Sei sulla pagina 1di 18

12/03/2012 Module Descriptor

Code: CED55702-6

Version: 1

Approval Status: Valid Current

Title: ADVANCED DATA MANAGEMENT (D/L) Section: Computing, Engineering & Technology Contact ANDY JONES Pattern Of Delivery Credits 15 3 Total Independent Learning Study Hours Hours 147 150 Description of Pattern of Delivery Pattern 1, study 100% in period 1 Pattern 2, study 100% in period 2 Pattern 3, study 25% in period 1 Pattern 3, study 75% in period 3 E-mail Address A.E.JONES@STAFFS.AC.UK VLE Blackboard Level: 6

Contact Hours

Site STAFFORD Registration Conditions None Module Details Assessment An ASSIGMT length 3000 WORDS weighted at 70%. A PORTFOLIO Module Version Condition Text

Details

weighted at 30%. 100% in-course assessment Assignment weighted at 70%. (Learning outcomes 1, 2 and 3). In course assessment, 3000 words written proposal for the administration of a given database environment case study. A portfolio weighted at 30% (learning outcomes 1 to 4). A variety of tasks will be undertaken which can be built up into an on-line portfolio.

Indicative Content

The module aims to develop a critical awareness the various factors involved in the management of database environments. The module will include the following topics: - Database administration and data management - Database architecture and its effect on database administration - Data definition and manipulation using SQL - Data dictionaries and their use to a DBA - Log and diagnostic files - Database transactions and performance tuning - Data recovery - Storage structures and table management - Distributed databases and their management - Decision support systems, OLAP data mining and date warehouses - Object-oriented and object-relational databases - Database connectivity and web databases - Emerging database technologies Directed learning supported by one-to-one contact with academics to encourage the students' knowledge, critical thinking and their application of the knowledge being learned. On-line materials will highlight topical issues and best practice case studies. Course content and exercises will be presented on Blackboard. Delivery content will be supported by the use of on-line educational video clips and case study scenarios. Formative feedback, by e-mail, will be given in response to regular exercises. The practical nature of the module is emphasised by the provision of practical portfolio tasks and an assignment which reflect all the elements of the module. Every business today makes use of various collections of data. The efficient and effective management and control of these databases is vital to the efficient running of the business. The module's overall focus is to study alternative strategies available to the database administrator to carry out his or her various duties. Theoretical and contextual topics will be presented in the teaching material. You will be expected to carry out academic research to complement the subject matter. In addition you will be provided with practical exercises to enable you to see how the theories are put into practice.

Learning Strategies

Prospectus Information

Resources

Library resources

Module website via Blackboard VLE Access to Internet Various DBMS environments such as Microsoft Access and MySQL Windows Virtual PC

Special Admissions Requirements

None.

Rob, P., Coronel, C. and Crockett, K. Database Systems. Design Implementation and Management, Course Technology Cengage Learning, 2008, ISBN: 978-1-84480-732-1 Connolly, T. and Begg, C., Database Systems. A practical Approach to Design, Implementation and Management (fifth edition), Addison Wesley, 2010, ISBN: 978-0-321-52306-8 Mullins Craig S., 2002, Database Administration: The Complete Guide to Practices and Procedures, ISBN-13: 978-0-201-74129-2, Addison-Wesley Professional. (available as an e-book)

Texts

Learning Outcome 1. EXPLAIN AND CRITICALLY EVALUATE CONTEMPORARY DATABASE ARCHITECTURES AND DATABASE MANAGEMENT ISSUES. Analysis Knowledge & Understanding 2. EVALUATE VARIOUS TOOLS, TECHNIQUES AND METHODS FOR THE EFFICIENT AND EFFECTIVE USE OF DATABASES. 3. DEMONSTRATE A CRITICAL AWARENESS OF THE TASK OF MANAGING A DATABASE SYSTEM AND BE ABLE TO MAKE JUDGEMENTS ON THE MANNER OF THE ORGANISATION OF THE DATA. 4. DISCUSS THE PROJECTED FUTURE DIRECTIONS OF DATABASE TECHNOLOGY IN TERMS OF DESIGN, HARDWARE AND SOFTWARE IMPLEMENTATIONS. Application

