Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
COURSE DESCRIPTION
This course examines the information requirement of an organization. It emphasizes the difference in the
kinds of information needed at the operational, administrative, strategic, and organizational levels. It
discusses planning and implementing a comprehensive information system and methods to measure its
effectiveness.
INSTRUCTIONAL MATERIALS
Required Resources
Turban, E., & Volonino, L. (2011) Information technology for management (8th ed.). Hoboken, NJ: John
Wiley & Sons.
Supplemental Resources
Committee on National Security Systems. (n.d.). Issuances. Retrieved from
http://www.cnss.gov/issuances.html
Hu, W.-C., & Zuo, Y. (2010). Handheld computing for mobile commerce: applications, concepts and
technologies. Hershey, PA: Information Science Reference.
Magal, S. R., & Word, J. (2011). Integrated business processes with ERP systems. Hoboken, NJ: John
Wiley & Sons, Inc.
Mulholland, A., Pyke, J., & Fingar, P. (2010). Enterprise cloud computing: a strategy guide for business
and technology leaders. Tampa, Florida: Meghan-Kiffer Press.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 1 of 28
Points
Preparation
Reading(s)
o Chapter 1: Information Systems in the 2010s
e-Activity
o Businesses have used barcodes to store product and price
information on product tags readable via specialized scanners.
Quick Response (QR) tags are the latest technology for storing
and publishing product information readable using
smartphones. There are no specialized scanners required to
read QR codes. Visit the Website, located at
http://www.qrstuff.com/, to generate a QR code. Follow these
instructions and be prepared to discuss:
Under the Data Type column (column 1), click on the
Email Address radio button.
Under the Content column (column 2), type your email
address in the textbox.
Notice the generated QR code in the QR code
Preview window.
Download the image to your local machine.
Repeat the exercise and generate the QR code for
your telephone number.
Activities
Discussions
Evaluation
10
None
Preparation
Reading(s)
o Chapter 2: IT Infrastructure and Support Systems
e-Activity
o Research the Internet for an article that describes how an
industry of your choice is using Radio Frequency Identification
(RFID) technology. Examine the uses, advantages, and
disadvantages of RFID technology. Be prepared to discuss.
Activities
Discussions
Evaluation
10
75
Preparation
Reading(s)
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 2 of 28
e-Activity
o Visit the AT&T Website, located at http://bit.ly/A0sbhC, and
Verizons Website, located at http://bit.ly/Xb0WU. Examine the
wireless broadband networks provided by each vendor. Be
prepared to discuss.
Activities
Discussions
Evaluation
10
100
Preparation
Reading(s)
o Chapter 5: IT Security, Crime, Compliance, and Continuity
e-Activity
o Visit the Committee on National Security Systems (CNNS)
Website, located at http://www.cnss.gov/policies.html. Study
the policies and directives and be prepared to discuss.
Activities
Discussions
Evaluation
10
75
Preparation
Reading(s)
o e-Business and e-Commerce
e-Activity
o Read the CNSS report: Progress Against 2008 Priorities,
located at http://www.cnss.gov/cnss_report.html. Be prepared
to discuss.
Activities
Discussions
Evaluation
10
100
Preparation
Reading(s)
o Chapter 7: Mobile Computing and Commerce
o Chapter 8: Web 2.0 and Social Media
Activities
Discussions
Evaluation
10
None
Preparation
Reading(s)
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 3 of 28
e-Activity
o Visit the following Websites and briefly examine the Enterprise
Resource Planning (ERP) offerings.
Commercial systems include SAP, located at
http://www.sap.com/solutions/businesssuite/erp/index.epx, Oracle PeopleSoft, located at
http://www.oracle.com/us/products/applications/people
soft-enterprise/index.html, and Seibel, located at
http://www.erp.com/section-layout/3-general/6834siebel-erp.html.
Open source ERP systems include Openbravo,
located at http://www.openbravo.com/, OpenERP,
located at http://www.openerp.com/, and xTuple,
located at http://www.xtuple.com/. Be prepared to
discuss.
Activities
Discussions
Evaluation
10
75
Preparation
Reading(s)
o Chapter 11: Business Intelligence and Decision Support
o Chapter 12: IT Strategic Planning
e-Activity
o Visit the Salesforce.com Website, located at
http://www.salesforce.com/, and examine the Customer
Relationships Management (CRM) service offerings. Be
prepared to discuss.
