Sunteți pe pagina 1din 62

Course Syllabus for "BUS206: Management Information

Systems"
Today, the management of information systems is mostly associated with databases,
the Internet, and server rooms. However, information management has been around
since before the invention of these tools. It is as old as commerce itself, as traders,
bankers, and merchants have always had reason to track sales and inventory.
Creditors must be aware of how much capital has been lent to borrowers and how
much money has been deposited at banks. Long before humans harnessed electricity,
there was a need for information systems. But currently almost all management of
information systems is done electronically. Management Information Systems (MIS)
is a formal discipline within business education that bridges the gap between
computer science and the well-known business disciplines of finance, marketing, and
management. However, most students will only take one or two MIS courses in their
undergraduate programs. You may not know it, but you use MIS every day. If you use
email, you are using MIS, as email is an information system (you just only see one
end of it). If you log into a computer every morning and access or edit data in
corporate systems and databases, you are using information systems. In its most
general terms, information systems encompass any interactions between organized
data and people. MIS can be the means by which information is transmitted (such as
the Internet), the software that displays the information (such as Microsoft Excel), or
the systems that manage the data. In this course, you will learn about the various
components of information systems and how to leverage them in business.
Learning Outcomes
Upon successful completion of this course, students will be able to:
Describe the use and function of management information systems.
Describe and evaluate information systems development processes and
techniques.
Identify and evaluate hardware and software requirements for information
systems.
Evaluate data management technologies.
Explain the security risks associated with management information systems.

Course Requirements
In order to take this course, you must:

Have access to a computer.

Have a basic understanding of computers.

Have continuous broadband Internet access.

Have the ability/permission to install plug-ins or software (e.g., Adobe Reader or


Flash).

Have the ability to download and save files and documents to a computer.

Have the ability to open Microsoft files and documents (.doc, .ppt, .xls, etc.).

Be competent in the English language.

Have read the Saylor Student Handbook.

Course Information
Welcome to BUS206 Management Information Systems. Below, please find
general information about this course and its requirements.
Course Designers: Markeyshi K'Patrick, Jenelle Davis, and Rose Wise
Primary Resources: The material for this course derives from a range of free online
content, and includes historical overviews, academic analysis, and primary sources.
However, you will find much of it produced or hosted by:
Massachusetts Institute of Technology: Technology Review
TechTarget: TechTarget.com
Pearson's InformIT: InformIT.com
Biola University: Dave Bourgeois What is a Management Information
System? lecture series

Requirements for Completion: In order to successfully complete this course, you


will need to work through each unit and all of its assigned materials. Note that you
will be officially graded only for the final exam. In order to pass the course, you will
have to earn a minimum of 70% on the final exam. Your score on the final exam will
be tabulated as soon as you complete it. You will have the opportunity to retake the
exam if you do not pass it.
Time Commitment: This course should take you approximately 96 hours to
complete. A time advisory is presented under each subunit to guide you on the
amount of time that you are expected to spend in going through the lectures. Please
do not rush through the material to adhere to the time advisory. You can look at the
time suggested in order to plan out your week for study and make your schedule
accordingly.
Tips/Suggestions: You will be using many different sources for reading assignments
in this course. Some concepts can be presented in different ways. Therefore, if you
are confused by a reading, refer to the unit learning outcomes. Each reading may
present the same material, just in a different style. Seek understanding, not just
completion.
Course Overview
Unit 1: Introduction to Management Information Systems
Information systems are designed to collect data and turn it into
information. These systems process information by gathering and organizing
data so it can be distributed in an understandable format. Information systems
processing includes data retrieval, data storage, and the execution of
transactions utilizing data. If you were given a list of home prices in various
zip codes and needed to report on which regions were experiencing price
increases and decreases, how would you do it? Without having information
about past prices (e.g., dates of sale) or the homes themselves (e.g., square
footage), this would be a difficult task. However, if the data had been entered
into a database with all of this information, it could be called upon quickly, and
you would have your report ready in seconds. In the past, such a report on
home prices could take days to compile. Thanks to modern information
systems, it can take a few minutes.
Much of MIS is driven by innovation. The right technology, processes, people,
and structures come together to solve problems utilizing new techniques and

strategies. In this unit, we will look at the applications of MIS in business and
learn how far MIS has come since the inception of the information age.
Unit 1 Time Advisory
This unit should take you approximately 15 hours to complete.

Subunit 1.1: 6 hours

Subunit 1.2: 3 hours

Subunit 1.3: 6 hours

Unit1 Learning Outcomes


Upon successful completion of this unit, students will be able to:
o Identify the roles of an information system.
o Define the term management information systems (MIS).
o List the components of an information system.
o Describe what innovation is and how technology contributes to it.
1.1 MIS and the Business Community
1.1.1 Introduction to Information Systems
o Web Media: Biola University: David Bourgeois Management
Information Systems: What is an Information System?: The 5
Components
Link: Biola University: David Bourgeois Management Information
Systems: What Is an Information System?: The 5
Components (YouTube)
Instructions: Please click on the link above and watch the entire video
(10:55) for an introduction to the concept of an information system.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to David Bourgeois.

o Reading: The Saylor Foundation: Gopinathan Thachappillys Role


of MIS in Business Management
Links: The Saylor Foundation: Gopinathan Thachappillys Role of MIS
in Business Management (PDF)
Instructions: Please click on the link above and read this brief overview
of the role of MIS in business management. What is the role of MIS in
the management of any size business?
Terms of Use: This resource has been reposted by the kind permission of
Gopinathan Thachappilly, and can be viewed in its original form here.
Please note that this material is under copyright and may not be
reproduced in any capacity without the explicit of from the copyright
holder.
o Mobile App: WAGmobs Management Information Systems:
Introduction
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: If you choose to use this app, you will first need to
download the version appropriate to your mobile device. Note that there
are costs associated with both of these apps, which is why they are
optional. No quiz or exam questions will be derived from material
within, but they are still useful supplementary resources. Once
downloaded, open the Management Information Systems (MIS) section
(if using the iOS version) and read the tutorial, Introduction.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
1.1.2 Information Technology and Information Systems
o Reading: Tech-FAQ.coms Decision Support System
Link: Tech-FAQ.coms Decision Support System (HTML)
Instructions: Please click on the link above and read the entire article to
better understand how information technology and information systems
come together to form MIS and generate high value decision-making

information for business organizations.


Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Management Information Systems:
Decision Support and Expert Systems
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: Open the MIS app and read the Decision Support and
Expert System tutorial. Once you have a firm grasp of the material, quiz
yourself with the Decision Support and Expert System flashcards.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
1.2 The Components of an Information System
o Web Media: Knowledge Horizons Describe the Components of
Information Systems
Link: Knowledge Horizons Describe the Components of Information
Systems (YouTube)
Instructions: Please click on the link above and view the entire video
(2:25) for an introduction to how the five components of MIS are used in
a business organization. While this speaker presents the material from a
business management point of view, see if you can spot each of the five
components of information systems that were presented in the subsubunit 1.1.1.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
1.2.1 Technology
o Reading: American Association for the Advancement of Science:
Science for All Americans: Chapter 3: The Nature of Technology

Link: American Association for the Advancement of Science: Science


for All Americans: Chapter 3: The Nature of Technology (HTML)
Instructions: Please click on the link above and read the entire article for
a high-level overview of technology, its production, and its components.
You may want to bookmark this item to review when you get to future
Units in this course, such as Unit 2 on systems development.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
1.2.2 Process
o Reading: Exforsys Inc.'s Business Intelligence Role in Making
Corporate Decisions
Link: Exforsys Inc.'s Business Intelligence Role in Making Corporate
Decisions (HTML)
Instructions: Please click on the link above and read the entire article to
see the process for using business data for information.
Terms of Use: Please respect the copyright and terms of use displayed by
the webpages above.
1.2.3 People
o Reading: George Mason University: Health Systems
Administrations Role of Information in Organizations
Link: George Mason University: Health Systems Administrations Role
of Information in Organizations (HTML)
Instructions: Please click on the link above and read the entire webpage.
Pay particular attention to the section titled, Investment in Information
Systems, which indicates the number of people employed in gathering
information. Why are people an important part of information in
organizations?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.

