Friday, October 11, 2019

Course Outline Faculty of Science and Technology Essay

Course Number Course Title: Course Instructor: Credits: Section: Semester: Class Meeting Times: Class Venue: Pre-requisites: CMPS1024 (formerly CMPS150) – Computer Business Application MGMT1014 (formerly MGMT101) – Fundamentals of Management None 2012-2 3 CMPS3012 (formerly CMPS360) Management Information Systems Co-requisites Office Location Office Hours: (Consultation Hours) Telephone: E-Mail Address: Resources Required Text: Other Resources: By appointment Laudon, K.C., Laudon,J.P.: Management Information Systems – Managing the Digital Firm, 11th edition, . Prentice Hall MIS course website: COURSE DESCRIPTION COURSE DESCRIPTION: This course is designed to provide techniques and knowledge for creating competitive business, managing global or local corporations, adding business value and providing useful product and services to intended customers. Topics include: Enterprise Applications. Systems for Supply Chain Management. Customer Relationship Management. Knowledge Management Systems. Digital Integration. Internet Technology. Database – Design and Implement in an existing Database Management System. COURSE OBJECTIVES: Upon successful completion of this course, students will be able to: 1.1.1 Knowledge a. b. c. d. e. f. g. h. i. j. k. l. m. Describe the role of information systems in today’s competitive business environment Explain information systems from both technical and business perspective Examine the transforming effect of information systems on organizations and management Explain the impact of internet technology and the World Wide Web on the Digi tal firm Describe the roles of individuals in the business process Describe the types of business structures and how they function and serve clientele. Explain the importance of effective mangers and the roles they play in the business success and the development of innovative services and products Identify the impact, usefulness and benefit afforded businesses through electronic commerce Examine privacy issues and the ways in which to secure a business and its stakeholders from privacy violations. Identify threats of intrusion and other forms of system violation that exists through external sources such as viruses. Describe salient differences between management and information technology specialists and how these differences are mitigated. Explain the various levels of management and the unique systems and structures that are critical to these levels Explain the Rationale for developing and maintaining systems which are reliable, scalable, portable and secure.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.