Activities
Discussions
Evaluation
10
100
Preparation
Reading(s)
o Chapter 13: Business Process Management and Systems
Development
Activities
Discussions
Evaluation
10
10
75
Preparation
Reading(s)
o Chapter 14: Global Ecology, Ethics, and Social Responsibility
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 4 of 28
11
10
200
Preparation
Reading(s): None
Activities
Discussions
Evaluation
100
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 5 of 28
% of
Grade
75
7.5%
75
7.5%
75
7.5%
75
7.5%
100
10%
100
10%
200
20%
100
10%
100
10%
Assignment
Tests are open book with a 2-hour time limit and may contain multiple choice, true / false, and essay
questions.
Participation (20 discussions worth 5 points apiece)
Note: Week 11 discussions are not graded.
Totals
Points
Percentage
Grade
900 1,000
90% 100%
800 899
80% 89%
700 799
70% 79%
Below 700
Below 70%
100
10%
1,000
100%
Writing Assignments
The objective of the School of Information Systems writing assignments is to promote attitudes and skills
that will improve a students ability to communicate in writing, develop research skills and documentation
techniques, and encourage critical analysis of data and conclusions specific to the course learning
outcomes in the information systems and technology domain.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 6 of 28
Goode, E. (2011, August 15). Sending the police before theres a crime. Retrieved from
http://www.nytimes.com/2011/08/16/us/16police.html
Pearsall, B. (2010, May). Predictive policing: The future of law enforcement? National Institute of
Justice Journal, 266. Retrieved from http://www.nij.gov/nij/journals/266/predictive.htm
Shurkin, J. N. (2011, September 13). Santa Cruz cops experiment with predictive policing.
Retrieved from http://idealab.talkingpointsmemo.com/2011/09/santa-cruz-cops-experimentwith-predictive-policing.php
Willis, J. J., Mastrofski, S. D., & Weisburd, D. (2003). Compstat in practice: An in-depth analysis
of three cities. Police Foundation. Retrieved from
http://www.policefoundation.org/pdf/compstatinpractice.pdf
In 1994, the New York City Police Department adopted a law enforcement crime fighting strategy known
as COMPSTAT (COMPuter STATistics). COMPSTAT uses Geographic Information Systems (GIS) to
map the locations of where crimes occur, identify hotspots, and map problem areas. COMPSTAT has
amassed a wealth of historical crime data. Mathematicians have designed and developed algorithms that
run against the historical data to predict future crimes for police departments. This is known as predictive
policing. Predictive policing has led to a drop in burglaries, automobile thefts, and other crimes in some
cities.
Write a four to five (4-5) page paper in which you:
1. Compare and contrast the application of information technology (IT) to optimize police
departments performance to reduce crime versus random patrols of the streets.
2. Describe how COMPSTAT, as an information system (IS), implements the four (4) basic IS
functions:
a. Input
b. Processing
c. Output
d. Feedback
3. Determine how information systems have allowed police departments that implement tools such
as COMPSTAT to respond to crime faster.
4. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT analysis) on behalf
of police departments that intend to implement predictive policing.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources. You may use the resources above or others of your choosing.
Your assignment must follow these formatting requirements:
Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 7 of 28
Use technology and information resources to research issues in information systems and
technology.
Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 75
Criteria
1. Compare and contrast
the application of
Information Technology
(IT) to optimize police
departments
performance to reduce
crime versus random
patrols of the streets.
Weight: 20%
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
Partially compared
and contrasted the
application of
Information
Technology (IT) to
optimize police
departments
performance to
reduce crime
versus random
patrols of the
streets.
Satisfactorily
compared and
contrasted the
application of
Information
Technology (IT) to
optimize police
departments
performance to
reduce crime
versus random
patrols of the
streets.
Thoroughly
compared and
contrasted the
application of
Information
Technology (IT) to
optimize police
departments
performance to
reduce crime
versus random
patrols of the
streets.
Partially described
how COMPSTAT,
as an information
system (IS),
implements the
basic IS input
function.
Satisfactorily
described how
COMPSTAT, as an
information system,
(IS), implements the
basic IS input
function.
Thoroughly
described how
COMPSTAT, as an
information system
(IS), implements the
basic IS input
function.
Partially described
how COMPSTAT
as an information
system (IS),
implements the
basic IS processing
function.