1.2.4 Structure
o Reading: InformIT.com: Bruce Robertson and Valentin Sribars
The Case for Adaptive Infrastructure
Link: InformIT.com: Bruce Robertson and Valentin Sribars The Case
for Adaptive Infrastructure (HTML)
Instructions: Please click on the link above and read the entire article,
paying particular attention to the section titled What Is IT
Infrastructure?, in which the authors detail each layer of the structure
and its characteristics. Note that both challenges of structure and
possible solutions are described.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
1.3 Systems Innovation
1.3.1 What Is Innovation?
o Web Media: Google: Eric Schmidt on Technology, Innovation &
the Global Economy and Massachusetts Institute of Technology:
Technology Reviews The Geography of Innovation
Links: Google: Eric Schmidt on Technology, Innovation & the Global
Economy (YouTube) and Massachusetts Institute of Technology:
Technology Reviews The Geography of Innovation (Adobe Flash)
Instructions: Please click on the first linke and view the entire video
(1:06:54) for a detailed definition of innovation and a discussion of how
it drives the global economy and is deeply tied to technology. This video
features Eric Schmidt, Google CEO, speaking at a forum jointly hosted
by Google and the Pittsburgh Technology Council on September 23,
2009, in Pittsburgh, PA.
Next, view the MIT video (2:56) for a deeper understanding of
innovation and how it might best be fostered by companies and other
organizations. This clip features Jason Pontin, editor in chief and
publisher of Technology Review, an independent publication owned by
MIT..

Terms of Use: Please respect the copyright and terms of use displayed on
the webpages above.
1.3.2 Needs of Innovation
o Reading: Prophet.com: David Aakers Peeling Back the Layers on
Innovation
Link: Prophet.com: David Aakers Peeling Back the Layers on
Innovation (PDF)
Instructions: Please click on the link above and read the entire article to
better understand an organizations need for innovation, perceived
innovativeness, and priorities in innovation. You can access the article in
PDF format here.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
1.3.3 Sources of Innovation
o Reading: Bloomberg Businessweek: Helen Walters C. K.
Prahalad: The New Age of Innovation
Link: Bloomberg Businessweek: Helen Walters C.K. Prahalad: The
New Age of Innovation (HTML)
Instructions: Please click on the link above and read the entire article to
better understand how a personalized customer experience is achieved
through the use of todays sources of innovation, creating value for a
business. You will also learn the importance of diversification in terms
of a companys ability to remain competitive in a technology-driven
society.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Web Media: Massachusetts Institute of Technology: Technology
Reviews 10 Ways to Think about Innovation

Link: Massachusetts Institute of Technology: Technology Reviews 10


Ways to Think About Innovation (Adobe Flash)
Instructions: Please click on the link above and view the entire video
(2:28) to better understand what successful young technologists need to
know about innovation. The article details specific examples of
technological innovation.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
Unit 1 Assessment
o Assessment: The Saylor Foundation's Unit 1 Checkpoint
Link: The Saylor Foundation's Unit 1 Checkpoint (PDF) and
Answer Key to Unit 1 Checkpoint (PDF)
Instructions: Please click on the link above and follow the instructions to
complete this assessment. When you have completed the assessment,
check your answers against Answer Key to Unit 1 Checkpoint. This
assessment should take you approximately 15 minutes to complete
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to The Saylor Foundation.
Unit 2: Information Systems Development
Businesses have diverse needs. While software packages for managing
information exist, most software is not plug and play ready for most business
applications. IT departments, in conjunction with representatives from all lines
of business, must work together to develop and implement information system
solutions. The IS development process can range from the simple to the
extremely complicated. Managers often find themselves disagreeing about
which information is most important and what is worth developing. The
tradeoffs between financial resources, time, and the capabilities of current
information systems can lead to frustration; for this reason, IS development is
a very important function within a business.
This unit begins by describing the elements of the IS development process,
which includes requirements, architecture, design, coding, testing, and

maintenance. Next, some of the main issues inherent in IS development will be


explored, such as cost, speed, complexity, and user adoption. The unit ends
with a discussion of other IS development methodologies such as iterative, big
bang, and prototyping.
Unit 2 Time Advisory
This unit should take you approximately 16 hours to complete.

Subunit 2.1: 4 hours

Subunit 2.2: 6 hours

Subunit 2.3: 6 hours

Unit2 Learning Outcomes


Upon successful completion of this unit, students will be able to:
o Identify the processes associated with designing an information system.
o Compare and contrast best practices of each of the IS development
methodologies: iterative, big bang, and prototyping.
o Define the Systems Development Life Cycle and list the steps involved.
o Describe some of the key issues involved in IS development and their
impact on business.
2.1 IS Development Process
o Reading: University of Georgia: Sue A. Congers The New Software
Engineering: Chapter 1: Overview of Software Engineering
Link: University of Georgia: Sue A. Congers The New Software
Engineering: Chapter 1: Overview of Software Engineering (PDF)
Also Available in:
Full Text PDF
Instructions: Please click on the link above and read the chapter (pages
22-28) up to the History section for an overview of the life cycle of the

IS development process and a better understanding of why businessapplication development projects have failed when not following the
System Development Life Cycle (SDLC) process. While different
resources will list the steps of the SDLC with a variety of terms, center
your quest for knowledge on the analysis, conceptual design, design,
implementation, testing, installation, and maintenance phases. When
you have finished, watch the next video below to see how everyone has
their own vision for the completed system and why you need the SDLC
process to capture and manage a business-application development
project.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed Sue A. Conger and the original
version can be found here.
o Web Media: Iman Louis's Software Development Life Cycle
(SDLC)
Link: Iman Louiss Software Development Life Cycle
(SDLC) (YouTube)
Instructions: Please click on the link above and watch entire video (1:27)
for a brief introduction to the SDLC.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Computer Science: Software Engineering
Link: WAGmobs Computer Science, MIS, and Networking (iOS App)
or WAGmobs Computer Science (Android App)
Instructions: If you choose to use this app, you will first need to
download the version appropriate to your mobile device. Note that there
are costs associated with both of these apps, which is why they are
optional. No quiz or exam questions will be derived from material
within, but they are still useful supplementary resources. Once
downloaded, open WAGmobs Computer Science app and read the
Software Engineering I and Software Engineering II tutorials.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.

o Mobile App: WAGmobs Management Information Systems: System


Development
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: Open the Management Information Systems app and read
the System Development tutorial.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.1.1 Requirements
o Reading: Steve McConnells Requirements Development
Link: Steve McConnells Requirements Development (HTML)
Instructions: Please click on the link above and read the entire article on
the three related activities of the requirements stage of IS development.
During this stage, the needs of the customer are determined and
translated to system specifications.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.1.2 Architecture
o Reading: University of Southern California: Center for Software
Engineering: Architecture Development Process
Link: University of Southern California: Center for Software
Engineering: Architecture Development Process (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the IS architecture development process. Pay
particular attention to Figure 2, which depicts the process by which this
architecture was developed.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.

2.1.3 External Design


o Reading: Philip Greenspun and Andrew Grumets Software Design
Review
Link: Philip Greenspun and Andrew Grumets Software Design
Review (HTML)
Instructions: Please click on the link above and read the entire article to
learn about the external design review process. Note that every stage of
the IS development process should involve design reviewers.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.1.4 Internal Design
o Reading: ProjectManagement.coms Process/Project RAD - RAD Rapid Application Development Process
Link: ProjectManagement.coms Process/Project RAD - RAD - Rapid
Application Development Process (HTML)
Instructions: Please click on the link above and read the entire article to
learn about the internal design review process, paying particular
attention to the Rapid Application Development methodology.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.1.5 Coding
o Mobile App: WAGmobs Computer Science: Programming
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Computer Science (Android App)
Instructions: Open the Computer Science app and read the
Programming Basics tutorial. Once you have a firm grasp of the
material, take the Programming quiz (only available in the iOS
version). Next, read the Web Programming Basics tutorial and take the

associated quiz. Then, do the same for Object Oriented Programming


(the quiz for this section is only available in the iOS version). Finally, do
the same for Java Programming Basics. Retake the quizzes as needed
until you answer all questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Reading: James Shore and Shane Wardens The Art of Agile
Development: Coding Standards
Link: James Shore and Shane Wardens The Art of Agile Development:
Coding Standards (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the importance of a written code standard in the IS
development process. The coding phase of the IS development process
is often a team effort.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.1.6 Testing
o Reading: World Wide Web Consortiums Why Is Testing
Important?
Link: World Wide Web Consortiums Why Is Testing
Important? (HTML)
Instructions: Please click on the link above and read the article to better
understand two types of testing in IS development: conformance and
interoperability. Pay particular attention to identifying when test
development should begin.
About the link: The article is a living document that is updated
periodically, particularly in response to feedback from readers. It is part
of the knowledge library of the World Wide Web Consortiums Quality
Assurance group.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.

