Sei sulla pagina 1di 28

CIS 500 Information Systems for Decision Making

COURSE DESCRIPTION
This course examines the information requirement of an organization. It emphasizes the difference in the
kinds of information needed at the operational, administrative, strategic, and organizational levels. It
discusses planning and implementing a comprehensive information system and methods to measure its
effectiveness.

INSTRUCTIONAL MATERIALS
Required Resources
Turban, E., & Volonino, L. (2011) Information technology for management (8th ed.). Hoboken, NJ: John
Wiley & Sons.
Supplemental Resources
Committee on National Security Systems. (n.d.). Issuances. Retrieved from
http://www.cnss.gov/issuances.html
Hu, W.-C., & Zuo, Y. (2010). Handheld computing for mobile commerce: applications, concepts and
technologies. Hershey, PA: Information Science Reference.
Magal, S. R., & Word, J. (2011). Integrated business processes with ERP systems. Hoboken, NJ: John
Wiley & Sons, Inc.
Mulholland, A., Pyke, J., & Fingar, P. (2010). Enterprise cloud computing: a strategy guide for business
and technology leaders. Tampa, Florida: Meghan-Kiffer Press.

COURSE LEARNING OUTCOMES


1. Explain how the components of an information technology system interrelate in an organizational
context.
2. Compare and contrast the strategic and operational use of data management systems.
3. Summarize the complexities of information technology and practices.
4. Describe the role of the information technology professional.
5. Compare and contrast operational and enterprise systems.
6. Describe the use of network management, Web, wireless, and mobility technologies.
7. Outline the strategic implications of information assurance and security in an information
technology environment.
8. Outline the challenges and strategies of e-Business and e-Commerce technology.
9. Explain how information technology systems influence organizational strategies.
10. Describe and identify the uses of business process management and systems development.
11. Evaluate the ethical concerns that information technologies raise in a global context.
12. Develop an information technology strategic plan to address and solve a proposed business
problem.
13. Use technology and information resources to research issues in information systems and
technology.
14. Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 1 of 28

CIS 500 Information Systems for Decision Making


WEEKLY COURSE SCHEDULE
The standard requirement for a 4.5 credit hour course is for students to spend 13.5 hours in weekly work.
This includes preparation, activities, and evaluation regardless of delivery mode.
Week
1

Preparation, Activities, and Evaluation

Points

Preparation

Reading(s)
o Chapter 1: Information Systems in the 2010s

e-Activity
o Businesses have used barcodes to store product and price
information on product tags readable via specialized scanners.
Quick Response (QR) tags are the latest technology for storing
and publishing product information readable using
smartphones. There are no specialized scanners required to
read QR codes. Visit the Website, located at
http://www.qrstuff.com/, to generate a QR code. Follow these
instructions and be prepared to discuss:
Under the Data Type column (column 1), click on the
Email Address radio button.
Under the Content column (column 2), type your email
address in the textbox.
Notice the generated QR code in the QR code
Preview window.
Download the image to your local machine.
Repeat the exercise and generate the QR code for
your telephone number.
Activities

Discussions
Evaluation

10

None

Preparation

Reading(s)
o Chapter 2: IT Infrastructure and Support Systems

e-Activity
o Research the Internet for an article that describes how an
industry of your choice is using Radio Frequency Identification
(RFID) technology. Examine the uses, advantages, and
disadvantages of RFID technology. Be prepared to discuss.
Activities

Discussions
Evaluation

Assignment 1: Predictive Policing

10
75

Preparation

Reading(s)

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 2 of 28

CIS 500 Information Systems for Decision Making


o
o

Chapter 3: Data, Text and Document Management


Chapter 4: Network Management and Mobility

e-Activity
o Visit the AT&T Website, located at http://bit.ly/A0sbhC, and
Verizons Website, located at http://bit.ly/Xb0WU. Examine the
wireless broadband networks provided by each vendor. Be
prepared to discuss.
Activities

Discussions
Evaluation

Case Study 1: The Big Data Challenges

10
100

Preparation

Reading(s)
o Chapter 5: IT Security, Crime, Compliance, and Continuity

e-Activity
o Visit the Committee on National Security Systems (CNNS)
Website, located at http://www.cnss.gov/policies.html. Study
the policies and directives and be prepared to discuss.
Activities

Discussions
Evaluation

Assignment 2: 4G Wireless Networks

10
75

Preparation

Reading(s)
o e-Business and e-Commerce

e-Activity
o Read the CNSS report: Progress Against 2008 Priorities,
located at http://www.cnss.gov/cnss_report.html. Be prepared
to discuss.
Activities

Discussions
Evaluation

Midterm Exam: Chapters 1 through 5

10
100

Preparation
Reading(s)
o Chapter 7: Mobile Computing and Commerce
o Chapter 8: Web 2.0 and Social Media
Activities

Discussions
Evaluation

10

None

Preparation

Reading(s)

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 3 of 28

CIS 500 Information Systems for Decision Making


o
o

Chapter 9: Operational Planning and Control Systems


Chapter 10: Enterprise Information Systems

e-Activity
o Visit the following Websites and briefly examine the Enterprise
Resource Planning (ERP) offerings.
Commercial systems include SAP, located at
http://www.sap.com/solutions/businesssuite/erp/index.epx, Oracle PeopleSoft, located at
http://www.oracle.com/us/products/applications/people
soft-enterprise/index.html, and Seibel, located at
http://www.erp.com/section-layout/3-general/6834siebel-erp.html.
Open source ERP systems include Openbravo,
located at http://www.openbravo.com/, OpenERP,
located at http://www.openerp.com/, and xTuple,
located at http://www.xtuple.com/. Be prepared to
discuss.
Activities

Discussions
Evaluation

Assignment 3: Mobile Computing and Social Networking

10
75

Preparation

Reading(s)
o Chapter 11: Business Intelligence and Decision Support
o Chapter 12: IT Strategic Planning

e-Activity
o Visit the Salesforce.com Website, located at
http://www.salesforce.com/, and examine the Customer
Relationships Management (CRM) service offerings. Be
prepared to discuss.
Activities

Discussions
Evaluation

Case Study 2: Cloud Computing

10
100

Preparation
Reading(s)
o Chapter 13: Business Process Management and Systems
Development
Activities