Analysis

Knowledge & Understanding Learning

12/03/2012 Module Descriptor

Code: CED55015-6

Version: 1

Approval Status: Valid Current

Title: CONCEPTS IN INFORMATION SYSTEMS SECURITY (D/L) Section: Computing, Engineering & Technology Contact CONSOLEE MBARUSHIMANA Pattern Of Delivery Credits 15 3 Total Independent Learning Study Hours Hours 147 150 Description of Pattern of Delivery Pattern 1, study 100% in period 1 Pattern 2, study 100% in period 2 Pattern 3, study 25% in period 1 Pattern 3, study 75% in period 3 E-mail Address C.MBARUSHIMANA@STAFFS.AC.UK VLE Blackboard Level: 6

Contact Hours

Site STOKE Registration Conditions None Module Details Assessment An ASSIGMT length 3000 WORDS weighted at 70%. A PORTFOLIO Module Version Condition Text

Details

weighted at 30%. 100% in course assessment. Assignment weighted at 70%. (Learning outcomes 2, 3 and 4). In course assessment, 3000 words written proposal for a security policy for an information systems scenario. A portfolio weighted at 30% (learning outcomes 1 to 4). A variety of tasks will be undertaken which can be built up into an on-line portfolio.

Indicative Content

The module aims to develop a critical awareness of the current state of information systems security, IS threats, security technologies, security architectures and legal policies. The module content will include the following topics: - Information Security Principles - Threats to, and Vulnerabilities of information systems - Risk Management - Information Security Management - Policy, Standards and Procedures - Legal Framework - Human and organisational contexts to security - Security Architecture and Design - Information Security Controls o Protection from Malicious Software o Access Controls o Telecommunications and Networks Security o Role of Cryptography o Application Development Security o Physical and Environmental Security - Disaster Recovery and Business Continuity Management

Learning Strategies

On-line materials and exercises will be provided on Blackboard. They will exemplify topical issues and best practice case studies. Delivery content will be supported by the use of on-line educational video clips and audio podcasts. The practical nature of the module will be emphasised by the provision of practical portfolio tasks and an assignment which reflects all the elements of the module, an information security policy will be developed. The discusion board will be used to discuss current topics in information security, encourage cognitive and exploratory learning, critical thinking skills, and student-to-student communication. Formative feedback, by email, will be given i response to regular exercises. This module will provide the students with: - An in-depth knowledge of the concepts relating to information security management - An overview of legislation and regulations which impact upon information security management - An awareness of current national and international standards, frameworks and organisations which facilitate the management of information security,

Prospectus Information

- An in-depth knowledge of security technologies available to implement a security solution within information services environments.

Resources

Library resources Module website via Blackboard VLE Access to Internet

Special Admissions Requirements

None.

Vacca, R.J, Computer and Information Security Handbook, Morgan Kaufmann, 2009, ISBN: 9780123743541 (available as an e-book) Taylor, A. (ed), Information Security Management Principles: An ISEB Certificate, BCS, 2008, ISBN: 9781902505909 Texts Solomon, M.G., Chapple, M., Information Security Illuminated, Jones and Bartlett, 2005, ISBN:0-7637-2677X International Information Systems Security (ISC)2, http://www.isc2.org (CISSP Certification).

Learning Outcome 1. DEMONSTRATE A KNOWLEDGE AND UNDERSTANDING OF INFORMATION SECURITY PRINCIPLES. 2. CRITICALLY ANALYSE THE THREATS TO MODERN INFORMATION SYSTEMS. Knowledge & Understanding Analysis

3. IMPLEMENT AN INTEGRATED SECURITY POLICY COMPLYING WITH THE Application LATEST REGULATORY FRAMEWORKS AND APPROPRIATE BUSINESS OBJECTIVES. 4. CRITICALLY EVALUATE THE CHARACTERISTICS, CATEGORISATION, OPERATION AND EFFECTIVENESS OF VARIOUS CONTROLS USED IN EXEMPLAR SECURITY INFORMATION SERVICES. Knowledge & Understanding Learning