o Reading: SoftwareQATest: Rick Howers Software QA and Testing


Frequently Asked Questions, Part 1
Link: SoftwareQATest: Rick Howers Software QA and Testing
Frequently Asked Questions, Part 1 (HTML)
Instructions: Please click on the link above and read the entire article.
Pay particular attention to the comprehensive classification of the
different types of testing.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.1.7 Maintenance
o Reading: Federal Financial Institution Examination Council's
Maintenance Phase
Link: Federal Financial Institution Examination Council's Maintenance
Phase (PDF)
Also available in:
HTML
Instructions: Please click on the link above and read the entire article for
an in-depth understanding of the maintenance phase of the IS
development process.
This resource is part of a publication intended to provide examiners and
financial institutions guidance for identifying and controlling
development and acquisition risks.
Terms of Use: This resource is in the public domain.
2.2 Issues With IS Development
2.2.1 Cost
o Reading: Annals of Software Engineering: Barry Boehm, Chris
Abts, and Sunita Chulanis Software Development Cost
Estimation ApproachesA Survey (2000)

Link: Annals of Software Engineering: Barry Boehm, Chris Abts, and


Sunita Chulanis Software Development Cost Estimation Approaches
A Survey (2000) (HTML)
Instructions: Please click on the link above and access this article by
downloading it in PDF format via the View or Download link at the
bottom of the page. Please read the entire read the article for an
understanding of various IS models and techniques, including the
following: development cost estimation, parametric, expertise-based,
learning-oriented, dynamics-based, regression-based, and compositeBayesian techniques for integrating expertise and regression-based
models.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.2.2 Speed
o Reading: InformIT.com: Jim Highsmiths Innovative Product
Development
Link: The Saylor Foundation: Jim Highsmiths Innovative Product
Development (PDF)
Instructions: Please click on the link above and read this chapter
from Agile Project Management: Creating Innovative Products for an
introduction to the concept of agile product management, a style of
product development that concentrates on adaptive, exploratory, and
speedy development.
Terms of Use: This resource has been reposted by the kind permission of
Jim Highsmith and can be viewed in its original form here. Please note
that this material is under copyright and may not be reproduced in any
capacity without the explicit permission of the copyright holder.
2.2.3 Complexity
o Reading: Journal of Social Sciences: Indranil Mukherjees
Understanding Information System Failures from the Complexity
Perspective

Link: Journal of Social Sciences: Indranil Mukherjees Understanding


Information System Failures from the Complexity Perspective (PDF)
Instructions: Click on the link above, which will take you to the abstract
of the article. To download the full article click on the View Fulltext
PDF on the right hand side of the screen. Pay particular attention the
authors analysis of information system failures in light of the
complexity theory.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.3 Other Development Platforms Methodologies
2.3.1 Iterative Development
o Web Media: Ivar Jacobson International Consulting: Kurt Bittners
Why Iterative Development
Link: Ivar Jacobson International Consulting: Kurt Bittners Why
Iterative Development (YouTube)
Instructions: Please click on the link above and view the entire video
(11:00) about the value of and reasons behind moving to an iterative
information systems development plan.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.3.2 Big Bang Development
o Reading: Academic Dictionaries and Encyclopedias: Big Bang
Adoption
Link: Academic Dictionaries and Encyclopedias: Big Bang
Adoption (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the IS changeover process known as big bang
instant adoption.

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
2.3.3 Prototyping
o Reading: University of Missouri at St. Louis: Vicki L. Sauters
Prototyping
Link: The Saylor Foundation: University of MissouriSt. Louis
Professor Vicki L. Sauters Prototyping (PDF)
Instructions: Please click on the link above and read the article for an
understanding of how the developer can use prototyping to demonstrate
a finished product to stakeholders. Pay particular attention to the steps
associated with prototyping.
Terms of Use: This resource has been reposted by the kind permission of
Vicki L. Sauter and can be viewed in its original form here. Please note
that this material is under copyright and may not be reproduced in any
capacity without the explicit permission of the copyright holder.
o Assessment: TechTarget.coms Quiz - Software Development
Link: TechTarget.coms Quiz - Software Development (HTML)
Instructions: Please click on the link above once you have completed
Unit 2 and take this quiz in order to test your knowledge of information
systems development processes.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Assessment: The Saylor Foundation: Unit 2 Checkpoint
Link: The Saylor Foundation: Unit 2 Checkpoint (PDF)
Instructions: Please click on the link above and follow the instructions to
complete this assessment. When you have completed the assessment,
check your response against the Saylor Foundations Unit 2 Checkpoint
Answer Key.

Terms of Use: This resource is licensed under a Creative Commons


Attribution License, it is attributed to The Saylor Foundation.
Unit 3: Hardware and Software of Information Systems
As mentioned in the course introduction, much of IS is now centered on
technology. Accordingly, IS capabilities are mostly limited to the hardware and
software capabilities of a given system. Ten years ago, the average Internet
user could download an MP3 music file in a few minutes over a cable. This
can now be done in seconds wirelessly from just about anywhere in the
developed world thanks to improvements in hardware and software. While it is
nearly impossible to remain in front of technology developments, it is possible
to analyze trends in technology advancements and identify what hardware and
software may give you a competitive advantage.
This unit will first discuss the hardware component of technology, followed by
software. The unit finishes with a discussion of networking as a component of
technology.
Unit 3 Time Advisory
This unit should take you approximately 18 hours to complete.

Subunit 3.1: 6 hours

Subunit 3.2: 6 hours

Subunit 3.3: 6 hours

Unit3 Learning Outcomes


Upon successful completion of this unit, students will be able to:
o Compare and contrast hardware and software.
o Identify the types of networks and their general functions.
o Describe the importance of the Internet to information systems.
o Explain how a lack of computer security places an organization in peril.
3.1 Hardware

o Mobile App: WAGmobs Computer Science: Computer


Fundamentals
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Computer Science (Android App)
Instructions: Open the Computer Science app and read the Computer
Fundamentals tutorial. Once you have a firm grasp of the material, quiz
yourself with the Computer Basics flashcards, and take the Computer
Fundamentals quiz. Retake the quiz as needed until you answer all 10
questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.1.1 Progress of Hardware Technology
o Web Media: Biola University: Dave Bourgeois The Hardware
Component
Link: Biola University: Dave Bourgeois The Hardware
Component (YouTube)
Instructions: Please click on the link above and watch the entire video
(17:33) to learn exactly how to answer the question: What is meant by
the term hardware?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Lecture: Harvard Extension School: David J. Malans
Understanding Computers and the Internet
Link: Harvard Extension School: David J. Malans Understanding
Computers and the Internet (YouTube)
Also available in:
Adobe Flash
Instructions: Please click on the link above and view the entire lecture
(1:49:10) for an understanding of computer hardware and what is going
on inside the computer as it works. Note that the original site that

houses the video also provides links for hardware jargon, lecture notes,
slides, and a lecture transcript. To view the video on its original page
you must select the Adobe Flash version, then click on play for "Lecture
1: Hardware."
Terms of Use: This resource is released under a Creative Commons
Attribution-Noncommercial-Share Alike 3.0 License. It is attributed to
David J. Malan and the original version can be found here.
o Mobile App: WAGmobs Computer Science: Computer Hardware
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Computer Science (Android App)
Instructions: Open the Computer Science app and read the Computer
Hardware, Data Communication, and Memory Management
tutorials. Then, quiz yourself with the Memory Management
flashcards. Once you have a firm grasp of the material, take the Data
Communication and Memory Management quiz. Retake the quiz as
needed until you answer all questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Management Information Systems:
Business Hardware
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: Open the Management Information Systems app and read
the Business Hardware I and Business Hardware II tutorials. Once
you have a firm grasp of the material, quiz yourself with the Business
Hardware flashcards and take the Business Hardware quiz. Retake
the quiz as needed until you answer all questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.1.2 Progress in Electronic Technology

o Reading: University of Washington: AccessIT's What Is Electronic


and Information Technology?
Link: University of Washington: AccessIT's What Is Electronic and
Information Technology? (PDF)
Also available in:
HTML
Instructions: Please click on the link above and read the entire article for
a succinct explanation of the terms electronic and information
technology versus information technology. Pay particular attention to
the formal definition of both electronic and information technology
published in the Access Boards Electronic and Information Technology
Accessibility Standards.
Terms of Use: The resource above can only be reproduced and
distributed for academic and non-commercial purposes.
3.1.3 Progress in Storage Technology
o Reading: CIO.com: Clod Barrera and Steve Wojtowecz's Cloud
Leads 5 Storage Trends for 2011
Link: CIO.com: Clod Barrera and Steve Wojtowecz's Cloud Leads 5
Storage Trends for 2011 (HTML)
Instructions: Please click on the link above and read the entire article to
better understand todays shift in how organizations are storing
technology. Pay particular attention to the five key technologies that IT
professionals should review when determining their organizations
technology storage strategy.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Reading: TechTarget.coms Fast Guide to Storage Technologies
Link: TechTarget.coms Fast Guide to Storage Technologies (HTML)
Instructions: Please click on the link above and review this guide to
storage technologies in table format. Pay particular attention to the

advantages, limitations, and applications of each technology.


Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.1.4 Personal Computers
o Web Media: HowStuffWorks Computer Tour
Link: HowStuffWorks Computer Tour (YouTube)
Instructions: Please click on the link above and watch the entire video
(3:24) to get a look inside the personal computer.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Reading: BCS - The Chartered Institute for IT: Steve Furbers The
Future of Computer Technology
Link: BCS - The Chartered Institute for Technology: Steve
Furbers The Future of Computer Technology (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of personal computing challenges and changes.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.2 Software
o Web Media: Biola University: Dave Bourgeois What Is Software?
Link: Biola University: Dave Bourgeois What Is
Software? (YouTube)
Instructions: Please click on the link above and watch the entire video
(19:45) to learn exactly what is meant by the term software.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.

o Mobile App: WAGmobs Computer Science: Computer Software


Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Computer Science (Android App)
Instructions: Open the Computer Science app and read the Computer
Software and Searching Algorithms tutorials. Once you have a firm
grasp of the material, quiz yourself with the Sorting and Searching
flashcards. Next, read the Operating System, Data Processing, and
File Processing tutorials and then take the Operating System quiz.
Retake the quizzes as needed until you answer all questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Management Information Systems:
Business Software
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: Open the Management Information Systemsapp and read
the Business Software tutorial. Once you have a firm grasp of the
material, quiz yourself with the Business Software flashcards.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.2.1 Evolution of Software
o Reading: University of Lugano: Lile Hattori, Marco DAmbros,
Michele Lanza, and Mircea Lungus Software Evolution
Comprehension: Replay to the Rescue
Link: University of Lugano: Lile Hattori, Marco DAmbros, Michele
Lanza, and Mircea Lungus Software Evolution Comprehension:
Replay to the Rescue (PDF)
Instructions: Please click on the link above and read the entire article for
an understanding of the evolution of software.

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.2.2 Batch Processing
o Reading: IBMs What Is Batch Processing?
Link: IBMs What Is Batch Processing (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the evolution and intricacies of batch processing.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.2.3 Time Sharing
o Reading: Stanford University: John McCarthys Reminiscences on
the History of Time Sharing
Link: Stanford University: John McCarthys Reminiscences on the
History of Time Sharing (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the history of time sharing.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Web Media: Computer History Museum's 1963 Timesharing: A
Solution to Computer Bottlenecks
Link: Computer History Museum's 1963 Timesharing: A Solution to
Computer Bottlenecks (YouTube)
Instructions: Please click on the link above and view the entire film
(27:38) for an understanding of timesharing, one of the most important
recent developments in the evolution of computing. This vintage film
features Massachusetts Institute of Technology science reporter John
Fitch at the MIT Computation Center in an extended interview with
professor of computer science Fernando J. Corbato. The film was coproduced by WGBH (Boston) and MIT.

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.2.4 Open-Source Software
o Reading: Open Source Initiatives The Open Source Definition
Link: Open Source Initiatives The Open Source Definition (PDF)
Instructions: Please click on the link above and read the entire article for
an understanding of how the distribution terms of open-source software
must comply with the specific criteria. The article was written by
members of the Open Source Initiative (OSI) who are the stewards of the
Open Source Definition (OSD) and the community-recognized body for
reviewing and approving licenses as OSD-conformant.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to the Open Source Inititative
and the original version can be found here.
3.2.5 Software Services
o Web Media: Cheharts What Is Software + Services?
Link: Cheharts What Is Software + Services (YouTube)
Instructions: Please click on the link above and view the entire video
(3:43) for an overview of the Software + Services story.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.2.6 Mobile Applications
o Reading: ReadWrite.com: Sarah Perezs The Top 10 Mobile
Applications of 2012
Link: ReadWrite.com: Sarah Perezs The Top 10 Mobile Applications
of 2012 (HTML)
Instructions: Please click on the link above and read the entire article for

an understanding of trends in todays mobile applications and the future


predictions by ReadWriteMobile.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Web Media: Salesforces: What Is Cloud Computing?
Link: Salesforces What Is Cloud Computing (YouTube)
Instructions: Please click on the link above and read the entire article for
an understanding of cloud computing as a necessary platform for mobile
computing.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.3 Networks
o Mobile App: WAGmobs Networking: Network Technology
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Networking 101 (Android App)
Instructions: If you choose to use this app, you will first need to
download the version appropriate to your mobile device. Note that there
are costs associated with both of these apps, which is why they are
optional. No quiz or exam questions will be derived from material
within, but they are still useful supplementary resources. After the app
has downloaded, open it and read the Networking Introduction,
Network Technology, and Types of Networks tutorials. Once you
have a firm grasp of the material, study the Networking Basics
flashcards and take the Network Technology quiz. Next, read the OSI
Model tutorial and take the associated quiz. Finally, read the Wireless
Networking and Advantages of Computer Networks tutorials.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.3.1 Local Area Networks

o Reading: The Saylor Foundation's LAN Defined


Link: The Saylor Foundation: LAN Defined (PDF)
Instructions: Please click on the link above and read the entire article for
an understanding of how local area networks link computers together
and provide shared access to printers, file servers, and other services.
Note that a network is any connection of two or more computing
devices for the purpose of communication. Networks can be very small,
such as a wireless network in your home, or large, such as a corporate
intranet. The Internet is the largest network in existence.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to The Saylor Foundation.
o Web Media: Megaboy84s LAN: Local Area Networks
Link: Megaboy84s LAN: Local Area Networks (YouTube)
Instructions: Please click on the link above and view the entire video
(4:24) to learn how to create a local area network using ethernet and
modems.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: Jason Staffords Learning Networking
Link: Jason Staffords Learning Networking (iOS App)
Instructions: If you choose to use this app, you will first need to
download it to your iPad or iPhone. Note that the app only available for
iOS users and has associated costs, which is why it is optional. No quiz
or exam questions will be derived from material within, but it is still a
useful supplementary resource. Once you have downloaded the app,
open it and watch all 11 learning videos. Once you have a firm grasp of
the material, take the practice exam. Retake the practice exam as needed
until you receive a passing score of 85% or higher. You may choose any
time limit you want to complete this practice exam.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.

o Mobile App: WAGmobs Computer Science: Networking and


Internet
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Computer Science (Android App)
Instructions: Open WAGmobs Computer Science app and read the
Networking and Internet tutorial. Once you have a firm grasp of the
material, take the Networking quiz. Retake the quiz as needed until
you answer all 10 questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Management Information Systems:
Computer Networks
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: Open WAGmobs Management Information Systems app
and read the Computer Networks tutorial. Once you have a firm grasp
of the material, quiz yourself with the Network Basics flashcards.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Networking: Network Topology
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Networking 101 (Android App)
Instructions: Open WAGmobs Networking app and read the Network
Topology I and Network Topology II tutorials. Once you have a firm
grasp of the material, study the Network Topology and Hardware
flashcards, and take the Network Hardware quiz. Retake the quiz as
needed until you answer all 10 questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.3.2 The Internet

o Reading: Corporation for National Research Initiatives: Robert E.