Discussions
Evaluation

10

Assignment 4: Data Mining

10
75

Preparation

Reading(s)
o Chapter 14: Global Ecology, Ethics, and Social Responsibility

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 4 of 28

CIS 500 Information Systems for Decision Making


Activities
Discussions
Evaluation

11

Term Paper: Mobile Computing and Social Networks

10
200

Preparation
Reading(s): None
Activities
Discussions
Evaluation

Final Exam: Chapters 6 through 14

100

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 5 of 28

CIS 500 Information Systems for Decision Making


GRADING SCALE GRADUATE
Total Points

% of
Grade

Assignment 1: Predictive Policing

75

7.5%

Assignment 2: 4G Wireless Networks

75

7.5%

Assignment 3: Mobile Computing and Social Networking

75

7.5%

Assignment 4: Data Mining

75

7.5%

Case Study 1: The Big Data Challenges

100

10%

Case Study 2: Cloud Computing

100

10%

Term Paper: Mobile Computing and Social Networks

200

20%

Midterm Exam (Chapters 1-5)

100

10%

Final Exam (Chapters 6-14)

100

10%

Assignment

Tests are open book with a 2-hour time limit and may contain multiple choice, true / false, and essay
questions.
Participation (20 discussions worth 5 points apiece)
Note: Week 11 discussions are not graded.
Totals

Points

Percentage

Grade

900 1,000

90% 100%

800 899

80% 89%

700 799

70% 79%

Below 700

Below 70%

100

10%

1,000

100%

Writing Assignments
The objective of the School of Information Systems writing assignments is to promote attitudes and skills
that will improve a students ability to communicate in writing, develop research skills and documentation
techniques, and encourage critical analysis of data and conclusions specific to the course learning
outcomes in the information systems and technology domain.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 6 of 28

CIS 500 Assignments and Rubrics


Assignment 1: Predictive Policing
Due Week 2 and worth 75 points
The following resources may be helpful in completing this assignment:

Goode, E. (2011, August 15). Sending the police before theres a crime. Retrieved from
http://www.nytimes.com/2011/08/16/us/16police.html

Pearsall, B. (2010, May). Predictive policing: The future of law enforcement? National Institute of
Justice Journal, 266. Retrieved from http://www.nij.gov/nij/journals/266/predictive.htm

Predictive Policing Symposium (2010). Retrieved from http://www.nij.gov/nij/topics/lawenforcement/strategies/predictive-policing/symposium/welcome.htm

Shurkin, J. N. (2011, September 13). Santa Cruz cops experiment with predictive policing.
Retrieved from http://idealab.talkingpointsmemo.com/2011/09/santa-cruz-cops-experimentwith-predictive-policing.php

Willis, J. J., Mastrofski, S. D., & Weisburd, D. (2003). Compstat in practice: An in-depth analysis
of three cities. Police Foundation. Retrieved from
http://www.policefoundation.org/pdf/compstatinpractice.pdf

In 1994, the New York City Police Department adopted a law enforcement crime fighting strategy known
as COMPSTAT (COMPuter STATistics). COMPSTAT uses Geographic Information Systems (GIS) to
map the locations of where crimes occur, identify hotspots, and map problem areas. COMPSTAT has
amassed a wealth of historical crime data. Mathematicians have designed and developed algorithms that
run against the historical data to predict future crimes for police departments. This is known as predictive
policing. Predictive policing has led to a drop in burglaries, automobile thefts, and other crimes in some
cities.
Write a four to five (4-5) page paper in which you:
1. Compare and contrast the application of information technology (IT) to optimize police
departments performance to reduce crime versus random patrols of the streets.
2. Describe how COMPSTAT, as an information system (IS), implements the four (4) basic IS
functions:
a. Input
b. Processing
c. Output
d. Feedback
3. Determine how information systems have allowed police departments that implement tools such
as COMPSTAT to respond to crime faster.
4. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT analysis) on behalf
of police departments that intend to implement predictive policing.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources. You may use the resources above or others of your choosing.
Your assignment must follow these formatting requirements:

Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 7 of 28

CIS 500 Assignments and Rubrics


The specific course learning outcomes associated with this assignment are:

Explain how the components of an information technology system interrelate in an organizational


context.

Use technology and information resources to research issues in information systems and
technology.

Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 75
Criteria
1. Compare and contrast
the application of
Information Technology
(IT) to optimize police
departments
performance to reduce
crime versus random
patrols of the streets.
Weight: 20%

2a. Describe how


COMPSTAT, as an
information system (IS),
implements the basic IS,
input function.
Weight: 5%
2b. Describe how
COMPSTAT, as an
information system (IS),
implements the basic IS
processing function.
Weight: 5%
2c. Describe how
COMPSTAT, as an
information system (IS),
implements the basic IS
output function.
Weight: 5%
2d. Describe how
COMPSTAT, as an
information system (IS),

Assignment 1: Predictive Policing


Unacceptable
Below 70% F
Did not submit or
incompletely
compared and
contrasted the
application of
Information
Technology (IT) to
optimize police
departments
performance to
reduce crime
versus random
patrols of the
streets.
Did not submit or
incompletely
described how
COMPSTAT, as an
information system
(IS), implements the
basic IS input
function.
Did not submit or
incompletely
described how
COMPSTAT, as an
information system
(IS), implements the
basic IS processing
function.
Did not submit or
incompletely
described how
COMPSTAT, as an
information system
(IS), implements the
basic IS output
function.
Did not submit or
incompletely
described how

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

Partially compared
and contrasted the
application of
Information
Technology (IT) to
optimize police
departments
performance to
reduce crime
versus random
patrols of the
streets.

Satisfactorily
compared and
contrasted the
application of
Information
Technology (IT) to
optimize police
departments
performance to
reduce crime
versus random
patrols of the
streets.

Thoroughly
compared and
contrasted the
application of
Information
Technology (IT) to
optimize police
departments
performance to
reduce crime
versus random
patrols of the
streets.

Partially described
how COMPSTAT,
as an information
system (IS),
implements the
basic IS input
function.

Satisfactorily
described how
COMPSTAT, as an
information system,
(IS), implements the
basic IS input
function.

Thoroughly
described how
COMPSTAT, as an
information system
(IS), implements the
basic IS input
function.

Partially described
how COMPSTAT
as an information
system (IS),
implements the
basic IS processing
function.

Satisfactorily
described how
COMPSTAT as an
information system
(IS), implements the
basic IS processing
function.

Thoroughly
described how
COMPSTAT as an
information system
(IS), implements the
basic IS processing
function.

Partially described
how COMPSTAT,
as an information
system (IS,)
implements the
basic IS output
function.

Satisfactorily
described how
COMPSTAT, as an
information system
(IS), implements the
basic IS output
function.

Thoroughly
described how
COMPSTAT, as an
information system
(IS), implements the
basic IS output
function.