Satisfactorily
described how
COMPSTAT as an
information system
(IS), implements the
basic IS processing
function.
Thoroughly
described how
COMPSTAT as an
information system
(IS), implements the
basic IS processing
function.
Partially described
how COMPSTAT,
as an information
system (IS,)
implements the
basic IS output
function.
Satisfactorily
described how
COMPSTAT, as an
information system
(IS), implements the
basic IS output
function.
Thoroughly
described how
COMPSTAT, as an
information system
(IS), implements the
basic IS output
function.
Partially described
how COMPSTAT,
as an information
Satisfactorily
described how
COMPSTAT, as an
Thoroughly
described how
COMPSTAT, as an
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 8 of 28
6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%
COMPSTAT, as an
information system
(IS), implements the
basic IS feedback
function.
Did not submit or
incompletely
determined how
information systems
have allowed police
departments that
implement tools
such as
COMPSTAT to
respond to crime
faster.
Did not submit or
incompletely
applied the SWOT
analysis on behalf
of police
departments that
intend to implement
predictive policing.
No references
provided
system (IS),
implements the
basic IS feedback
function.
information system
(IS), implements the
basic IS feedback
function.
information system
(IS), implements the
basic IS feedback
function.
Partially determined
how information
systems have
allowed police
departments that
implement tools
such as
COMPSTAT to
respond to crime
faster.
Satisfactorily
determined how
information systems
have allowed police
departments that
implement tools
such as
COMPSTAT to
respond to crime
faster.
Thoroughly
determined how
information systems
have allowed police
departments that
implement tools
such as
COMPSTAT to
respond to crime
faster.
Satisfactorily
applied the SWOT
analysis on behalf
of police
departments that
intend to implement
predictive policing.
Thoroughly applied
the SWOT analysis
on behalf of police
departments that
intend to implement
predictive policing.
Meets number of
required references;
all references high
quality choices.
Exceeds number of
required references;
all references high
quality choices.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 9 of 28
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Compare and contrast the strategic and operational use of data management systems.
Use technology and information resources to research issues in information systems and
technology.
Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 10 of 28
6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
Satisfactorily judged
how Volvo Car
Corporation
integrated the cloud
infrastructure into
their networks.
Thoroughly judged
how Volvo Car
Corporation
integrated the cloud
infrastructure into
their networks.
Partially explained
how Volvo Car
Corporation
transformed data
into knowledge.
Satisfactorily
explained how
Volvo Car
Corporation
transformed data
into knowledge.
Thoroughly
explained how
Volvo Car
Corporation
transformed data
into knowledge.
Partially identified
the real-time
information systems
implemented and
partially evaluated
the impact of those
implementations.
Satisfactorily
identified the realtime information
systems
implemented and
satisfactorily
evaluated the
impact of those
implementations.
Thoroughly
identified the realtime information
systems
implemented and
thoroughly
evaluated the
impact of those
implementations.
Partially argued
how the Big Data
strategy gives Volvo
Car Corporation a
competitive
advantage.
Satisfactorily
argued how the Big
Data strategy gives
Volvo Car
Corporation a
competitive
advantage.
Meets number of
required references;
all references high
quality choices.
Thoroughly argued
how the Big Data
strategy gives Volvo
Car Corporation a
competitive
advantage.
Exceeds number of
required references;
all references high
quality choices.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 11 of 28
The 3rd Generation Partnership Project (3GPP) developed the 3GPP Long-Term Evolution (LTE)
standard for wireless communications technology. It is regarded as an evolution of the Global System
for Mobile Communication (GSM), the Universal Mobile Telecommunications Systems (UMTS), and
other standards. It is also known as the 4G LTE. The competition among the carriers to support 4G LTE
networks has been very fierce as evidenced by TV commercials targeting smartphone users. Many
smartphones run on 3G networks.
Write a four to five (4-5) page paper in which you:
1. Compare and contrast 3G wireless networks to 4G networks in terms of:
a. Services and applications
b. Network architecture
c. Data throughput
d. User perceptions
2. Distinguish between the 4G LTE, 4G WiMax, and 4G WiBro networks based on:
a. Upload and download speeds
b. User perceptions
c. Backward compatibility
d. Service availability
3. Identify why the competition between the 4G LTE carriers has been so fierce and describe the
benefits of this competition to the subscribers.
