Course Competencies
BUS 705
Advanced Management Information Systems
The student will be able to:
1. analyze, determine, design, and support appropriate approaches to information
systems for specific organizations. (cases)
BUS 705 - Case
Competencies
Purposes of MIS Cases
FAQs: Preparing Cases
For BUS 705
2. describe information as an organizational resource and explain how it differs from other resources. (lecture)
3. discuss current trends in information systems as they relate to business. (lecture)
Change in IS Focus
Not specific competencies:
Application Service
Providers
Information Systems:
Functional Strategies
Microsoft XP - Should You
Upgrade?
Virtual Teams
Virtual Workplaces
What Do Individuals Need
To Do About The Y2K Bug?
Y2K - Is It a Problem?
4. identify in an organization, give appropriate examples of, and clearly differentiate
between Transaction Processing Systems (TPS), Management Information Systems (MIS), Office
Automation Systems (OAS), Decision Support Systems (DSS), and Executive Support Systems
(ESS). (2, lecture)
Types of Information
Systems
5. identify the levels of management served and the inter-relationships between the
various types of systems listed in competency 4. (2, lecture)
Types of Information
Systems
6. explain the advantages, disadvantages, and appropriate situations for the use of
batch and on-line input as well as batch and on-line processing. (lecture)
Batch & Online Input
& Processing
7. describe, including examples, several ways information systems may serve a strategic
role in organizations. (3, lecture)
Strategic Information
Systems
8. discuss the ways in which various organizational factors influence the design of
information systems. (3)
Design of Information
Systems - Organization Factors
9. clearly delineate the advantages and disadvantages of centralization and
decentralization of an Information Systems Department. (lecture)
Centralization/Decentralization
of IS People
10. explain the ways in which decision-making influences the design of information
systems. (3)
Design of Information
Systems - Decision-Making
11. identify and differentiate between the three levels of decision making, types of
decisions and organizational information systems. (12)
IS and Decision-Making
11A. discuss various forms of electronic commerce and electronic business, including
what they are, how they function, their advantages and disadvantages, and when they may be
appropriate. (10, lecture)
Categories of Electronic
Commerce
How Business Generates
Value With the Internet
Internet Benefits to
Organizations
Business Concerns About the
Internet
Not a Specific
Competency:
Internet E-Commerce -
Security Issues
11B. describe and give examples of appropriate uses of the Internet,
intranets, and extranets by businesses. (2, 7)
Internet, Intranet,
Extranet
Distribution Chain
Management
Supplier Relationship
Management
11C. describe the major cross-functional enterprise systems (ERP and CRM), including
how they function, how they inter-relate to other traditional systems, their advantages
and disadvantages, and when their use may be appropriate. (9, lecture)
CRM - Customer
Relationship Management
ERP - Enterprise Resource
Planning
11D. explain the concept of middleware, the major approaches to implementing middleware, and when middleware may be appropriate for an organization. (5, lecture)
12. be able to describe and give examples of appropriate uses for the major computer
input, output, and secondary storage devices. (5, lecture)
Hardware - Input
Hardware - Output
Hardware - Input/Output
Hardware - Storage
Not a Specific
Competency:
PCs - Plus and Minus
Main Uses of PCs
Major Problems &
Issues With PCs
13. describe and give examples of appropriate uses of
different sizes and types of computers. (5/lecture)
Types of Computers
14. discuss RFID, including appropriate uses, advantages and disadvantages. (7)
15. be able to describe the major types of software, their functions and appropriate
applications. (5, lecture)
Types of Computer
Software
16. discuss the advantages and disadvantages of file-based systems and compare them to
database systems (DBMS). (6, lecture)
File Management Systems
Database Management
Systems
Not a specific
competency:
Data Resource Management
16A. describe and be able to discuss the appropriate uses
of business intelligence, analytics and data mining. (6).
Reporting,
Data Mining & Analytics
18. define and identify examples of distributed processing; and discuss its advantages
and disadvantages (versus centralized systems). Be able to discuss and identify examples
of distributed databases, various approaches and when they may be appropriate. (6,
lecture)
Distributed Data Processing
Distributed Databases
19. identify and explain the advantages and disadvantages of the various types of
communications links (channels) available for long distance communications (WANS). Include
both private channels and common carriers. (7, lecture)
Typical WAN Channel
Speeds
Wide Area Networks
20. explain the various parts of a long distance communications network (WAN) and give
an example. This would include such things as remote controllers, multiplexors, modems,
communications controllers, and front-end processors. (7, lecture)
Wide Area Networks
21. describe the various parts of a local area network (LAN), discuss the advantages
and disadvantages of a LAN, and explain an example use of a LAN in a business. Parts of a
LAN would include such things as physical connections, servers, workstations, how
peripherals (such as printers) are used, and bridges/gateways. (7, lecture)
Local Area Networks
Wireless Networks Pose
High Security Risks
22. describe EDI (Electronic Data Interchange), including what it is, the advantages
and disadvantages, and when it would be appropriate to use. (810 lecture).