Kahn and Vinton G. Cerfs What is the Internet (and What Makes
it Work)?
Link: CNRI: Robert E. Kahn and Vinton G. Cerfs What Is the Internet
(and What Makes it Work)? (HTML)
Instructions: Please click on the link above and read the entire article for
a basic understanding of the history of the Internet. The authors suggest
that their paper should be of particular interest to policy makers who
need to distinguish the Internet as a global information system apart
from its underlying communications infrastructure.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Networking: Internet Basics
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Networking 101 (Android App)
Instructions: Open WAGmobs Networking app and read the Internet
Basics tutorial.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.3.3 Client-Server Applications
o Reading: Eric Lease Morgans Client/Server Model of Computing
Link: Eric Lease Morgans Client/Server Model of
Computing (HTML)
Instructions: Please click on the link above and read the entire article for
an overview of client/server computing.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.3.4 Application Program Interfaces

o Reading: ComputerWorld: David Orensteins QuickStudy:


Application Programming Interface (API)
Link: ComputerWorld: David Orensteins QuickStudy: Application
Programming Interface (API) (HTML)
Instructions: Please click on the link above and read the entire article for
an overview of APIs with particular attention on the considerations
necessary for corporate developers. It should also be noted that APIs are
considered a competitive advantage for todays organizations. The
graphic at the end of the article, APIs and You, is of particular interest.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.3.5 Collaborative Applications
o Reading: University of North Carolina: Prasun Dewans Definition
of a Collaborative Application
Link: University of North Carolina: Prasun Dewans Definition of a
Collaborative Application (HTML)
Instructions: Please click on the link above and read the entire article for
a definition of collaborative/groupware applications. Pay particular
attention to those traditional applications that qualify as collaborative
applications according to this definition and those that do not.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.3.6 The Digital Divide
o Reading: Jakob Nielsen's Alertbox: Digital Divide: The Three
Stages
Link: Jakob Nielsen's Alertbox: Digital Divide: The Three
Stages (HTML)
Instructions: Please click on the link above and read the entire webpage
to get an insightful look at the digital divide. What is the digital divide?

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Web Media: ARPL - ICTPs ICTP Digital Divide Simulator
Link: ARPL - ICTPs ICTP Digital Divide Simulator (HTML)
Instructions: Please click on the link above and use the digital divide
simulator to experience browsing the web with varying bandwidths.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
3.3.7 Security
o Reading: Purdue University: Jane F. Kinkus Science and
Technology Resources on the Internet: Computer Security
Link: Purdue University: Jane F. Kinkus Science and Technology
Resources on the Internet: Computer Security (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the major technical areas of computer security. Pay
particular attention to the section titled, Computer and Information
Ethics on WWW.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Management Information Systems:
Systems Security
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: Open WAGmobs Management Information Systems app
and read the Security Information Systems tutorial. Once you have a
firm grasp of the material, take the Security Information Systems quiz.
Retake the quiz as needed until you answer all questions correctly.

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Networking: Network Security
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Networking 101 (Android App)
Instructions: Open WAGmobs Networking app and read the Network
Security tutorial.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Assessment: The Saylor Foundation's Unit 3 Checkpoint
Link: The Saylor Foundation's Unit 3 Checkpoint (PDF)
Instructions: Please click on the link above and complete this
assessment. When you have completed the assessment, check your
answers against The Saylor Foundations Unit 3 Checkpoint Answer
Key.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to The Saylor Foundation.
Unit 4: Data Management
Data is a collection of facts. For example, the population estimates for China
and the United States are data. Information is the presentation of these facts
in an organized manner, that is, the presentation of these population counts
side-by-side with other facts like per-capita income. Knowledge refers to the
use of information to make informed decisionsin this case, policy decisions
about China and the United States. Managing data allows the government,
corporations, and even individuals to apply this knowledge to their everyday
lives. Managing data can be difficult because databases are often filled with
more information than you need. In this unit, you will explore the challenges of
data management and learn how to take data and turn it into knowledge.
We have used the word database a number of times in this course. We will
now define and study databases in detail. Entire courses are devoted to this
subject, as the uses and types of databases are as varied as the number of

businesses that need them. However, you can expect to leave this section with
enough of an understanding of databases to have a conversation with any
database administrator about the needs of your team or department. This
course focuses on relational databases.
Unit 4 Time Advisory
This unit should take you approximately 12 hours to complete.

Subunit 4.1: 6 hours

Subunit 4.2: 6 hours

Unit4 Learning Outcomes


Upon successful completion of this unit, students will be able to:
o Define metadata.
o Differentiate between information and knowledge.
o List the components of knowledge management.
o Describe data management within organizations.
o Describe the characteristics and types of databases.
4.1 Introduction to Data Management
4.1.1 Data vs. Information vs. Knowledge
o Reading: Systems Thinking: Gene Bellinger, Durval Castro, and
Anthony Mills Data, Information, Knowledge, and Wisdom
Link: Systems Thinking: Gene Bellinger, Durval Castro, and Anthony
Mills Data, Information, Knowledge, and Wisdom (PDF)
Instructions: Please click on the link above and read the article for an
understanding of how data is transformed into information, information
into knowledge, and knowledge into wisdom.
Terms of Use: This resource has been reposted by the kind permission of

Gene Bellinger, Durval Castro, and Anthony Mills and can be viewed in
its original form here. Please note that this material is under copyright
and may not be reproduced in any capacity without the explicit
permission of the copyright holder.
o Web Media: Nick Miltons Nick Milton of Knoco.com Discusses
Data, Information, and Knowledge
Link: Nick Miltons Nick Milton of Knoco.com Discusses Data,
Information, and Knowledge (YouTube)
Instructions: Please click on the link above and view the entire video
(4:23) for an understanding of the difference between data, information,
and knowledge.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.1.2 Utilizing Data to Make Decisions
o Reading: University of South Florida: Florida Center for
Instructional Technologys Using Data to Make Decisions
Link: University of South Florida: Florida Center for Instructional
Technologys Using Data to Make Decisions (HTML)
Instructions: Please click on the link above and read the five lectures
based on the Continuous Improvement Cycle: Plan, Do, Study, Study,
and Act. Complete the practice exercises and review the links to
relevant articles and case studies to further your learning. You can
access and work through all five from the bottom of the page.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.1.3 Knowledge Management
o Web Media: Knowledgeable Ltd.: Chris Collisons What Is
Knowledge Management?

Link: Knowledgeable Ltd.: Chris Collisons What Is Knowledge


Management? (YouTube)
Instructions: Please click on the link above and view the entire video
(2:40) on knowledge management to better understand the breadth of the
tools and techniques of this discipline. Chris Collision's website can be
found here.

Terms of Use: This resource has been reposted by the kind permission of
Chris Collison and can be viewed in its original form here. Please note
that this material is under copyright and may not be reproduced in any
capacity without the explicit permission of the copyright holder.
4.2 Data Management and Efficiency
4.2.1 Data Management within Organizations
o Reading: TechTarget.com: Hannah Smalltrees Seven Master Data
Management Best Practices
Link: TechTarget.com: Hannah Smalltrees Seven Master Data
Management Best Practices (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of data management issues. List at least three issues.
Have you had a personal experience with one of these issues?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Reading: WAGmobs Database Management System: Data
Modeling & Design
Link: WAGmobs SQL and DBMS (iOS App) or WAGmobs Database
Management System (Android App)
Instructions: If you choose to use this app, you will first need to
download the version appropriate to your mobile device. Note that there
are costs associated with both of these apps, which is why they are
optional. No quiz or exam questions will be derived from material

within, but they are still useful supplementary resources. Once you have
downloaded the app, open it and read the Data Models tutorial. Once
you have a firm grasp of the material, take the Data Models quiz.
Next, read the Database Design tutorial and take the associated quiz.
Then, read the Distributed DBMS tutorial. Finally, read the Database
Connectivity and Web Technologies tutorial and take the associated
quiz. Retake the quizzes as needed until you answer all questions
correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.2.2 Reality and Data
o Reading: William Kents Data and Reality: Chapter 12: Philosophy Reality and Tools
Link: William Kents Data and Reality: Chapter 12: Philosophy Reality and Tools (HTML)
Instructions: Please click on the link above and read the entire article.
What is the impact of more data on reality?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.2.3 Defining Data
o Reading: Information Disciplines: Conrad Weiserts Defining Data
Items
Link: Information Disciplines: Conrad Weiserts Defining Data
Items (PDF)
Instructions: Please click on the link above and read the entire article to
identify the different types of data and learn why a rigorous definition of
data is so important.
Terms of Use: This resource has been reposted by the kind permission of
Conrad Weisert and can be viewed in its original form here. Please note

that this material is under copyright and may not be reproduced in any
capacity without the explicit permission of the copyright holder.
4.2.4 Granularity
o Reading: The Saylor Foundation's Data Granularity Defined
Link: The Saylor Foundation's Data Granularity Defined (PDF)
Instructions: Please click on the link above and read the entire article for
an understanding of data granularity. Pay particular attention to the
different dimensions of granularity, i.e., time and space.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to The Saylor Foundation.
4.2.5 Identifiers
o Lecture: Indian Institute of Technology at Madras: Professor
Janakirams Introduction to Database Management System
Link: Indian Institute of Technology at Madras: Professor
Janakirams Introduction to Database Management System (YouTube)
Instructions: Please click on the link above and view the entire lecture
(53:32) for an understanding of the different identifiers in database
terminology.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Database Management System: Types of
DBMS
Link: WAGmobs SQL and DBMS (iOS App) or WAGmobs Database
Management System (Android App)
Instructions: Open WAGmobs Database Management System app and
read the Introduction to DBMS and Types of DBMS tutorials.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.

