BIS Self-Study Appendices - University of Nebraska Omaha
BIS Self-Study Appendices - University of Nebraska Omaha BIS Self-Study Appendices - University of Nebraska Omaha
- Page 2 and 3: -2-
- Page 4 and 5: -4-
- Page 6 and 7: on July 1, 1930. In January, 1931 t
- Page 8 and 9: The department chair writes a recom
- Page 10 and 11: CREF and/or Fidelity Investments in
- Page 12 and 13: Credit Unit We count the 50 minute
- Page 14 and 15: facilities. A library staff liaison
- Page 16 and 17: awareness and expanding the interna
- Page 18 and 19: Day Co-op Off Campus Alternate Mode
- Page 20 and 21: Table 2. Degrees Awarded and Transc
- Page 22 and 23: Table 3. Support Expenditures Infor
- Page 24 and 25: Total Undergrad Total Grad Table 5.
- Page 26 and 27: -26-
- Page 28 and 29: -28-
- Page 30 and 31: 2.5 Know how to connect with staff
- Page 32 and 33: 10.0 Theoretical content: Please li
- Page 34 and 35: BIS Program Outcomes (2009) 1. unde
- Page 36 and 37: 3.1.4 List and Data Management (3.0
- Page 38 and 39: Points Grade 96-100% A+ 92-95% A 89
- Page 40 and 41: 1. Local and global role of iS 2. K
- Page 42 and 43: -42-
- Page 44 and 45: 3.0 Content and Organization List o
- Page 46 and 47: 3.6.1 Overview 3.6.2 Submit and res
- Page 48 and 49: 8.0 Oral and Written Communications
- Page 50 and 51: 1. Local and global role of iS 2. K
-2-
APPENDIX 1 – INSTITUTIONAL SUMMARY ....................................................................... 5<br />
APPENDIX 2 – COURSE DESCRIPTIONS ........................................................................... 27<br />
APPENDIX 3 – FACULTY VITAE ....................................................................................... 353<br />
APPENDIX 4 – CURRENT LIST OF SERIALS TITLES .................................................. 501<br />
APPENDIX 5 – STRATEGIC PLAN FOR INFORMATION<br />
TECHNOLOGY SERVICE .......................................................................... 503<br />
APPENDIX 6 – COLLEGE OF IS&T SYSTEM OVERVIEW ............................................ 529<br />
APPENDIX 7 – ASSESSMENT DATA COLLECTION ...................................................... 605<br />
-3-
-4-
APPENDIX 1 – INSTITUTIONAL SUMMARY<br />
The Institution<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong><br />
John E. Christensen, Chancellor<br />
Type <strong>of</strong> Control<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> is a comprehensive, public university located in the heart <strong>of</strong><br />
<strong>Nebraska</strong>’s largest city. It is the second-largest higher education campus in the state. UNO is part <strong>of</strong> the<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> system, which also includes the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-Lincoln, the <strong>University</strong> <strong>of</strong><br />
<strong>Nebraska</strong> at Kearney and the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Medical Center.<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, with 471 full-time faculty members, <strong>of</strong>fers approximately 100<br />
baccalaureate degree programs and more than 60 masters and doctoral degree programs.<br />
Undergraduate degree programs are <strong>of</strong>fered in the colleges <strong>of</strong> Arts and Sciences, Business<br />
Administration, Education, Fine Arts, Information Science and Technology, Public Affairs and Community<br />
Service, and Division <strong>of</strong> Continuing Studies. Programs and courses also are <strong>of</strong>fered in the College <strong>of</strong><br />
Human Resources and Family Sciences, the College <strong>of</strong> Engineering and Technology, the College <strong>of</strong><br />
Agriculture and Natural Resources, and the College <strong>of</strong> Architecture, which are administered by the<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-Lincoln. The College <strong>of</strong> Public Affairs and Community Service is administered by<br />
the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> on both the <strong>Omaha</strong> and Lincoln campuses.<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> has a central administration with a President at the helm who reports to an<br />
elected Board <strong>of</strong> Regents. Each campus including UNO has a chancellor who reports to the system<br />
President. UNO is organized into five colleges (College <strong>of</strong> Information Science & Technology, College <strong>of</strong><br />
Fine Arts, Communication and Media, College <strong>of</strong> Public Administration and Community Affairs, College<br />
<strong>of</strong> Education and the College <strong>of</strong> Arts & Sciences), with Deans who report to the Vice Chancellor <strong>of</strong><br />
Academic Affairs.<br />
History <strong>of</strong> Institution<br />
What is now the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> was founded in 1908 as the <strong>University</strong> <strong>of</strong> <strong>Omaha</strong>, a<br />
private non-sectarian college, with a campus at 24th and Pratt Streets in northeast <strong>Omaha</strong>. The first<br />
term <strong>of</strong> the co-educational college began in 1909, under the leadership <strong>of</strong> Dr. Daniel E. Jenkins, with<br />
twenty students.<br />
The movement to make the <strong>University</strong> a municipal institution began in 1929, and in May, 1930 the<br />
citizens <strong>of</strong> <strong>Omaha</strong> voted to establish the Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong>. In the summer <strong>of</strong> 1930, the<br />
<strong>Omaha</strong> Board <strong>of</strong> Education selected the first <strong>University</strong> Board <strong>of</strong> Regents who was inducted into <strong>of</strong>fice<br />
-5-
on July 1, 1930. In January, 1931 the new Board <strong>of</strong> Regents took over the <strong>University</strong> <strong>of</strong> <strong>Omaha</strong> and its<br />
properties.<br />
The expansion <strong>of</strong> the Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong> in the early 1930s led to a decision to move the<br />
campus to a 52-acre site southwest <strong>of</strong> Dodge and 60th Streets. In November 1936, the <strong>University</strong><br />
secured a grant from the Works Progress Administration which, together with some accrued building<br />
funds, financed the construction <strong>of</strong> a Georgian-style building. This building, now called Arts and<br />
Sciences Hall, was finished in 1938 and served as the sole campus building until the 1950s.<br />
In July 1968, the citizens <strong>of</strong> <strong>Omaha</strong> voted to transfer all <strong>University</strong> property to the <strong>University</strong> <strong>of</strong><br />
<strong>Nebraska</strong>, and the former Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong> became the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>.<br />
The <strong>University</strong> began rapid growth when it became a part <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> System.<br />
Enrollment was 8,730 in the fall <strong>of</strong> 1967 which was the last year as the Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong>.<br />
Three years later, enrollment was 13,185, a growth <strong>of</strong> 51 percent in the first three years as the<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>. Student enrollment for the fall 2003 semester is 14,959.<br />
The Dodge Street campus has expanded from its original 52 acres to the current 158.5 acres at two<br />
locations. On January 17, 1998 the Board <strong>of</strong> Regents approved a ground lease with <strong>Nebraska</strong> Housing I<br />
Limited Partnership (with Century Development as the general partner) to provide 576 beds <strong>of</strong> student<br />
housing at UNO. Six buildings and a club/<strong>of</strong>fice was completed for the fall 1999 semester and Scott Hall<br />
was completed for the fall 2000 semester which provided housing for an additional 164 students. Scott<br />
Village opened in fall 2003; total on-campus housing capacity is now 1,212 students. Groundbreaking for<br />
The Peter Kiewit Institute <strong>of</strong> Information Science, Technology and Engineering began on September 10,<br />
1997 and was open for the fall 1999 semester. This 147,797 square foot facility is located on the former<br />
Aksarben property and is designed to meet present needs and has the flexibility to adapt easily to<br />
breaking technologies <strong>of</strong> tomorrow. The building will house UNO’s College <strong>of</strong> Information Science and<br />
Technology and the <strong>Omaha</strong>-based programs <strong>of</strong> UNL’s College <strong>of</strong> Engineering and Technology.<br />
Student Body<br />
With a student body <strong>of</strong> 14,959 undergraduate and graduate students, the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at<br />
<strong>Omaha</strong> strives to treat each student as an individual. The UNO student population is a diverse mix <strong>of</strong> full<br />
and part-time students, men and women, and traditional and non-traditional-age enrollees. Students<br />
come from all walks <strong>of</strong> life, from business pr<strong>of</strong>essionals to international students. Such broad<br />
backgrounds and experiences enrich the classroom atmosphere. Ample opportunity is provided for<br />
specialized study in terms <strong>of</strong> interest, talent and ultimate vocational objective. Thus, the <strong>University</strong> is<br />
concerned that its graduates be good citizens who earn a better living and live a richer, fuller life.<br />
The <strong>University</strong>, in addition to <strong>of</strong>fering courses for college credit, designs training courses for thousands<br />
<strong>of</strong> business and industrial employees; provides in-service training for elementary and secondary school<br />
-6-
teachers; conducts television classes for college credit and sponsors a wide variety <strong>of</strong> conferences,<br />
workshops, lectures, and fine art events to enrich the college credit <strong>of</strong>ferings.<br />
Opportunities for teaching and research abroad, coordinated by the Office <strong>of</strong> International Studies and<br />
Programs, exist through the <strong>University</strong>’s network <strong>of</strong> sister institutions in Germany, India, Japan, Norway<br />
the Philippines, Romania and Czechoslovakia, and through exchange programs with China, Austria,<br />
Russia, Belgium and Mexico.<br />
Regional or Institutional Accreditation<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> is accredited by the North Central Association <strong>of</strong> Colleges and<br />
