Course Outline - SIS
Course Outline - SIS
Course Outline - SIS
COURSE DESCRIPTOR
Strategic Information System
Course code: ITM- Version: 1
Educational level: (Masters/Bachelor) Applies from: 2015-03-03
Field of education: Technology Management Replaces course descriptor approved:
Subject area: Business Administration
_______________________________________________________________________________________________
Explain the relationship between information
1. Course title and credit points
technology and business processes in an
The course is titled: Strategic Information System
organization;
awards 3 credit points.
Explain how an organization can leverage data for
2. Decision and approval strategic planning through the use of data
This course was approved by the Faculty of warehouses and business intelligence;
Management Sciences. The course descriptor applies Identify different online technologies and explain
from 2010-01-01. how each can be used to improve business and
contribute to competitive advantage; and
3. Objectives Describe the process to develop a technology
This course aims to familiarize you with the key strategy for an organization.
concepts, practices and issues in the strategic
management of IT and provide you with sufficient 5. Generic skills
practical and theoretical knowledge of the area so The following generic skills are trained in the course:
that you will be able to meaningfully participate in, Presentation skills, Information retrieval, Analytical
or interact with, this aspect of IT management. In skills, Academic writing
addition to providing these domain skills we will
also be looking to enhance your communication, 6. Learning and teaching
presentation, problem solving and critical thinking Along with formal lectures there will be tutorials and
skills through class work and assignments. laboratory sessions to support practical work. Each
week students will be given homework assignments
This course will be of benefit to all those students that will help them to understand the concepts
intent on pursuing a career in IS/IT, business covered in the previous week. Good attendance and
consulting or management. The course would also active participation in class is needed
be useful for those who envisage, or perhaps already The course is taught in English.
have, launched their own business ventures.
7. Assessment and grading (Examination of the course)
4. Aims and learning outcomes ------------------------------------------------
On successful completion of this unit, students will Code Module Credit Grading
be able to: -------------------------------------------------
Mid Term examination 25%
Class Participation/discussion 5%
Explain the relationship between information
Quiz 10%
technology and competitive advantage; Assignments 10%
Final Paper 50% Fail/Pass
-------------------------------------------
9. Prerequisites
8. Course evaluation Students accepted for the MBA Program in Business
The course coordinator is responsible for Administration (72 credit points) are eligible for the
systematically gathering feedback from the students course.
in course evaluations and making sure that the
results of these feedback are used into the 10. Field of education and subject area
development of the course. The field of education is Technology Management and
the subject area is Business Administration.
Lecture 1:
• why information systems are so essential in business today.
• Define an information system from both a technical and a
business perspective.
• Business Objectives achieved through Information System
Lecture 3:
• Define and describe business processes and their relationship
to information systems.
• Evaluate the role played by systems serving the various levels
of management in a business and their relationship to each
other.
Week 2 Assignment 2 / Quiz 1
Lecture 4:
• Explain how enterprise applications, collaboration and
communication systems, and intranets improve
organizational performance.
• Explain the difference between e-business, e-commerce, and
e-government.
• Assess the role of the information systems function in a
business.
Lecture 5:
Determine the role general managers must take in decisions
about Information Systems (IS).
Define and explain the Information Systems Strategy
Triangle.
Understand the alignment between decisions of business
Week 3 Quiz 2
strategy, information systems, and organizational design.
Lecture 6:
Identify and define the various business strategy frameworks.
Explain the information system strategy matrix.
Understand and apply these models to different
organizations.
Case Study:
Lecture 7:
Case Study: UPS Competes Globally with Information
Technology (Chapter 1)
Week 4 Case Study: Amazon (Chapter 3) Class Discussion
Lecture 8:
Case Study: Automakers Become Software Companies
(Chapter 3)
Lecture 9:
• Analyze the relationships among ethical, social, and political
issues that are raised by information systems.