o Mobile App: WAGmobs Computer Science: Databases


Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Computer Science (Android App)
Instructions: Open WAGmobs Computer Science app and read the
Database I and Database II tutorials. Once you have a firm grasp of
the material, take the Databases quiz. Retake the quiz as needed until
you answer all 10 questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Management Information Systems: Data
Warehouses
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: Open WAGmobs Management Information Systems app
and read the Databases and Data Warehouses tutorial.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.2.6 Values
o Reading: ExpertWebInstalls: David Nelsons Basic Relational
Database Concepts/Design, the SQL Language, & the mySQL
Database Server
Link: ExpertWebInstalls: David Nelsons Basic Relational Database
Concepts/Design, the SQL Language, & the mySQL Database
Server (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of data values. Pay particular attention to the section
titled SQL Column Data Types (these are the names of the data types
for the mySQL database).
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.

o Mobile App: WAGmobs Database Management System: Structured


Query Language
Link: WAGmobs SQL and DBMS (iOS App) or WAGmobs Database
Management System (Android App)
Instructions: Open WAGmobs Database Management System app and
read the Structured Query Language and Database Performance and
Query Optimization tutorials. Once you have a firm grasp of the
material, quiz yourself with the Structured Query Language flashcards.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.2.7 Relationship Management
o Reading: MouseTrax Computing Solutions: Beth Meltons
Databases: Access Terminology and Relational Database Concepts
Link: MouseTrax Computing Solutions: Beth Meltons Databases:
Access Terminology and Relational Database Concepts (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of relationships in todays relational databases. Pay
particular attention to how each relationship will have a primary and
foreign key.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Database Management System:
Databases
Link: WAGmobs SQL and DBMS (iOS App) or WAGmobs Database
Management System (Android App)
Instructions: Open WAGmobs Database Management System app and
read the Database Administration and Security, Relational Database
Model, Entity Relationship Modeling, and Normalization of
Database Tables tutorials. Once you have a firm grasp of the material,
quiz yourself with the Relational Database Model flashcards, and take
the Normalization of Database Tables quiz. Retake the quiz as needed

until you answer all questions correctly.


Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
4.2.8 Metadata
o Reading: The Saylor Foundation's Metadata Defined
Link: The Saylor Foundation's Metadata Defined (PDF)
Instructions: Please click on the link above and read the entire article for
an understanding of metadata. Pay particular attention to how
collections of information have been organized.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to The Saylor Foundation.
o Assessment: The Saylor Foundation's Unit 4 Checkpoint
Link: The Saylor Foundation's Unit 4 Checkpoint (PDF)
Instructions: Please click on the link above and follow the instructions to
complete this assessment. When you have completed the assessment,
check your answers against The Saylor Foundations Unit 4 Checkpoint
Answer Key.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3,0 License. It is attributed to the Saylor Foundation.
Unit 5: Strategic Management Information Systems
Strategic MIS is the application of information management in the overall
strategy of a business. Many corporations include a Chief Information Officer
(CIO) in senior management to ensure that corporate strategies can be
effectively implemented to be more competitive. What good would it do for
Apple to create an iPhone application that can tell where you are and serve
you ads based on location if it isnt technically feasible? Part of the role of the
CIO would be to figure out if it is possible to do this nowand if not now,
when.
This unit will examine how information technology and systems are changing

the way organizations operate. The unit starts with an examination of some of
the key technological forces that characterize the information age that all firms
must consider in their strategic planning. Next, the special characteristics and
challenges faced by business-to-business operations are described. The unit
concludes with an examination of the impact of information technology on
organizations and the means by which they are adapting to changes in
technology.
Unit 5 Time Advisory
This unit should take you approximately 18 hours to complete.

Subunit 5.1: 6 hours

Subunit 5.2: 6 hours

Subunit 5.3: 6 hours

Unit5 Learning Outcomes


Upon successful completion of this unit, students will be able to:
o Identify and describe the information age impact of new technologies
that are changing the infrastructure requirements for MIS.
o Describe Moores Law.
o Compare and contrast Porters Five Forces and The New Five
Forces.
o Describe how information technology and information systems are
impacting the way organizations operate.
o Describe the characteristics and challenges of the B2B information
technology.
5.1 Change in the Information Age
o Mobile App: WAGmobs Management Information Systems:
Emerging Trends

Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or


WAGmobs Management Information Systems (Android App)
Instructions: Open WAGmobs Management Information Systems app
and read the Emerging Trends and Technologies tutorial.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.1 Game Changing Applications
o Reading: Gigaom.com: Stacey Higginbothams Why We Need Fat
Pipes: The Top 5 Bandwidth-Hungry Apps
Link: Gigaom.com: Stacey Higginbothams Why We Need Fat Pipes:
The Top 5 Bandwidth-Hungry Apps (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of game changing applications and their IT
infrastructure requirements. Pay particular attention to how these
applications require additional speed and network capacity.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Reading: BigCommerce.com: Mitchell Harpers Innovation in the
Cloud10 Game Changing SaaS Applications
Link: BigCommerce.com: Mitchell Harpers Innovation in the Cloud
10 Game Changing SaaS Applications (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of web-based applications and their growing
dominance today. What is a SaaS application? When might you use a
SaaS application in a business you manage?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.2 Porters Five Forces

o Web Media: Harvard University: Harvard Business Publishings


The Five Competitive Forces That Shape Strategy
Link: Harvard University: Harvard Business Publishings The Five
Competitive Forces That Shape Strategy (YouTube)
Instructions: Please click on the link above and view the entire video
(13:12), which is an interview with Michael E. Porter, a professor at
Harvard University. Porter published How Competitive Forces Shape
Strategy in the Harvard Business Review in 1979 and recently revisited
the article and the model in this video. Note that Porter's five
competitive forces serve as the basis for much of modern business
strategy. This video helps to define Porters framework and explains
how businesses put it into practice.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Mobile App: WAGmobs Management Information Systems:
Strategic and Competitive Opportunities
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Management Information Systems (Android App)
Instructions: Open WAGmobs Management Information Systems app
and read the Strategic and Competitive Opportunities tutorial.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.3 The New Five Forces
o Reading: Yvonne M. Davis Separating Emerging Technology
Trends From Fads in the Face of Rapid Change
Link: Yvonne M. Davis Separating Emerging Technology Trends From
Fads in the Face of Rapid Change (HTML)
Instructions: Please click on the link above and access the PDF via the
link to the right entitled Master of Science in Information Technology
Thesis. Please read the article, noting how new technologies are
constantly emerging with the rate of change rising exponentially over

time. Note the new five forces shaping business today.


Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.3.1 Moores Law
o Reading: Intel Corporation: Moore's Law Backgrounder
Link: Intel Corporation: Moore's Law Backgrounder (HTML)
Instructions: Please click on the link above and access the article via the
link underneath Printed Materials. Please read the entire article.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.3.2 Metcalfes Law
o Lecture: University of New South Wales: Richard Buklands What
Makes a Good Programmer?
Link: University of New South Wales: Richard Buklands What Makes
a Good Programmer? (YouTube)
Instructions: Please click on the link above and view the entire video
(55:09) for an understanding of Metcalfes Law, how it fits into
information technology, and how it is used by information technologists
today.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Reading: James Robertsons Metcalfe's Law
Link: James Robertsons Metcalfe's Law (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of Metcalfes Law and how it affects network
planning. Pay particular attention to the quote by Marc Andreesen, an
Internet pioneer.

