Course Outline - SIS

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

International Islamic University

Faculty of Management Sciences


Department of Technology
Management

COURSE DESCRIPTOR
Strategic Information System
Course code: ITM- Version: 1
Educational level: (Masters/Bachelor) Applies from: 2015-03-03
Field of education: Technology Management Replaces course descriptor approved:
Subject area: Business Administration
_______________________________________________________________________________________________
 Explain the relationship between information
1. Course title and credit points
technology and business processes in an
The course is titled: Strategic Information System
organization;
awards 3 credit points.
 Explain how an organization can leverage data for
2. Decision and approval strategic planning through the use of data
This course was approved by the Faculty of warehouses and business intelligence;
Management Sciences. The course descriptor applies  Identify different online technologies and explain
from 2010-01-01. how each can be used to improve business and
contribute to competitive advantage; and
3. Objectives  Describe the process to develop a technology
This course aims to familiarize you with the key strategy for an organization.
concepts, practices and issues in the strategic
management of IT and provide you with sufficient 5. Generic skills
practical and theoretical knowledge of the area so The following generic skills are trained in the course:
that you will be able to meaningfully participate in, Presentation skills, Information retrieval, Analytical
or interact with, this aspect of IT management. In skills, Academic writing
addition to providing these domain skills we will
also be looking to enhance your communication, 6. Learning and teaching
presentation, problem solving and critical thinking Along with formal lectures there will be tutorials and
skills through class work and assignments. laboratory sessions to support practical work. Each
week students will be given homework assignments
This course will be of benefit to all those students that will help them to understand the concepts
intent on pursuing a career in IS/IT, business covered in the previous week. Good attendance and
consulting or management. The course would also active participation in class is needed
be useful for those who envisage, or perhaps already The course is taught in English.
have, launched their own business ventures.
7. Assessment and grading (Examination of the course)
4. Aims and learning outcomes ------------------------------------------------
On successful completion of this unit, students will Code Module Credit Grading
be able to: -------------------------------------------------
Mid Term examination 25%
Class Participation/discussion 5%
 Explain the relationship between information
Quiz 10%
technology and competitive advantage; Assignments 10%
Final Paper 50% Fail/Pass
-------------------------------------------
9. Prerequisites
8. Course evaluation Students accepted for the MBA Program in Business
The course coordinator is responsible for Administration (72 credit points) are eligible for the
systematically gathering feedback from the students course.
in course evaluations and making sure that the
results of these feedback are used into the 10. Field of education and subject area
development of the course. The field of education is Technology Management and
the subject area is Business Administration.

Week Content / Topics Assignment / Quiz

Chapter 1: Information Systems in Global Business Today

Lecture 1:
• why information systems are so essential in business today.
• Define an information system from both a technical and a
business perspective.
• Business Objectives achieved through Information System

Week 1 Lecture 2: Assignment 1


• Identify and describe the three dimensions of information
systems.
• Assess the complementary assets required for information
technology to provide value to a business.
• Identify and describe contemporary approaches to the study
of information systems and distinguish between computer
literacy and information systems literacy.

From Book Management Information system by Laudon and Laudon

Chapter 2: Global E-Business: How Businesses Use Information


Systems

Lecture 3:
• Define and describe business processes and their relationship
to information systems.
• Evaluate the role played by systems serving the various levels
of management in a business and their relationship to each
other.
Week 2 Assignment 2 / Quiz 1
Lecture 4:
• Explain how enterprise applications, collaboration and
communication systems, and intranets improve
organizational performance.
• Explain the difference between e-business, e-commerce, and
e-government.
• Assess the role of the information systems function in a
business.

From Book Management Information system by Laudon and Laudon


Chapter 1: The Information Systems Strategy Triangle

Lecture 5:
 Determine the role general managers must take in decisions
about Information Systems (IS).
 Define and explain the Information Systems Strategy
Triangle.
 Understand the alignment between decisions of business
Week 3 Quiz 2
strategy, information systems, and organizational design.

Lecture 6:
 Identify and define the various business strategy frameworks.
 Explain the information system strategy matrix.
 Understand and apply these models to different
organizations.

From Book Managing and Using IS: A strategic Approach (SIS)

Case Study:

Lecture 7:
Case Study: UPS Competes Globally with Information
Technology (Chapter 1)
Week 4 Case Study: Amazon (Chapter 3) Class Discussion

Lecture 8:
Case Study: Automakers Become Software Companies
(Chapter 3)

From Book Management Information system by Laudon and Laudon

Chapter 4: Ethical and Social Issues in Information Systems

Lecture 9:
• Analyze the relationships among ethical, social, and political
issues that are raised by information systems.
• Identify the main moral dimensions of an information society
Week 5 Assignment 3
and specific principles for conduct that can be used to guide
ethical decisions.