Secondary Schools, and has programs which are accredited or approved by the National Council for<br />
Accreditation <strong>of</strong> Teacher Education, the Council for Accreditation <strong>of</strong> Counseling and Related Educational<br />
Programs, the National Council on Social Work Education, the Engineers Council for Pr<strong>of</strong>essional<br />
Development, Computing Accreditation Commission/Accreditation Board for Engineering and<br />
Technology, National Association for Industrial Technology, the American Home Economics<br />
Association(for undergraduate programs), the American Dietetic Association, the AACSB International –<br />
the Association to Advance Collegiate Schools <strong>of</strong> Business, the National Association <strong>of</strong> School <strong>of</strong> Music,<br />
the National Association <strong>of</strong> Schools <strong>of</strong> Public Affairs and Administration, the Educational Standards<br />
Board <strong>of</strong> the Board <strong>of</strong> Examiners in Speech-Language Pathology and Audiology, the Commission on<br />
Accreditation <strong>of</strong> Allied Health Education Programs (CAAHEP), the Council on Aviation Administration,<br />
Association <strong>of</strong> Small Business Development Centers, and the American Chemical Society.<br />
UNO’s courses are accepted for purposes <strong>of</strong> teacher certification by the <strong>Nebraska</strong> State Department <strong>of</strong><br />
Education. The Elementary School, Secondary School and Community Counseling programs are<br />
accredited by the Council for the Accreditation <strong>of</strong> Counseling and Related Educational Programs<br />
(CACREP), the national accrediting agency for Counselor Education programs.<br />
Course credits from UNO are accepted by other member colleges and universities <strong>of</strong> the North Central<br />
Association and by member institutions <strong>of</strong> other regional accrediting agencies<br />
Personnel and Policies<br />
Promotion and Tenure<br />
In general, tenure-track junior faculty must be reappointed each year. Their portfolios are reviewed first<br />
by a departmental committee consisting <strong>of</strong> all tenured faculty members within the department. This<br />
committee evaluates the individual's performance as outstanding, above average, average, or belowaverage<br />
in the three categories <strong>of</strong> teaching, research, and service. In addition, a vote is taken on<br />
whether to reappoint the individual. This evaluation and the vote, together with supporting arguments<br />
and recommendations for the department chair and for the individual, are submitted to the faculty<br />
member review and possible comments. Then the portfolios are submitted to the department chair.<br />
-7-
The department chair writes a recommendation on whether to reappoint the individual or not.<br />
Following the Department chair's review, the faculty member reviews the portfolio prior to its<br />
submission to the College Personnel Committee, which similarly evaluates the faculty member's<br />
accomplishments in teaching, research, and service, and votes on reappointment. The recommendation<br />
<strong>of</strong> the Personnel Committee, consisting <strong>of</strong> three members each <strong>of</strong> the ISQA and CS departments, is then<br />
reviewed by the faculty member, and then the portfolio is submitted to the Dean. Having received<br />
recommendations from the committees, the department chair and the College Personnel Committee,<br />
the Dean writes a recommendation to the Senior Vice Chancellor for Academic and Student Affairs, who<br />
makes the final decision on reappointment. Prior to submission to the Vice Chancellors Office, the<br />
faculty member is required to review and sign the portfolios.<br />
The process for tenure and promotion is similar. Unless a faculty member has been hired on a "fasttrack"<br />
to tenure, he or she submits a tenure packet for review during the fall <strong>of</strong> the sixth year <strong>of</strong><br />
employment at UNO. The tenure packet is reviewed by the same committees and individuals as for<br />
reappointment with the faculty member allowed the opportunity to review the portfolio after each<br />
review and recommendation. The difference is that the departmental committee now consists only <strong>of</strong><br />
those individuals who have already received tenure. Each committee votes on whether or not to<br />
recommend tenure and/or promotion. Rather than making the final decision in the case <strong>of</strong> tenure, the<br />
Senior Vice Chancellor for Academic and Student Affairs makes recommendations to the Board <strong>of</strong><br />
Regents, which must approve each decision.<br />
To be eligible for tenure, an individual must be evaluated as outstanding in either teaching or research,<br />
and above average in the other. Service must be average or better. To help make this evaluation more<br />
objective, the College faculty has approved the use <strong>of</strong> a scoring matrix to assist the committees in<br />
evaluating the scholarly contribution <strong>of</strong> various elements <strong>of</strong> the tenure packet. This scoring matrix may<br />
be made available upon request. This matrix is used as an aid in decision making, but does automate<br />
the tenure decision. Committee members rely on their own judgments and letters <strong>of</strong> reference from<br />
those outside the College who may be in a position to evaluate the faculty member's scholarly<br />
contributions.<br />
Depending on their pr<strong>of</strong>essional experience prior to hire, a faculty member may be hired on a "fasttrack"<br />
tenure schedule, submitting a tenure packet in the fall <strong>of</strong> third year <strong>of</strong> employment.<br />
Faculty Salaries<br />
Each February, all faculty members must submit an Annual Performance Review report, which is used as<br />
the basis for annual performance reviews by the Department Faculty, Department Chair, and the Dean.<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> chapter <strong>of</strong> the American Association <strong>of</strong> <strong>University</strong> Pr<strong>of</strong>essors in<br />
their collective bargaining agreement with the faculty negotiates with the <strong>University</strong> the total dollars<br />
that shall be used in determining salary increase for satisfactory performance. This is distributed across<br />
campus on an equal increase for each faculty member who has achieved a satisfactory performance<br />
rating.<br />
-8-
The same Annual Performance Review report is used as the basis for determining merit salary<br />
adjustments. Each year, the Senior Vice Chancellor informs the College <strong>of</strong> the availability <strong>of</strong> money for<br />
merit salary increases which is determined from the amount specified in the Union Bargaining<br />
Agreement less any promotion increases achieved by campus faculty during the<br />
reappointment/promotion/tenure process. Each Department Committee reviews the annual<br />
Performance Review Reports and categorizes each faculty member in the three areas <strong>of</strong> research,<br />
service and teaching. The review is submitted to the department chairperson who then uses these<br />
reviews to assist in assessing faculty performance. The chairperson determines categories based upon<br />
department input and to determine merit salary increments which are submitted to the Dean. The<br />
Dean reviews the recommendations and makes any adjustments that he deems appropriate and the<br />
information is forwarded to the Academic and Student Affairs Office.<br />
Faculty Benefits<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> has a workforce <strong>of</strong> approximately 13,000, including faculty and staff<br />
members on campuses and in outreach locations throughout the state. As one <strong>of</strong> <strong>Nebraska</strong>'s largest<br />
employers, the <strong>University</strong> <strong>of</strong>fers excellent benefits, tuition assistance for faculty and staff and their<br />
families, a diverse multicultural work environment and access to tremendous cultural and education<br />
opportunities.<br />
The normal retirement age for all members <strong>of</strong> the <strong>University</strong> staff is 59 1/2 years. Employees may retire<br />
at age 55 after 10 years <strong>of</strong> service with the <strong>University</strong> with earned annuity benefits computed on an<br />
actuarially equivalent basis. An employee also may retire prior to the normal retirement age because <strong>of</strong><br />
physical or mental disability that prevents such employee from satisfactorily performing work. A faculty<br />
member who is disabled because <strong>of</strong> physical or mental disability and who carries the <strong>University</strong> group<br />
long-term disability income insurance may request a disability leave in lieu <strong>of</strong> a disability retirement.<br />
Among the benefits in the Fringe Benefit Program <strong>of</strong>fered to retirees and early retirees are group life<br />
insurance with various age limits, group medical insurance (or health maintenance organization<br />
participation) which includes prescription benefits, group dental insurance, and long-term care<br />
insurance. The retired employee pays the entire premium for these insurance options.<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> provides employees a retirement plan for the purpose <strong>of</strong> accumulating<br />
lifetime retirement income through participation in the Basic Retirement Plan. Participation is<br />
mandatory at age 30 and optional at age 26 with two years <strong>of</strong> service. Both the employee and the<br />
<strong>University</strong> contribute to the basic retirement plan based on a percentage <strong>of</strong> income on a pre-tax basis.<br />
The employee chooses between two levels <strong>of</strong> participation: Tier 1 is 3.5 percent for employee’s<br />
contribution and 6.6 percent for the <strong>University</strong>. Tier 2 is 5.5 percent for the employee’s contribution<br />
and 8.0 percent for the <strong>University</strong>. All contributions, including those made by the <strong>University</strong> are vested<br />
immediately in the employee’s name. Employees have the option to allocate contributions with TIAA-<br />
-9-
CREF and/or Fidelity Investments in several investment categories. Accumulations can be accessed after<br />
employment with the <strong>University</strong> is terminated and can be taken as a lifetime retirement annuity or as a<br />
lump sum payment.<br />
Employees may also participate in the Supplemental Retirement Plan (SRA) which establishes individual<br />