12/03/2012 Module Descriptor

Code: CED55501-6

Version: 1

Approval Status: Valid Current

Title: APPLIED RESEARCH & PROPOSAL (D/L) Section: Computing, Engineering & Technology Contact LESLEY DRUMM Pattern Of Delivery Credits 15 3 Total Independent Learning Study Hours Hours 147 150 Description of Pattern of Delivery Pattern 1, study 100% in period 1 Pattern 2, study 100% in period 2 Pattern 3, study 25% in period 1 Pattern 3, study 75% in period 3 E-mail Address L.E.DRUMM@STAFFS.AC.UK VLE Blackboard Level: 6

Contact Hours

Site STOKE Registration Conditions None Module Details Assessment A COURSEWORK weighted at 100%. Module Version Condition Text

Details 100% coursework including a number of deliverables (Learning outcomes 1-4): A portfolio of submissions leading to: - A review paper of literature and background investigation of the research project (guide approx. 2,500 words). - Dissertation project proposal, which states the research programme and reflects the understanding of the research problem in its context, methods to be adopted in the project and ethical implications (guide approx. 2,000 words). - A project plan for the dissertation project. - Presentation of the proposed research area. (Approx. 8 minutes)

Methods and skills of literature research, gathering of data from a range of sources, selecting and using appropriate technologies available (e.g. library, digital library, Internet facilities and other sources). Techniques required to analyse data and to present the results in a suitable format. Indicative Content Refined skills in project planning, organisation of study materials, presentation and dissemination of research, research proposal specification, techniques of research report writing. Research proposal specification, regulations and supervisors role. A student will demonstrate a wide range of professional and IT skills such as producing technical documents, research papers and project proposals and plans.

Learning Strategies

Directed learning supported by one-to-one contact with academics to encourage the students' knowledge, critical thinking, reflection and their application of the knowledge being learned. On-line materials will highlight subject related issues and link to recent advances in the industry. Course content and exercises will be presented on Blackboard. Delivery content will be supported by the use of on-line educational video clips and related internet material. Formative feedback, by email and the virtual learning environment will be given in response to regular exercises. Provisional grades and feedback will be made available by e-mail and/or the virtual learning anvironment as appropriate. By studying the module the student will be introduced to research and the required skills needed to undertake an honours dissertation. The student will produce a detailed proposal, a detailed literature review and deliver a presentation on their intended dissertation subject.

Prospectus Information

Transferable skills will assist the student in their future careers and for further postgraduate study. These include developing skills to enable individuals to sell themselves through the development of personal presentation skills, conducting interviews to assist in research, and producing technical reports.

Resources

PC with Office, MS Project A statistical package, such as Excel (or SPSS) Access to the Internet Library

Special Admissions Requirements

None.

Texts

Hunt, Anthony (2005) Your research project: how to manage it. Routledge (available as e-book) Weaver, Philip (2004) Success in your project: a guide to student system development projects. Prentice Hall (available as e-book)

Learning Outcome 1. USE A WIDE RANGE OF IT TO APPROPRIATELY PLAN A PROJECT AND EFFECTIVELY COMMUNICATE AIMS AND OBJECTIVES - FOR EXAMPLE PROJECT MANAGEMENT AND PRESENTATION SOFTWARE. 2. USE TECHNICAL AND EDUCATIONAL RESOURCES EFFECTIVELY AND APPLY DIFFERENT APPROACHES TO THE COLLECTION OF DATA AND INFORMATION. 3. PRODUCE TECHNICAL PRESENTATIONS AND DOCUMENTATION TO PROFESSIONAL STANDARD. 4. DEMONSTRATE A CRITICAL AND PRACTICAL UNDERSTANDING OF THE METHODS EMPLOYED IN RESEARCH AND AN AWARENESS OF ETHICAL AND ACCESS ISSUES RELATED TO RESEARCH AND INDUSTRIAL COLLABORATION BOTH IN TERMS OF DATA COLLECTION AND UTILISATION OF DATA. Problem Solving

