Documente Academic
Documente Profesional
Documente Cultură
Systems"
Today, the management of information systems is mostly associated with databases,
the Internet, and server rooms. However, information management has been around
since before the invention of these tools. It is as old as commerce itself, as traders,
bankers, and merchants have always had reason to track sales and inventory.
Creditors must be aware of how much capital has been lent to borrowers and how
much money has been deposited at banks. Long before humans harnessed electricity,
there was a need for information systems. But currently almost all management of
information systems is done electronically. Management Information Systems (MIS)
is a formal discipline within business education that bridges the gap between
computer science and the well-known business disciplines of finance, marketing, and
management. However, most students will only take one or two MIS courses in their
undergraduate programs. You may not know it, but you use MIS every day. If you use
email, you are using MIS, as email is an information system (you just only see one
end of it). If you log into a computer every morning and access or edit data in
corporate systems and databases, you are using information systems. In its most
general terms, information systems encompass any interactions between organized
data and people. MIS can be the means by which information is transmitted (such as
the Internet), the software that displays the information (such as Microsoft Excel), or
the systems that manage the data. In this course, you will learn about the various
components of information systems and how to leverage them in business.
Learning Outcomes
Upon successful completion of this course, students will be able to:
Describe the use and function of management information systems.
Describe and evaluate information systems development processes and
techniques.
Identify and evaluate hardware and software requirements for information
systems.
Evaluate data management technologies.
Explain the security risks associated with management information systems.
Course Requirements
In order to take this course, you must:
Have the ability to download and save files and documents to a computer.
Have the ability to open Microsoft files and documents (.doc, .ppt, .xls, etc.).
Course Information
Welcome to BUS206 Management Information Systems. Below, please find
general information about this course and its requirements.
Course Designers: Markeyshi K'Patrick, Jenelle Davis, and Rose Wise
Primary Resources: The material for this course derives from a range of free online
content, and includes historical overviews, academic analysis, and primary sources.
However, you will find much of it produced or hosted by:
Massachusetts Institute of Technology: Technology Review
TechTarget: TechTarget.com
Pearson's InformIT: InformIT.com
Biola University: Dave Bourgeois What is a Management Information
System? lecture series
strategies. In this unit, we will look at the applications of MIS in business and
learn how far MIS has come since the inception of the information age.
Unit 1 Time Advisory
This unit should take you approximately 15 hours to complete.
1.2.4 Structure
o Reading: InformIT.com: Bruce Robertson and Valentin Sribars
The Case for Adaptive Infrastructure
Link: InformIT.com: Bruce Robertson and Valentin Sribars The Case
for Adaptive Infrastructure (HTML)
Instructions: Please click on the link above and read the entire article,
paying particular attention to the section titled What Is IT
Infrastructure?, in which the authors detail each layer of the structure
and its characteristics. Note that both challenges of structure and
possible solutions are described.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
1.3 Systems Innovation
1.3.1 What Is Innovation?
o Web Media: Google: Eric Schmidt on Technology, Innovation &
the Global Economy and Massachusetts Institute of Technology:
Technology Reviews The Geography of Innovation
Links: Google: Eric Schmidt on Technology, Innovation & the Global
Economy (YouTube) and Massachusetts Institute of Technology:
Technology Reviews The Geography of Innovation (Adobe Flash)
Instructions: Please click on the first linke and view the entire video
(1:06:54) for a detailed definition of innovation and a discussion of how
it drives the global economy and is deeply tied to technology. This video
features Eric Schmidt, Google CEO, speaking at a forum jointly hosted
by Google and the Pittsburgh Technology Council on September 23,
2009, in Pittsburgh, PA.
Next, view the MIT video (2:56) for a deeper understanding of
innovation and how it might best be fostered by companies and other
organizations. This clip features Jason Pontin, editor in chief and
publisher of Technology Review, an independent publication owned by
MIT..
Terms of Use: Please respect the copyright and terms of use displayed on
the webpages above.
1.3.2 Needs of Innovation
o Reading: Prophet.com: David Aakers Peeling Back the Layers on
Innovation
Link: Prophet.com: David Aakers Peeling Back the Layers on
Innovation (PDF)
Instructions: Please click on the link above and read the entire article to
better understand an organizations need for innovation, perceived
innovativeness, and priorities in innovation. You can access the article in
PDF format here.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
1.3.3 Sources of Innovation
o Reading: Bloomberg Businessweek: Helen Walters C. K.
