Beruflich Dokumente
Kultur Dokumente
Credit:
301-938-3098ell
ACCT Phone:
Magal, S. R., & Word, J. (2011).Integrated business processes with ERP systems.
Hoboken, NJ: John Wiley & Sons, Inc.
Mulholland, A., Pyke, J., &Fingar, P. (2010).Enterprise cloud computing: a strategy
guide for business and technology leaders. Tampa, Florida: Meghan-Kiffer Press.
Page 1 of 13
Page 2 of 13
Reading(s)
o Chapter 1: Information Systems in the 2010s
e-Activity
o Businesses have used barcodes to store product and
price information on product tags readable via
specialized scanners. Quick Response (QR) tags are the
latest technology for storing and publishing product
information readable using smartphones. There are no
specialized scanners required to read QR codes. Visit the
Website, located at http://www.qrstuff.com/, to generate
a QR code. Follow these instructions and be prepared to
discuss:
Under the Data Type column (column 1), click on
the Email Address radio button.
Under the Content column (column 2), type your
email address in the textbox.
Notice the generated QR code in the QR code
Preview window.
Download the image to your local machine.
Activities
Discussions
Evaluation
Poin
ts
None
Preparation
Page 3 of 13
Reading(s)
o Chapter 2: IT Infrastructure and Support Systems
e-Activity
o Research the Internet for an article that describes how
an industry of your choice is using Radio Frequency
Identification (RFID) technology. Examine the uses,
advantages, and disadvantages of RFID technology. Be
prepared to discuss.
10
10
Discussions
Evaluation
75
Preparation
Reading(s)
o Chapter 3: Data, Text and Document Management
o Chapter 4: Network Management and Mobility
e-Activity
o Visit the AT&T Website, located at http://bit.ly/A0sbhC,
and Verizons Website, located at http://bit.ly/Xb0WU.
Examine the wireless broadband networks provided by
each vendor. Be prepared to discuss.
Activities
Discussions
Evaluation
10
100
Preparation
Reading(s)
o Chapter 5: IT Security, Crime, Compliance, and
Continuity
e-Activity
o Visit the Committee on National Security Systems
(CNNS) Website, located at
http://www.cnss.gov/policies.html. Study the policies and
directives and be prepared to discuss.
Activities
Discussions
Evaluation
10
75
Preparation
Reading(s)
o e-Business and e-Commerce
e-Activity
o Read the CNSS report: Progress Against 2008 Priorities,
located at http://www.cnss.gov/cnss_report.html. Be
prepared to discuss.
Activities
Discussions
Evaluation
Page 4 of 13
10
100
Preparation
Reading(s)
o Chapter 7: Mobile Computing and Commerce
o Chapter 8: Web 2.0 and Social Media
Activities
Discussions
Evaluation
10
None
Preparation
Reading(s)
o Chapter 9: Operational Planning and Control Systems
o Chapter 10: Enterprise Information Systems
e-Activity
o Visit the following Websites and briefly examine the
Enterprise Resource Planning (ERP) offerings.
Commercial systems include SAP, located at
http://www.sap.com/solutions/businesssuite/erp/index.epx, Oracle PeopleSoft, located at
http://www.oracle.com/us/products/applications/pe
oplesoft-enterprise/index.html, and Seibel, located
at http://www.erp.com/section-layout/3general/6834-siebel-erp.html.
Open source ERP systems include Openbravo,
located at http://www.openbravo.com/, OpenERP,
located at http://www.openerp.com/, and xTuple,
located at http://www.xtuple.com/. Be prepared to
discuss.
Activities
Discussions
Evaluation
Preparation
Page 5 of 13
Reading(s)
o Chapter 11: Business Intelligence and Decision Support
o Chapter 12: IT Strategic Planning
e-Activity
o Visit the Salesforce.com Website, located at
http://www.salesforce.com/, and examine the Customer
Relationships Management (CRM) service offerings. Be
prepared to discuss.
10
75
10
100
Preparation
Reading(s)
o Chapter 13: Business Process Management and Systems
Development
Activities
Discussions
Evaluation
10
10
75
Preparation
Reading(s)
o Chapter 14: Global Ecology, Ethics, and Social
Responsibility
Activities
10
Discussions
Evaluation
11
200
Preparation
Reading(s): None
Activities
Discussions
Evaluation
100
% of
Grade
75
7.5%
75
7.5%
75
7.5%
75
7.5%
100
10%
100
10%
200
20%
Assignment
Page 6 of 13
100
10%
100
10%
Tests are open book with a 2-hour time limit and may contain multiple choice, true /
false, and essay questions.
Participation (20 discussions worth 5 points apiece)
Totals
Points
Percentage
Grade
900 1,000
90% 100%
800 899
80% 89%
700 799
70% 79%
Below 700
Below 70%
100
10%
1,000
100%
Writing Assignments
The objective of the School of Information Systems writing assignments is to
promote attitudes and skills that will improve a students ability to communicate in
writing, develop research skills and documentation techniques, and encourage
critical analysis of data and conclusions specific to the course learning outcomes in
the information systems and technology domain.
Page 7 of 13
Goode, E. (2011, August 15). Sending the police before theres a crime.
Retrieved from http://www.nytimes.com/2011/08/16/us/16police.html
In 1994, the New York City Police Department adopted a law enforcement crime
fighting strategy known as COMPSTAT (COMPuterSTATistics). COMPSTAT uses
Geographic Information Systems (GIS) to map the locations of where crimes occur,
identify hotspots, and map problem areas. COMPSTAT has amassed a wealth of
historical crime data. Mathematicians have designed and developed algorithms that
run against the historical data to predict future crimes for police departments. This
is known as predictive policing. Predictive policing has led to a drop in burglaries,
automobile thefts, and other crimes in some cities.
