Course Competencies
BUS 705
Advanced Management Information Systems

The student will be able to:

1. analyze, determine, design, and support appropriate approaches to information systems for specific organizations. (cases)
        BUS 705 - Case Competencies
        Purposes of MIS Cases
        FAQs: Preparing Cases For BUS 705

2. describe information as an organizational resource and explain how it differs from other resources. (lecture)

3. discuss current trends in information systems as they relate to business. (lecture)
        Change in IS Focus
           Not specific competencies:
        Application Service Providers
        Information Systems: Functional Strategies
        Microsoft XP - Should You Upgrade?
        Virtual Teams
        Virtual Workplaces
        What Do Individuals Need To Do About The Y2K Bug?
        Y2K - Is It a Problem?

4. identify in an organization, give appropriate examples of, and clearly differentiate between Transaction Processing Systems (TPS), Management Information Systems (MIS), Office Automation Systems (OAS), Decision Support Systems (DSS), and Executive Support Systems (ESS). (2, lecture)
        Types of Information Systems

5. identify the levels of management served and the inter-relationships between the various types of systems listed in competency 4. (2, lecture)
        Types of Information Systems

6. explain the advantages, disadvantages, and appropriate situations for the use of batch and on-line input as well as batch and on-line processing. (lecture)
        Batch & Online Input & Processing

7. describe, including examples, several ways information systems may serve a strategic role in organizations. (3, lecture)
        Strategic Information Systems

8. discuss the ways in which various organizational factors influence the design of information systems. (3)
        Design of Information Systems - Organization Factors

9. clearly delineate the advantages and disadvantages of centralization and decentralization of an Information Systems Department. (lecture)
        Centralization/Decentralization of IS People

10. explain the ways in which decision-making influences the design of information systems. (3)
        Design of Information Systems - Decision-Making

11. identify and differentiate between the three levels of decision making, types of decisions and organizational information systems. (12)
        IS and Decision-Making

11A. discuss various forms of electronic commerce and electronic business, including what they are, how they function, their advantages and disadvantages, and when they may be appropriate. (10, lecture)
        Categories of Electronic Commerce
        How Business Generates Value With the Internet
        Internet Benefits to Organizations
        Business Concerns About the Internet
            Not a Specific Competency:
        Internet E-Commerce - Security Issues

11B. describe and give examples of appropriate uses of the Internet, intranets, and extranets by businesses. (2, 7)
        Internet, Intranet, Extranet
        Distribution Chain Management
        Supplier Relationship Management

11C. describe the major cross-functional enterprise systems (ERP and CRM), including how they function, how they inter-relate to other traditional systems, their advantages and disadvantages, and when their use may be appropriate. (9, lecture)
        CRM - Customer Relationship Management
        ERP - Enterprise Resource Planning

11D. explain the concept of middleware, the major approaches to implementing middleware, and when middleware may be appropriate for an organization. (5, lecture)

12. be able to describe and give examples of appropriate uses for the major computer input, output, and secondary storage devices. (5, lecture)
        Hardware - Input
        Hardware - Output
        Hardware - Input/Output
        Hardware - Storage
            Not a Specific Competency:
        PCs - Plus and Minus
        Main Uses of PCs
        Major Problems & Issues With PCs

13. describe and give examples of appropriate uses of different sizes and types of computers. (5/lecture)
        Types of Computers

14. discuss RFID, including appropriate uses, advantages and disadvantages. (7)

15. be able to describe the major types of software, their functions and appropriate applications. (5, lecture)
        Types of Computer Software

16. discuss the advantages and disadvantages of file-based systems and compare them to database systems (DBMS). (6, lecture)
        File Management Systems
        Database Management Systems
            Not a specific competency:
        Data Resource Management

16A. describe and be able to discuss the appropriate uses of business intelligence, analytics and data mining. (6).
        Reporting, Data Mining & Analytics

18. define and identify examples of distributed processing; and discuss its advantages and disadvantages (versus centralized systems). Be able to discuss and identify examples of distributed databases, various approaches and when they may be appropriate. (6, lecture)
        Distributed Data Processing
        Distributed Databases

19. identify and explain the advantages and disadvantages of the various types of communications links (channels) available for long distance communications (WANS). Include both private channels and common carriers. (7, lecture)
        Typical WAN Channel Speeds
        Wide Area Networks

20. explain the various parts of a long distance communications network (WAN) and give an example. This would include such things as remote controllers, multiplexors, modems, communications controllers, and front-end processors. (7, lecture)
        Wide Area Networks