Enquiry

Application

Reflection

12/03/2012 Module Descriptor

Code: CED55502-6

Version: 1

Approval Status: Valid Current

Title: PERSPECTIVES IN IS SYSTEMS ANALYSIS AND DESIGN (D/L) Section: Computing, Engineering & Technology Contact JONATHAN WESTLAKE Pattern Of Delivery Credits 15 3 Total Independent Learning Study Hours Hours 147 150 Description of Pattern of Delivery Pattern 1, study 100% in period 1 Pattern 2, study 100% in period 2 Pattern 3, study 25% in period 1 Pattern 3, study 75% in period 3 E-mail Address J.C.WESTLAKE@STAFFS.AC.UK VLE Blackboard Level: 6

Contact Hours

Site STOKE Registration Conditions None Module Details Assessment An ASSIGMT length 3000 WORDS weighted at 70%. A PORTFOLIO Module Version Condition Text

Details

weighted at 30%. 100% in course assessment. Assignment weighted at 70% (Final). (Learning outcome 3). In course assessment, 3000 words written design proposal of an individual analysis of suitable business scenarios through the use of specified object oriented analysis and design techniques. Learning Outcome 3. A portfolio weighted at 30% (learning outcomes 1, 2). A variety of tasks will be undertaken which can be built up into an on-line portfolio. Short tests administered through Blackboard will be used where appropriate.

Indicative Content

This module enables students to make a critical appraisal of business systems analysis and design structured and agile methodologies including the use of unified modelling language (UML) and the business process modelling notation standard (BPMN). The application of UML and BPMN to a business problem via Use cases, Class diagrams, State diagrams, Object sequence diagrams and business process diagrams will complete the perspective of the latest techniques in this area of business computing.

Learning Strategies

Directed learning supported by one to one contact with academics to encourage the student knowledge, critical thinking, and their application of that knowledge being learned. On-line materials will highlight topical issues and best practice case studies. Course content and exercises will be presented on Blackboard. The practical nature of the module is emphasised by delivery content supported by the use of on-line educational video clips and case study scenarios. Formative feedback, by email, will be given in response to regular exercises. The complexity of everyday business processes require the application of disciplined development methods for the software applications which are needed to support them. This module will examine several systems and analysis methodologies and show you how to select a suitable one. It will also highlight the ways in which software tools can help you and show you how to critically assess them. These topics will be set against the background of some of the software development industry's needs such as speedy development timescales, ever-changing requirements, and continually evolving technologies. Also within this module you will apply object oriented principles and methods using Unified Modelling Language (UML) to underpin your study.

Prospectus Information

Resources

Online Library resources Module website via Blackboard VLE Access to Internet Argo UML tool http://argouml.tigris.org/ Business Process Modelling Notation http://www.bpmn.org/

Special Admissions Requirements

None.

e-book available via Staffordshire University ebrary service. Systems Analysis and Design : Techniques, Methodologies, Approaches, and Architectures Chiang, Roger Siau, Keng Hardgrave, Bill C. Publisher: M.E. Sharpe, Inc. 2009 eISBN: 9780765623768 Avison and Fitzgerald, Information Systems Development: Methodologies, Techniques and Tools, 4th Edition, McGraw-Hill (2006). ISBN 0-077114175 BENNETT, McROBB and FARMER (4th Edition), Object Oriented Systems and Design using UML, McGraw Hill (2010) ISBN 0-070712536-3 Applied Data Communications - A Business-Oriented Approach. 4th Edition, Goldman and Rawles, Wiley, 2006, ISBN: 0-471-45177-0

Texts

Learning Outcome 1. EVALUATE FACTORS AFFECTING THE CHOICE OF A SYSTEMS ANALYSIS AND DESIGN METHODOLOGY. Knowledge & Understanding Problem Solving 2. CRITICALLY ASSESS A RANGE OF SPECIFIC METHODOLOGIES (FOR EXAMPLE FROM STRUCTURED, OBJECT ORIENTED, SOFT SYSTEMS, PROTOTYPING AND AGILE). 3. ANALYSE AND DESIGN IN AN OBJECT ORIENTED ENVIRONMENT USING THE UML (UNIFIED MODELLING LANGUAGE). Analysis

Analysis Application

12/03/2012 Module Descriptor

Code: CED55802-6

Version: 1

Approval Status:

Valid Current

Title:

MANAGEMENT OF INFORMATION SYSTEMS AUDIT AND INTERNAL CONTROL (D/L) Level: 6 VLE Blackboard

Section: Computing, Engineering & Technology Contact PHIL MICKLEBURGH Pattern Of Delivery Credits 15 3 Total Independent Learning Study Hours Hours 147 150 E-mail Address P.G.MICKLEBURGH@STAFFS.AC.UK

Contact Hours

Description of Pattern of Delivery Pattern 1, study 100% in period 1 Pattern 2, study 100% in period 2 Pattern 3, study 25% in period 1 Pattern 3, study 75% in period 3

Site STOKE Registration Conditions None Module Details Module Version Condition Text

An ASSIGMT length 3000 WORDS weighted at 100%. A written assignment weighted at 100% (learning outcomes 1, 2, 3 and 4) Assessment Details Assignment of 3000 words in length. Sumative assessment will be based on individuals demonstrating their understanding of the application of computing audit techniques to a case study. Information Systems (IS) are at the heart of every organisation and many modern businesses would simply stop and fail without them. The application of IS audit and internal control techniques have become the backbone, for many organisations, of successful management controls strategy. During the module, students will be introduced to concepts of: the role of the IS auditor, the audit plan, audit methodology, the audit process, computer-assisted audit tools and techniques, the management of IS audits, and compliance with governance standards, regulations and legislation. We will also explore why data integrity, reliability and validity are important, and how controls can be used to maintain IS quality. We will consider how computer audit can help protect organisations against computer fraud and cyber-crime using the application of a risk oriented approach to audit. Students will study today's IS audit environment and how far audit techniques have come. How the lack of strong internal audit control techniques may have contributed to financial disasters, for example, Enron and Worldcom.

Indicative Content

Learning Strategies

Directed learning supported by one to one contact with academics to encourage the student knowledge, critical thinking and their application of that knowledge being learned. On-line materials will highlight topical issues and best practice case studies. Course content and exercises will be presented on Blackboard. Delivery content will be supported by the use of on-line educational video clips and case study scenarios. Formative feedback, by e- mail, will be given in response to regular exercises. Information Systems (IS) are at the heart of every organisation and many modern businesses would simply stop and fail without them. The application of IS audit and internal control techniques have become the backbone, for many organisations, of successful management controls strategy. During the module, students will be introduced to the concept of risk and the application of a risk oriented approach to audit. You will study today's Information Systems audit environment and how far audit techniques have come. How the lack of strong internal audit control techniques may have contributed to financial disasters, for example, Enron and Worldcom.

Prospectus Information

Resources Special Admissions Requirements

Internet, webcam, Skype, e-Library Resources, Text books as necessary

None.

Title: Information Technology Control and Audit, Authors: Sandra Senft and Frederick Gallegos, Publisher: CRC Press, Year: 2009, 3rd Edition, ISBN: 978-1-4200-2742 Title: Under Control: Governance across the Enterprise (Available as an ebook), Author: Jacob Lamm, Publisher: Apress, Year: 2009, Web ISBN: 14302-1592-5 Title: Stepping Through the IS Audit, 4th Edition, Authors: J.L. Bayuk, Publisher: ISACA, Year: 2004, ISBN: 978-1893209770

Texts

Learning Outcome 1. DEMONSTRATE A SYSTEMATIC KNOWLEDGE AND UNDERSTANDING OF INFORMATION SYSTEMS AUDIT AND INTERNAL CONTROL PROCEDURES, TECHNIQUES AND ISSUES. 2. COMMUNICATE THE IMPORTANCE OF THE NEED FOR THE PROTECTION OF INFORMATION ASSETS. 3. IDENTIFY INFORMATION SYSTEMS RISKS AND RECOMMEND APPROPRIATE CONTROLS TO MITIGATE THOSE RISKS. Knowledge & Understanding

Communication

Analysis Problem Solving

4. CRITICALLY EVALUTE AND REFLECT UPON THE LEGAL, PROFESSIONAL AND ETHICAL ISSUES OF INFORMATION SYSTEMS AUDIT AND AUDITORS.