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.3.3 Coasian Economics
o Reading: David D. Friedmans The Swedes Get It Right
Link: David D. Friedmans The Swedes Get It Right (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of Coases important contributions to economics. Pay
particular attention to the generalization example.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.3.4 Flock-of-Birds Phenomenon
o Reading: University of Georgia Research Magazine: Carole
VanSickles When Dot-Coms Succeed
Link: University of Georgia Research Magazine: Carole
VanSickles When Dot-Coms Succeed (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the flock-of-birds phenomenon and the five
technology forces key to Betfair.coms operations.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.1.3.5 Fish-Tank Phenomenon
o Reading: Digital Body Language: Steven Woods What Is B2B
Marketing?
Link: Digital Body Language: Steven Woods What Is B2B
Marketing? (HTML)
Instructions: Please click on the link above and read the entire article.

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.2 Business to Business (B2B)
5.2.1 Integration
o Web Media: GXS: B2B Past, Present, and Future: Part 5 - Web
2.0
Link: GXS: B2B Past, Present, and Future: Part 5 - Web 2.0 (Adobe
Flash)

Instructions: Please click on the link above and view the entire video
(4:36) for an introduction to web browser software. What is its purpose,
including the three major activities performed?

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.2.2 History of B2B Systems
o Reading: Drummond Group: Rik Drummond and Beth Morrows
Lessons Learned from the History of Interoperable B2B
Communication
Link: Drummond Group: Rik Drummond and Beth Morrows Lessons
Learned from the History of Interoperable B2B Communication (PDF)
Instructions: Please click on the link above and read the article for an
understanding of the history of B2B and the important lessons learned.
Pay particular attention to the critical success factors for B2B to continue
to grow.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.2.3 Buyers and Sellers

o Reading: Boundless: B2B Channels, Selling to Businesses, and


Streamlining Distribution
Link: Boundless: B2B Channels, Selling to Businesses, and Streamlining
Distribution (HTML)
Instructions: Read these articles, which identify what suppliers must take
into consideration when deciding whether or not to embrace B2B ecommerce. Pay special attention to the topics of business-to-business
channels, e-commerce, transaction costs, disintermediation, pricing
issues, supply chain, and planning development.
Terms of Use: These resources are licensed under a Creative Commons
Attribution-ShareAlike 3.0 Unported License and are attributed to
Boundless.
5.2.4 B2B Technology
o Reading: Rose India Technologies B2B Application Development
Link: Rose India Technologies B2B Application
Development (HTML)
Instructions: Read this article for an understanding of B2B technologies
and applications. Pay particular attention to the sections titled Emarketplace B2B applications and B2B and the Economy.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.2.5 Challenges of B2B Systems
o Reading: George Washington University: B2B Integration: The
Drive to Gain and Maintain Competitive Advantage
Link: George Washington University: B2B Integration: The Drive to
Gain and Maintain Competitive Advantage (HTML)
Instructions: Read this article for an understanding of the challenges
associated with complex and costly B2B integration. Pay particular
attention to the integration drivers: cost reduction, efficiencies, and

sharpened competitiveness improvement.


Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.2.6 Future of B2B Systems
o Reading: Federal Trade Commission: Dale Boeths An Analysis of
the Future of B2B E-Commerce
Link: Federal Trade Commission: Dale Boeths An Analysis of the
Future of B2B E-Commerce (PDF)
Instructions: Please click on the link above and access the PDF by
following the link to 21. PPRO-PurchasePro.com, Inc. Read the entire
article for an understanding of the future of B2B systems, and pay
particular attention to cXML, which began as a collaborative effort but
now may define the future of B2B.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.3 Organizations and Information Systems
5.3.1 Defining Organizations
o Reading: Free Management Library: Carter McNamaras Basic
Definition of Organization
Link: Free Management Dictionary: Carter McNamaras Basic
Definition of Organization (HTML)
Instructions: Please click on the link above and read the article. Pay
particular attention to the section on organizations as systems.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Reading: Free Management Library: Carter McNamaras
Thinking About Organizations as Systems

Link: Free Management Library: Carter McNamaras Thinking About


Organizations as Systems (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of how recent management studies have come to view
organizations from a systems perspective.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.3.2 Role of Managers
o Reading: Solhaam.org: Manfred Davidmanns Role of Managers
under Different Styles of Management
Link: Solhaam.org: Manfred Davidmanns Role of Managers under
Different Styles of Management (HTML)
Instructions: Please click on the link above and read the entire article on
authoritarian and participative styles of management. Pay particular
attention of the characteristics of each style.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
5.3.3 Impact of Technology on Organizations
o Reading: David Skyrme Associates: Jack Nilles The Impact of IT
on Organizations and The Impact of IT
Links: David Skyrme Associates: Jack Nilles The Impact of IT on
Organizations (HTML) and The Impact of IT (HTML)
Instructions: Please read these articles for an understanding of how IT
has dramatically changed the business landscape. Pay particular
attention to the implications of change in the areas of business strategy,
organizational culture, organizational structure, management processes,
work, and the workplace.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.

5.3.4 New Models of Company Organization


o Reading: Broadstuff: Alan Patricks McKinsey on 10 Tech Trends
Link: Broadstuff: Alan Patricks McKinsey on 10 Tech
Trends (HTML)
Instructions: Read this article for an understanding of how technology
may be impacting traditional business practices. Note the editorial
comments and ratings for each of McKinseys 10 trends.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 Unported license. It is attributed to Alan Patrick.
o Assessment: The Saylor Foundation's Unit 5 Checkpoint
Link: The Saylor Foundation's Unit 5 Checkpoint (PDF)
Instructions: Please click on the link above and follow the instructions to
complete this assessment. When you have completed the assessment,
check your response against The Saylor Foundations Unit 5
Checkpoint Answer Key.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is atrributed to The Saylor Foundation.
Unit 6: Security Failures and the Future of MIS
Even though most businesses use similar software to manage information, the
information itself is usually kept secret and considered vital to the success of
the firm. Security is particularly important in a flattening world, where
information now travels internationally. A manager working from home in
Florida talks to a programmer in India who, in turn, sends data to another
manager working in an office in Berlin. Preventing competitors from seeing or
stealing this information has become important to business success.
Of course, as information systems become increasingly sophisticated and
complicated, without the proper precautions the chances of a failure increase.
Data center backups, emergency power, and software failures can all cripple
or close an ill-prepared business.

This unit concludes with a look at the future of MIS. After studying the security
issues and failures of various systems, the outlook can seem bleak. Wherever
there is a problem in MIS, there are new dot com and/or employment/career
opportunities to find profitable solutions.
Unit 6 Time Advisory
This unit should take you approximately 16.5 hours to complete.

Subunit 6.1: 4.5 hours

Subunit 6.2: 6 hours

Subunit 6.3: 6 hours

Unit6 Learning Outcomes


Upon successful completion of this unit, students will be able to:
o Describe some of the key issues facing the future of MIS, including
ethical concerns, the role of IT, and the role of business.
o Differentiate between the technical and formal aspects of information
systems security.
o Describe the sources of system failure in an organization.
o Describe the following concepts of information security: confidentiality,
integrity, availability, and authenticity.
o Explain the types and effects of computer crime.
o Identify measures used to prevent computer crime.
o Identify criteria for the ethical use of information systems.
6.1 Information Systems Security
o Mobile App: WAGmobs Computer Science: Security
Link: WAGmobs Computer Science, MIS, and Networking (iOS App) or
WAGmobs Computer Science (Android App)