Prahalad: The New Age of Innovation
Link: Bloomberg Businessweek: Helen Walters C.K. Prahalad: The
New Age of Innovation (HTML)
Instructions: Please click on the link above and read the entire article to
better understand how a personalized customer experience is achieved
through the use of todays sources of innovation, creating value for a
business. You will also learn the importance of diversification in terms
of a companys ability to remain competitive in a technology-driven
society.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Web Media: Massachusetts Institute of Technology: Technology
Reviews 10 Ways to Think about Innovation
IS development process and a better understanding of why businessapplication development projects have failed when not following the
System Development Life Cycle (SDLC) process. While different
resources will list the steps of the SDLC with a variety of terms, center
your quest for knowledge on the analysis, conceptual design, design,
implementation, testing, installation, and maintenance phases. When
you have finished, watch the next video below to see how everyone has
their own vision for the completed system and why you need the SDLC
process to capture and manage a business-application development
project.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed Sue A. Conger and the original
version can be found here.
o Web Media: Iman Louis's Software Development Life Cycle
(SDLC)
Link: Iman Louiss Software Development Life Cycle
(SDLC) (YouTube)
Instructions: Please click on the link above and watch entire video (1:27)
for a brief introduction to the SDLC.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Computer Science: Software Engineering
Link: WAGmobs Computer Science, MIS, and Networking (iOS App)
or WAGmobs Computer Science (Android App)
Instructions: If you choose to use this app, you will first need to
download the version appropriate to your mobile device. Note that there
are costs associated with both of these apps, which is why they are
optional. No quiz or exam questions will be derived from material
within, but they are still useful supplementary resources. Once
downloaded, open WAGmobs Computer Science app and read the
Software Engineering I and Software Engineering II tutorials.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.3.3 Prototyping
o Reading: University of Missouri at St. Louis: Vicki L. Sauters
Prototyping
Link: The Saylor Foundation: University of MissouriSt. Louis
Professor Vicki L. Sauters Prototyping (PDF)
Instructions: Please click on the link above and read the article for an
understanding of how the developer can use prototyping to demonstrate
a finished product to stakeholders. Pay particular attention to the steps
associated with prototyping.
Terms of Use: This resource has been reposted by the kind permission of
Vicki L. Sauter and can be viewed in its original form here. Please note
that this material is under copyright and may not be reproduced in any
capacity without the explicit permission of the copyright holder.
o Assessment: TechTarget.coms Quiz - Software Development
Link: TechTarget.coms Quiz - Software Development (HTML)
Instructions: Please click on the link above once you have completed
Unit 2 and take this quiz in order to test your knowledge of information
systems development processes.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Assessment: The Saylor Foundation: Unit 2 Checkpoint
Link: The Saylor Foundation: Unit 2 Checkpoint (PDF)
Instructions: Please click on the link above and follow the instructions to
complete this assessment. When you have completed the assessment,
check your response against the Saylor Foundations Unit 2 Checkpoint
Answer Key.
houses the video also provides links for hardware jargon, lecture notes,
slides, and a lecture transcript. To view the video on its original page
you must select the Adobe Flash version, then click on play for "Lecture
1: Hardware."
Terms of Use: This resource is released under a Creative Commons
Attribution-Noncommercial-Share Alike 3.0 License. It is attributed to
David J. Malan and the original version can be found here.
o Mobile App: WAGmobs Computer Science: Computer Hardware
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Computer Science (Android App)
Instructions: Open the Computer Science app and read the Computer
Hardware, Data Communication, and Memory Management
tutorials. Then, quiz yourself with the Memory Management
flashcards. Once you have a firm grasp of the material, take the Data
Communication and Memory Management quiz. Retake the quiz as
needed until you answer all questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Management Information Systems:
Business Hardware
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: Open the Management Information Systems app and read
the Business Hardware I and Business Hardware II tutorials. Once
you have a firm grasp of the material, quiz yourself with the Business
Hardware flashcards and take the Business Hardware quiz. Retake
the quiz as needed until you answer all questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.1.2 Progress in Electronic Technology
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.2.2 Batch Processing
o Reading: IBMs What Is Batch Processing?
