Sunteți pe pagina 1din 2

COURSE CONTENT IN COMPUTER BUSINESS APPLICATION

2nd Sem, 2018-19 - BSBA 2A/B

PRELIMINARIES The moral dimensions of information Systems


 Information Rights: Privacy and Freedom in
Vision, Mission, Goals, and Objectives of the the Internet Age
University  Property Rights: Intellectual Property
Subject Requirements  Accountability, Liability, and Control
Class Room Policies  System Quality: Data Quality and System
Errors
CHAPTER I – Introduction: Information Systems  Quality of Life; Equity, Access, and
Boundaries
 Information Technology Basics
 Types of Information System
Chapter IV: Securing Information Systems
 Components of Information System
 Collaboration Tools and Communication  System Vulnerability And Abuse
Media  Malicious Software: Viruses, Worms, Trojan
Horses, and Spyware
CHAPTER II – Information Systems in Global  Hackers and Computer Crime
Business Today  Internal Threats: Employees
 Software Vulnerability
 The Role of Information Systems in
Business Today  Business Value Of Security And Control
 How Information Systems Are  Legal and Regulatory Requirements for
Transforming Business Electronic
 Globalization Challenges and  Records Management
Opportunities: A Flattened World  Electronic Evidence and Computer Forensics
 Strategic Business Objectives of  Establishing A Framework For Security And
Information Systems Control
 Information Systems Controls
 Perspectives on Information Systems  Risk Assessment
 Dimensions of Information Systems  Security Policy
 A Business Perspective on Information  Disaster Recovery Planning and Business
Systems Continuity
 Complementary Assets  Planning
 The Role of Auditing
 Roles and Responsibilities In Information
Systems  Technologies And Tools For Protecting
 CIO, CTO, CSO, CPO, CKO Information Resources
 Identity Management and Authentication
 Measuring Information Technology’s  Firewalls, Intrusion Detection Systems, and
Success Antivirus
 Efficiency  Software
 Effectivity  Securing Wireless Networks
 Encryption
CHAPTER III – Ethical and Social Issues in  Ensuring System Availability
Information Systems  Security Issues for Cloud Computing and the
Mobile
Ethical And Social Issues Related to Systems
 Digital Platform
 Five Moral Dimensions of the Information Age
 Ensuring Software Quality
 Key Technology Trends that Raise Ethical
Issues
Chapter V: Achieving Operational Excellence and
Ethics in an Information Society Customer Intimacy: Enterprise Applications
 Basic Concepts; Responsibility,
Accountability, Liability  Enterprise Systems
 Ethical Analysis  What Are Enterprise Systems?
 Candidate Ethical Principles  Enterprise Software
 Professional Codes of Conduct  Business Value of Enterprise Systems
 Some Real-World Ethical Dilemmas
 Supply Chain Management Systems  Digital Goods in a Global Marketplace
 The Supply Chain
 E-Commerce: Business And Technology
 Information Systems and Supply Chain
 Types of E-commerce
Management
 E-commerce Business Models
 Supply Chain Management Software
 E-commerce Revenue Models
 Global Supply Chains and the Internet
 Social Networking and the Wisdom of Crowds
 Business Value of Supply Chain Management
Systems  E-commerce Marketing
 B2B E-commerce: New Efficiencies and
Customer relationship management Systems Relationships
 Customer Relationship Management Software  The Mobile Digital Platform And Mobile E-
 Operational and Analytical CRM Commerce
 Business Value of Customer Relationship  Location-based Services and Applications
Management Systems  Other Mobile Commerce Services
 Enterprise Applications: New Opportunities
And Challenges
 Enterprise Application Challenges
 Next-Generation Enterprise Applications LABORATORY

1. Advanced MS Word
Chapter VI: E-Commerce: Digital Markets, Digital 2. Advanced MS Excel
Goods 3. Advanced MS PowerPoint
4. MS Publisher
 E-Commerce And The Internet 5. Internet Browsing
 Key Concepts in E-commerce: Digital Markets
and

S-ar putea să vă placă și