ISM6045 Syllabus
 


ISM6045 Current Economic & Social Implications of Information Systems Syllabus
FALL 2005

Course Description:


The Business Community has finally realized that managing Information Technology should no longer be left solely in the hands of the IT department. There must be collaboration across the various departments otherwise the system that is supposed to serve you, the user, becomes a system dominating, you, the user. The Business Community must now learn enough about IT to be able to take informed decisions that directly concerns his/her organization, his/her department, and his/her business. Do we need e-Commerce? If we do, then we need to look at Digital Certificates, Digital ids, SSL, Shopping carts, accepting online payments and much more. If we work on a network, we have to look at how networks function, who needs to be given access to what information and how do we protect this data? What are redundant systems? What is RAID 5? What are Access Controls? The data that the company possesses how should that be protected? Should we use Symmetric or Asymmetric Encryption? Are we planning a new system? What is the cycle of Systems Analysis and Design? Do we have an old system? What is a legacy system? Finally what is 18 USC 1030? How do the legal aspects affect us? We need to address all of the above at the Corporate Level, not solely at the IT Level. It is therefore imperative that we, the Business Decision Maker, become acquainted with the terminology, the concepts and gain experience in this world of IT jargon. This is where we start. Good Luck.

Course Catalogue Description

Introducing concepts/software in enterprise-wide computing, information architecture, process analysis/design, data models, client/server computing, information security and network survivability.

Course syllabus

Introducing concepts in enterprise-wide computing, information architecture, process analysis and design, data models, client/server computing, information assurance and management and maintenance of laptops and PCs.

Provides extensive usage of available PC software for business decision making,

data management, project management and presentations.

Understanding e-commerce secure transactions as well as secure transmission of digital data.

Usage of software for creating digital ids, digital signatures, digital certificates and encryption.

Understanding transmission media and how digital data moves through LANs, WANs, VPNs and the Internet.

Implications of different types of attacks on information systems, and preparation and analysis of network survivability for the business manager.


Course prerequisites:

Prerequisite:

1. You are expected to have the basic skills in handling IBM-PC compatible computer running Windows 3.1, Windows 95/98 or Windows 2000/Me/XP, including file handling operations using file manager/Windows Explorer/ Netscape, basic text editing using Window's notepad or MS Word.

2. The full time use of a PC desktop or laptop

3. An email address which you check daily.

4. You will need two burn two CDs, one for each project. If you do not have a CD burner, these are available are Office Depot, Kinko's and various other places.

5. The time and ability to go on a field trip either in a group or by oneself.

6. The time and ability to work on two projects in a group or by oneself.

7. The time and ability to check email daily

8. The time and ability to check the Professor's web daily

Both 8 and 9 are imperative to communicating with the class

Check list:

1. Understanding how digital information moves down the digital lines.
2. Transmission Media
3. Client/Server Computing
4. Information Architecture
5. Data Models
6. Protecting company information and Information Assurance. .
7. Understanding E-commerce and secure transactions.
8. Communication with digital ids, symmetric and asymmetric encryption
9. Legal issues
10. Setting up Policy and Procedures.
11. Systems Analysis and Design
12. Enterprise wide computing
13. Legacy Systems
14. What are the first TEN things I should do?

Please click on the Class Schedule on my web site for a tentative outline of assignments.

Textbook:


Information Systems Management in Practice, 7/E

Barbara C. McNurlin, Writer, Information Technology
Ralph H. Sprague, University of Hawaii
Publisher: Prentice Hall

ISBN: 0-13-185471-2

Copyright: 2006 Format: Cloth; 672 pp

 

Office Hours:

Office hours for this class will be immediately after this class for one hour:

For those of you wanting to see me during office hours, you must make an appointment with me or the department assistants. The assistants in turn will have to allocate an available office in UPC, in our department, RB 250.

My office is located at BBC (A-II 120D) and is therefore unreasonable and inconvenient for both students and myself to drive up from UPC to BBC just to hold an appointment in the official FIU allocated office.

Contact me first for an appointment or further assistance by email (gk@fiu.edu) or see me in class. Email response time depends on the volume of emails but I expect it to be within 1-2 working days.

Course grading:


1. Exam 1 (20%)

2. Exam 2 (20%)

3. Exam 3 (20%)

4. Project 1 (10%)

5. Project 2 (10%)

6. Attendance (10%)

7. Class participation (10%)


8. Professional quality in the organization, completeness, neatness, and timeliness of material handed in will be expected (including exams).

9. During the semester there will be three exams and quizzes. Quizzes are part of the class participation grade.

10. Make up exams - There will be no makeup exams - if you miss an exam you will receive an F for that exam.

11. Extra work for better grade - There will be no extra work assigned for an extra grade. Everyone will be treated on an equal basis.