Link: IBMs What Is Batch Processing (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the evolution and intricacies of batch processing.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.2.3 Time Sharing
o Reading: Stanford University: John McCarthys Reminiscences on
the History of Time Sharing
Link: Stanford University: John McCarthys Reminiscences on the
History of Time Sharing (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the history of time sharing.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Web Media: Computer History Museum's 1963 Timesharing: A
Solution to Computer Bottlenecks
Link: Computer History Museum's 1963 Timesharing: A Solution to
Computer Bottlenecks (YouTube)
Instructions: Please click on the link above and view the entire film
(27:38) for an understanding of timesharing, one of the most important
recent developments in the evolution of computing. This vintage film
features Massachusetts Institute of Technology science reporter John
Fitch at the MIT Computation Center in an extended interview with
professor of computer science Fernando J. Corbato. The film was coproduced by WGBH (Boston) and MIT.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.2.4 Open-Source Software
o Reading: Open Source Initiatives The Open Source Definition
Link: Open Source Initiatives The Open Source Definition (PDF)
Instructions: Please click on the link above and read the entire article for
an understanding of how the distribution terms of open-source software
must comply with the specific criteria. The article was written by
members of the Open Source Initiative (OSI) who are the stewards of the
Open Source Definition (OSD) and the community-recognized body for
reviewing and approving licenses as OSD-conformant.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to the Open Source Inititative
and the original version can be found here.
3.2.5 Software Services
o Web Media: Cheharts What Is Software + Services?
Link: Cheharts What Is Software + Services (YouTube)
Instructions: Please click on the link above and view the entire video
(3:43) for an overview of the Software + Services story.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.2.6 Mobile Applications
o Reading: ReadWrite.com: Sarah Perezs The Top 10 Mobile
Applications of 2012
Link: ReadWrite.com: Sarah Perezs The Top 10 Mobile Applications
of 2012 (HTML)
Instructions: Please click on the link above and read the entire article for
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Web Media: ARPL - ICTPs ICTP Digital Divide Simulator
Link: ARPL - ICTPs ICTP Digital Divide Simulator (HTML)
Instructions: Please click on the link above and use the digital divide
simulator to experience browsing the web with varying bandwidths.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.3.7 Security
o Reading: Purdue University: Jane F. Kinkus Science and
Technology Resources on the Internet: Computer Security
Link: Purdue University: Jane F. Kinkus Science and Technology
Resources on the Internet: Computer Security (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the major technical areas of computer security. Pay
particular attention to the section titled, Computer and Information
Ethics on WWW.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Management Information Systems:
Systems Security
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: Open WAGmobs Management Information Systems app
and read the Security Information Systems tutorial. Once you have a
firm grasp of the material, take the Security Information Systems quiz.
Retake the quiz as needed until you answer all questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Networking: Network Security
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Networking 101 (Android App)
Instructions: Open WAGmobs Networking app and read the Network
Security tutorial.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Assessment: The Saylor Foundation's Unit 3 Checkpoint
Link: The Saylor Foundation's Unit 3 Checkpoint (PDF)
Instructions: Please click on the link above and complete this
assessment. When you have completed the assessment, check your
answers against The Saylor Foundations Unit 3 Checkpoint Answer
Key.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to The Saylor Foundation.
Unit 4: Data Management
Data is a collection of facts. For example, the population estimates for China
and the United States are data. Information is the presentation of these facts
in an organized manner, that is, the presentation of these population counts
side-by-side with other facts like per-capita income. Knowledge refers to the
use of information to make informed decisionsin this case, policy decisions
about China and the United States. Managing data allows the government,
corporations, and even individuals to apply this knowledge to their everyday
lives. Managing data can be difficult because databases are often filled with
more information than you need. In this unit, you will explore the challenges of
data management and learn how to take data and turn it into knowledge.
We have used the word database a number of times in this course. We will
now define and study databases in detail. Entire courses are devoted to this
subject, as the uses and types of databases are as varied as the number of
businesses that need them. However, you can expect to leave this section with
enough of an understanding of databases to have a conversation with any
database administrator about the needs of your team or department. This
course focuses on relational databases.
Unit 4 Time Advisory
This unit should take you approximately 12 hours to complete.
Gene Bellinger, Durval Castro, and Anthony Mills and can be viewed in
its original form here. Please note that this material is under copyright
and may not be reproduced in any capacity without the explicit
permission of the copyright holder.
o Web Media: Nick Miltons Nick Milton of Knoco.com Discusses
Data, Information, and Knowledge
Link: Nick Miltons Nick Milton of Knoco.com Discusses Data,
Information, and Knowledge (YouTube)
Instructions: Please click on the link above and view the entire video
(4:23) for an understanding of the difference between data, information,
and knowledge.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.1.2 Utilizing Data to Make Decisions
o Reading: University of South Florida: Florida Center for
Instructional Technologys Using Data to Make Decisions
Link: University of South Florida: Florida Center for Instructional
Technologys Using Data to Make Decisions (HTML)
Instructions: Please click on the link above and read the five lectures
based on the Continuous Improvement Cycle: Plan, Do, Study, Study,
and Act. Complete the practice exercises and review the links to
relevant articles and case studies to further your learning. You can
access and work through all five from the bottom of the page.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.1.3 Knowledge Management
o Web Media: Knowledgeable Ltd.: Chris Collisons What Is
Knowledge Management?