annuity and/or custodial accounts for the purpose <strong>of</strong> supplementing the basic retirement plan. Any<br />
employee, regardless <strong>of</strong> age or length <strong>of</strong> service, may enroll in the SRA. All contributions are made on a<br />
pre-tax, voluntary basis and no <strong>University</strong> contributions are made to this plan. Participants may invest<br />
with TIAA-CREF and/or Fidelity Investments. Accumulations can be accessed only after employment<br />
with <strong>University</strong> is terminated and can be taken as a lifetime retirement annuity or as a lump sum<br />
payment. In addition to the basic and supplemental retirement programs, the <strong>University</strong> also<br />
participates in the Federal Social Security Program.<br />
All retired faculty who have met the normal retirement regulations are also eligible for the employee<br />
scholarship program. Retirees whose applications have been approved pay all normal admission and<br />
matriculation fees. They shall also pay all usual course-related costs such as books and supplies. The<br />
courses may be taken for credit or audit. The program allows tuition equal to the <strong>University</strong>’s residencytuition-charge-per-semester<br />
credit hours less $1.00 per semester credit hour. The program is limited to<br />
not more than 15 credit hours in any 12-month period and is restricted to no more than 6 credit hours<br />
per semester. The program also allows retired employees to be eligible for the Dependent Scholarship<br />
Program which allows a spouse or dependent children to use the employee’s scholarship. Full-time<br />
enrollment status is required for a dependent child to be eligible but not for a spouse and is limited to<br />
undergraduate academic credit courses at any campus <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>.<br />
Retired faculty has the same right to <strong>University</strong> non-academic facilities and services as full-time<br />
employees. These include access and/or admission to <strong>University</strong> non-academic facilities, services,<br />
intercollegiate athletic events, and fine arts programs.<br />
-10-
Education Unit<br />
The chief academic <strong>of</strong>ficer is Dr. Terry Hynes, Senior Vice Chancellor <strong>of</strong> Academic Affairs.<br />
The complete hierarchy <strong>of</strong> the educational unit is provided in the following organizational<br />
chart.<br />
-11-
Credit Unit<br />
We count the 50 minute meeting <strong>of</strong> classroom contact as equal to one contact hour and our semesters<br />
are 16 weeks total which includes one week for finals and one week (5 days total) <strong>of</strong> non-class time<br />
(Spring Break in the Spring semester and Fall Break and Thanksgiving Break in the Fall semester) which is<br />
a total <strong>of</strong> 28 weeks <strong>of</strong> scheduled instruction between a fall and spring semester.<br />
Instructional Modes<br />
In addition to traditional on-campus instruction, the College <strong>of</strong> IS&T has been <strong>of</strong>fering online or distance<br />
education courses. The College <strong>of</strong> IS&T collaborates with the Division <strong>of</strong> Continuing Studies to <strong>of</strong>fer<br />
online degrees in a BGS in MIS and BGS in IT. The BS in MIS is only two or three courses from having<br />
their program online. The following courses have been developed into an online <strong>of</strong>fering:<br />
Pre-requisites for BGS in MIS<br />
*CIST 1100 – Introduction to Personal Computers<br />
*CSCI 1400 – Introduction to Computer Programming<br />
*CIST 2500 – Introduction to Statistics<br />
*ISQA 3210 – Advanced Technology for Personal Productivity<br />
Required Courses<br />
*CIST 3100 – Organizations, Applications, and Technology<br />
*CSCI 1620 – Introduction to Computer Science II<br />
*ISQA 3300 – File Structures for Information Systems<br />
*ISQA 3310 – Managing the Database Environment<br />
**ISQA 4110 – Information Systems Analysis<br />
**ISQA 4120 – Systems Design and Implementation<br />
**ISQA 3400 – Business Data Communications<br />
*CIST 3110 – Information Technology Ethics<br />
*CIST 3600 – Information Security and Policy<br />
*denotes the courses that have been developed and available for online <strong>of</strong>fering<br />
**denotes that these courses are under development and will be available Fall Semester 2009.<br />
Several <strong>of</strong> these courses are <strong>of</strong>fered only once a year or twice a year. For example, CIST 3600 is<br />
<strong>of</strong>fered Spring Semester during the daytime and an online course would be available for<br />
evening students. Courses could alternate semesters between an in-person and online delivery<br />
mode.<br />
Grade-Point Average<br />
For all programs in the College <strong>of</strong> IS&T, a minimum cumulative GPA <strong>of</strong> 2.5 is required for graduation. A<br />
student must obtain a grade <strong>of</strong> C- or better in each class counted towards the degree.<br />
-12-
Academic Supporting Units<br />
The following departments teach courses that are required for the MIS major:<br />
Department College Name and Title <strong>of</strong> Responsible Individual<br />
Accounting Business Administration Jack L. Armitage, Department Chair<br />
Economics Business Administration Donald Baum, Department Chair<br />
English Arts & Sciences Susan Naramore Maher, Department Chair<br />
Mathematics Arts & Sciences Jack Heidel, Department Chair<br />
School <strong>of</strong><br />
Communication, Fine Arts, and Jeremy Lipschultz, School Director<br />
Communication Media<br />
Students are also required to take a co-requisite course, which may be chosen from either an ISQA<br />
course or from one <strong>of</strong> the following departments:<br />
Department College Name and Title <strong>of</strong> Responsible Individual<br />
Finance, Banking,<br />
and Law<br />
Marketing and<br />
Management<br />
Business Administration<br />
Business Administration<br />
David Volkman, Department Chair<br />
Phani Tej Adidam, Department Chair<br />
Students also take Distribution requirements which include the Natural Sciences (Biology, Chemistry,<br />
Physics, Geology, etc.), Humanities (History, Philosophy, Religion, selected English courses, Foreign<br />
Languages, etc.), Social Sciences (Anthropology, Goodrich, Sociology, Psychology, Political Sciences,<br />
selected subjects <strong>of</strong> communication, etc.), Racial minorities (Native American studies, Black Studies,<br />
Latino/Latin American studies, etc.), and International dimension/or Women Studies. Most <strong>of</strong> these<br />
courses are taught by the College <strong>of</strong> Arts & Sciences and some by the College <strong>of</strong> Communication, Fine<br />
Arts and Media.<br />
Non-Academic Supporting Units<br />
<br />
Criss Library<br />
Dr. C.C. and Mabel L. Criss Library (http://library.unomaha.edu) serves as the primary source <strong>of</strong><br />
academic information for the <strong>University</strong> community through its collections, academic and reference<br />
services, innovative and modern technology, exhibit and event programming and modern physical<br />
-13-
facilities. A library staff liaison person is specifically assigned to the college <strong>of</strong> IS&T. In addition, the<br />
college <strong>of</strong> IS&T has a faculty member who is a designated library liaison.<br />
Primary contact: Nora Hillyer, IS&T Staff Liaison (nhillyer@mail.unomaha.edu; 554-2138).<br />
PKI Career Resource Center<br />
The Peter Kiewit Institute's Career Resource Center is dedicated to providing and facilitating unique<br />
opportunities that will enhance your college career and allow students to graduate fully prepared to<br />
enter their chosen pr<strong>of</strong>ession well prepared for success!<br />
Opportunities provided to students by the Career Resource Center include:<br />
Internships with a large variety <strong>of</strong> business partners during the academic year and summer.<br />
Internship include full/part-time internships, salaried and "for credit" internships.<br />
Full-time employment opportunities following graduation.<br />
Resume/cover letter development and assistance.<br />
Mock interviews with business/industry representatives.<br />
Networking opportunities with business/industry partners.<br />
A library and other reading material.<br />
An environment conducive to study and interaction with other students and staff.<br />
Primary contact: Doug Bahle, Coordinator, Career Resource Center (dbahle@nufoundation.org;<br />
554-2090)<br />
UNO Career Center<br />
The UNO Career Center (http://unoceo.unomaha.edu/) establishes and develops partnerships<br />
with employers, the community, and alumni to assist students in exploring their career<br />
possibilities. These partnerships provide students, alumni, and faculty with enhanced career<br />
development and educational experiences. The career center <strong>of</strong>fers various services including the<br />
following:<br />
-14-
Fairs & Exhibits<br />
Career Preparation Workshops<br />
Info Sessions & Tables<br />
On-campus Interviews<br />
Resume & Cover Letter<br />
Job Search<br />
Interviewing & Salary<br />
Networking & Apparel<br />
<strong>Self</strong> Assessment<br />
Graduate School Advising<br />
UNO CareerConnect<br />
Primary contact: Michelle Perone, Director, UNO Career Center (554-3523)<br />
Information Technology Services (ITS)<br />
ITS provides customer service and free s<strong>of</strong>tware through a site license program with Micros<strong>of</strong>t and<br />
McAfee. They also <strong>of</strong>fer a laptop loan program and support computer user rooms, labs and Internet<br />
centers in multiple buildings on campus. ITS also provides training for a variety <strong>of</strong> computer programs<br />
including MS Office, Lotus Notes, and Blackboard; supports distance education courses; and manages<br />
campus servers and networks.<br />
Primary contact: Lanyce Keel, Director, ITS (554-2020).<br />
College <strong>of</strong> IS&T Systems Support<br />
The members <strong>of</strong> the Systems Staff at the College <strong>of</strong> Information Science and Technology are dedicated<br />
to providing quality support for faculty, staff and students. Support services provided by this group<br />
include:<br />
S<strong>of</strong>tware Installation and troubleshooting<br />
Classroom server support<br />
Printer Installation<br />
Hardware Repairs<br />
Backups<br />
Website help<br />
Technical specifications<br />
Primary contact: Mike Grove, Director, Systems Support (mgrove@mail.unomaha.edu; 554-4392)<br />