4. In January 2012, Verizon stated that 4G LTE is available in 190 cities covering 200 million
American subscribers. According to AT&Ts Website, they had plans for covering 20 million
Americans in 15 markets by end of 2011. Conclude why Verizon is able to cover more markets
than AT&T.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources. You may use the resources above or others of your choosing.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations
and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Compare and contrast the strategic and operational use of data management systems.
Describe the use of network management, Web, wireless, and mobility technologies.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 12 of 28
Use technology and information resources to research issues in information systems and
technology.
Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 75
Criteria
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
Partially compared
and contrasted 3G
wireless networks
to 4G networks in
terms of services
and applications.
Satisfactorily
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of services
and applications.
Thoroughly
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of services
and applications.
Partially compared
and contrasted 3G
wireless networks
to 4G networks in
terms of network
architecture.
Satisfactorily
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of network
architecture.
Thoroughly
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of network
architecture.
Partially compared
and contrasted 3G
wireless networks
to 4G networks in
terms of data
throughput.
Satisfactorily
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of data
throughput.
Thoroughly
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of data
throughput.
Partially compared
and contrasted 3G
wireless networks
to 4G networks in
terms of user
perceptions.
Satisfactorily
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of user
perceptions.
Thoroughly
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of user
perceptions.
Partially
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
upload and
download speeds.
Satisfactorily
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
upload and
download speeds.
Thoroughly
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
upload and
download speeds.
Partially
distinguished
between the 4G
LTE, 4G WiMax,
Satisfactorily
distinguished
between the 4G
LTE, 4G WiMax,
Thoroughly
distinguished
between the 4G
LTE, 4G WiMax,
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 13 of 28
LTE, 4G WiMax,
and 4G WiBro
networks based on
user perceptions.
Did not submit or
incompletely
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
backward
compatibility.
Did not submit or
incompletely
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
upload and on
service availability.
Did not submit or
incompletely
identified why the
competition
between the 4G
LTE carriers has
been so fierce and
did not submit or
incompletely
described the
benefits of this
competition to the
subscribers.
Did not submit or
incompletely
concluded why
Verizon is able to
cover more markets
than AT&T.
and 4G WiBro
networks based on
user perceptions.
and 4G WiBro
networks based on
user perceptions.
and 4G WiBro
networks based on
user perceptions.
Partially
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
backward
compatibility.
Satisfactorily
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
backward
compatibility.
Thoroughly
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
backward
compatibility.
Partially
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
service availability.
Satisfactorily
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
service availability.
Thoroughly
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
service availability.
Partially identified
why the competition
between the 4G
LTE carriers has
been so fierce and
partially described
the benefits of this
competition to the
subscribers.
Satisfactorily
identified why the
competition
between the 4G
LTE carriers has
been so fierce and
satisfactorily
described the
benefits of this
competition to the
subscribers.
Thoroughly
identified why the
competition
between the 4G
LTE carriers has
been so fierce and
thoroughly
described the
benefits of this
competition to the
subscribers.
Partially concluded
why Verizon is able
to cover more
markets than AT&T.
Satisfactorily
concluded why
Verizon is able to
cover more markets
than AT&T.
Thoroughly
concluded why
Verizon is able to
cover more markets
than AT&T.
5. 3 references
Weight: 5%
No references
provided
Meets number of
required references;
all references high
quality choices.
Exceeds number of
required references;
all references high
quality choices.
6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 14 of 28
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Describe the use of network management, Web, wireless, and mobility technologies.
Outline the strategic implications of information assurance and security in an information
technology environment.
Use technology and information resources to research issues in information systems and
technology.
Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 15 of 28
2. Identify the
advantages and
disadvantages of using
mobile computing
technology to monitor
patients.
Weight: 20%
3. Assess the security
concerns with regard to
the transmission of
personal medical
information over wireless
networks.
Weight: 25%
4. Assess the use of
social networking for
group support for
patients with similar
medical concerns.
Weight: 20%
5. 3 references
Weight: 5%
6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
Partially compared
and contrasted
monitoring of
patient vital signs
using mobile
computing
technology to inpatient visits to the
doctors office or
hospital.
Satisfactorily
compared and
contrasted
monitoring of
patient vital signs
using mobile
computing
technology to inpatient visits to the
doctors office or
hospital.
Thoroughly
compared and
contrasted
monitoring of
patient vital signs
using mobile
computing
technology to inpatient visits to the
doctors office or
hospital.