Instructions: Open WAGmobs Computer Science app and read the


Computer Viruses and Computer Security tutorials. Once you have a
firm grasp of the material, take the Computer Viruses quiz. Retake the
quiz as needed until you answer all 10 questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.1.1 Informal Aspects of Security
o Reading: University of Texas: Network Security Resources What
Is Information Technology Security?
Link: University of Texas: Network Security Resources What Is
Information Technology Security? (HTML)
Instructions: Please click on the link above and read the entire article.
Then complete the following exercise: Assume you work for a
government agency in Washington, D.C. As you are busy doing a
business data analysis on your mobile device, you notice a white van
driving slowly past the building you are working that reminds you of a
surveillance van. You have seen this vehicle several times. Based on the
article you read, make a list of possible actions you might take to protect
the sensitive data you are accessing at the time you spot the suspicious
vehicle. Why did you choose these actions rather than just ignore the
van?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.1.2 Formal Aspects
o Web Media: Iowa State University: Talk About IT's IT Security
Policy & Risk Assessment
Link: Iowa State University: Talk About IT's IT Security Policy & Risk
Assessment (YouTube)
Instructions: Please click on the link above and watch the entire video
(7:55) for an understanding of how an organization uses a formal

security policy to protect its information resources and reduce its


vulnerability to security breaches that could damage its reputation.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.1.3 Technical Aspects
o Reading: Information Systems Security: James S. Tillers Security
and the Business: The Need for an Adaptive Security Management
Architecture
Link: Information Systems Security: James S. Tillers Security and the
Business: The Need for an Adaptive Security Management
Architecture (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the technical aspects of information systems
security. Architecture is a critical success factor in security
implementation in today's global enterprise.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Web Media: Information Systems Security: James S. Tillers
Adaptive Security Management Architecture Overview
Link: Information Systems Security: James S. Tillers Adaptive
Security Management Architecture Overview (Mp4)
Instructions: Please click on the link above and locate this video under
the Interview section of the linked page. Please download and watch
the entire video (7:29), in which James Tiller discusses adaptive security
management architecture.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.1.4 Computer Crime in the Information Age

o Reading: Bright Hub: Aaron R.s A Good Selection of Cybercrime


Articles
Link: Bright Hub: Aaron R.s A Good Selection of Cybercrime
Articles (HTML)

Instructions: Please click on the link above and read the entire article,
which provides a broad list of computer crime issues. How might this
type of crime have a negative impact on a business you own or manage?

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Reading: Purdue University: Jane F. Kinkus Science and
Technology Resources on the Internet: Computer Security
Link: Purdue University: Jane F. Kinkus' Science and Technology
Resources on the Web: Computer Security (HTML)

Instructions: Please click on the link above and read the entire article,
which provides a list of computer crime detection and prevention
resources to inoculate your business from the most prevalent computer
crimes. Pick at least two links that will help prevent the crimes
identified in the first article in this subunit.

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2 System Failures
6.2.1 IT Infrastructure
o Reading: HP.com: Understanding Information Technology
Requirements and IT Infrastructure Complexity

The Saylor Foundation does not yet have materials for this portion of the
course. If you are interested in contributing your content to fill this gap
or aware of a resource that could be used here, please submit it here.
Submit Materials
6.2.2 Confidentiality
o Reading: Bright Hub: Lee Clemmers Information Security
Concepts: Confidentiality, Integrity, Availability, and Authenticity
Link: Bright Hub: Lee Clemmers Information Security Concepts:
Confidentiality, Integrity, Availability, and Authenticity (HTML)
Instructions: Please click on the link above and read the entire article,
which introduces four central security issues. You will be asked to read
the link for each concept in the subunits below.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2.3 Integrity
o Reading: Bright Hub: Lee Clemmers Information Security
Concepts: Integrity
Link: Bright Hub: Lee Clemmers Information Security Concepts:
Integrity (HTML)
Instructions: Please click on the link above and read the entire article.
Note that integrity is a core concept of information security and that not
all issues associated with integrity are malicious. Note the authors
suggestions on how to verify and retain system integrity.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2.4 Availability
o Reading: Bright Hub: Lee Clemmers Information Security
Concepts: Availability

Link: Bright Hub: Lee Clemmers Information Security Concepts:


Availability (HTML)
Instructions: Please click on the link above and read the entire article.
Note that availability is one of the core concepts in information security.
Pay particular attention to Clemmers strategies for ensuring that
information is available. It is refreshing to note that high-availability
solutions are becoming increasingly simplified and affordable for today's
organizations.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Web Media: Freedomeye: Shirley Shmerling's High Availability
Information Systems (YouTube)
Link: Freedomeye: Shirley Shmerling's High Availability Information
Systems (YouTube)
Instructions: Please click on the link above and watch the entire video
(6:30) for an understanding of how cyber security includes operations
that protect and defend both information and information systems by
ensuring their availability. As you listen, answer these three questions:
What can go wrong to impact system availability? How can these risks
be prevented? How do you react if the system availability is
compromised?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2.5 Authenticity
o Reading: Bright Hub: Lee Clemmers Information Security
Concepts: Authenticity
Link: Bright Hub: Lee Clemmers Information Security Concepts:
Authenticity (HTML)

Instructions: Please click on the link above and read the entire article.
What is authenticity? Why is it important to a business?

Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2.6 Sources of Failure
o Reading: J.H. Berk and Associates: Joseph H. Berks Systems
Failure Analysis
Link: J.H. Berk and Associates: Joseph H. Berks Systems Failure
Analysis (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the various sources of system failure. This article
focuses on the fault-tree-driven, disciplined failure analysis approach.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.2.7 Risk Management
o Reading: SANS Institute: Steve Elky's An Introduction to
Information Systems Risk Management
Link: SANS Institute: Steve Elky's An Introduction to Information
Systems Risk Management (HTML)
Instructions: Please click on the link above and scroll down (about
halfway down the webpage) to the article entitled An Introduction to
Information Systems Risk Management. Click on the link for the
article and read it in its entirety for a sound introduction to the
components of risk management for information systems.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.3 The Future of MIS
o Reading: Management Information Systems Quarterly: Richard O.
Masons Four Ethical Issues of the Information Age

Link: Management Information Systems Quarterly: Richard O.


Masons Four Ethical Issues of the Information Age (HTML)
Instructions: Please click on the link above and read the entire article for
an understanding of the IS architecture development process.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.3.1 Role of Information Technology
o Reading: Association for Computing Machinery: B. Pradeep Kumar,
John Selvam, V.S. Meenakshi, K. Kanthi, A.L. Suseela, V. Lalith
Kumar's Business Decision Making, Management and Information
Technology
Link: Association for Computing Machinery: B. Pradeep Kumar, John
Selvam, V.S. Meenakshi, K. Kanthi, A.L. Suseela, V. Lalith
Kumar's Business Decision Making, Management and Information
Technology (HTML)
Instructions: Please click on the link above and read the entire article,
which argues that IT is the business environment. Do you agree or
disagree? What facts form the basis of your decision?
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.3.2 Role of Business
o Reading: University of Sheffield: Information Research: Ian Owens,
T.D. Wilson, and Angela Abells Information and Business
Performance: A Study of Information Systems and Services in HighPerforming Companies
Link: University of Sheffield: Information Research: Owens, Wilson,
and Abells Information and Business Performance: A Study of
Information Systems and Services in High-Performing
Companies (HTML)
Instructions: Read the article for an understanding of the relationship

between information and business performance.


Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
6.3.3 MIS Resources
o Reading: Iowa State University: Brian E. Menneckes Management
Information Systems Resources
Link: Iowa State University: Brian E. Menneckes Management
Information Systems Resources (HTML)
Instructions: Please click on the link above and review the site for a
comprehensive list of resources for Management Information Systems.
Explore the links under MIS Resources for an overview. Pick a
subject you find interesting and follow the link for more information.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
o Assessment: The Saylor Foundation's Unit 6 Checkpoint
Link: The Saylor Foundation's Unit 6 Checkpoint (PDF)
Instructions: Please click on the link above and follow the instructions to
complete this assessment. When you have completed the assessment,
check your response against The Saylor Foundations Unit 6
Checkpoint Guide to Responding (PDF).
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to The Saylor Foundation.
o Mobile App: Ion Citadel LLCs CLEP Exams: Information Systems
and Computer Applications
Link: Ion Citadel LLCs CLEP Exams (iOS App)
Instructions: If you choose to use this app, you will first need to
download it to your iPad or iPhone. Note that the app is only available
for iOS users, which is why it is optional. The initial download of the
app is free, but to access the full set of exam prep questions, there is a

small fee. No final exam questions will be derived from material within,
but it is still a useful supplementary resource, especially if you plan to
take the College-Level Examination Program (CLEP) exam for
Information Systems and Computer Applications. Once you have
downloaded the app, open it and select the Information Systems and
Computer Applications questions. If taking the CLEP exam, it is
recommended that you retake the quiz as needed until you answer all
300 questions correctly.
Terms of Use: Please respect the copyright and terms of use displayed on
the webpage above.
Unit 7: Final Exam
o Final Exam: The Saylor Foundation's BUS206 Final Exam
Link: The Saylor Foundation's BUS206 Final Exam
Instructions: Please click on the link above and complete the final exam.
You must be logged into your Saylor Foundation School account in
order to access this exam. If you do not yet have an account, you will be
able to create one, free of charge, after clicking the link.
Terms of Use: This resource is licensed under a Creative Commons
Attribution 3.0 License. It is attributed to The Saylor Foundation.

S-ar putea să vă placă și