International Studies & Programs (http://world.unomaha.edu)<br />
Since 1973, International Studies and Programs (IS&P) has developed and coordinated UNO’s<br />
international projects, student and faculty exchanges, and the undergraduate program in International<br />
Studies. IS&P serves as a focal point for the international mission <strong>of</strong> the university, cultivating global<br />
-15-
awareness and expanding the international connections <strong>of</strong> the students and faculty <strong>of</strong> UNO and the<br />
citizens <strong>of</strong> the State <strong>of</strong> <strong>Nebraska</strong>. IS&P provides outstanding programs and services for prospective and<br />
currently enrolled international students, as well as all other UNO students, faculty and staff. IS&T<br />
international students are serviced by IS&P staff advisors and are the first point <strong>of</strong> contact for all<br />
applicants.<br />
Primary contact: Merry Ellen Turner, Director <strong>of</strong> International Studies & Programs (554-2562;<br />
mturner@mail.unomaha.edu)<br />
UNO Writing Center (http://www.unomaha.edu/writingcenter/)<br />
The Writing Center <strong>of</strong>fers UNO students, faculty, and staff in all university divisions the service to work<br />
with a writing consultant on any university-related writing project. This free service can be used to work<br />
on assignments, resumés, business letters, or other projects. The center’s goal is to encourage students<br />
to become effective, independent writers, rather than edit papers for you, the center helps student<br />
develop the ability to edit their own work. A number <strong>of</strong> IS&T students use this center’s service.<br />
Primary contact: Dorianne Richards, Director (554-3311; drichards@mail.unomaha.edu)<br />
UNO Math and Science Learning Center<br />
The Math-Science Learning Center (MSLC) is a place where UNO students can find the assistance they<br />
need to conquer academic challenges in Math and Science. Model students serve as tutors,<br />
supplemental instruction leaders and study group facilitators trained to assist their peers in achieving<br />
academic success. The MSLC houses meeting alcoves, study/tutoring space, tutorial computers and<br />
reserve study materials. It also <strong>of</strong>fers academic consultation for students seeking to increase their<br />
overall learning effectiveness and efficiency.<br />
Primary contact: Dr. Dana Richter-Egger, Director<br />
UNO Honors Program<br />
The mission <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> Honors Program is to provide an enhanced and<br />
supportive learning environment responsive to the educational needs <strong>of</strong> highly able and/or<br />
exceptionally motivated undergraduate students. This goal will be accomplished through participation <strong>of</strong><br />
faculty noted for excellence in teaching by providing small honor sections <strong>of</strong> regular courses,<br />
interdisciplinary Honors colloquia, special seminars, and increased opportunity for undergraduate<br />
research/creative activity. The <strong>University</strong> Honors Program is a program with its own budget with a<br />
Director who is responsible to the Vice Chancellor for Academic and Student Affairs through the<br />
Associate Vice Chancellor for Academic Affairs. The Director works closely with the <strong>University</strong> Honors<br />
Committee to establish and review policies and procedures for the <strong>University</strong> Honors Program.<br />
Primary contact: Dr. Rosalie C. Saltzman, Director (rsaltzma@mail.unomaha.edu; 554-4963)<br />
-16-
Faculty Workload<br />
<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> and the college <strong>of</strong> IS&T has specific guidelines on faculty workload.<br />
Teaching load per faculty member per term is based on a 12-hour equivalent workload. (Most courses<br />
are taught as a 3-hour course.) Tenured and tenure-track faculty members on an average teach 6 hours<br />
per semester with the additional 6 hours for research and/or service activities. Newly recruited faculty<br />
members will have their teaching workload further reduced normally to give them opportunity to begin<br />
their research (if recruited directly after receiving their Ph.D.) or an opportunity to continue their<br />
research activities while acclimating to a new academic environment.<br />
-17-
Day<br />
Co-op<br />
Off<br />
Campus<br />
Alternate<br />
Mode<br />
Now<br />
Accredited.<br />
Not Now<br />
Accredited<br />
Now<br />
Accredited<br />
Not Now<br />
Accredited<br />
Nominal<br />
Years to<br />
Complete<br />
Administrative<br />
Head<br />
Table 1. Programs Offered by the Educational Unit<br />
Program Title 1 Modes Offered 2<br />
Administrative<br />
Unit or Units<br />
(e.g. Dept.)<br />
Exercising<br />
Budgetary<br />
Control<br />
BS Computer Science X 4 Quiming Zhu Computer<br />
Science<br />
X<br />
Submitted for<br />
Evaluation 3<br />
Offered, Not<br />
Submitted for<br />
Evaluation 4<br />
BS Management<br />
Information Systems<br />
X 4 Ilze ZIgurs ISQA X<br />
BS Bioinformatics X X<br />
BS Information<br />
Assurance<br />
X<br />
X<br />
MS Computer<br />
Science<br />
X 2 Quiming Zhu<br />
Computer<br />
Science<br />
X<br />
MS Management<br />
Information Systems<br />
X 2 Ilze Zigurs ISQA X<br />
-18-
List <strong>of</strong> the titles <strong>of</strong> all degrees <strong>of</strong>fered by the education unit responsible for the programs being evaluated, undergraduate and graduate, granted by the institution. If there are<br />
differences in the degrees awarded for completion <strong>of</strong> co-op programs, these should be clearly indicated.<br />
1<br />
Give program title as shown on a graduate’s transcript<br />
2<br />
Indicate all modes in which the program is <strong>of</strong>fered. If separate accreditation is requested for an alternative mode, list on a separate line.<br />
Describe “Other” by footnote.<br />
3<br />
Only those programs being submitted at this time for reaccreditation (now accredited) or initial accreditation (not now accredited) should be<br />
checked in this column.<br />
-19-
Table 2. Degrees Awarded and Transcript Designations by Educational Unit<br />
Modes Offered 2 Alternative Name <strong>of</strong> Degree<br />
Program Title 1 Day Co-op Off Campus Mode<br />
Awarded 3 Designation on Transcript 4<br />
Dept: Computer Science<br />
Major Computer Science<br />
Dept: Information Systems<br />
Quantitative Analysis<br />
Major: Management<br />
Information Systems<br />
Bachelor <strong>of</strong><br />
Science in<br />
Computer Science<br />
Bachelor <strong>of</strong><br />
Science in<br />
Management<br />
Information<br />
Systems<br />
Complete the table for all programs, as follows:<br />
1<br />
Give the program title as <strong>of</strong>ficially published in catalog.<br />
2<br />
List the mode for each program <strong>of</strong>fered. 3 List degree awarded for each mode <strong>of</strong>fered. If different degrees are awarded, list on separate lines.<br />
4<br />
Indicate how the program is listed on transcript for each mode <strong>of</strong>fered. If different designations are used, list on separate lines.<br />
-20-
The transcript <strong>of</strong> a Computer Science major would show the following information:<br />
Current Academic Program:<br />
Information Science & Technology<br />
Bachelor <strong>of</strong> Science, Computer Sci<br />
Major: Computer Science<br />
The transcript <strong>of</strong> a Management Information Systems major would show the following information:<br />
Current Academic Program:<br />
Information Science & Technology<br />
Bach <strong>of</strong> Science, Mgmt Info Systems<br />
Major: Management Info Systems<br />
-21-
Table 3. Support Expenditures<br />
Information Systems and Quantitative Analysis<br />
Fiscal Year 2007-2008 2008-2009 2009-2010<br />
Expenditure Category<br />
Operations (not including staff) 25,480 34,808 34,808<br />
Travel 26,048 17,786 17,786<br />
Equipment<br />
(a) Institutional Funds 0 0 0<br />
(b) Grants and Gifts<br />
Graduate Teaching Assistants 45,234 47,686 47,548<br />
Part-time Assistance<br />
7,976 915 945<br />
(other than teaching)<br />
Faculty Salaries 1,356,993 1,553,708 1,615,708<br />
College <strong>of</strong> IS&T<br />
Fiscal Year 2007-2008 2008-2009 2009-2010<br />
Expenditure Category<br />
Operations (not including staff) 293,154 356,258 370,508<br />
Travel 69,818 74,305 71,333<br />
Equipment<br />
(a) Institutional Funds 11,432 0 0<br />
(b) Grants and Gifts<br />
Graduate Teaching Assistants 314,150 189,767 197,357<br />
Part-time Assistance<br />
217,828 87,485 90,984<br />
(other than teaching)<br />
Faculty Salaries 3,735,088 4,117,042 4,420,273<br />
Approximately 24% <strong>of</strong> total faculty salaries for their benefits are not included in Faculty Salary<br />
figures.<br />
-22-
Table 4. Personnel and Students<br />
Information Systems and Quantitative Analysis<br />
Year: __2008-2009___<br />
HEAD COUNT FTE RATIO TO<br />
FT PT<br />
FACULTY<br />
Administrative .6 0 .6<br />
Faculty (tenure-track) 13.4 0 13.4<br />
Other Faculty (excluding student<br />
Assistants) 2 3 2.75<br />
Student Teaching Assistants 0 0 0 0<br />
Student Research Assistants 4 0 4 25%<br />
Technicians/Specialists 0 0 0 0<br />
Office/Clerical Employees 1 0 1 6%<br />
Others 0 0 0 0<br />
Undergraduate Student enrollment<br />
Graduate Student enrollment<br />
*The undergraduate student enrollment figures include Freshmen and Sophomores.<br />
College <strong>of</strong> IS&T<br />
Year: __2008-2009___<br />
HEAD COUNT FTE RATIO TO<br />
FT PT<br />
FACULTY<br />
Administrative 2.7 0 2.7<br />
Faculty (tenure-track) 30.3 0 30.3<br />
Other Faculty (excluding student<br />
Assistants) 12 .29 12.29<br />
Student Teaching Assistants 4 0 4 9%<br />
Student Research Assistants 20 0 20 47%<br />
Technicians/Specialists 7 1.9 8.9 21%<br />
Office/Clerical Employees 6 .5 6.5 15%<br />
Others 7.05 0 7.05 17%<br />
Undergraduate Student enrollment 473 123 522 14%<br />
Graduate Student enrollment 78 182 95 6%<br />
*The undergraduate student enrollment figures include Freshmen and Sophomores and<br />
one Early Entry.<br />
*Others including advising, grant writer and IT Outreach<br />
-23-
Total<br />
Undergrad<br />
Total<br />
Grad<br />
Table 5. Program Enrollment and Degree Data<br />
Information Systems and Quantitative Analysis<br />
Enrollment Year<br />
Degrees Conferred<br />
Academic<br />
Year<br />
1st 2nd 3 rd 4th 5th Bachelor Master Doctor Other<br />
CURRENT FT 26 35 34 43 138 34<br />
Fall 2008 08-09 PT 5 4 10 28 5 52 109<br />
1 FT 31 29 40 41 1 142 40<br />
Fall 2007 07-08 PT 10 11 12 18 3 54 84 50 35 45<br />