Partially identified
the advantages and
disadvantages of
using mobile
computing
technology to
monitor patients.
Satisfactorily
identified the
advantages and
disadvantages of
using mobile
computing
technology to
monitor patients.
Thoroughly
identified the
advantages and
disadvantages of
using mobile
computing
technology to
monitor patients.
Partially assessed
the security
concerns with
regard to the
transmission of
personal medical
information over
wireless networks.
Satisfactorily
assessed the
security concerns
with regard to the
transmission of
personal medical
information over
wireless networks.
Thoroughly
assessed the
security concerns
with regard to the
transmission of
personal medical
information over
wireless networks.
Partially assessed
the use of social
networking for
group support for
patients with similar
medical concerns.
Satisfactorily
assessed the use of
social networking
for group support
for patients with
similar medical
concerns.
Thoroughly
assessed the use of
social networking
for group support
for patients with
similar medical
concerns.
Meets number of
required references;
all references high
quality choices.
Exceeds number of
required references;
all references high
quality choices.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 16 of 28
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this assignment are:
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 17 of 28
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
Partially determined
the benefits of data
mining to the
businesses when
employing
predictive analytics
to understand the
behavior of
customers.
Satisfactorily
determined the
benefits of data
mining to the
businesses when
employing
predictive analytics
to understand the
behavior of
customers.
Thoroughly
determined the
benefits of data
mining to the
businesses when
employing
predictive analytics
to understand the
behavior of
customers.
Partially determined
the benefits of data
mining to the
businesses when
employing
associations
discovery in
products sold to
customers.
Satisfactorily
determined the
benefits of data
mining to the
businesses when
employing
associations
discovery in
products sold to
customers.
Thoroughly
determined the
benefits of data
mining to the
businesses when
employing
associations
discovery in
products sold to
customers.
Partially determined
the benefits of data
mining to the
businesses when
employing Web
mining to discover
business
intelligence from
Web customers.
Satisfactorily
determined the
benefits of data
mining to the
businesses when
employing Web
mining to discover
business
intelligence from
Web customers.
Thoroughly
determined the
benefits of data
mining to the
businesses when
employing Web
mining to discover
business
intelligence from
Web customers.
Partially determined
the benefits of data
mining to the
businesses when
employing
clustering to find
related customer
information.
Satisfactorily
determined the
benefits of data
mining to the
businesses when
employing
clustering to find
related customer
information.
Thoroughly
determined the
benefits of data
mining to the
businesses when
employing
clustering to find
related customer
information.
Partially assessed
the reliability of the
data-mining
algorithms.
Partially decided if
they can be trusted
and partially
predicted the errors
Satisfactorily
assessed the
reliability of the
data-mining
algorithms.
Satisfactorily
decided if they can
be trusted and
Thoroughly
assessed the
reliability of the
data-mining
algorithms.
Thoroughly decided
if they can be
trusted and
Criteria
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 18 of 28
5. 3 references
Weight: 5%
6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%
satisfactorily
predicted the errors
they are likely to
produce.
thoroughly
predicted the errors
they are likely to
produce.
Satisfactorily chose
and described three
(3) concerns raised
by the collection of
personal data for
mining purposes.
Thoroughly chose
and described three
(3) concerns raised
by the collection of
personal data for
mining purposes.
Partially decided if
each of the
concerns is valid
and partially
explained your
decision for each.
Satisfactorily
decided if each of
the concerns is
valid and
satisfactorily
explained your
decision for each.
Thoroughly decided
if each of the
concerns is valid
and thoroughly
explained your
decision for each.
Partially described
how each concern
is being allayed.
Satisfactorily
described how each
concern is being
allayed.
Thoroughly
described how each
concern is being
allayed.
Partially provided at
least three (3)
examples where
businesses have
used predictive
analysis to gain a
competitive
advantage and
partially evaluated
the effectiveness of
each businesss
strategy.
Satisfactorily
provided at least
three (3) examples
where businesses
have used
predictive analysis
to gain a
competitive
advantage and
satisfactorily
evaluated the
effectiveness of
each businesss
strategy.
Thoroughly
provided at least
three (3) examples
where businesses
have used
predictive analysis
to gain a
competitive
advantage and
thoroughly
evaluated the
effectiveness of
each businesss
strategy.