EDI
EDI Security Risks
22A. explain how the internet functions, including servers, browsers, ISPs and e-mail;
advantages and disadvantages for business; and major uses. (7, lecture)
Internet - Overview
How Business Generates
Value With the Internet
Internet Benefits to
Organizations
Business Concerns About the
Internet
Individual Uses of the
Internet
24. summarize the steps in the traditional model of systems development. (13)
IS Steering Committee
Traditional Systems
Development Cycle
25. describe the advantages and disadvantages of each of the following methods of
testing: specially prepared test data, historical data, and pilot test. (13, lecture)
IS Testing Approaches
26. specifically identify the advantages and disadvantages of each of the following
methods of system conversion: parallel, direct cutover, phased (by function and by
organizational unit). (13, lecture)
IS Cutover Approaches
27. discuss the advantages and disadvantages of user involvement in the systems development process. (14)
28. define and explain the appropriate use of system prototypes. (13)
29. explain the advantages and disadvantages of various alternative approaches to
systems design and development. (5, 13, lecture)
Information Systems
Alternatives
Application Service
Providers
Packaged Applications
Software
Selecting Package
Software
30. define and summarize trends in end-user computing. (13)
End-User Development -
Factors Driving the Increase
End-User Development -
Advantages and Disadvantages
31. understand the factors that cause management to lack confidence in the Information Systems department. (14, lecture)
32. discuss the five primary methods of measuring system success or failure. (lecture)
Measures of Information
System Success
33. describe the four main causes of information system success or failure.
(lecture)
Main Causes of System
Success or Failure
34. understand and be able to apply on a contingency basis tools from each of the four
basic project management techniques. (14, lecture)
Project Management
Techniques to Control Risk Factors
** Note earlier competencies relating to OAS (#4 & #5). (lecture)
Types of Information
Systems
Office Automation Systems
Groupware
34A. discuss the dimensions of knowledge and various approaches to knowledge management (11).
35. describe various types of electronic records management, including what
they are, how they work, the
advantages and disadvantages, and when it would be appropriate to use each. (12,
lecture)
Records Management
Information, Records, and
Electronic Document Management
** Note earlier competencies relating to DSS and ESS (#4 & #5). (12)
Types of Information
Systems
36. discuss the components of a Decision Support System (lecture, 12).
Components of
Decision-Support Systems
37. differentiate between expert systems and neural networks, including what each is, how it works, and when it might be appropriate in a business environment. (11)
38. discuss and explain both passive and active threats to information systems.
(lecture)
Computer Crime
Controlling
E-Business Risks
E-Business
Risks
Internet E-Commerce -
Security Issues
Threats to Computer
Systems
Tighten Internal
Computer Security
Types of Computer Fraud
Wireless
Networks Pose High Security Risks
39. explain the overall design of system security including the three levels of
security, security objectives, and general controls. (lecture)
Computer Application
Security Objectives
Levels of Computer
Security
IS Physical Security
40. describe the six types of "general" controls and the possible effects of
weaknesses in each. (lecture)
General Controls in IS
41. discuss the most common application controls used in each of the three
areas (input, processing, output), including the four main edit techniques.
(lecture)
Objectives of
Application Controls
Application Controls
Main
Edit Techniques
Evaluation of
Biometric Techniques
Desktop Security
Suggestions
Top 10 IT Security
Mistakes
41a. understand the concepts of business continuity
planning and disaster recovery. (8, lecture)
Business Continuity Planning
Disaster Recovery Plan
for IS
42. describe the five moral dimensions of the information age including specific examples of each. (4)
43. discuss the principles of Fair Information Practices (US HEW 1973) and the OECD
Guidelines on the Protection of Privacy (1980). (4, lecture)
Privacy
OECD Guidelines on the
Protection of Privacy
44. describe the public policy issues of privacy, property rights, and access rights as
they relate to information. (4, lecture)
Information Access Versus
Privacy
The Lawless Internet
- Competencies last revised 10/03/2007 -