Partially described
how COMPSTAT,
as an information

Satisfactorily
described how
COMPSTAT, as an

Thoroughly
described how
COMPSTAT, as an

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 8 of 28

CIS 500 Assignments and Rubrics


implements the basic IS
feedback function.
Weight: 5%
3. Determine how
information systems have
allowed police
departments that
implement tools such as
COMPSTAT to respond
to crime faster.
Weight: 20%

4. Apply the SWOT


analysis on behalf of
police departments that
intend to implement
predictive policing.
Weight: 25%
5. 3 references
Weight: 5%

6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

COMPSTAT, as an
information system
(IS), implements the
basic IS feedback
function.
Did not submit or
incompletely
determined how
information systems
have allowed police
departments that
implement tools
such as
COMPSTAT to
respond to crime
faster.
Did not submit or
incompletely
applied the SWOT
analysis on behalf
of police
departments that
intend to implement
predictive policing.
No references
provided

More than 6 errors


present

system (IS),
implements the
basic IS feedback
function.

information system
(IS), implements the
basic IS feedback
function.

information system
(IS), implements the
basic IS feedback
function.

Partially determined
how information
systems have
allowed police
departments that
implement tools
such as
COMPSTAT to
respond to crime
faster.

Satisfactorily
determined how
information systems
have allowed police
departments that
implement tools
such as
COMPSTAT to
respond to crime
faster.

Thoroughly
determined how
information systems
have allowed police
departments that
implement tools
such as
COMPSTAT to
respond to crime
faster.

Partially applied the


SWOT analysis on
behalf of police
departments that
intend to implement
predictive policing.

Satisfactorily
applied the SWOT
analysis on behalf
of police
departments that
intend to implement
predictive policing.

Thoroughly applied
the SWOT analysis
on behalf of police
departments that
intend to implement
predictive policing.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 9 of 28

CIS 500 Assignments and Rubrics


Case Study 1: The Big Data Challenges
Due Week 3 and worth 100 points
Big Data is a term used to describe the voluminous amount of structured and semi-structured data
generated by companies. The term is used when referring to petabytes (PB), exabytes (EB), and
zettabytes (ZB) of data. Companies face challenges when it comes to capturing, storing, searching, and
analyzing Big Data. The Volvo Car Corporation faced this problem because of the massive amount of
data it was streaming from its vehicles.
Download and study the Volvo Car Corporation case study titled, Converting data into business value at
Volvo, located at http://www.i-cio.com/__data/assets/pdf_file/0004/8833/i-cio_Case_Study_Volvo.pdf.
Write a two to four (2-4) page paper in which you:
1. Judge how Volvo Car Corporation integrated the cloud infrastructure into its networks.
2. Explain how Volvo Car Corporation transforms data into knowledge.
3. Identify the real-time information systems implemented and evaluate the impact of these
implementations.
4. Argue how the Big Data strategy gives Volvo Car Corporation a competitive advantage.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain how the components of an information technology system interrelate in an organizational


context.

Compare and contrast the strategic and operational use of data management systems.

Use technology and information resources to research issues in information systems and
technology.
Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 10 of 28

CIS 500 Assignments and Rubrics


Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 100
Criteria
1. Judge how Volvo Car
Corporation integrated
the cloud infrastructure
into their networks.
Weight: 25%
2. Explain how Volvo Car
Corporation transforms
data into knowledge.
Weight: 20%

3. Identify the real-time


information systems
implemented and
evaluate the impact of
these implementations.
Weight: 20%

4. Argue how the Big


Data strategy gives Volvo
Car Corporation a
competitive advantage.
Weight: 20%
5. 3 references
Weight: 5%

6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

Case Study 1: The Big Data Challenges


Unacceptable
Below 70% F

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

Did not submit or


incompletely judged
how Volvo Car
Corporation
integrated the cloud
infrastructure into
their networks.
Did not submit or
incompletely
explained how
Volvo Car
Corporation
transformed data
into knowledge.
Did not submit or
incompletely
identified the realtime information
systems
implemented and
did not submit or
incompletely
evaluated the
impact of those
implementations.
Did not submit or
incompletely argued
how the Big Data
strategy gives Volvo
Car Corporation a
competitive
advantage.
No references
provided

Partially judged how


Volvo Car
Corporation
integrated the cloud
infrastructure into
their networks.

Satisfactorily judged
how Volvo Car
Corporation
integrated the cloud
infrastructure into
their networks.

Thoroughly judged
how Volvo Car
Corporation
integrated the cloud
infrastructure into
their networks.

Partially explained
how Volvo Car
Corporation
transformed data
into knowledge.

Satisfactorily
explained how
Volvo Car
Corporation
transformed data
into knowledge.

Thoroughly
explained how
Volvo Car
Corporation
transformed data
into knowledge.

Partially identified
the real-time
information systems
implemented and
partially evaluated
the impact of those
implementations.

Satisfactorily
identified the realtime information
systems
implemented and
satisfactorily
evaluated the
impact of those
implementations.

Thoroughly
identified the realtime information
systems
implemented and
thoroughly
evaluated the
impact of those
implementations.

Partially argued
how the Big Data
strategy gives Volvo
Car Corporation a
competitive
advantage.

Satisfactorily
argued how the Big
Data strategy gives
Volvo Car
Corporation a
competitive
advantage.
Meets number of
required references;
all references high
quality choices.

Thoroughly argued
how the Big Data
strategy gives Volvo
Car Corporation a
competitive
advantage.

3-4 errors present

0-2 errors present

More than 6 errors


present

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Exceeds number of
required references;
all references high
quality choices.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 11 of 28

CIS 500 Assignments and Rubrics


Assignment 2: 4G Wireless Networks
Due Week 4 and worth 75 points
The following resources may be helpful when completing this assignment.

3GPP Specification Detail. (n.d.). General format. Retrieved from


http://www.3gpp.org/ftp/specs/html-info/23002.htm

WiMax Forum. (2012). General format. Retrieved from http://www.wimaxforum.org/

The 3rd Generation Partnership Project (3GPP) developed the 3GPP Long-Term Evolution (LTE)
standard for wireless communications technology. It is regarded as an evolution of the Global System
for Mobile Communication (GSM), the Universal Mobile Telecommunications Systems (UMTS), and
other standards. It is also known as the 4G LTE. The competition among the carriers to support 4G LTE
networks has been very fierce as evidenced by TV commercials targeting smartphone users. Many
smartphones run on 3G networks.
Write a four to five (4-5) page paper in which you:
1. Compare and contrast 3G wireless networks to 4G networks in terms of:
a. Services and applications
b. Network architecture
c. Data throughput
d. User perceptions
2. Distinguish between the 4G LTE, 4G WiMax, and 4G WiBro networks based on:
a. Upload and download speeds
b. User perceptions
c. Backward compatibility
d. Service availability
3. Identify why the competition between the 4G LTE carriers has been so fierce and describe the
benefits of this competition to the subscribers.
4. In January 2012, Verizon stated that 4G LTE is available in 190 cities covering 200 million
American subscribers. According to AT&Ts Website, they had plans for covering 20 million
Americans in 15 markets by end of 2011. Conclude why Verizon is able to cover more markets
than AT&T.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources. You may use the resources above or others of your choosing.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Compare and contrast the strategic and operational use of data management systems.