2 FT 34 35 44 39 1 153 34<br />
Fall 2006 06-07 PT 3 7 15 29 7 61 82 57 27 11<br />
3 FT 42 34 46 57 179 31<br />
Fall 2005 05-06 PT 5 3 17 41 8 74 87 68 38<br />
4 FT 26 42 61 50 3 182 27<br />
Fall 2004 04-05 PT 1 5 19 53 11 89 89 94 26<br />
5 FT 40 53 63 80 4 240 57<br />
Fall 2003 03-04 PT 7 16 29 49 7 108 99 78 52<br />
Note: 08-09 Degrees Conferred will be made available during the campus visit in fall 2009.<br />
The 1 st year column includes some undeclared majors.<br />
The 5 th year columns reports special undergraduates and undergraduates enrolled in only a certificate program. Give <strong>of</strong>ficial fall term<br />
enrollment figures (head count) for the current and preceding five academic years and undergraduate and graduate degrees conferred during<br />
each <strong>of</strong> those years. The "current" year means the academic year preceding the fall visit.<br />
FT--full time, PT—part time<br />
-24-
Table 6. Faculty Salary Data 1<br />
Information Systems and Quantitative Analysis<br />
Academic Year 2008-2009<br />
Pr<strong>of</strong>essor<br />
Associate<br />
Pr<strong>of</strong>essor Assistant Pr<strong>of</strong>essor Instructor<br />
Number 2 9 3 2<br />
High 157,544 129,304 108,130 47,491<br />
Mean 152,439 99,299 105,355 44,157<br />
Low 147,334 85,929 100,000 40,823<br />
1<br />
College <strong>of</strong> IS&T<br />
Chairs and segregated salary support is not included in these figures. The Instructor<br />
column includes Instructors and Lecturers.<br />
Academic Year 2008-2009<br />
Pr<strong>of</strong>essor<br />
Associate<br />
Pr<strong>of</strong>essor Assistant Pr<strong>of</strong>essor Instructor Other<br />
Number 9 14 8 8 8<br />
High 157,544 129,304 108,130 59,484 158,327<br />
Mean 113,261 99,485 98,742 42,196 71,416<br />
Low 94,797 85,929 82,994 39,924 57,757<br />
1<br />
Chairs and segregated salary support is not included in these figures. The Instructor<br />
column includes Assistant Instructors and Lecturers. Other column includes Senior<br />
Community Service Associate, Senior Fellows, Senior Research Fellows and Senior<br />
Research Tech Fellows. This does not include any faculty support from grants.<br />
-25-
-26-
APPENDIX 2 – COURSE DESCRIPTIONS<br />
For each required or elective course in the program that can be counted in the curriculum being reviewed for<br />
accreditation, include a two-page or three-page course outline, as indicated below, at this point in the <strong>Self</strong>-<strong>Study</strong><br />
Report. If your documentation does not exactly follow this format, be sure that all <strong>of</strong> the requested information<br />
(if applicable) is present, and please in any case adhere to a common format for all course descriptions. If some <strong>of</strong><br />
this documentation is on-line (e. g., in an instructor’s web site), please give here the URLs for accessing any such<br />
materials. These URLs should be made accessible to the visiting team as soon as the <strong>Self</strong>-<strong>Study</strong> is sent to them.<br />
As described in Section H <strong>of</strong> the General Instructions for the <strong>Self</strong>-<strong>Study</strong>, the course outline for each required or<br />
elective computing course in the program (including those that satisfy the IS Environment component <strong>of</strong> an<br />
Information Systems program) must also be included in a display <strong>of</strong> course materials that is available for study at<br />
all times during the evaluation visit.<br />
-27-
-28-
CIST 1010 Foundations <strong>of</strong> Information Science and Technology<br />
Department and Course Number CIST 1010<br />
Course Title<br />
Course Coordinator<br />
Total Credits 1<br />
Date <strong>of</strong> Last Revision 10/12/08<br />
Foundations <strong>of</strong> Information Science and Technology<br />
Ilze Zigurs<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
An introduction to the information age; focus on foundations <strong>of</strong> information technologies,<br />
problem solving, information system applications, and social issues. Also describes careers in<br />
information related fields.<br />
1.2 For whom course is intended.<br />
This course is the first <strong>of</strong> six included in the College <strong>of</strong> IS&T’s new core curriculum. Core courses<br />
are to be taken by students before moving into their major area <strong>of</strong> study in the college.<br />
Foundations <strong>of</strong> IS&T is for all students coming into the college (i.e., new incoming freshmen,<br />
transfers from other colleges and universities, and transfers from other colleges in UNO), as well<br />
as students from other colleges who are interested in an overview <strong>of</strong> the broad topics in<br />
information science and technology.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
There are no prerequisites for the course.<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
None.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
This course is unique in taking an experiential approach to the discovery <strong>of</strong> information science<br />
and technology. Students have the opportunity to find out what the College <strong>of</strong> Information<br />
Science and Technology is all about – the main areas <strong>of</strong> study, the big topics in the field, and the<br />
opportunities that are ahead. In-class exercises allow students to experience the “inner workings”<br />
<strong>of</strong> information technology and get a first-hand feel for what they might do, so that they can make<br />
informed choices for their careers as students and beyond.<br />
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
2.1 Understand the main areas <strong>of</strong> study in information science and technology.<br />
2.2 Recognize and appreciate the range <strong>of</strong> career options in information science and technology.<br />
2.3 Be able to find answers to questions during your career as a student here.<br />
2.4 Know how to connect with faculty members in your areas <strong>of</strong> interest<br />
-29-
2.5 Know how to connect with staff members who can help you accomplish your academic goals .<br />
3.0 Content and Organization:<br />
List <strong>of</strong> major topics to be covered in chronological sequence.<br />
3.1 Description <strong>of</strong> College <strong>of</strong> IS&T; Foundation <strong>of</strong> information science 2 hours<br />
and technology fields<br />
3.2 Foundations <strong>of</strong> bioinformatics; experiencing bioinformatics 2 hours<br />
3.3 Foundations <strong>of</strong> computer science; experiencing computer science 2 hours<br />
3.4 Foundations <strong>of</strong> management information systems; experiencing 2 hours<br />
management information systems<br />
3.5 Foundations <strong>of</strong> information assurance; experiencing information 2 hours<br />
assurance<br />
3.6 IT innovation and problem solving 1 hour<br />
3.7 Careers and career development in IS&T 2 hours<br />
3.8 Interdisciplinary issues in IS&T; Social impacts 2 hours<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The class is a mix <strong>of</strong> experiential exercises with discussion. Exercises are conducted in lab sessions<br />
and follow-up discussion builds on what was learned in lab. Guest instructors are included to<br />
expose students to a broad range <strong>of</strong> faculty in the college as well as some guests from industry.<br />
Virtual learning environments and collaboration technologies expose students to leading-edge<br />
methods for collaborative learning.<br />
4.2 Student role in the course.<br />
Students are asked to learn concepts through experiencing them, not to memorize lists and<br />
specific content presented in class. In addition, they are required to apply these concepts in<br />
discussion and exploration.<br />
5.0 Evaluation:<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Students are continuously evaluated during the course. Each experiential exercise is preceded by<br />
research on that topic and a short written assignment.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
The final grade will be calculated as follows:<br />
Component<br />
Grading<br />
Class attendance and participation in exercises 50%<br />
-30-
Weekly written assignments 50%<br />
5.3 Grading scale and criteria.<br />
The course is a pass-fail course. Students must achieve at least 2500 out <strong>of</strong> 3000 possible points in<br />
order to pass the course. Each weekly assignment is worth 100 points and each weekly class<br />
attendance/participation is worth 100 points.<br />
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
There are no textbooks or required/suggested reading materials.<br />
6.2 Other suggested reading materials, if any.<br />
Current news articles as assigned.<br />
6.3 Other sources <strong>of</strong> information.<br />
The students are provided handouts <strong>of</strong> selected overheads presented in each class presentation<br />
to help them to identify key concepts.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
None<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language<br />
Analysis and Design<br />
Data management<br />
Role <strong>of</strong> IS in Organizations 8<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least __15___ written reports (not including exams, tests, quizzes,<br />
or commented programs) to typically __1__ pages and to make __0__ oral presentations <strong>of</strong> typically<br />
_____ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as<br />
well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues:<br />
Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />
on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />
One speaker per semester<br />
-31-
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />
No coverage<br />
11.0 Problem analysis:<br />
Please describe the analysis experiences common to all course sections.<br />
One speaker per semester<br />
12.0 Solution design:<br />
Please describe the design experiences common to all course sections<br />
No coverage<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
6/24/03 ABET cleanup Wolcott<br />
10/12/08 Change to experiential exercises;<br />
Zigurs<br />
Update approach to evaluation to<br />
having regular assignments over the<br />
course <strong>of</strong> the semester;<br />
Update course coordinator<br />
-32-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 1010<br />
Course Title<br />
Foundations <strong>of</strong> Information Science and Technology<br />
Course Coordinator<br />
Ilze Zigurs<br />
Total Credits 1<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand the main areas <strong>of</strong> study in<br />