12. There will be NO exceptions on an INDIVIDUAL basis. If an exception is requested for one student and it is granted, then it will be announced in class and that exception will also be valid for all other students.

Grading Scale:

 

95-100%
A
90-94.99%
A-
87-89.99%
B+
84-86.99%
B
81-83.99%
B-
78-80.99%
C+
75-77.99%
C
72-74.99%
C-
69-71.99%
D+
66-68.99%
D
63-65.99%
D-
<63%
F



Religious Holidays:

Following FIU policy, the Academic Calendar for 2005-2006 includes only official University holidays. References to specific religious holidays have been excluded. In keeping with University policy, faculty are encouraged to make accommodations for students who wish to observe their religious holidays.

Students should make these requests known at the beginning of the semester.

The FIU policy statement with reference to religious holy days is printed on page 54 of the 2005-06 Undergraduate Catalog and page 38 of the Graduate Catalog. The statement is copied herein for your convenience:

Because there are some classes and other functions where attendance may be considered essential, the following policy is in effect:

1. Each student shall, upon notifying his/her instructor, be excused from class to observe a religious holy day of his/her faith.

2. While the student will be held responsible for the material covered in his/her absence, each student shall be permitted a reasonable amount of time to make up any work missed.

3. No major test, major class event, or major University activity will be scheduled on a major religious holy day.

4. Professors and University administrators shall not arbitrarily penalize students who are absent from academic or social activities because of religious observances.

For a listing of religious holidays you may visit
http://www.interfaithcalendar.org.

Communicating with me:


The best way to communicate with me is by email.

Emails

1. Subject line: When you send an email, make sure that the subject line of your email starts as per Example 1 that follows:

2. Carbon copies: If you would like to make sure that you have sent important email correctly, send a "cc" to yourself. Then if you do not get a copy back - you know there is something wrong.

3. Requesting a receipt: If you want a receipt for assignments, projects and important emails, activate your receipt request in your email program. This is a simple procedure and will cut down a lot of emails asking me -did you receive my email Professor? If you are using Outlook Express for example, Click on Tools, Options, Receipts and choose request receipt.

4. The time and date of your emails must be accurate especially when there are deadlines. Your email starts off with your computer's time and date. If this is incorrect by an hour, then your email will arrive by an hour off. Therefore make sure that the computer your are using, the lab computer, the office computer, your friend's computer and your laptop and desktop have an accurate time and date. Assignments that arrive late receive only a fraction of the grade and assignments that do not arrive at all, receive an incomplete until they arrive.

5. If the time or date is incorrect then this is what you do: Move your mouse to the bottom right hand corner of your monitor. Slide it over the time. This will give you the time and date. If it is not accurate, right click on it. Adjust date and time. Make sure Date, Time and Time Zone are correct.

6. Anti Virus: A good antiviral program is necessary. Protect your computer. If your email or attachment contains a virus, it will not be opened and will be deleted immediately.

7. All attachments being sent must be formats that are supported. An example: MS Office, MS Word, MS Excel, MS Access, MS PowerPoint, Notepad, WordPad, .jpeg, .mpeg, .wav, .tiff, Corel Draw, .swf, .htm, FrontPage.

8. I do not support WordPerfect at this present moment.

9. Spell check: Please activate and use it. Typos and incorrect spelling does not make a good impression and sometimes can confuse the reader.

10. Large files and attachments: Some email programs have a limit on how large a file you can send through them. For example, HOTMAIL has a limit of 1MB. If your attachment or file is larger than 1 MB, your file will not be sent. You can either compress your files with a zip or use another email service e.g. Yahoo.com

11. Subject line: [ v e r y i m p o r t a n t ]

If your class, for example is CGS3300 this is what should go as a heading in your email subject line

CGS 3300

CGS3300/Pat Smith/Assignment 1

ISM 4220 Business Data Communications

ISM4220/Your name /Subject...............for example

ISM4220/Pat Smith/Assignment 1

ISM 4990 Network Security

ISM4990/Your name /Subject...............for example

ISM4990/Pat Smith/Assignment 1

International MBA

IMBA6830/Your Name/Subject

evening MBA6830

eveMBA6830/Your Name /Subject

Graduate Management Program MAN 6830

GMP 6830/Your name/Subject

executive MBA JAMAICA

JAMMAN6830/Your Name/Subject

If you are not attending a class right now your subject line should start off with:

YOUR NAME/Subject

Example:

Telephone calls
Please email me at gk@fiu.edu. Do not call my department to leave a message. The staff in the CBA are there to support the faculty in their duties.

Faxes
Do not send faxes.

Dropping in: It is my pleasure to see you. However, "dropping in" does not necessarily mean that there will be enough time to see you or deal with a particular problem. So, if your business is important make sure that you have emailed me or spoken to me first.




Copyright © 2005 Gerard Klonarides, Lecturer, DSIS, CBA, Florida International University.