Describe the use of network management, Web, wireless, and mobility technologies.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 12 of 28

CIS 500 Assignments and Rubrics

Use technology and information resources to research issues in information systems and
technology.
Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 75
Criteria

Assignment 2: 4G Wireless Networks


Unacceptable
Below 70% F

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

1a. Compare and


contrast 3G wireless
networks to 4G networks
in terms of services and
applications.
Weight: 5%

Did not submit or


incompletely
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of services
and applications.

Partially compared
and contrasted 3G
wireless networks
to 4G networks in
terms of services
and applications.

Satisfactorily
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of services
and applications.

Thoroughly
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of services
and applications.

1b. Compare and


contrast 3G wireless
networks to 4G networks
in terms of network
architecture.
Weight: 5%

Did not submit or


incompletely
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of network
architecture.
Did not submit or
incompletely
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of data
throughput.
Did not submit or
incompletely
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of user
perceptions.
Did not submit or
incompletely
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
upload and
download speeds.
Did not submit or
incompletely
distinguished
between the 4G

Partially compared
and contrasted 3G
wireless networks
to 4G networks in
terms of network
architecture.

Satisfactorily
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of network
architecture.

Thoroughly
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of network
architecture.

Partially compared
and contrasted 3G
wireless networks
to 4G networks in
terms of data
throughput.

Satisfactorily
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of data
throughput.

Thoroughly
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of data
throughput.

Partially compared
and contrasted 3G
wireless networks
to 4G networks in
terms of user
perceptions.

Satisfactorily
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of user
perceptions.

Thoroughly
compared and
contrasted 3G
wireless networks
to 4G networks in
terms of user
perceptions.

Partially
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
upload and
download speeds.

Satisfactorily
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
upload and
download speeds.

Thoroughly
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
upload and
download speeds.

Partially
distinguished
between the 4G
LTE, 4G WiMax,

Satisfactorily
distinguished
between the 4G
LTE, 4G WiMax,

Thoroughly
distinguished
between the 4G
LTE, 4G WiMax,

1c. Compare and


contrast 3G wireless
networks to 4G networks
in terms of data
throughput.
Weight: 5%
1d. Compare and
contrast 3G wireless
networks to 4G networks
in terms of user
perceptions.
Weight: 5%
2a. Distinguish between
the 4G LTE, 4G WiMax,
and 4G WiBro networks
based on upload and
download speeds.
Weight: 5%

2b. Distinguish between


the 4G LTE, 4G WiMax,
and 4G WiBro networks
based on user

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 13 of 28

CIS 500 Assignments and Rubrics


perceptions.
Weight: 5%

LTE, 4G WiMax,
and 4G WiBro
networks based on
user perceptions.
Did not submit or
incompletely
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
backward
compatibility.
Did not submit or
incompletely
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
upload and on
service availability.
Did not submit or
incompletely
identified why the
competition
between the 4G
LTE carriers has
been so fierce and
did not submit or
incompletely
described the
benefits of this
competition to the
subscribers.
Did not submit or
incompletely
concluded why
Verizon is able to
cover more markets
than AT&T.

and 4G WiBro
networks based on
user perceptions.

and 4G WiBro
networks based on
user perceptions.

and 4G WiBro
networks based on
user perceptions.

Partially
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
backward
compatibility.

Satisfactorily
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
backward
compatibility.

Thoroughly
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
backward
compatibility.

Partially
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
service availability.

Satisfactorily
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
service availability.

Thoroughly
distinguished
between the 4G
LTE, 4G WiMax,
and 4G WiBro
networks based on
service availability.

Partially identified
why the competition
between the 4G
LTE carriers has
been so fierce and
partially described
the benefits of this
competition to the
subscribers.

Satisfactorily
identified why the
competition
between the 4G
LTE carriers has
been so fierce and
satisfactorily
described the
benefits of this
competition to the
subscribers.

Thoroughly
identified why the
competition
between the 4G
LTE carriers has
been so fierce and
thoroughly
described the
benefits of this
competition to the
subscribers.

Partially concluded
why Verizon is able
to cover more
markets than AT&T.

Satisfactorily
concluded why
Verizon is able to
cover more markets
than AT&T.

Thoroughly
concluded why
Verizon is able to
cover more markets
than AT&T.

5. 3 references
Weight: 5%

No references
provided

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

More than 6 errors


present

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

3-4 errors present

0-2 errors present

2c. Distinguish between


the 4G LTE, 4G WiMax,
and 4G WiBro networks
based on backward
compatibility.
Weight: 5%

2d. Distinguish between


the 4G LTE, 4G WiMax,
and 4G WiBro networks
based on service
availability.
Weight: 5%

3. Identify why the


competition between the
4G LTE carriers has
been so fierce and
describe the benefits of
this competition to the
subscribers.
Weight: 20%

4. Conclude why Verizon


is able to cover more
markets than AT&T.
Weight: 25%

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 14 of 28

CIS 500 Assignments and Rubrics


Assignment 3: Mobile Computing and Social Networking
Due Week 7 and worth 75 points
Mobile computing has dramatically changed how information is accessed and shared. Wireless
networking has been an enabler of mobile computing. One profession that mobile computing has had a
big impact on is health care management. Patients are now able to monitor their vital signs such as blood
pressure, glucose levels, etc. without having to periodically visit a doctors office or hospital. There are
devices such as the Withings Blood Pressure Monitor that works with an iPhone, iPod Touch, or iPad to
record, track, and graph a patients blood pressure. There are other devices that can measure blood
glucose levels, oxygen levels, heart rate, etc. and use an iPhone to send the results to a clinical server.
Doctors and caregivers are then able to access the data on the clinical server.
According to the American College of Gastroenterology, social networking sites like Facebook, Twitter,
and YouTube are used as powerful platforms to deliver and receive health care information. Patients and
caregivers are increasingly going online to connect and share experiences with others with similar
medical issues or concerns Patients are able to take advantage of social networks to do more than just
share pictures and tweets.
Write a four to five (4-5) page paper in which you:
1. Compare and contrast monitoring of patient vital signs using mobile computing technology to inpatient visits to the doctors office or hospital.
2. Analyze the advantages and disadvantages of using mobile computing technology to monitor
patients.
3. Assess the security concerns with regard to the transmission of personal medical information
over wireless networks.
4. Assess the use of social networking for group support for patients with similar medical concerns.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the use of network management, Web, wireless, and mobility technologies.
Outline the strategic implications of information assurance and security in an information
technology environment.
Use technology and information resources to research issues in information systems and
technology.
Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 15 of 28