Meets number of
required references;
all references high
quality choices.
Exceeds number of
required references;
all references high
quality choices.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 19 of 28
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Compare and contrast the strategic and operational use of data management systems.
Use technology and information resources to research issues in information systems and
technology.
Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 20 of 28
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
Partially assessed
how Ericsson
benefitted from
AWS in terms of
cost reduction,
automated software
updates, remote
access, and ondemand availability.
Satisfactorily
assessed how
Ericsson benefitted
from AWS in terms
of cost reduction,
automated software
updates, remote
access, and ondemand availability.
Thoroughly
assessed how
Ericsson benefitted
from AWS in terms
of cost reduction,
automated software
updates, remote
access, and ondemand availability.
2. Evaluate the
scalability, dependability,
manageability, and
adaptability of Amazon
Elastic Compute Cloud
(Amazon EC2), Amazon
Simple Storage Services
(Amazon S3), and
RightScale.
Weight: 25%
Partially evaluated
the scalability,
dependability,
manageability, and
adaptability of
Amazon Elastic
Compute Cloud
(Amazon EC2),
Amazon Simple
Storage Services
(Amazon S3), and
RightScale.
Satisfactorily
evaluated the
scalability,
dependability,
manageability, and
adaptability of
Amazon Elastic
Compute Cloud
(Amazon EC2),
Amazon Simple
Storage Services
(Amazon S3), and
RightScale.
Thoroughly
evaluated the
scalability,
dependability,
manageability, and
adaptability of
Amazon Elastic
Compute Cloud
(Amazon EC2),
Amazon Simple
Storage Services
(Amazon S3), and
RightScale.
Partially examined
the security
concerns for cloudbased services and
partially made
suggestions to cope
with these
concerns.
Satisfactorily
examined the
security concerns
for cloud-based
services and
satisfactorily made
suggestions to cope
with these
concerns.
Thoroughly
examined the
security concerns
for cloud-based
services and
thoroughly made
suggestions to cope
with these
concerns.
Partially assessed
possible scalability,
reliability, and cost
issues associated
with cloud
computing, and
partially made
suggestions to
overcome each of
these issues.
Satisfactorily
assessed possible
scalability,
reliability, and cost
issues associated
with cloud
computing, and
satisfactorily made
suggestions to
overcome each of
these issues.
Thoroughly
assessed possible
scalability,
reliability, and cost
issues associated
with cloud
computing, and
thoroughly made
suggestions to
overcome each of
these issues.
Meets number of
required references;
Exceeds number of
required references;
Criteria
4. Assess possible
scalability, reliability, and
cost issues associated
with cloud computing,
and make suggestions to
overcome each of these
issues.
Weight: 20%
5. 3 references
Weight: 5%
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 21 of 28
6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%
references; some or
all references poor
quality choices.
5-6 errors present
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 22 of 28
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 23 of 28
Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 200
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Assess the
effectiveness and
efficiency mobile-based
applications provide to
capture geolocation data
and customer data, and
quickly upload to a
processing server without
users having to use a
desktop system.
Weight: 15%
Partially assessed
the effectiveness
and efficiency
mobile-based
applications provide
to capture
geolocation data
and customer data,
and quickly upload
to a processing
server without users
having to use a
desktop system.
Satisfactorily
assessed the
effectiveness and
efficiency mobilebased applications
provide to capture
geolocation data
and customer data,
and quickly upload
to a processing
server without users
having to use a
desktop system.
Thoroughly
assessed the
effectiveness and
efficiency mobilebased applications
provide to capture
geolocation data
and customer data,
and quickly upload
to a processing
server without users
having to use a
desktop system.
2. Evaluate benefits
realized by consumers
because of the ability to
gain access to their data
via mobile applications.
Weight: 15%
Partially evaluated
benefits realized by
consumers because
of the ability to gain
access to their data
via mobile
applications.
Satisfactorily
evaluated benefits
realized by
consumers because
of the ability to gain
access to their data
via mobile
applications.
Thoroughly
evaluated benefits
realized by
consumers because
of the ability to gain
access to their data
via mobile
applications.
3. Examine the
challenges of developing
applications that run on
mobile devices because
of the small screen size.
Weight: 10%
Partially examined
the challenges of
developing
applications that run
on mobile devices
because of the
small screen size.
Satisfactorily
examined the
challenges of
developing
applications that run
on mobile devices
because of the
small screen size.