Terms of Use: This resource has been reposted by the kind permission of
Chris Collison and can be viewed in its original form here. Please note
that this material is under copyright and may not be reproduced in any
capacity without the explicit permission of the copyright holder.
4.2 Data Management and Efficiency
4.2.1 Data Management within Organizations
o Reading: TechTarget.com: Hannah Smalltrees Seven Master Data
Management Best Practices
Link: TechTarget.com: Hannah Smalltrees Seven Master Data
Management Best Practices (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of data management issues. List at least three issues.
Have you had a personal experience with one of these issues?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Reading: WAGmobs Database Management System: Data
Modeling & Design
Link: WAGmobs SQL and DBMS (iOS App) or WAGmobs Database
Management System (Android App)
Instructions: If you choose to use this app, you will first need to
download the version appropriate to your mobile device. Note that there
are costs associated with both of these apps, which is why they are
optional. No quiz or exam questions will be derived from material
within, but they are still useful supplementary resources. Once you have
downloaded the app, open it and read the Data Models tutorial. Once
you have a firm grasp of the material, take the Data Models quiz.
Next, read the Database Design tutorial and take the associated quiz.
Then, read the Distributed DBMS tutorial. Finally, read the Database
Connectivity and Web Technologies tutorial and take the associated
quiz. Retake the quizzes as needed until you answer all questions
correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.2.2 Reality and Data
o Reading: William Kents Data and Reality: Chapter 12: Philosophy Reality and Tools
Link: William Kents Data and Reality: Chapter 12: Philosophy Reality and Tools (HTML)
Instructions: Please click on the link above and read the entire article.
What is the impact of more data on reality?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.2.3 Defining Data
o Reading: Information Disciplines: Conrad Weiserts Defining Data
Items
Link: Information Disciplines: Conrad Weiserts Defining Data
Items (PDF)
Instructions: Please click on the link above and read the entire article to
identify the different types of data and learn why a rigorous definition of
data is so important.
Terms of Use: This resource has been reposted by the kind permission of
Conrad Weisert and can be viewed in its original form here. Please note
that this material is under copyright and may not be reproduced in any
capacity without the explicit permission of the copyright holder.
4.2.4 Granularity
o Reading: The Saylor Foundation's Data Granularity Defined
Link: The Saylor Foundation's Data Granularity Defined (PDF)
Instructions: Please click on the link above and read the entire article for
an understanding of data granularity. Pay particular attention to the
different dimensions of granularity, i.e., time and space.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to The Saylor Foundation.
4.2.5 Identifiers
o Lecture: Indian Institute of Technology at Madras: Professor
Janakirams Introduction to Database Management System
Link: Indian Institute of Technology at Madras: Professor
Janakirams Introduction to Database Management System (YouTube)
Instructions: Please click on the link above and view the entire lecture
(53:32) for an understanding of the different identifiers in database
terminology.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Database Management System: Types of
DBMS
Link: WAGmobs SQL and DBMS (iOS App) or WAGmobs Database
Management System (Android App)
Instructions: Open WAGmobs Database Management System app and
read the Introduction to DBMS and Types of DBMS tutorials.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
the way organizations operate. The unit starts with an examination of some of
the key technological forces that characterize the information age that all firms
must consider in their strategic planning. Next, the special characteristics and
challenges faced by business-to-business operations are described. The unit
concludes with an examination of the impact of information technology on
organizations and the means by which they are adapting to changes in
technology.
Unit 5 Time Advisory
This unit should take you approximately 18 hours to complete.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.3.3 Coasian Economics
o Reading: David D. Friedmans The Swedes Get It Right
Link: David D. Friedmans The Swedes Get It Right (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of Coases important contributions to economics. Pay
particular attention to the generalization example.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.3.4 Flock-of-Birds Phenomenon
o Reading: University of Georgia Research Magazine: Carole
VanSickles When Dot-Coms Succeed
Link: University of Georgia Research Magazine: Carole
VanSickles When Dot-Coms Succeed (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the flock-of-birds phenomenon and the five
technology forces key to Betfair.coms operations.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.3.5 Fish-Tank Phenomenon
o Reading: Digital Body Language: Steven Woods What Is B2B
Marketing?
