Course Number Course Title: Course Instructor: Credits: Section: Semester: Class Meeting Times: Class Venue: Pre-requisites: CMPS1024 (formerly CMPS150) – Computer Business Application MGMT1014 (formerly MGMT101) – Fundamentals of Management None 2012-2 3 CMPS3012 (formerly CMPS360) Management Information Systems
Co-requisites Office Location Office Hours: (Consultation Hours) Telephone: E-Mail Address: Resources Required Text: Other Resources:
Laudon, K.C., Laudon,J.P.: Management Information Systems – Managing the Digital Firm, 11th edition, . Prentice Hall MIS course website: http://odl.ub.edu.bz/moodle3/course/view.php?id=106
COURSE DESCRIPTION COURSE DESCRIPTION: This course is designed to provide techniques and knowledge for creating competitive business, managing global or local corporations, adding business value and providing useful product and services to intended customers. Topics include: Enterprise Applications. Systems for Supply Chain Management. Customer Relationship Management. Knowledge Management Systems. Digital Integration. Internet Technology. Database – Design and Implement in an existing Database Management System. COURSE OBJECTIVES: Upon successful completion of this course, students will be able to: 1.1.1 Knowledge a. b. c. d. e. f. g. h. i. j. k. l. m. Describe the role of information systems in today’s competitive business environment Explain information systems from both technical and business perspective Examine the transforming effect of information systems on organizations and management Explain the impact of internet technology and the World Wide Web on the Digital firm Describe the roles of individuals in the business process
Describe the types of business structures and how they function and serve clientele. Explain the importance of effective mangers and the roles they play in the business success and the development of innovative services and products Identify the impact, usefulness and benefit afforded businesses through electronic commerce Examine privacy issues and the ways in which to secure a business and its stakeholders from privacy violations. Identify threats of intrusion and other forms of system violation that exists through external sources such as viruses. Describe salient differences between management and information technology specialists and how these differences are mitigated. Explain the various levels of management and the unique systems and structures that are critical to these levels Explain the Rationale for developing and maintaining systems which are reliable, scalable, portable and secure.
Courtney from Study Moose
Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/3TYhaX