information science and technology.<br />
Recognize and appreciate the range <strong>of</strong> career<br />
options in information science and technology.<br />
Be able to find answers to questions during your<br />
career as a student here<br />
Know how to connect with faculty members in<br />
your areas <strong>of</strong> interest<br />
Know how to connect with staff members who<br />
can help you accomplish your academic goals<br />
S X X X X X X<br />
S X X X X<br />
X X X X X X X X<br />
X<br />
X<br />
X<br />
-33-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-34-
CIST 1100 Introduction to Computing<br />
Department and Course Number CIST 1100<br />
Course Title<br />
Introduction to Personal Computing<br />
Course Coordinator<br />
Mary Levesque<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/13/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course is an introduction to program development using Visual Basic, Excel and<br />
Access.<br />
1.2 For whom course is intended.<br />
Designed for majors in the College <strong>of</strong> IS&T and others required to take it as a pre-requisite<br />
for CIST 1400<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
None.<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
None.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
2.0 Objectives:<br />
There are no unusual circumstances for this course.<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
2.1 Understanding <strong>of</strong> the program development cycle,<br />
2.2 Create basic Visual Basic programs<br />
2.3 Apply introductory user interface design practices<br />
2.4 Create functional databases using Micros<strong>of</strong>t Access<br />
2.5 Create and use Excel spreadsheets<br />
3.0 Content and Organization:<br />
3.1 Introduction to Spreadsheets – 13.5 Hours<br />
3.1.1 Introduction to Micros<strong>of</strong>t Excel (4.5 hours)<br />
3.1.2 Charts and Graphs in Excel (1.5 hours)<br />
3.1.3 3D Workbooks and file Linking (1.5 hours)<br />
-35-
3.1.4 List and Data Management (3.0 hours)<br />
3.1.5 Exam (1.5 hours)<br />
3.2 Introduction to Programming – 21.0 hours<br />
3.2.1 CPU Fundamentals (1.5 hours, integrated with other topics)<br />
3.2.2 Introduction to programming languages<br />
3.2.3 Problem solving<br />
3.2.4 User-interface design issues (1.5 hours)<br />
3.2.5 Fundamentals <strong>of</strong> Visual Basic (3.0 hours)<br />
3.2.6 Functions (1.5 hours)<br />
3.2.7 Procedures (1.5 hours)<br />
3.2.8 Decisions (4.5 hours)<br />
3.2.9 Repetition (3.0 hours)<br />
3.2.10 Files (1.5 hours)<br />
3.2.11 Arrays (1.5 hours, if time allows)<br />
3.2.12 Exam (1.5 hours)<br />
3.3 Introduction to Database – 10.5 hours<br />
3.3.1 Introduction to Micros<strong>of</strong>t Access (1.5 hours)<br />
3.3.2 Access Tables (3.0 hours)<br />
3.3.3 Reports and Queries from a Data base (1.5 hours)<br />
3.3.4 Miscellaneous (1.5 hours)<br />
3.3.5 Relating Tables (1.5 hours)<br />
3.3.6 Exam (1.5 hours)<br />
-36-
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The course will be taught through lecture, discussions and demonstrations in the Visual Basic,<br />
Access and Excel applications.<br />
4.2 Student role in the course.<br />
Students will be evaluated through programming assignments, Micros<strong>of</strong>t Application assignments<br />
(written and computer) quizzes and three exams.<br />
4.3 Contact hours.<br />
3 hours<br />
5.0 Evaluation:<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
The grade will be based on a combination <strong>of</strong> quizzes, examinations, applications, and<br />
programming assignments.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
The grade will be determined from a weighted average that may resemble the following:<br />
Component<br />
Grading<br />
Quizzes 10%<br />
Exams 50%<br />
Program assignments 40%.<br />
5.3 Grading scale and criteria.<br />
-37-
Points Grade<br />
96-100% A+<br />
92-95% A<br />
89-91% A-<br />
86-88% B+<br />
82-85% B<br />
79-81% B-<br />
76-78% C+<br />
72-75% C<br />
69-71% C-<br />
66-68% D+<br />
62-65% D<br />
59-61% D-<br />
0-58% F<br />
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Shelly, Gary, Cashman, Thomas, and Hoisington, Corinne, Mocros<strong>of</strong>t Visual Basic 2008 for<br />
Windows and Modile Applications, Introductory.<br />
6.1.2 Farrell, Joyce, Programming Logic and Design Fifth Edition bundled with a flowcharting<br />
tool called Visual Logic<br />
6.1.3 Shelly, Gary, Cashman, Thomas, and Quasney, Jeffrey, Micros<strong>of</strong>t Office Excel 2007<br />
Complete Concepts and Techniques.<br />
6.1.4 Shelly, Gary, Cashman, Thomas, Pratt, Philip, and Last, Mary, Micros<strong>of</strong>t Office Access<br />
2007 Complete Concepts and Techniques.<br />
6.2 Other sources <strong>of</strong> information.<br />
Students are directed to search the World Wide Web for other relevant material.<br />
6.3 Current bibliography <strong>of</strong> resource for student’s information.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category<br />
Core<br />
Hardware and s<strong>of</strong>tware 15<br />
Networking and telecommunications<br />
Modern programming language 18<br />
Analysis and Design 2<br />
Data management 9<br />
Role <strong>of</strong> IS in Organizations<br />
Advanced<br />
-38-
8.0 Oral and Written Communications:<br />
Every student is required to submit at least ___0__ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically __0___ pages and to make ___0__ oral presentations <strong>of</strong> typically<br />
__0___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />
as well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues:<br />
No coverage<br />
10.0 Theoretical content:<br />
No coverage<br />
11.0 Problem analysis:<br />
No coverage<br />
12.0 Solution design:<br />
No coverage<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
9/26/02 Initial ABET version Levesque<br />
6/24/03 ABET cleanup Wolcott<br />
10/13/08 Reference list updated Levesque<br />
-39-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 1100<br />
Course Title<br />
Introduction to Personal Computing<br />
Course Coordinator<br />
Mary Levesque<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/13/08<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understanding <strong>of</strong> the program<br />
X<br />
development cycle,<br />
Create basic Visual Basic programs X X S<br />
Apply introductory user interface design X X S<br />
practices<br />
Create functional databases using<br />
X X S<br />
Micros<strong>of</strong>t Access<br />
Create and use Excel spreadsheets X S S<br />
-40-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-41-
-42-
CIST 1300 Introduction to Web Development<br />
Department and Course Number CIST 1300 / CSCI 1300<br />
Course Title<br />
Introduction to Web Development<br />
Course Coordinator<br />
Robert Fulkerson<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision November 17, 2008<br />
1.0 Course Description<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> course (Catalog description)<br />
This course will provide students with a practical introduction to web development. By learning<br />
the basic skills needed to develop an interactive website, students will develop an understanding<br />
<strong>of</strong> the web development task and an appreciation <strong>of</strong> the importance <strong>of</strong> the Internet in both<br />
business and academic environments. Specific technical topics to be covered include XHTML, CSS,<br />
the Unix/Linux operating system, web server s<strong>of</strong>tware, and a programming language. As part <strong>of</strong><br />
the class, each student will develop a working website.<br />
1.2 For whom course is intended<br />
This course is intended for all college students with an interest in computers.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses)<br />
MATH 1310 (or equivalent)<br />
1.4 Prerequisites <strong>of</strong> the course (Topics)<br />
1.4.1 User knowledge <strong>of</strong> a computer (PC or equivalent), keyboard and mouse<br />
1.4.2 Basic algebra<br />
1.5 Unusual circumstances <strong>of</strong> the course<br />
None<br />
2.0 Objectives<br />
2.1 List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
Students successfully completing this class will have developed:<br />
1.5.1 A working knowledge <strong>of</strong> a command-line oriented operating system.<br />
1.5.2 The ability to write simple programs in the Perl programming language.<br />
1.5.3 The ability to create an XHTML standards-compliant web page.<br />
1.5.4 The ability to create standards-compliant CSS documents.<br />
-43-
3.0 Content and Organization<br />
List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> contact hours on each).<br />
3.1 Introduction and Overview 3<br />
3.2 Unix 1.5<br />
3.2.1 asdjklfasjd<br />
3.2.2 Overview <strong>of</strong> Unix<br />
3.2.3 ssh<br />
3.2.4 mkdir<br />
3.2.5 chmod<br />
3.2.6 directory structure<br />
3.2.7 cd<br />
3.2.8 ls<br />
3.2.9 mv<br />
3.2.10 rm<br />
3.2.11 vim<br />
Contact Weeks<br />
3.3 XHTML 6<br />
3.3.1 Overview<br />
3.3.2 Web browsers<br />
3.3.3 Web servers<br />
3.3.4 Block vs. Inline elements<br />
3.3.5 Content vs. Structure<br />
3.3.6 URLs, relative and absolute<br />
3.3.7 Minimal page (, , , , , )<br />
3.3.8 Headers (, , , , , )<br />
3.3.9 Paragraphs, line breaks and blocks (, , , )<br />
3.3.10 Naming and labeling elements (, )<br />
3.3.11 Comments ()<br />
3.3.12 Formatting (, , , , , , , )<br />
3.3.13 Block quotes ()<br />
3.3.14 More formatting (, , , )<br />
3.3.15 Abbreviations and acronyms (, )<br />
3.3.16 Images ()<br />
3.3.17 Image types (JPEG, GIF, PNG)<br />
3.3.18 Links (, )<br />
3.3.19 Lists (, , , , , )<br />
3.3.20 Tables (, , , )<br />
-44-
3.4 CSS 4.5<br />
3.4.1 Overview<br />
3.4.2 Inline vs. Embedded vs. External<br />
3.4.3 Inline CSS via style attribute<br />
3.4.4 CSS Predefined Values<br />
3.4.5 CSS Lengths / Percentages (em, px, in, cm, mm, pt, pc)<br />
3.4.6 RGB triplets for color<br />
3.4.7 Common properties used for formatting (border, border-color, width, padding, font-size,<br />
font-family, background-color, border-top, border-bottom, etc)<br />
3.4.8 Embedded CSS via tag<br />
3.4.9 Style sheets and rules<br />
3.4.10 External CSS via tag<br />
3.4.11 Pseudo-classes<br />
3.4.12 What is meant by “Cascading” style sheets<br />
3.5 Box Model <strong>of</strong> CSS Layout<br />
Perl 18<br />
3.5.1 Overview<br />
3.5.2 Machine language, Assembly Language, High-level Language<br />
3.5.3 Compiling<br />
3.5.4 Basic output using print, printf<br />
3.5.5 Types <strong>of</strong> programming errors (syntax, runtime, semantic)<br />
3.5.6 Scalar data type<br />
3.5.7 Basic input using <br />
3.5.8 Variable interpolation<br />