Analysis Reflection

12/03/2012 Module Descriptor

Code: CED55022-6 Title: WORK BASED IS PROJECT (D/L)

Version: 1

Approval Status: Valid Current

Section: Computing, Engineering & Technology Contact ANDY JONES Pattern Of Delivery Credits 45 9 Total Independent Learning Study Hours Hours 441 450 E-mail Address A.E.JONES@STAFFS.AC.UK VLE Blackboard

Level: 6

Contact Hours

Description of Pattern of Delivery Pattern 1, study 100% in period 1 Pattern 2, study 100% in period 2 Pattern 3, study 25% in period 1 Pattern 3, study 75% in period 3

Site STOKE Registration Conditions None Module Details Assessment A COURSEWORK length 10000 WORDS weighted at 100%. Module Version Condition Text

Details 100% coursework assessing all learning outcomes: Project proposal 10% Project Report (10,000 words or equivalent) (Learning outcomes 1 to 5) 90%

Indicative Content

The module gives students the opportunity to develop their IT skills, knowledge and concepts in the context of a real IT/IS scenario. The project will be industry based, being delivered from the student's place of employment. Projects should: - Have a technology context - Involve elements of work which are not part of the student's normal employment duties - Involve project management, evaluation and communication Subject to these requirements, projects will be of great variety but will typically include at least one of the following: - Implementation of an IS system, involving hardware and/or software - New and/or modified usage of existing equipment or systems - Review and evaluation of a specified technology practice or system - Commissioning a piece of software or business process and instructing others in its usage

Learning Strategies

Students will carry out a project identified through their project proposal which will need to be agreed by the project supervisor. The student will be advised to keep a logbook, which will encourage them to reflect on the problems they are meeting, and the ways in which they are solving them. They will need to prepare for and conduct businesslike telephone / e-mail / webcam meetings with their supervisor and to communicate clearly and effectively with him or her. An important part of the learning will take place during this direct discussion with the supervisor. The independent learning for this module will include organisation of literature, searching using both library catalogue facilities and Internet searching techniques. Students will conduct other types of research, such as user interviewing and requirements elicitation, as necessary. The project aims to provide an opportunity for you to undertake a significant project that integrates aspects of modules studied as part of your award and relate it to your place of work. This will involve the development of the project together with accompanying documentation. There should also be a report on the process that went into the project development, including a review of current literature and research, a critical appraisal of the methods used, discussion of alternative strategies and a conclusion. Library resources Module website via Blackboard VLE Access to Internet Other resources as appropriate to the project

Prospectus Information

Resources

Special Admissions Requirements

None.

Texts

Dawson, Projects in Computing and IS 2009 2nd Ed. Addison-Wesley ISBN 9780273721314 Schwalbe, IT Project Management 6th Ed. 2010 Cengage learning ISBN 11112217558 Available as e-books: Hunt, Anthony, 2005, Your Research Project: How to manage it. Routledge, ISBN: ISBN: 9780203430491 (e-book). Weaver, Philip, 2004, Success in your project: a guide to student system development projects, ISBN: 9781405870955 Prentice Hall (available as an e-book).

Learning Outcome 1. IDENTIFY, INVESTIGATE AND DOCUMENT A PROBLEM CONSIDERING THE CONTEXT, DOMAIN AND TECHNICAL ASPECTS USING TECHNIQUES SUCH AS LITERATURE SEARCHES, WEB BASED RESEARCH AND DATA GATHERING AND STATISTICAL ANALYSIS. Analysis Application Enquiry 2. SCOPE, DEFINE, SPECIFY AND PLAN THE PROJECT USING PRACTICAL PROJECT MANAGEMENT SKILLS. 3. CHOOSE AN APPROPRIATE IMPLEMENTATION OR PROBLEM-SOLVING METHOD AND USE IT TO DEVELOP THE RESEARCH INTO AN EFFECTIVE SOLUTION. 4. USE A VARIETY OF METHODS TO COMMUNICATE DIFFERENT ASPECTS OF THE PROJECT (E.G. METHODOLOGY, RESULTS AND RECOMMENDATIONS). 5. CRITICALLY ANALYSE AND EVALUATE THE WORK UNDERTAKEN. Knowledge & Understanding Problem Solving

Communication

Reflection

Potrebbero piacerti anche