Sei sulla pagina 1di 5


Name of Course/ Module Management of Technology

2. Course Code COM 573
3. Name(s) of academic staf
4. Rationale for the inclusion of the Major
course/ module in the
5. Semester and Year ofered Semester 2
6. Total Student Face to Face Total Guided and
Learning Time Independent Learning
L = Lecture L T P O
T = Tutorial 120 Hours
P = Practical 42 78 Hours
O = Others Hours
8. Credit Value 3 credits
9. Prerequisite (if any) Nil

10. Objectives This unit equips students with a sound

knowledge on the management of information
technology, e-business and associated
technologies that is important from a
managerial point of view.
11. Learning outcomes Upon the completion of this unit, students will
be able
 To demonstrate knowledge and
understanding of the need for efective
managerial technology.
 To identify and manage technology
infrastructure within an organization
 To identify and develop strategies to
overcome challenges that a manager face in
managing the successful development and
use of information technology
 To develop, IT management plans for their
 To develop plans for the utilization of
emerging technologies and challenges
 To apply legislations and professional
conduct governing information technology
management in organizations.

12. Transferable Skills: Skills and how Managerial skills, planning skills,
they are develop and assessed, communication skills
Project and practical experience
and Internship
13. Teaching-learning and Lecture integral part of the module and is
assessment strategy designed to reinforce the materials introduce in
the lecture by working through additional
example where appropriate (past year exam
and tutorial questions)
14. Synopsis The module examines topics such as new and
emerging technology, management control of
IT, developing a technology management plan,
data protection act, using information
technology as a strategic resource among other
related topics.
15. Mode of Delivery Lecture, Lecture
Tutorial, Workshop, Seminar, etc.

16. Assessment Methods and Types Individual Assignment 10%

Group Assignment 20%
Mid- term Examination 30%
Final Examination 40%
17. Mapping of the course/ module to X Knowledge
the Programme Learning X Practical Skills
Outcome Social Skills and Responsibilities
Communication, Leadership and Team
Scientific Methods, Criteria Thinking and
Problem Solving
Lifelong Learning and Information
Management Skills
X Entrepreneurship and Managerial Skills
Ethics, Professionalism and Humanities
25. Content outline of the Attachment A
course/module and the SLT per
26. Main reference supporting the Management Information Systems:
course Managing the Digital Firm (14th
by Kenneth C. Laudon (Author), Jane P.
Laudon (Author), 672 pages,
Pearson; 14 edition (January 15, 2015),
ISBN-13: 978-0133898163

New JIT, New Management Technology Principle,

Kakuro Amasaka
December 3, 2014 by Productivity Press
Reference - 490 Pages - 243 B/W Illustrations
ISBN 9781466575028 - CAT# K16672
Additional reference supporting Introduction to Information Systems,
the course James O'Brien, George Marakas
15th Edition, 2009
ISBN-13: 978-0073376776

Management Information Systems

Kenneth C. Laudon and Carol Traver
12th Edition, 2011
Prentice Hall
ISBN-13: 978-0132142854

Management Information Systems

Ken Laudon and Jane Laudon
12th Edition, 2011
Prentice Hall
ISBN-13: 978-0136078463

Management Information Systems

Efy Oz
6th edition, 2008
Course Technology
ISBN-13: 978-1418835972
Attachment A


WEEK 1 Understanding the systems theories
Control systems
 Nature of computing systems
 Definition of information
 Value of information
 Technology and managers
WEEK 2 Developing a technology management plan
 Identifying organizational needs
 Identifying user needs
 Information gathering processes
 Involvement of users when developing a
technology management plan
WEEK 3 Systems design methodologies
Principle models
 Large scale technology design models
 Systems analysis and understanding the
organizational technology needs
 Performing a technology mapping exercise
WEEK 4 Data protection act
Computer ethics
 Current rules and regulations
 Computers used in social context 3
 Legal and moral issues
 Workplace monitoring
 The outdated understanding of computer ethics
WEEK 5 Systems Development Life Cycles 3
 Understanding what is a system
 Components of a system
 Various of SDLCs
 Importance of using a SDLC
 Waterfall SDLC
 Strengths and limitations
 Prototype SDLC
 Strengths and limitations

WEEK 6 Understanding Computer Systems concepts and

& methods
Week 7  Frameworks for information technology
 Decision-oriented frameworks
 A synthesized framework
 Adding organizational and decisions to a 6
 A framework for technology management
 Changing technology and applications
 Processing transactions

WEEK 8 Legislative and Industry Trends

 The Semiconductor Industry
 The Computer Industry
 The Information Infrastructure
 Regulating Telecommunication Services 3
 Industry Transformations
 Local and Long-Distance Considerations
 Cellular and Wireless Operators

WEEK 9 Managing Applications Portfolios

 Application Program Resources
 Depreciation and Obsolescence
 Maintenance and Enhancement
 The Programming Backlog 3
 The Need to Prioritize
 The High Cost of Enhancement
 Trends in Resource Expenditures
 Typical Ad Hoc Processes
WEEK 10 Managing Application Development
 The Challenge of Application Development
 Application Project Management
 Business Case Development
 The Phase Review Process 3
 Resource Allocation and Control
 Risk Analysis
 Programming Process Improvements
 Successful Application Management
WEEK 11 Development and Acquisition Alternatives 3
 Advances in Programming Tools and Techniques
 Subcontract Development
 Purchased Applications
 E-Business Alternatives

WEEK 12 Managing E-Business Applications

&  Developing and Using Intranets and Extranets
WEEK 13  Implementing E-Business Systems
 Management Issues
 Managing Computer and Data Resources 6
 Problem Management
 Change Management
 Recovery Management

WEEK 14 IT Controls, Assets Protection and Security

 Business Control Principles
 Control Responsibilities
 Application Controls
 Network Controls and Security
 Additional Control and Protection Measures
 Controls for E-Business Applications
 The Keys to Efective Control
Total 42