Sei sulla pagina 1di 4

Course No.

FE 1
Subject Title: MANAGEMENT OF INFORMATION SYSTEM
Credit Unit: 3
Credit Hours: 50
Lecture Hours: 3hr/week
Lab Hours: None
Prerequisite: None
Instructor: Julie Ann C. Sanchez
Bachelor of Science in Computer Science (AMA Computer University, Tarlac City)
Master of Arts in Education Management (PCLU, Agoo La Union (12 Units)
Master in Information Technology (DMMMSU MLC, San Fernando, La Union )

Course Description: The course introduces the theoretical and conceptual framework of information system management and administration. The
student will become acquainted with different information systems and their management, as well as with methods, computer supported strategic information
and the implementation of information system in a firm.

Vision: Graduate with superior knowledge, skills and attitude who are effective and globally competitive professionals.

Mission: The Polytechnic College of La Union, a non stock non profit college, shall develop a strong and innovative human resource base who demonstrate
step value and personal discipline via the use
of information technology in response to the regional national goal.

Course Objectives: At the end of the course, the student is expected to be familiar with the management and administration of information systems in an
organization. Specifically, the student should be able to:
1. Discuss how to implement and maintain an information system.
2. Enumerate and discuss systems performance criteria.
3. Understand the issues and problems in systems evaluation.
4. Discuss the implications of security and project planning.
5. Identify the main threats to the security of a system.
LEARNING OBJECTIVES TOPIC/ SUBJECT MATTER TEACHING LEARNING TIME ALLOTMENT MATERIALS/ RESOURCES EVALUATION
STRATEGIES TECHNIQUES

System implementation To be able to know the Lecture 12hrs Lectures with visual aids Exercises
strategies concept of system Discussion Recitation
implementation and Assignment Quizzes
Hardware and software Research Exam
identifying maintenance
acquisition provider and types of
software maintenance.

Installation Lecture 12hrs Lectures with visual aids Exercises


Discussion Recitation
Maintenance Assignment Quizzes
Research Exam

Evaluation in the To introduce to the Lecture 12hrs Lectures with visual aids Exercises
management process students the evaluation in Discussion Recitation
the management process, Assignment Quizzes
Framework of a Research Exam
differences in criteria and
system’s evaluation perception, system
System’s performance quality, cost-benefit
criteria evaluation, optimality and
the evaluation process.

Alternative evaluation Lecture 12hrs Lectures with visual aids Exercises


perspective Discussion Recitation
Assignment Quizzes
The optimum system Research Exam

Issues and problems

Control and Security Discuss the importance of Lecture 12hrs Lectures with visual aids Exercises
Issues control and security Discussion Recitation
issues in an organization. Assignment Quizzes
Security in Research Exam
Different key concepts
contemporary society and issues: disaster,
Basic Definitions fraud, privacy,
vulnerability, threats,
Key concepts and Issues risks and protection.

Security and project Discuss security and Lecture 12hrs Lectures with visual aids Exercises
planning protection; phases in the Discussion Recitation
implementation Software Development Assignment Quizzes
Research Exam
Life Cycle.
Security in the SDLC

Complexity in system
design

Intellectual property
rights I software

Threats to Security Explain the different Lecture 12hrs Lectures with visual aids Exercises
threats to software Discussion Recitation
Main threats to security security. Assignment Quizzes
Research Exam
Physical threats

People and security

Planning considerations

The problem of
equipment theft

Physical attack and


industrial espionage

Data Security Discussion on data Lecture 12hrs Lectures with visual aids Exercises
security, the different Discussion Recitation
Introduction to data access control and Assignment Quizzes
security Research Exam
methods on software
Logical access system protection.

Control of Flow

Inference controls

Encryption

Hacking
Electronic
Eavesdropping

Security Design and List the different security Lecture 12hrs Lectures with visual aids Exercises
Operation designs and operations, Discussion Recitation
support systems and Assignment Quizzes
Internal data control Research Exam
network security, and
Support systems and different methodologies
networks used in security.

Micro security systems

Methods of fraud

Auditing steps

Detecting methodology
conclusions

References:
1. Information Systems in Business, Bob Ritchie, David Marshall and Alan Eardley (1998)

Potrebbero piacerti anche