3.5.9 Escape characters<br />
3.5.10 chomp() and chop()<br />
3.5.11 Basic arithmetic (+, -, *, /, %, **, ., x)<br />
3.5.12 Precedence <strong>of</strong> operators<br />
3.5.13 Compound assignment operators<br />
3.5.14 Unary increment and decrement operators<br />
3.5.15 if selection<br />
3.5.16 if/else selection<br />
3.5.17 Boolean expressions (&&, ||, !)<br />
3.5.18 Uninitialized variables<br />
3.5.19 while repetition<br />
3.5.20 until repetition<br />
3.5.21 Array data type<br />
3.5.22 foreach repetition<br />
3.5.23 for repetition<br />
3.5.24 Data::Dumper for debugging<br />
3.5.25 Hash data type<br />
3.6 XHTML Forms 3<br />
-45-
3.6.1 Overview<br />
3.6.2 Submit and reset buttons<br />
3.6.3 Checkboxes and radio buttons<br />
3.6.4 Text fields, password fields, text areas<br />
3.6.5 Combo boxes<br />
3.7 CGI 6<br />
3.7.1 Overview<br />
3.7.2 Static content vs. dynamic content<br />
3.7.3 CGI defined<br />
3.7.4 Basic CGI using simple Content-Type: text/html<br />
3.7.5 CGI.pm overview<br />
3.7.6 CGI.pm to create basic XHTML<br />
3.7.7 CGI::Carp for debugging<br />
3.7.8 CGI.pm to create XHTML forms<br />
3.7.9 CGI.pm to process forms<br />
4.0 Teaching Methodology<br />
4.1 Methods to be used<br />
The material is taught through lectures based on a common set <strong>of</strong> slides for all instructors. Some<br />
sections may use hands-on laboratory classrooms for each lecture or for special lectures<br />
throughout the semester.<br />
4.2 Student role in the course<br />
Students are encouraged to read the material in the books in advance <strong>of</strong> the lecture so that new<br />
concepts and terms are not “sprung on them”. They are encouraged to participate in class<br />
discussions and ask questions when the material is unclear since all <strong>of</strong> the material is cumulative<br />
and builds on understanding <strong>of</strong> the material that has come before it in the course.<br />
4.3 Contact hours<br />
5.0 Evaluation<br />
The course usually meets for two 75-minute periods weekly (3.0 contact hours).<br />
5.1 Types <strong>of</strong> student products that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. (For laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Each student will write complete approximately 15 assignments on the various topics as they are<br />
covered during the semester. These assignments will include creating XHTML web pages, CSS style<br />
-46-
sheets and Perl programs. Additionally, the students will take a mid-term and a final exam along<br />
with quizzes as needed.<br />
5.2 Basis for determining the final grade.<br />
70% <strong>of</strong> grade will be based on the program/homework scores, 30% <strong>of</strong> the grade will be based on<br />
the quiz and exam scores.<br />
5.3 Grading scale.<br />
6.0 Resource Material<br />
A+ 97% - 100% 4.00 GPA<br />
A 93% - 96% 4.00 GPA<br />
A- 90% - 92% 3.67 GPA<br />
B+ 87% - 89% 3.33 GPA<br />
B 83% - 86% 3.00 GPA<br />
B- 80% - 82% 2.67 GPA<br />
C+ 77% - 79% 2.33 GPA<br />
C 73% - 76% 2.00 GPA<br />
C- 70% - 72% 1.67 GPA<br />
D+ 67% - 69% 1.33 GPA<br />
D 63% - 66% 1.00 GPA<br />
D- 60% - 62% 0.67 GPA<br />
F 0% - 59% 0.00 GPA<br />
6.1 Textbook(s) or other required readings<br />
6.1.1 Randall L. Schwartz, Tom Phoenix, brian d foy. Learning Perl, Fourth Edition. O’Reilly,<br />
2005.<br />
6.1.2 Elizabeth Castro. HTML, XHTML and CSS, Sixth Edition. Peachpit Press, 2006.<br />
6.2 Other suggested reading materials, if any<br />
6.1.3 http://www.perl.com/<br />
6.1.4 http://www.w3.org/<br />
6.1.5 http://www.w3schools.com/<br />
6.3 Current bibliography and other resources<br />
7.0 Computing Accreditation Commission Category Content (class time in hours)<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language 43.5<br />
Analysis and Design<br />
Data management<br />
Role <strong>of</strong> IS in Organizations<br />
-47-
8.0 Oral and Written Communications<br />
Every student is required to submit at least 0 written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically N/A pages and to make 0 oral presentations <strong>of</strong> typically 0<br />
minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as<br />
for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues<br />
Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />
on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth)?<br />
None.<br />
10.0 Theoretical content<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />
None.<br />
11.0 Problem analysis<br />
Please describe the analysis experiences common to all course sections.<br />
Students will learn a number <strong>of</strong> fundamental computer concepts and skills. At the end <strong>of</strong> the course, they<br />
will be able to apply these skills to the development <strong>of</strong> their own dynamic, data-driven web site.<br />
12.0 Solution design<br />
Please describe the design experiences common to all course sections.<br />
This course will require the student to apply a set <strong>of</strong> initially unfamiliar tools to a diverse set <strong>of</strong> problems.<br />
As the student works through each problem, he/she will gain experience and competence in the broader<br />
skill <strong>of</strong> problem solving.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
4/22/2004 Initial ABET version Pauley<br />
3/9/2005 Change to initial course <strong>of</strong> a sequence Brown Also formatted the course to be<br />
suitable for General Education<br />
8/18/05 Reorganization <strong>of</strong> Content and<br />
Pauley<br />
Organization section to make the course<br />
more web page centric. Also added a<br />
semester project.<br />
9/11/06 Further reorganization <strong>of</strong> Content and Pauley<br />
-48-
Organization to make the course even<br />
more web page centric.<br />
4/21/08 Revision to reflect course conversion to Fulkerson<br />
Perl since Fall 2007<br />
4/24/08 Revision to reflect CSCI 1300 cross-listing Fulkerson<br />
and removal <strong>of</strong> “database” in course<br />
description<br />
11/17/08 Update to include CS Program outcomes Fulkerson<br />
-49-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> CS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 1300 / CSCI 1300<br />
Course Title<br />
Introduction to Web Development<br />
Course Coordinator<br />
Robert Fulkerson<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision November 17, 2008<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
A working knowledge <strong>of</strong> a command-line<br />
oriented operating system<br />
The ability to write simple programs in the<br />
Perl programming language.<br />
The ability to create an XHTML standardscompliant<br />
web page<br />
The ability to create standards-compliant CSS<br />
documents.<br />
S S<br />
X S S X<br />
X X S S X S<br />
X X S S X S<br />
-50-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-51-
-52-
CIST 1400 Introduction to Computer Programming<br />
Department and Course Number CIST 1400<br />
Course Title<br />
Introduction to Computer Programming<br />
Course Coordinator<br />
Robert Fulkerson<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision April 24, 2008<br />
1.0 Course Description<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
An introduction to programming within the context <strong>of</strong> a high level modern programming<br />
language. Coverage <strong>of</strong> fundamental programming concepts and program design; including arrays,<br />
user defined types, and objects. This course has a laboratory component in CIST 1404. This lab is<br />
optional.<br />
1.2 For whom course is intended.<br />
This course is intended for freshman-level students in the College <strong>of</strong> IS&T. It also serves many<br />
other departments, including math, education, geography/geology and engineering.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
MATH 1310 AND EITHER CIST 1100 OR CIST 1300<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
Fundamental computing basics and familiarity with computer processing (input, output). Basic<br />
college algebra.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None.<br />
2.0 Objectives<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
2.1 The student should be able to write moderately complex programs in the Java language that<br />
accomplish moderately difficult tasks.<br />
2.2 The students are prepared for the continuation <strong>of</strong> their Java studies in CSCI 1620.<br />
2.3 The students should be comfortable working in a Unix-based console environment.<br />
3.0 Content and Organization<br />
List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> contact hours on each).<br />
-53-
3.1 Overview (1.5 hrs)<br />
3.1.1 What is a computer<br />
3.1.2 Machine Language<br />
3.1.3 Assembly Language<br />
3.1.4 High-Level Langauge<br />
3.1.5 Compiling bytecode<br />
3.2 Introduction to console-based Java Applications (6 hrs)<br />
3.2.1 Basic program structure<br />
3.2.2 Console output with System.out.printf()<br />
3.2.3 Console output with System.out.print()<br />
3.2.4 Console output with System.out.println()<br />
3.2.5 Variables<br />
3.2.6 int<br />
3.2.7 Console Input Using the Scanner Class<br />
3.2.8 Arithmetic (+, -, *, /, %)<br />
3.2.9 Precedence <strong>of</strong> operators<br />
3.2.10 Equality and relational operators (==, !=, , =)<br />
3.2.11 if<br />
3.3 Introduction to Classes and Objects (7.5 hrs)<br />
3.3.1 Classes, objects and instance variables<br />
3.3.2 Declaring a class with a method<br />
3.3.3 Instantiating an object <strong>of</strong> a class<br />
3.3.4 Declaring a method with a parameter<br />
3.3.5 Primitive types<br />
3.3.6 Constructors<br />
3.4 Control Structures (10.5 hrs)<br />
3.4.1 if<br />
3.4.2 if/else<br />
3.4.3 switch<br />
3.4.4 while<br />
3.4.5 do/while<br />
3.4.6 for<br />
3.4.7 Boolean operators (&&, ||, !)<br />
3.4.8 break<br />
3.4.9 continue<br />
3.5 Arithmetic (1.5 hrs)<br />
3.5.1 Compound assignment operators<br />
3.5.2 Unary increment and decrement operators<br />
3.6 Methods (9 hrs)<br />
-54-
3.6.1 Static methods<br />
3.6.2 Static fields<br />
3.6.3 Math class<br />
3.6.4 Java API packages<br />
3.6.5 Methods with multiple parameters<br />
3.6.6 Argument promotion and casting<br />
3.6.7 Scope<br />
3.6.8 Method overloading<br />
3.7 Arrays (9 hrs)<br />
3.7.1 Introduction to Arrays<br />
3.7.2 Arrays and References<br />
3.7.3 Programming with Arrays<br />
3.7.4 Multidimensional Arrays<br />
3.7.5 Searching and sorting<br />
3.7.6 Variable length argument lists<br />
3.7.7 Command-line arguments<br />
4.0 Teaching Methodology<br />
4.1 Methods to be used.<br />
The material is taught through lectures based on a common set <strong>of</strong> slides, assignments and other<br />