CIS 500 Assignments and Rubrics


Points: 75
Criteria
1. Compare and contrast
monitoring of patient vital
signs using mobile
computing technology to
in-patient visits to the
doctors office or hospital.
Weight: 20%

2. Identify the
advantages and
disadvantages of using
mobile computing
technology to monitor
patients.
Weight: 20%
3. Assess the security
concerns with regard to
the transmission of
personal medical
information over wireless
networks.
Weight: 25%
4. Assess the use of
social networking for
group support for
patients with similar
medical concerns.
Weight: 20%
5. 3 references
Weight: 5%

6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

Assignment 3: Mobile Computing and Social Networking


Unacceptable
Below 70% F
Did not submit or
incompletely
compared and
contrasted
monitoring of
patient vital signs
using mobile
computing
technology to inpatient visits to the
doctors office or
hospital.
Did not submit or
incompletely
identified the
advantages and
disadvantages of
using mobile
computing
technology to
monitor patients.
Did not submit or
incompletely
assessed the
security concerns
with regard to the
transmission of
personal medical
information over
wireless networks.
Did not submit or
incompletely
assessed the use of
social networking
for group support
for patients with
similar medical
concerns.
No references
provided

More than 6 errors


present

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

Partially compared
and contrasted
monitoring of
patient vital signs
using mobile
computing
technology to inpatient visits to the
doctors office or
hospital.

Satisfactorily
compared and
contrasted
monitoring of
patient vital signs
using mobile
computing
technology to inpatient visits to the
doctors office or
hospital.

Thoroughly
compared and
contrasted
monitoring of
patient vital signs
using mobile
computing
technology to inpatient visits to the
doctors office or
hospital.

Partially identified
the advantages and
disadvantages of
using mobile
computing
technology to
monitor patients.

Satisfactorily
identified the
advantages and
disadvantages of
using mobile
computing
technology to
monitor patients.

Thoroughly
identified the
advantages and
disadvantages of
using mobile
computing
technology to
monitor patients.

Partially assessed
the security
concerns with
regard to the
transmission of
personal medical
information over
wireless networks.

Satisfactorily
assessed the
security concerns
with regard to the
transmission of
personal medical
information over
wireless networks.

Thoroughly
assessed the
security concerns
with regard to the
transmission of
personal medical
information over
wireless networks.

Partially assessed
the use of social
networking for
group support for
patients with similar
medical concerns.

Satisfactorily
assessed the use of
social networking
for group support
for patients with
similar medical
concerns.

Thoroughly
assessed the use of
social networking
for group support
for patients with
similar medical
concerns.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 16 of 28

CIS 500 Assignments and Rubrics


Assignment 4: Data Mining
Due Week 9 and worth 75 points
The development of complex algorithms that can mine mounds of data that have been collected from
people and digital devices have led to the adoption of data mining by most businesses as a means of
understanding their customers better than before. Data mining takes place in retailing and sales, banking,
education, manufacturing and production, health care, insurance, broadcasting, marketing, customer
services, and a number of other areas. The analytical information gathered by data-mining applications
has given some businesses a competitive advantage, an ability to make informed decisions, and better
ways to predict the behavior of customers.
Write a four to five (4-5) page paper in which you:
1. Determine the benefits of data mining to the businesses when employing:
a. Predictive analytics to understand the behavior of customers
b. Associations discovery in products sold to customers
c. Web mining to discover business intelligence from Web customers
d. Clustering to find related customer information
2. Assess the reliability of the data mining algorithms. Decide if they can be trusted and predict the
errors they are likely to produce.
3. Analyze privacy concerns raised by the collection of personal data for mining purposes.
a. Choose and describe three (3) concerns raised by consumers.
b. Decide if each of these concerns is valid and explain your decision for each.
c. Describe how each concern is being allayed.
4. Provide at least three (3) examples where businesses have used predictive analysis to gain a
competitive advantage and evaluate the effectiveness of each businesss strategy.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain how information technology systems influence organizational strategies.


Evaluate the ethical concerns that information technologies raise in a global context.
Outline the challenges and strategies of e-Business and e-Commerce technology.
Use technology and information resources to research issues in information systems and
technology.
Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 17 of 28

CIS 500 Assignments and Rubrics


Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 75

Assignment 4: Data Mining


Unacceptable
Below 70% F

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

1a. Determine the


benefits of data mining to
the businesses when
employing predictive
analytics to understand
the behavior of
customers.
Weight: 5%

Did not submit or


incompletely
determined the
benefits of data
mining to the
businesses when
employing
predictive analytics
to understand the
behavior of
customers.

Partially determined
the benefits of data
mining to the
businesses when
employing
predictive analytics
to understand the
behavior of
customers.

Satisfactorily
determined the
benefits of data
mining to the
businesses when
employing
predictive analytics
to understand the
behavior of
customers.

Thoroughly
determined the
benefits of data
mining to the
businesses when
employing
predictive analytics
to understand the
behavior of
customers.

1b. Determine the


benefits of data mining to
the businesses when
employing associations
discovery in products
sold to customers.
Weight: 5%

Did not submit or


incompletely
determined the
benefits of data
mining to the
businesses when
employing
associations
discovery in
products sold to
customers.
Did not submit or
incompletely
determined the
benefits of data
mining to the
businesses when
employing Web
mining to discover
business
intelligence from
Web customers.
Did not submit or
incompletely
determined the
benefits of data
mining to the
businesses when
employing
clustering to find
related customer
information.
Did not submit or
incompletely
assessed the
reliability of the
data-mining
algorithms. Did not
submit or
incompletely

Partially determined
the benefits of data
mining to the
businesses when
employing
associations
discovery in
products sold to
customers.

Satisfactorily
determined the
benefits of data
mining to the
businesses when
employing
associations
discovery in
products sold to
customers.

Thoroughly
determined the
benefits of data
mining to the
businesses when
employing
associations
discovery in
products sold to
customers.

Partially determined
the benefits of data
mining to the
businesses when
employing Web
mining to discover
business
intelligence from
Web customers.

Satisfactorily
determined the
benefits of data
mining to the
businesses when
employing Web
mining to discover
business
intelligence from
Web customers.

Thoroughly
determined the
benefits of data
mining to the
businesses when
employing Web
mining to discover
business
intelligence from
Web customers.

Partially determined
the benefits of data
mining to the
businesses when
employing
clustering to find
related customer
information.

Satisfactorily
determined the
benefits of data
mining to the
businesses when
employing
clustering to find
related customer
information.

Thoroughly
determined the
benefits of data
mining to the
businesses when
employing
clustering to find
related customer
information.