• Identify the main moral dimensions of an information society
Week 5 Assignment 3
and specific principles for conduct that can be used to guide
ethical decisions.
Lecture 10:
Case Study: Data for Sale (Chapter 4)
Case Study:
Lecture 13:
Case Study: Can This Bookstore Be Saved? (Chapter 3)
Week 7 Class Discussion
Lecture 14:
Case Study: Life On The Grid: IPHONE Becomes ITRACK
(Chapter 4)
Lecture 15:
List the identifying factors of the eras of information usage.
Know what makes an information resource valuable.
Explain how information resources are used strategically in
context of the 5-forces model.
Week 8 Assignment 4 / Quiz 3
Lecture 16:
Understand how information resources can be used to alter
the value chain.
Explain the importance of strategic alliances.
Know the risks of information resources.
MIDTERM
Lecture 19:
• Identify the principal components of telecommunications
networks and key networking technologies.
Week 10 • Describe the main telecommunications transmission media Class Activity
and types of networks.
Lecture 20:
• Explain how the Internet and Internet technology work and
how they support communication and e-business.
• What is Inernet?
• IP Addressing
• Domain Name SystemInternet Services
• World Wide Web
• Intranet and Extranet
• Technology and Tools for communication & E-bus.
Lecture 21:
• Identify the principal technologies and standards for wireless
networking, communication, and Internet access.
• Assess the value to business of radio frequency identification
(RFID) and wireless sensor networks.
Lecture 22:
• Analyze why information systems need special protection
from destruction, error, and abuse.
• Why Systems are Vulnerable?
• Virus, Worms and Trojans Horses, Spyware
• Hackers and Cybervandalism
• Spoofing and Sniffing
• Denial of Service Attacks
• Computer Crimes and Cyber Terrorism
Lecture 23:
• Establishing a frameowrk for security and control
• Risk Assesment
• Security Policy
• Ensuring Busines Continuity
Lecture 26
• Define TQM and BPR and explain how they are used to
transform a business
• Building Agile and Dynamic Business Process
• Explain an enterprise system and how they are used to
implement organizational change
Lecture 27
• Explain IT Governance and discuss the four perspective of IT
Governance
• Centralized versus Decentralized Organizational
Structures
Week 14 Quiz 5
• Archetypes of Accountability and Decision Rights
Lecture 28
• Emergent Governance-The Digital Ecosystem
• Decision-Making Mechanisms
• Governance Frameworks for Control Decisions
Chapter 11:
Managing Knowledge
Lecture 29:
• What is the role of knowledge management and knowledge
management programs in business?
Week 15 • What types of systems are used for enterprise-wide Assignment 7
knowledge management and how do they provide value for
businesses?
Lecture 30:
• Knowledge Spiral Model
Week 16 Article: Knowledge Management: Hype, Hope, or Help? Blair (2002) Class Discussion
Lecture 31 and 32:
• What is “Knowledge”?
• Why Are People, Especially Managers, Thinking About
Knowledge Management Now?
• What Are the Enabling Technologies for KM?
• What Are the Prerequisites for KM?
• What Are the Major Challenges for KM?
READING MATERIAL:
Managing and Using Information Systems: A Strategic Approach, 6th Edition Keri E. Pearlson, Carol S.
Saunders, Dennis F. Galletta. Wiley Publishing
Management Information System by Laudon & Laudon .” Latest Edition
ATTENDANCE
All students are expected to attend every class. Students who are unable to attend class should advise the
instructor before the class. Failure to attend classes may result in a grade reduction.
DISABILITY POLICY
Any student who feels that he or she has a mental or physical disability that requires attention or accommodation
should contact the instructor immediately.
HONESTY POLICY
All students are expected to behave ethically and honestly. Students must submit their own work. Copying and
pasting from internet sites or other sources is not acceptable. Copying work from other students is not acceptable.
* Original work is appreciated and plagiarism is discourage and bears consequences towards suspension from
course, responsibility lies solely at participants end.
Good Luck!