21. describe the various parts of a local area network (LAN), discuss the advantages and disadvantages of a LAN, and explain an example use of a LAN in a business. Parts of a LAN would include such things as physical connections, servers, workstations, how peripherals (such as printers) are used, and bridges/gateways. (7, lecture)
        Local Area Networks
        Wireless Networks Pose High Security Risks

22. describe EDI (Electronic Data Interchange), including what it is, the advantages and disadvantages, and when it would be appropriate to use. (810 lecture).
        EDI
        EDI Security Risks

22A. explain how the internet functions, including servers, browsers, ISPs and e-mail; advantages and disadvantages for business; and major uses. (7, lecture)
        Internet - Overview
        How Business Generates Value With the Internet
        Internet Benefits to Organizations
        Business Concerns About the Internet
        Individual Uses of the Internet

24. summarize the steps in the traditional model of systems development. (13)
        IS Steering Committee
        Traditional Systems Development Cycle

25. describe the advantages and disadvantages of each of the following methods of testing: specially prepared test data, historical data, and pilot test. (13, lecture)
        IS Testing Approaches

26. specifically identify the advantages and disadvantages of each of the following methods of system conversion: parallel, direct cutover, phased (by function and by organizational unit). (13, lecture)
        IS Cutover Approaches

27. discuss the advantages and disadvantages of user involvement in the systems development process. (14)

28. define and explain the appropriate use of system prototypes. (13)

29. explain the advantages and disadvantages of  various alternative approaches to systems design and development. (5, 13, lecture)
        Information Systems Alternatives
        Application Service Providers
        Packaged Applications Software
        Selecting Package Software

30. define and summarize trends in end-user computing. (13)
        End-User Development - Factors Driving the Increase
        End-User Development - Advantages and Disadvantages

31. understand the factors that cause management to lack confidence in the Information Systems department. (14, lecture)

32. discuss the five primary methods of measuring system success or failure. (lecture)
        Measures of Information System Success

33. describe the four main causes of information system success or failure. (lecture)
       
Main Causes of System Success or Failure

34. understand and be able to apply on a contingency basis tools from each of the four basic project management techniques. (14, lecture)
       
Project Management Techniques to Control Risk Factors

** Note earlier competencies relating to OAS (#4 & #5). (lecture)
       
Types of Information Systems
       
Office Automation Systems
       
Groupware

34A. discuss the dimensions of knowledge and various approaches to knowledge management (11).

35. describe various types of electronic records management, including what they are, how they work, the advantages and disadvantages, and when it would be appropriate to use each. (12, lecture)
       
Records Management
       
Information, Records, and Electronic Document Management

** Note earlier competencies relating to DSS and ESS (#4 & #5). (12)
       
Types of Information Systems

36. discuss the components of a Decision Support System (lecture, 12).
        Components of Decision-Support Systems

37. differentiate between expert systems and neural networks, including what each is, how it works, and when it might be appropriate in a business environment. (11)

38. discuss and explain both passive and active threats to information systems. (lecture)
        Computer Crime
        Controlling E-Business Risks
        E-Business Risks
        Internet E-Commerce - Security Issues
        Threats to Computer Systems
        Tighten Internal Computer Security
        Types of Computer Fraud
        Wireless Networks Pose High Security Risks

39. explain the overall design of system security including the three levels of security, security objectives, and general controls. (lecture)
        Computer Application Security Objectives
        Levels of Computer Security
        IS Physical Security

40. describe the six types of "general" controls and the possible effects of weaknesses in each. (lecture)
        General Controls in IS

41. discuss the most common application controls used in each of the three areas (input, processing, output), including the four main edit techniques. (lecture)
        Objectives of Application Controls
        Application Controls
        Main Edit Techniques
       
Evaluation of Biometric Techniques
        Desktop Security Suggestions
        Top 10 IT Security Mistakes

41a. understand the concepts of business continuity planning and disaster recovery. (8, lecture)
       
Business Continuity Planning
        Disaster Recovery Plan for IS

42. describe the five moral dimensions of the information age including specific examples of each. (4)

43. discuss the principles of Fair Information Practices (US HEW 1973) and the OECD Guidelines on the Protection of Privacy (1980). (4, lecture)
        Privacy
        OECD Guidelines on the Protection of Privacy

44. describe the public policy issues of privacy, property rights, and access rights as they relate to information. (4, lecture)
        Information Access Versus Privacy
        The Lawless Internet

- Competencies last revised 10/03/2007 -

Home

Main Page

Contact

Contact rkulzick@stu.edu with questions or comments about this web site.
Copyright © 1999
-2007 Raymond S. Kulzick - Last modified: October 12, 2009