Partially assessed
the reliability of the
data-mining
algorithms.
Partially decided if
they can be trusted
and partially
predicted the errors

Satisfactorily
assessed the
reliability of the
data-mining
algorithms.
Satisfactorily
decided if they can
be trusted and

Thoroughly
assessed the
reliability of the
data-mining
algorithms.
Thoroughly decided
if they can be
trusted and

Criteria

1c. Determine the


benefits of data mining to
the businesses when
employing Web mining to
discover business
intelligence from Web
customers.
Weight: 5%

1d. Determine the


benefits of data mining to
the businesses when
employing clustering to
find related customer
information.
Weight: 5%

2. Assess the reliability of


the data-mining
algorithms. Decide if they
can be trusted and
predict the errors they
are likely to produce.
Weight: 20%

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 18 of 28

CIS 500 Assignments and Rubrics

3a. Choose and describe


three (3) concerns raised
by the collection of
personal data for mining
purposes.
Weight: 5%
3b. Decide if each of
these concerns is valid
and explain your decision
for each.
Weight: 5%

3c. Describe how each


concern is being allayed.
Weight: 5%
4. Provide at least three
(3) examples where
businesses have used
predictive analysis to
gain a competitive
advantage and evaluate
the effectiveness of each
businesss strategy.
Weight: 30%

5. 3 references
Weight: 5%

6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

decided if they can


be trusted and did
not submit or
incompletely
predicted the errors
they are likely to
produce.
Did not submit or
incompletely chose
and described three
(3) concerns raised
by the collection of
personal data for
mining purposes.
Did not submit or
incompletely
decided if each of
the concerns is
valid and did not
submit or
incompletely
explained your
decision for each.
Did not submit or
incompletely
described how each
concern is being
allayed.
Did not submit or
incompletely
provided at least
three (3) examples
where businesses
have used
predictive analysis
to gain a
competitive
advantage and did
not submit or
incompletely
evaluated the
effectiveness of
each businesss
strategy.
No references
provided

More than 6 errors


present

they are likely to


produce.

satisfactorily
predicted the errors
they are likely to
produce.

thoroughly
predicted the errors
they are likely to
produce.

Partially chose and


described three (3)
concerns raised by
the collection of
personal data for
mining purposes.

Satisfactorily chose
and described three
(3) concerns raised
by the collection of
personal data for
mining purposes.

Thoroughly chose
and described three
(3) concerns raised
by the collection of
personal data for
mining purposes.

Partially decided if
each of the
concerns is valid
and partially
explained your
decision for each.

Satisfactorily
decided if each of
the concerns is
valid and
satisfactorily
explained your
decision for each.

Thoroughly decided
if each of the
concerns is valid
and thoroughly
explained your
decision for each.

Partially described
how each concern
is being allayed.

Satisfactorily
described how each
concern is being
allayed.

Thoroughly
described how each
concern is being
allayed.

Partially provided at
least three (3)
examples where
businesses have
used predictive
analysis to gain a
competitive
advantage and
partially evaluated
the effectiveness of
each businesss
strategy.

Satisfactorily
provided at least
three (3) examples
where businesses
have used
predictive analysis
to gain a
competitive
advantage and
satisfactorily
evaluated the
effectiveness of
each businesss
strategy.

Thoroughly
provided at least
three (3) examples
where businesses
have used
predictive analysis
to gain a
competitive
advantage and
thoroughly
evaluated the
effectiveness of
each businesss
strategy.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 19 of 28

CIS 500 Assignments and Rubrics


Case Study 2: Cloud Computing
Due Week 8 and worth 100 points
Cloud computing is defined by Cearly and Phifer in their case study titled Case Studies in Cloud
Computing as a style of computing in which scalable and elastic IT-related capabilities are provided as
a service to customers using Internet technologies. Cloud computing services had been provided by
major vendors such as Google, Amazon, Microsoft, IBM, Hewlett-Packard, and others for business
computing until recently when Apple Corporation announced iCloud for consumers. Therefore, cloud
computing is now available for businesses as well as consumers.
Read the case study titled, Ericsson, located at http://aws.amazon.com/solutions/case-studies/ericsson/,
about Ericsson cloud computing.
Write a two to four (2-4) page paper in which you:
1. Assess how Ericsson benefitted from Amazon Web Services (AWS) in terms of cost reduction,
automated software updates, remote access, and on-demand availability.
2. Evaluate the scalability, dependability, manageability, and adaptability of Amazon Elastic
Compute Cloud (Amazon EC2), Amazon Simple Storage Services (Amazon S3), and RightScale.
3. Examine the security concerns for cloud-based services and make suggestions to cope with
these concerns.
4. Assess possible scalability, reliability, and cost issues associated with cloud computing, and
make suggestions to overcome each of these issues.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Compare and contrast the strategic and operational use of data management systems.

Outline the strategic implications of information assurance and security in an information


technology environment.

Use technology and information resources to research issues in information systems and
technology.

Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 20 of 28

CIS 500 Assignments and Rubrics


Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 100

Case Study 2: Cloud Computing


Unacceptable
Below 70% F

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

1. Assess how Ericsson


benefitted from AWS in
terms of cost reduction,
automated software
updates, remote access,
and on-demand
availability.
Weight: 20%

Did not submit or


incompletely
assessed how
Ericsson benefitted
from AWS in terms
of cost reduction,
automated software
updates, remote
access, and ondemand availability.

Partially assessed
how Ericsson
benefitted from
AWS in terms of
cost reduction,
automated software
updates, remote
access, and ondemand availability.

Satisfactorily
assessed how
Ericsson benefitted
from AWS in terms
of cost reduction,
automated software
updates, remote
access, and ondemand availability.

Thoroughly
assessed how
Ericsson benefitted
from AWS in terms
of cost reduction,
automated software
updates, remote
access, and ondemand availability.

2. Evaluate the
scalability, dependability,
manageability, and
adaptability of Amazon
Elastic Compute Cloud
(Amazon EC2), Amazon
Simple Storage Services
(Amazon S3), and
RightScale.
Weight: 25%

Did not submit or


incompletely
evaluated the
scalability,
dependability,
manageability, and
adaptability of
Amazon Elastic
Compute Cloud
(Amazon EC2),
Amazon Simple
Storage Services
(Amazon S3), and
RightScale.

Partially evaluated
the scalability,
dependability,
manageability, and
adaptability of
Amazon Elastic
Compute Cloud
(Amazon EC2),
Amazon Simple
Storage Services
(Amazon S3), and
RightScale.

Satisfactorily
evaluated the
scalability,
dependability,
manageability, and
adaptability of
Amazon Elastic
Compute Cloud
(Amazon EC2),
Amazon Simple
Storage Services
(Amazon S3), and
RightScale.

Thoroughly
evaluated the
scalability,
dependability,
manageability, and
adaptability of
Amazon Elastic
Compute Cloud
(Amazon EC2),
Amazon Simple
Storage Services
(Amazon S3), and
RightScale.