Thoroughly
examined the
challenges of
developing
applications that run
on mobile devices
because of the
small screen size.
Partially described
the methods that
could be used to
decide which
platform to support,
Satisfactorily
described the
methods that could
be used to decide
which platform to
Thoroughly
described the
methods that could
be used to decide
which platform to
Criteria
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 24 of 28
5. Discuss ways of
providing high
availability.
Weight: 15%
6. Discuss methods of
making mobile devices
more secure.
Weight: 15%
7. 3 references
Weight: 5%
8. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%
which platform to
support, i.e.,
iPhone, iPad,
Windows Phone, or
Android.
Did not submit or
incompletely
discussed ways of
providing high
availability.
support, i.e.,
iPhone, iPad,
Windows Phone, or
Android.
support, i.e.,
iPhone, iPad,
Windows Phone, or
Android.
Partially discussed
ways of providing
high availability.
Satisfactorily
discussed ways of
providing high
availability.
Thoroughly
discussed ways of
providing high
availability.
Partially discussed
methods of making
mobile devices
more secure.
Satisfactorily
discussed methods
of making mobile
devices more
secure.
Thoroughly
discussed methods
of making mobile
devices more
secure.
Meets number of
required references;
all references high
quality choices.
Exceeds number of
required references;
all references high
quality choices.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 25 of 28
Instructional Materials
In order to be fully prepared, obtain a copy of the required textbooks and other instructional materials
prior to the first day of class. When available, Strayer University provides a link to the first three (3)
chapters of your textbook(s) in eBook format. Check your online course shell for availability.
Review the online course shell or check with your professor to determine whether Internet-based
assignments and activities are used in this course.
Strayer students are encouraged to purchase their course materials through our designated bookstore
MBS Direct. http://bookstore.mbsdirect.net/strayer.htm If a lab is required for the course, MBS Direct is
the only vendor that sells the correct registration code so that Strayer students may access labs
successfully.
Running and navigating the software or labs that will be used in this course
Demonstrating the use of relevant programming languages and tools through screen capture and
live navigation.
Logging into the lab environments and running a sample lab required in this course (if labs are
required)
Demonstrating the downloading and installing of software to a students computer (if necessary)
or using the software already installed in the Strayer University campus labs
Locating or finding files and other student materials that may be required to use in assignments
You are strongly advised to use the material provided by faculty in these sessions. Online and Ground
instructors will post the Kaltura video recorded sessions to the Instructor Insights folder within the weekly
tabs of the online course shell (Blackboard).
Discussions
Students taking this course online are required to post their discussions to a weekly thread in the online
course shell. To earn full credit in an online threaded discussion, students must have a total of 3 posts per
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 26 of 28
Tests
Tests (quizzes, midterm and final exams, essay exams, lab tests, etc.) are available for student access
and completion through the online course shell. Check the online course shell to determine how you are
expected to take the tests.
Online students are to complete the test by Sunday midnight the week the test is due.
On-ground students are to complete the tests after the material is covered and before the next
class session.
Assignments
A standardized performance grading rubric is a tool your professor will use to evaluate your written
assignments. Review the rubric before submitting assignments that have grading rubrics associated with
them to ensure you have met the performance criteria stated on the rubric.
Grades are based on individual effort. There is no group grading; however, working in groups in the
online or on-ground classroom is acceptable.
Assignments for online students are always submitted through the online course shell. On-ground
professors will inform students on how to submit assignments, whether in paper format or through the
online course shell.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 27 of 28
For technical questions, please contact Strayer Online Technical Support by logging in to your
iCampus account at https://icampus.strayer.edu/login and submitting a case under Student
Center, then Submit Help Ticket. If you are unable to log in to your iCampus account, please
contact Technical Support via phone at (877) 642-2999.
For concerns with your class, please access the Solution Center by logging in to your iCampus
account at https://icampus.strayer.edu/login and submitting a case under Student Center, then
Submit Help Ticket. If you are unable to log in to your iCampus account, please contact the IT
Help Desk at (866) 610-8123 or at mailto:IThelpdesk@Strayer.edu.
TurnItIn.com is an optional online tool to assess the originality of student written work. Check with your
professor for access and use instructions.
The Strayer Policies link on the navigation bar in the online course shell contains academic policies. It is
important that students be aware of these policies.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 28 of 28