Write a four to five (4-5) page paper in which you:
1. Compare and contrast the application of information technology (IT) to
optimize police departments performance to reduce crime versus random
patrols of the streets.
2. Describe how COMPSTAT, as an information system (IS), implements the four
(4) basic IS functions:
a. Input
b. Processing
c. Output
d. Feedback
3. Determine how information systems have allowed police departments that
implement tools such as COMPSTAT to respond to crime faster.
4. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT
analysis) on behalf of police departments that intend to implement predictive
policing.
Page 8 of 13
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia
and similar Websites do not qualify as quality resources. You may use the
resources above or others of your choosing.
Case Study 1: The Big Data Challenges
Due Week 3 and worth 100 points
Big Data is a term used to describe the voluminous amount of structured and semistructured data generated by companies. The term is used when referring to
petabytes (PB), exabytes (EB), and zettabytes (ZB) of data. Companies face
challenges when it comes to capturing, storing, searching, and analyzing Big Data.
The Volvo Car Corporation faced this problem because of the massive amount of
data it was streaming from its vehicles.
Study the Volvo Car Corporation case study titled, Converting data into business
value at Volvo, located in the online course shell.
Write a two to four (2-4) page paper in which you:
1. Judge how Volvo Car Corporation integrated the cloud infrastructure into its
networks.
2. Explain how Volvo Car Corporation transforms data into knowledge.
3. Identify the real-time information systems implemented and evaluate the
impact of these implementations.
4. Argue how the Big Data strategy gives Volvo Car Corporation a competitive
advantage.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia
and similar Websites do not qualify as quality resources.
Assignment 2: 4G Wireless Networks
Due Week 4 and worth 75 points
The following resources may be helpful when completing this assignment.
The 3rd Generation Partnership Project (3GPP) developed the 3GPP LongTerm Evolution (LTE) standard for wireless communications technology. It is
regarded as an evolution of the Global System for Mobile Communication
(GSM), the Universal Mobile Telecommunications Systems (UMTS), and other
standards. It is also known as the 4G LTE. The competition among the carriers to
support 4G LTE networks has been very fierce as evidenced by TV commercials
targeting smartphone users. Many smartphones run on 3G networks.
Page 9 of 13
Page 10 of 13
3. Analyze privacy concerns raised by the collection of personal data for mining
purposes.
a. Choose and describe three (3) concerns raised by consumers.
b. Decide if each of these concerns is valid and explain your decision for
each.
c. Describe how each concern is being allayed.
4. Provide at least three (3) examples where businesses have used predictive
analysis to gain a competitive advantage and evaluate the effectiveness of
each businesss strategy.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia
and similar Websites do not qualify as quality resources.
Assignment 3: Mobile Computing and Social Networking
Due Week 7 and worth 75 points
Mobile computing has dramatically changed how information is accessed and
shared. Wireless networking has been an enabler of mobile computing. One
profession that mobile computing has had a big impact on is health care
management. Patients are now able to monitor their vital signs such as blood
pressure, glucose levels, etc. without having to periodically visit a doctors office or
hospital. There are devices such as the Withings Blood Pressure Monitor that works
with an iPhone, iPod Touch, or iPad to record, track, and graph a patients blood
pressure. There are other devices that can measure blood glucose levels, oxygen
levels, heart rate, etc. and use an iPhone to send the results to a clinical server.
Doctors and caregivers are then able to access the data on the clinical server.
According to the American College of Gastroenterology, social networking sites like
Facebook, Twitter, and YouTube are used as powerful platforms to deliver and
receive health care information. Patients and caregivers are increasingly going
online to connect and share experiences with others with similar medical issues or
concerns Patients are able to take advantage of social networks to do more than
just share pictures and tweets.
Write a four to five (4-5) page paper in which you:
1. Compare and contrast monitoring of patient vital signs using mobile
computing technology to in-patient visits to the doctors office or hospital.
2. Analyze the advantages and disadvantages of using mobile computing
technology to monitor patients.
3. Assess the security concerns with regard to the transmission of personal
medical information over wireless networks.
4. Assess the use of social networking for group support for patients with similar
medical concerns.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia
and similar Websites do not qualify as quality resources.
Page 11 of 13
Page 12 of 13
provides a link to the first three (3) chapters of your textbook(s) in eBook format.
Check your online course shell for availability.
Review the online course shell or check with your professor to determine whether
Internet-based assignments and activities are used in this course.
Discussions
To earn full credit in an online threaded discussion, students must have one original
post and a minimum of one other post per discussion thread.
Please note: Material in the online class will be made available on the previous
Thursday. As it is always possible that students could lose their work due to
unforeseen circumstances, it is a best practice to routinely save a working draft in a
separate file before posting in the course discussion area.
Professors hold discussions during class time for on-ground students. Check with
your professor if any additional discussion participation is required in the online
course shell outside of class hours.
Tests
Tests (quizzes, midterm and final exams, essay exams, lab tests, etc.) are available
for student access and completion through the online course shell. Check the online
course shell to determine how you are expected to take the tests.
Online students are to complete the test by Monday 9:00 a.m. Details
regarding due dates are posted in the Blackboard Calendar tool.
On-ground students are to complete the tests after the material is covered
and before the next class session.
Assignments
A standardized performance grading rubric is a tool your professor will use to
evaluate your written assignments. Review the rubric before submitting
assignments that have grading rubrics associated with them to ensure you have
met the performance criteria stated on the rubric.
Grades are based on individual effort. There is no group grading; however, working
in groups in the online or on-ground classroom is acceptable.
Assignments for online students are always submitted through the online course
shell. On-ground professors will inform students on how to submit assignments,
whether in paper format or through the online course shell.
Page 13 of 13