3. Examine the security


concerns for cloud-based
services and make
suggestions to cope with
these concerns.
Weight: 20%

Did not submit or


incompletely
examined the
security concerns
for cloud-based
services and did not
submit or
incompletely made
suggestions to cope
with these
concerns.
Did not submit or
incompletely
assessed possible
scalability,
reliability, and cost
issues associated
with cloud
computing, and did
not submit or
incompletely made
suggestions to
overcome each of
these issues.
No references
provided

Partially examined
the security
concerns for cloudbased services and
partially made
suggestions to cope
with these
concerns.

Satisfactorily
examined the
security concerns
for cloud-based
services and
satisfactorily made
suggestions to cope
with these
concerns.

Thoroughly
examined the
security concerns
for cloud-based
services and
thoroughly made
suggestions to cope
with these
concerns.

Partially assessed
possible scalability,
reliability, and cost
issues associated
with cloud
computing, and
partially made
suggestions to
overcome each of
these issues.

Satisfactorily
assessed possible
scalability,
reliability, and cost
issues associated
with cloud
computing, and
satisfactorily made
suggestions to
overcome each of
these issues.

Thoroughly
assessed possible
scalability,
reliability, and cost
issues associated
with cloud
computing, and
thoroughly made
suggestions to
overcome each of
these issues.

Does not meet the


required number of

Meets number of
required references;

Exceeds number of
required references;

Criteria

4. Assess possible
scalability, reliability, and
cost issues associated
with cloud computing,
and make suggestions to
overcome each of these
issues.
Weight: 20%

5. 3 references
Weight: 5%

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 21 of 28

CIS 500 Assignments and Rubrics

6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

More than 6 errors


present

references; some or
all references poor
quality choices.
5-6 errors present

all references high


quality choices.

all references high


quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 22 of 28

CIS 500 Assignments and Rubrics


Term Paper: Mobile Computing and Social Networks
Due Week 10 and worth 200 points
There are thousands of iPhone Apps, iPad Apps, and Android Apps that have been developed to perform
a myriad of tasks and processes. Initially, most of these applications were games intended to be played
on mobile devices. The popularity of these applications led businesses to ponder whether some of their
business process applications that run on desktop platforms and the Web could be redesigned to run on
mobile devices. The answer was a resounding yes!
For example, Nationwide developed the Nationwide Mobile, a free iPhone App that allows its insurance
policyholders to file a claim on the spot when an accident occurs. The application can snap pictures of the
accident and attach them to the claim data and upload the claim information to a server. This reduces the
length of time to process a claim filed this way. Nationwide competitors have followed suit and developed
iPhone, iPad, and Android applications of their own. Policyholders can receive messages via Facebook or
Twitter.
Other business processes that have been reengineered as a result of mobile computing include Quick
Response (QR) codes which have replaced one-dimensional bar codes. They are read using mobile
devices, accepting credit card payments from an iPhone, iPad or Android device, depositing checks using
an iPhone without visiting a bank, and many more.
Write a ten to fifteen (10-15) page term paper in which you:
1. Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation
data and customer data, and quickly upload to a processing server without users having to use a
desktop system.
2. Evaluate benefits realized by consumers because of the ability to gain access to their own data
via mobile applications.
3. Examine the challenges of developing applications that run on mobile devices because of the
small screen size.
4. Describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad,
Windows Phone, or Android.
5. Mobile applications require high availability because end users need to have continuous access
to IT and IS systems. Discuss ways of providing high availability.
6. Mobile devices are subjected to hacking at a higher rate than non-mobile devices. Discuss
methods of making mobile devices more secure.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 23 of 28

CIS 500 Assignments and Rubrics


The specific course learning outcomes associated with this assignment are:

Explain how the components of an information technology system interrelate in an organizational


context.
Describe the use of network management, Web, wireless, and mobility technologies.
Describe and identify the uses of business process management and systems development.
Use technology and information resources to research issues in information systems and
technology.
Write clearly and concisely about topics related to information systems for decision making using
proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 200

Term Paper: Mobile Computing and Social Networks


Unacceptable
Below 70% F

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

1. Assess the
effectiveness and
efficiency mobile-based
applications provide to
capture geolocation data
and customer data, and
quickly upload to a
processing server without
users having to use a
desktop system.
Weight: 15%

Did not submit or


incompletely
assessed the
effectiveness and
efficiency mobilebased applications
provide to capture
geolocation data
and customer data,
and quickly upload
to a processing
server without users
having to use a
desktop system.

Partially assessed
the effectiveness
and efficiency
mobile-based
applications provide
to capture
geolocation data
and customer data,
and quickly upload
to a processing
server without users
having to use a
desktop system.

Satisfactorily
assessed the
effectiveness and
efficiency mobilebased applications
provide to capture
geolocation data
and customer data,
and quickly upload
to a processing
server without users
having to use a
desktop system.

Thoroughly
assessed the
effectiveness and
efficiency mobilebased applications
provide to capture
geolocation data
and customer data,
and quickly upload
to a processing
server without users
having to use a
desktop system.

2. Evaluate benefits
realized by consumers
because of the ability to
gain access to their data
via mobile applications.
Weight: 15%

Did not submit or


incompletely
evaluated benefits
realized by
consumers because
of the ability to gain
access to their data
via mobile
applications.

Partially evaluated
benefits realized by
consumers because
of the ability to gain
access to their data
via mobile
applications.

Satisfactorily
evaluated benefits
realized by
consumers because
of the ability to gain
access to their data
via mobile
applications.

Thoroughly
evaluated benefits
realized by
consumers because
of the ability to gain
access to their data
via mobile
applications.

3. Examine the
challenges of developing
applications that run on
mobile devices because
of the small screen size.
Weight: 10%

Did not submit or


incompletely
examined the
challenges of
developing
applications that run
on mobile devices
because of the
small screen size.
Did not submit or
incompletely
described the
methods that could
be used to decide

Partially examined
the challenges of
developing
applications that run
on mobile devices
because of the
small screen size.

Satisfactorily
examined the
challenges of
developing
applications that run
on mobile devices
because of the
small screen size.

Thoroughly
examined the
challenges of
developing
applications that run
on mobile devices
because of the
small screen size.

Partially described
the methods that
could be used to
decide which
platform to support,

Satisfactorily
described the
methods that could
be used to decide
which platform to

Thoroughly
described the
methods that could
be used to decide
which platform to

Criteria

4. Describe the methods


that can be used to
decide which platform to
support, i.e., iPhone,
iPad, Windows Phone, or

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 24 of 28

CIS 500 Assignments and Rubrics


Android.
Weight: 15%

5. Discuss ways of
providing high
availability.
Weight: 15%
6. Discuss methods of
making mobile devices
more secure.
Weight: 15%
7. 3 references
Weight: 5%

8. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

which platform to
support, i.e.,
iPhone, iPad,
Windows Phone, or
Android.
Did not submit or
incompletely
discussed ways of
providing high
availability.

i.e., iPhone, iPad,


Windows Phone, or
Android.

support, i.e.,
iPhone, iPad,
Windows Phone, or
Android.

support, i.e.,
iPhone, iPad,
Windows Phone, or
Android.