Lecture 10:
Case Study: Data for Sale (Chapter 4)

From Book Management Information system by Laudon and Laudon


Lecture 11:
• Evaluate the impact of contemporary information systems
Week 6 and the Internet on the protection of individual privacy and Class Discussion
intellectual property.
• Challenges of Intellectual Property Rights
Lecture 12:
• Assess how information systems have affected everyday life.
• Accountability, Liability and Control
• System Quality: Data Quality and System Errors

From Book Management Information system by Laudon and Laudon

Case Study:

Lecture 13:
Case Study: Can This Bookstore Be Saved? (Chapter 3)
Week 7 Class Discussion
Lecture 14:
Case Study: Life On The Grid: IPHONE Becomes ITRACK
(Chapter 4)

From Book Management Information system by Laudon and Laudon


Chapter 2: Strategic Use of Information Resources

Lecture 15:
 List the identifying factors of the eras of information usage.
 Know what makes an information resource valuable.
 Explain how information resources are used strategically in
context of the 5-forces model.
Week 8 Assignment 4 / Quiz 3
Lecture 16:
 Understand how information resources can be used to alter
the value chain.
 Explain the importance of strategic alliances.
 Know the risks of information resources.

From Book Managing and Using IS: A strategic Approach (SIS)

MIDTERM

Chapter 7: Telecommunications, the internet, and Wireless


Technology

Lecture 19:
• Identify the principal components of telecommunications
networks and key networking technologies.
Week 10 • Describe the main telecommunications transmission media Class Activity
and types of networks.

Lecture 20:
• Explain how the Internet and Internet technology work and
how they support communication and e-business.
• What is Inernet?
• IP Addressing
• Domain Name SystemInternet Services
• World Wide Web
• Intranet and Extranet
• Technology and Tools for communication & E-bus.

From Book Management Information system by Laudon and Laudon

Chapter 7: Telecommunications, the internet, and Wireless


Technology (Cont)

Lecture 21:
• Identify the principal technologies and standards for wireless
networking, communication, and Internet access.
• Assess the value to business of radio frequency identification
(RFID) and wireless sensor networks.

Chapter 8: Securing Information Systems


Week 11 Quiz 4

Lecture 22:
• Analyze why information systems need special protection
from destruction, error, and abuse.
• Why Systems are Vulnerable?
• Virus, Worms and Trojans Horses, Spyware
• Hackers and Cybervandalism
• Spoofing and Sniffing
• Denial of Service Attacks
• Computer Crimes and Cyber Terrorism

From Book Management Information system by Laudon and Laudon


Chapter 8: Securing Information Systems (Contd)

Lecture 23:
• Establishing a frameowrk for security and control
• Risk Assesment
• Security Policy
• Ensuring Busines Continuity

Week 12 Lecture 24: Assignment 5


• Evaluate the most important tools and technologies for
safeguarding information resources.
• Accesss Control
• Firewalls, Intrusion Detection Systems and Antivirus
Software
• Encryption and Decryption

From Book Management Information system by Laudon and Laudon

Week 13 Chapter 5: Information Systems and Business Transformation Assignment 6


Lecture 25
• Silo Perspective versus Business Process Perspective
• Understand the problems that are caused by the functional
(silo) perspective of a business
• Identify how the business process perspective keeps the big
picture in view and how IT can be used to facilitate this
perspective

Lecture 26
• Define TQM and BPR and explain how they are used to
transform a business
• Building Agile and Dynamic Business Process
• Explain an enterprise system and how they are used to
implement organizational change

From Book Managing and Using IS: A strategic Approach (SIS)

Chapter 9: Governance of the Information Systems Organization

Lecture 27
• Explain IT Governance and discuss the four perspective of IT
Governance
• Centralized versus Decentralized Organizational
Structures
Week 14 Quiz 5
• Archetypes of Accountability and Decision Rights

Lecture 28
• Emergent Governance-The Digital Ecosystem
• Decision-Making Mechanisms
• Governance Frameworks for Control Decisions

From Book Managing and Using IS: A strategic Approach (SIS)

Chapter 11:
Managing Knowledge

Lecture 29:
• What is the role of knowledge management and knowledge
management programs in business?
Week 15 • What types of systems are used for enterprise-wide Assignment 7
knowledge management and how do they provide value for
businesses?

Lecture 30:
• Knowledge Spiral Model

From Book Management Information system by Laudon and Laudon

Week 16 Article: Knowledge Management: Hype, Hope, or Help? Blair (2002) Class Discussion
Lecture 31 and 32:
• What is “Knowledge”?
• Why Are People, Especially Managers, Thinking About
Knowledge Management Now?
• What Are the Enabling Technologies for KM?
• What Are the Prerequisites for KM?
• What Are the Major Challenges for KM?

READING MATERIAL:
 Managing and Using Information Systems: A Strategic Approach, 6th Edition Keri E. Pearlson, Carol S.
Saunders, Dennis F. Galletta. Wiley Publishing
 Management Information System by Laudon & Laudon .” Latest Edition

ATTENDANCE
All students are expected to attend every class. Students who are unable to attend class should advise the
instructor before the class. Failure to attend classes may result in a grade reduction.

CELL PHONE AND OTHER ELECTRONIC DEVICE POLICY


Turn off all cell phones prior to class. Students may not text or otherwise use electronic devices during class.
Students receiving or sending electronic messages will be asked to leave the classroom for the duration of the
lecture.

DISABILITY POLICY
Any student who feels that he or she has a mental or physical disability that requires attention or accommodation
should contact the instructor immediately.

HONESTY POLICY
All students are expected to behave ethically and honestly. Students must submit their own work. Copying and
pasting from internet sites or other sources is not acceptable. Copying work from other students is not acceptable.

* Original work is appreciated and plagiarism is discourage and bears consequences towards suspension from
course, responsibility lies solely at participants end.

Good Luck!

** Version 2 may apply subject to variation in response

You might also like