data protection, and computer usage.

 129
Lecture

the expertise of addressing the complex issues that lie at the intersection of business and technology. Students will be trained to lead their future organisations in developing and executing technology strategies and managing the change associated with technology adoption. Second, the course will explore the theoretical concepts and practical aspects of knowledge and organisational learning in organisations. Technology leadership is primarily supported by strategies to manage knowledge in organisations

 252
Lecture

The course will provide a comprehensive understanding of the strategic value of information technology to the organisation, and the strategic use of information technology to provide competitive advantage to an enterprise. The students will be introduced to strategic information systems planning and how the implications new technologies have on their employees and the organisation as a whole. Through real-world case studies, they will evaluate the internal (e.g., processes, political and organisational culture) and external (e.g., laws, global concerns, and cultural issues) environments that organisations compete in and plan accordingly. 

 147
Lecture

This course will introduce the process for the management of information security, and creating a solid enterprise-wide information security policy and practice. This course will provide students the managerial-level understanding of information security and practice. Readings, demos, lectures, case studies and real world events will be discussed with the intent of bridging theory with practice, law and ethics. The case studies will also offer the opportunity to evaluate the socio-cultural and socio-technical challenges of managing internet security in developing economies and in transnational transactions. The course topics includes: introduction to information security and architecture, network and distributed systems security, web security, network threats, vulnerabilities and risks, encryption and virtual private network, e-mails security, web services security, risk on internet, database security, wireless security, detection of the attack, incident response, and security improvement.

 

 

Additional topics covered include an overview of computer crimes, types of security breaches (computer and human), information warfare, mobile phone security, cyber terrorism and protection of critical infrastructures. The student will have an in-depth understanding of the steps required to build and maintain an information security department, and the depth of technical understanding to be able to communicate effectively with information security teams.

 171
Lecture

The course is intended to provide students with a practical hands-on experience in developing software for real-life requirements problem. Students will therefore be introduced to software-development techniques used to create medium-scale interactive application systems. The focus will be on the use of object-oriented and procedural software engineering methodologies in data definition and measurement, abstract data type construction and use in developing screen editors, reports and other IS applications using data structure including indexed files, and use of libraries to create well-designed graphical user interfaces.

 160
Lecture

The course aims to develop a critical appreciation of research work in Information Systems and of the methodologies employed in that research. It would also provide the skills appropriate to the successful design and conduct of an applied research project on a relevant Information Systems topic.

 

 

Topics to be treated include: The research process; study of methodologies appropriate to the conduct of research in various aspects of information systems; inquiry into emerging issues in information systems; information systems research frameworks; the appropriate use of statistical data analysis in information systems research projects; qualitative and quantitative research in information systems; the design of information systems research proposals; and the use of research software tools. The student will engage in a mini-research project to obtain a first-hand experience in applying the theories and methods taught in the course.

 166
Lecture

The course will explore the role of the Internet and related technologies in sharing business information, conducting transactions and maintaining relationships. It provides an understanding of how electronic business has affected all aspects of the corporate world.

 

This course consists of two components: a theoretical component to provide a conceptual basis for electronic commerce applications, and experiential learning through case study of e-business adoption and usage in firms in both developing and developed economies. The students will learn the tools and techniques to analyse, design, implement and manage the use of electronic commerce between businesses, consumers and government. The students will develop an understanding of the roles of people, infrastructure, business processes and technologies to develop successful electronic e-business applications and how e-business can accommodate the increased rate of change created by social, economic, political and technical developments. 

 

 

Topics to be discussed include electronic business models, Internet marketing, marketing on the web, e-commerce hardware and software, Web 2.0, social networking and virtual communities, payment systems for electronic commerce  and  the environment of electronic commerce: legal, ethical, and tax issues.

 157
Lecture

The course addresses data needs of functions such as marketing, finance, and production.

Students will be equipped with advanced skills needed to design, develop and use database, data warehousing and data mining systems for effective decision support.  Topics to be covered include: data integration, data quality, data schemes, data and system security, privacy-enhancing technologies and digital asset protection.

 

This course provides students with the key concepts and tools to turn raw data into information and knowledge repositories useful for business intelligence. The course will explore how to use statistical and modern data mining techniques in studying interrelationships between technology and health, education and governance. Problems considered will include such standard marketing research activities as customer segmentation and customer preference as well as more recent issues in measuring service quality, evaluating health data and citizen perspectives on governance and policy issues.

 

 

Students will also be equipped with skills to use Microsoft Excel and SPSS applications alongside the theoretical concepts to solve real-world case scenarios. 

 148

PhD Information Systems

Lecture

This course exposes students to contemporary debates on different philosophical perspectives in information systems research and the rationale for justifying their appropriateness. The course discusses the ontological, epistemological, methodological and axiological perspectives of the major philosophical perspectives in information systems research. It also exposes students to the advantages and disadvantages of each paradigm, and the circumstances that determine their appropriateness. Specific topics include ontology, epistemology, methodology, axiology and evaluation principles of positivist, interpretive, critical and pragmatic philosophy in information systems research.    

 482
Lecture

The course examines the fundamental principles associated with IS development, operation, uses and management within the organisation, and the significant managerial aspects of treating information as an organisational resource and its increasing impact on today’s organisation.

 

 

 

 168

Ratings

Your rating for Operations and Management Information Systems, Business School

(in case you do not want to comment anonymously make sure you are logged in and uncheck this checkbox)
Overall ratings for Operations and Management Information Systems, Business School
 
Comments
 
Feedback