Partially discussed
ways of providing
high availability.

Satisfactorily
discussed ways of
providing high
availability.

Thoroughly
discussed ways of
providing high
availability.

Did not submit or


incompletely
discussed methods
of making mobile
devices more
secure.
No references
provided

Partially discussed
methods of making
mobile devices
more secure.

Satisfactorily
discussed methods
of making mobile
devices more
secure.

Thoroughly
discussed methods
of making mobile
devices more
secure.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

More than 6 errors


present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 25 of 28

CIS 500 Student Notes


Weekly Course Schedule
The purpose of the course schedule is to give you, at a glance, the required preparation, activities, and
evaluation components of your course. For more information about your course, whether on-ground or
online, access your online course shell.
The expectations for a 4.5 credit hour course are for students to spend 13.5 hours in weekly work. This
time estimate includes preparation, activities, and evaluation regardless of the delivery mode.

Instructional Materials
In order to be fully prepared, obtain a copy of the required textbooks and other instructional materials
prior to the first day of class. When available, Strayer University provides a link to the first three (3)
chapters of your textbook(s) in eBook format. Check your online course shell for availability.
Review the online course shell or check with your professor to determine whether Internet-based
assignments and activities are used in this course.
Strayer students are encouraged to purchase their course materials through our designated bookstore
MBS Direct. http://bookstore.mbsdirect.net/strayer.htm If a lab is required for the course, MBS Direct is
the only vendor that sells the correct registration code so that Strayer students may access labs
successfully.

Kaltura Video Sessions


Instructors will record video or screen capture sessions using Kaltura in Weeks 2 and 4. Your instructor
may also provide these sessions on a weekly basis to act as student tutorials on the following applicable
procedures:

Running and navigating the software or labs that will be used in this course

Demonstrating the use of relevant programming languages and tools through screen capture and
live navigation.

Logging into the lab environments and running a sample lab required in this course (if labs are
required)

Demonstrating the downloading and installing of software to a students computer (if necessary)
or using the software already installed in the Strayer University campus labs

Locating or finding files and other student materials that may be required to use in assignments

Submitting assignments in Blackboard

You are strongly advised to use the material provided by faculty in these sessions. Online and Ground
instructors will post the Kaltura video recorded sessions to the Instructor Insights folder within the weekly
tabs of the online course shell (Blackboard).

Study Buddy Wiki


The School of Information Systems and Technology provides Study Buddy Wikis for nine (9) course
categories which include: Homeland Security, Computer Security, Programming, Database Management,
Web Design, Software Engineering, Networking, Capstone, and Infrastructure. You will be provided a
direct link to the courses aligned within your program to post questions, search for answers, add helpful
tips, and to assist other students. You should post to the Study Buddy Wiki board that corresponds to the
course(s) you are currently taking. Assigned faculty will be monitoring to assist as needed.

Discussions
Students taking this course online are required to post their discussions to a weekly thread in the online
course shell. To earn full credit in an online threaded discussion, students must have a total of 3 posts per
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 26 of 28

CIS 500 Student Notes


discussion thread. Additionally, the posts must be made on two different days during the week. Please
note: Material in the online class will be made available on the previous Thursday. As it is always possible
that students could lose their work due to unforeseen circumstances, it is a best practice to routinely save
a working draft in a separate file before posting in the course discussion area.
Professors hold discussions during class time for on-ground students. Check with your professor if any
additional discussion participation is required in the online course shell outside of class hours.

Tests
Tests (quizzes, midterm and final exams, essay exams, lab tests, etc.) are available for student access
and completion through the online course shell. Check the online course shell to determine how you are
expected to take the tests.

Online students are to complete the test by Sunday midnight the week the test is due.

On-ground students are to complete the tests after the material is covered and before the next
class session.

Assignments
A standardized performance grading rubric is a tool your professor will use to evaluate your written
assignments. Review the rubric before submitting assignments that have grading rubrics associated with
them to ensure you have met the performance criteria stated on the rubric.
Grades are based on individual effort. There is no group grading; however, working in groups in the
online or on-ground classroom is acceptable.
Assignments for online students are always submitted through the online course shell. On-ground
professors will inform students on how to submit assignments, whether in paper format or through the
online course shell.

Association for Computing Machinery (ACM) Digital Library


The ACM Digital Library is a complete collection of all of ACMs publications, including ACM journals,
conference proceedings, magazines, newsletters, and multimedia titles. The ACM Digital Library contains
the largest and most complete full-text archive of articles on computing available today, consisting of:
2.0+ Million Pages of full-text articles , 20,000 New full-text articles added each year, 40+ High Impact
Journals , 270+ Conference Proceedings Titles, 9 Magazines (including the flagship Communications of
the ACM), 43 Special Interest Groups contributing content.
You are encouraged to search the ACM Digital Library for full-text articles for your writing assignments
and Term Papers refereed referenced material. For more information on the ACM Digital Library please
watch the video located in the Student Center tab of the online course shell (Blackboard).
To access the ACM Digital Library:
Students:
1.
2.
3.
4.
5.
6.

Login to iCampus: http://icampus.strayer.edu


Click on Student Services
Click on Learning Resource Center
Click on Databases
Scroll down to Information Systems/Computing
Click on ACM Digital Library

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 27 of 28

CIS 500 Student Notes


Resources
The Resource Center navigation button in the online course shell contains helpful links. Strayer University
Library Resources are available here as well as other important information. You should review this area
to find resources and answers to common questions.
Technical support is available for the following:

For technical questions, please contact Strayer Online Technical Support by logging in to your
iCampus account at https://icampus.strayer.edu/login and submitting a case under Student
Center, then Submit Help Ticket. If you are unable to log in to your iCampus account, please
contact Technical Support via phone at (877) 642-2999.

For concerns with your class, please access the Solution Center by logging in to your iCampus
account at https://icampus.strayer.edu/login and submitting a case under Student Center, then
Submit Help Ticket. If you are unable to log in to your iCampus account, please contact the IT
Help Desk at (866) 610-8123 or at mailto:IThelpdesk@Strayer.edu.

TurnItIn.com is an optional online tool to assess the originality of student written work. Check with your
professor for access and use instructions.
The Strayer Policies link on the navigation bar in the online course shell contains academic policies. It is
important that students be aware of these policies.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 500 Student Version 1124 (1156 2/19/2012)
Page 28 of 28

Potrebbero piacerti anche