Link: Digital Body Language: Steven Woods What Is B2B
Marketing? (HTML)
Instructions: Please click on the link above and read the entire article.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.2 Business to Business (B2B)
5.2.1 Integration
o Web Media: GXS: B2B Past, Present, and Future: Part 5 - Web
2.0
Link: GXS: B2B Past, Present, and Future: Part 5 - Web 2.0 (Adobe
Flash)
Instructions: Please click on the link above and view the entire video
(4:36) for an introduction to web browser software. What is its purpose,
including the three major activities performed?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.2.2 History of B2B Systems
o Reading: Drummond Group: Rik Drummond and Beth Morrows
Lessons Learned from the History of Interoperable B2B
Communication
Link: Drummond Group: Rik Drummond and Beth Morrows Lessons
Learned from the History of Interoperable B2B Communication (PDF)
Instructions: Please click on the link above and read the article for an
understanding of the history of B2B and the important lessons learned.
Pay particular attention to the critical success factors for B2B to continue
to grow.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.2.3 Buyers and Sellers
This unit concludes with a look at the future of MIS. After studying the security
issues and failures of various systems, the outlook can seem bleak. Wherever
there is a problem in MIS, there are new dot com and/or employment/career
opportunities to find profitable solutions.
Unit 6 Time Advisory
This unit should take you approximately 16.5 hours to complete.
Instructions: Please click on the link above and read the entire article,
which provides a broad list of computer crime issues. How might this
type of crime have a negative impact on a business you own or manage?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Reading: Purdue University: Jane F. Kinkus Science and
Technology Resources on the Internet: Computer Security
Link: Purdue University: Jane F. Kinkus' Science and Technology
Resources on the Web: Computer Security (HTML)
Instructions: Please click on the link above and read the entire article,
which provides a list of computer crime detection and prevention
resources to inoculate your business from the most prevalent computer
crimes. Pick at least two links that will help prevent the crimes
identified in the first article in this subunit.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2 System Failures
6.2.1 IT Infrastructure
o Reading: HP.com: Understanding Information Technology
Requirements and IT Infrastructure Complexity
The Saylor Foundation does not yet have materials for this portion of the
course. If you are interested in contributing your content to fill this gap
or aware of a resource that could be used here, please submit it here.
Submit Materials
6.2.2 Confidentiality
o Reading: Bright Hub: Lee Clemmers Information Security
Concepts: Confidentiality, Integrity, Availability, and Authenticity
Link: Bright Hub: Lee Clemmers Information Security Concepts:
Confidentiality, Integrity, Availability, and Authenticity (HTML)
Instructions: Please click on the link above and read the entire article,
which introduces four central security issues. You will be asked to read
the link for each concept in the subunits below.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2.3 Integrity
o Reading: Bright Hub: Lee Clemmers Information Security
Concepts: Integrity
Link: Bright Hub: Lee Clemmers Information Security Concepts:
Integrity (HTML)
Instructions: Please click on the link above and read the entire article.
Note that integrity is a core concept of information security and that not
all issues associated with integrity are malicious. Note the authors
suggestions on how to verify and retain system integrity.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2.4 Availability
o Reading: Bright Hub: Lee Clemmers Information Security
Concepts: Availability
Instructions: Please click on the link above and read the entire article.
What is authenticity? Why is it important to a business?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2.6 Sources of Failure
o Reading: J.H. Berk and Associates: Joseph H. Berks Systems
Failure Analysis
Link: J.H. Berk and Associates: Joseph H. Berks Systems Failure
Analysis (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the various sources of system failure. This article
focuses on the fault-tree-driven, disciplined failure analysis approach.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2.7 Risk Management
o Reading: SANS Institute: Steve Elky's An Introduction to
Information Systems Risk Management
Link: SANS Institute: Steve Elky's An Introduction to Information
Systems Risk Management (HTML)
Instructions: Please click on the link above and scroll down (about
halfway down the webpage) to the article entitled An Introduction to
Information Systems Risk Management. Click on the link for the
article and read it in its entirety for a sound introduction to the
components of risk management for information systems.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.3 The Future of MIS
o Reading: Management Information Systems Quarterly: Richard O.
Masons Four Ethical Issues of the Information Age
small fee. No final exam questions will be derived from material within,
but it is still a useful supplementary resource, especially if you plan to
take the College-Level Examination Program (CLEP) exam for
Information Systems and Computer Applications. Once you have
downloaded the app, open it and select the Information Systems and
Computer Applications questions. If taking the CLEP exam, it is
recommended that you retake the quiz as needed until you answer all
300 questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
Unit 7: Final Exam
o Final Exam: The Saylor Foundation's BUS206 Final Exam
Link: The Saylor Foundation's BUS206 Final Exam
Instructions: Please click on the link above and complete the final exam.
You must be logged into your Saylor Foundation School account in
order to access this exam. If you do not yet have an account, you will be
able to create one, free of charge, after clicking the link.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to The Saylor Foundation.