documents for all instructors.<br />
4.2 Student role in the course.<br />
Students are encouraged to read the material in the book in advance <strong>of</strong> the lecture so that new<br />
concepts and terms are not “sprung on them”. They are encouraged to participate in class<br />
discussions and ask questions when the material is unclear since all <strong>of</strong> the material is cumulative<br />
and builds on understanding <strong>of</strong> the material that has come before it in the course.<br />
4.3 Contact hours.<br />
5.0 Evaluation<br />
3.0 contact hours per week<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Each student will write approximately 15 – 20 complete console-based Java programs on<br />
the various topics as they are covered during the semester. Additionally, the students will<br />
take four substantial quizzes and a final exam. There may be writing assignments to help<br />
build a fundamental understanding <strong>of</strong> key programming concepts.<br />
-55-
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
60% <strong>of</strong> grade will be based on the program/homework scores, 40% <strong>of</strong> the grade will be<br />
based on the quiz and final exam scores.<br />
5.3 Grading scale and criteria.<br />
6.0 Resource Material<br />
A+ 97% - 100% 4.00 GPA<br />
A 93% - 96% 4.00 GPA<br />
A- 90% - 92% 3.67 GPA<br />
B+ 87% - 89% 3.33 GPA<br />
B 83% - 86% 3.00 GPA<br />
B- 80% - 82% 2.67 GPA<br />
C+ 77% - 79% 2.33 GPA<br />
C 73% - 76% 2.00 GPA<br />
C- 70% - 72% 1.67 GPA<br />
D+ 67% - 69% 1.33 GPA<br />
D 63% - 66% 1.00 GPA<br />
D- 60% - 62% 0.67 GPA<br />
F 0% - 59% 0.00 GPA<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Java How to Program, Seventh Edition, Deitel & Deitel, 2007<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 Thinking in Java, Fourth Edition, Bruce Eckel, 2006<br />
6.2.2 Java Pocket Guide, Robert Liquori, Patricia Liquori, 2008<br />
6.3 Other sources <strong>of</strong> information.<br />
6.3.1 asdjklajsd<br />
6.3.2 Student study groups<br />
6.3.3 Tutoring provided by the College <strong>of</strong> IS&T<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
7.0 Computing Accreditation Commission (CAC) Category Content (class time in hours)<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
-56-
8.0 Oral and Written Communications<br />
Modern programming language 43.5<br />
Analysis and Design<br />
Data management<br />
Role <strong>of</strong> IS in Organizations<br />
Every student is required to submit at least ___0__ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically __0___ pages and to make __0___ oral presentations <strong>of</strong> typically<br />
__0___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />
as well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues<br />
Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />
on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />
None.<br />
10.0 Theoretical content<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />
None.<br />
11.0 Problem analysis<br />
Students must be able to identify the desired goals from a problem statement.<br />
12.0 Solution design<br />
Although each programming assignment targets some topics more than others (namely those that have<br />
been recently presented in the lectures), the solutions will be designed using cumulative knowledge.<br />
Students will design a solution by selecting those techniques that are appropriate to the problem at hand.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
12/16/2002 Initial ABET version Fulkerson<br />
06/13/2003 Cleanup Wileman<br />
12/04/2007 First draft for migration to Java Dasgupta<br />
04/21/2008 Second draft for migration to Java Fulkerson<br />
-57-
04/24/2008 Third draft, minor updates Fulkerson<br />
11/17/08 Update to include CS Program<br />
Outcomes table<br />
Fulkerson<br />
-58-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 1400<br />
Course Title<br />
Introduction to Computer Programming<br />
Course Coordinator<br />
Robert Fulkerson<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision May 27, 2009<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
The student should be able to write<br />
moderately complex programs in the Java<br />
language that accomplish moderately<br />
difficult tasks.<br />
The students are prepared for the<br />
continuation <strong>of</strong> their Java studies in CSCI<br />
1620.<br />
The students should be comfortable<br />
working in a Unix-based console<br />
environment.<br />
S X S<br />
S X S<br />
X S<br />
-59-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-60-
CIST 2500 Introduction to Applied Statistics for IS&T<br />
Department and Course Number CIST 2500<br />
Course Title<br />
Introduction to Applied Statistics for IS&T<br />
Course Coordinator<br />
L<strong>of</strong>tollah Najjar<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 6/24/03<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The course emphasizes the function <strong>of</strong> statistics in information science and technology<br />
including topics such as descriptive statistical measures, probability, discrete probability,<br />
sampling, estimation analysis, hypothesis testing, regression, and analysis <strong>of</strong> variance. A<br />
well-known computer package will be used to support the problem-solving process.<br />
1.2 For whom course is intended.<br />
The course is primarily intended for College <strong>of</strong> Information Science and Technology<br />
(CIST) undergraduate and graduate students who need to satisfy foundation requirements.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 MATH 2030 or MATH 2040 or permission <strong>of</strong> advisor<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Combinatorics<br />
1.4.2 Probability<br />
1.4.3 Discrete Random Variables<br />
1.4.4 Continuous Random Variables<br />
1.4.5 Polynomial Equations<br />
1.4.6 Quadratic Equations<br />
1.4.7 Log and Natural Log Functions<br />
1.4.8 Exponential Functions<br />
1.4.9 Summations (single, double and triple)<br />
1.4.10 Binomial Functions<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None.<br />
2.0 Objectives:<br />
The broad objective <strong>of</strong> this course is to enable you to gain an overview <strong>of</strong> the functions <strong>of</strong> statistics<br />
in modern business. This course will facilitate your understanding <strong>of</strong> the concepts and your<br />
-61-
development <strong>of</strong> the skills needed to apply statistics to the business decision-making process. This<br />
course will also enable you to extend your understanding and use <strong>of</strong> computer-based statistical tools<br />
and provide opportunities to use them to analyze business problems.<br />
3.0 Content and Organization:<br />
Contact Hours<br />
3.1 Data and Statistics 2<br />
3.2 Descriptive Statistics I: Tabular and Graphical Methods 3<br />
3.3 Descriptive Statistics II: Numerical Methods 5<br />
3.4 Probability 1<br />
3.5 Discrete Probability Distributions 2<br />
3.6 Continuous Probability Distributions 1<br />
3.7 Sampling and Sampling Distributions 5<br />
3.8 Interval Estimation 4<br />
3.9 Hypothesis Testing 5<br />
3.10 Statistical Inference about Means with Two Populations 3<br />
3.11 Analysis <strong>of</strong> Variance 4<br />
3.12 Regression Analysis 5<br />
3.13 Interpretation <strong>of</strong> Statistics for Technology Pr<strong>of</strong>essionals 3<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The course uses a combination <strong>of</strong> approaches including lecturing, problem solving, contemporary<br />
project using a statistical packages (MINITAB and Excel), and exams<br />
4.2 Student role in the course.<br />
The student will attend lectures, participate in discussion on assigned readings, complete<br />
assigned projects, and complete required examinations<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Class attendance and participation<br />
Three to four problem-solving projects using a statistical package<br />
Three examinations with combination <strong>of</strong> problem solving and multiple-choice questions about<br />
the concepts discussed in the class.<br />
Component<br />
Grading<br />
-62-
Class attendance and participation 10%<br />
Examinations 60%<br />
Projects 30%<br />
5.2 Grading scale and criteria.<br />
The final grade is based on the percentage <strong>of</strong> points that the student receives out <strong>of</strong> the<br />
total possible points for the course. The guaranteed grade scale is shown in the following<br />
table. A curve may be used to scale the entire class higher, if necessary, but scaling down<br />
will not be done.<br />
Points<br />
92-100% A<br />
89-91% A-<br />
86-88% B+<br />
82-85% B<br />
79-81% B-<br />
76-78% C+<br />
72-75% C<br />
69-71% C-<br />
66-68% D+<br />
62-65% D<br />
59-61% D-<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language<br />
Analysis and Design<br />
Data management 5<br />
Role <strong>of</strong> IS in Organizations 3<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least _3___ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically ___5__ pages and to make __0___ oral presentations <strong>of</strong> typically<br />
___0__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />
as well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues:<br />
No coverage.<br />
10.0 Theoretical content:<br />
Contact Hours<br />
Descriptive Statistics 8<br />
Sampling and Sampling Distributions 5<br />
Interval Estimation 3<br />
Hypothesis Testing 5<br />
Analysis <strong>of</strong> Variance 4<br />
Regression Analysis 5<br />
11.0 Problem analysis:<br />
11.1 Data Collections<br />
11.2 Data Organization<br />
11.3 Data Analysis<br />
12.0 Solution design:<br />
-64-
Student design the appropriate experimental design using statistical models and a well known statistical<br />
s<strong>of</strong>tware such as Excel or MINITAB. Then the appropriate conclusions will be drawn from the results for a<br />
better decision-making.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
10/9/200 Initial ABET version Najjar<br />
6/24/03 ABET clean-up Wolcott<br />
6/25/03 Expansion <strong>of</strong> prerequisite topics Najjar Prerequisite topics previously listed<br />
just prerequisite class titles.<br />
Mapping <strong>of</strong> CS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 2500<br />
Course Title<br />
Introduction to Applied Statistics for IS&T<br />
Course Coordinator<br />
L<strong>of</strong>tollah Najjar<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/27/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
-65-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Work on a team<br />
6. Computer-based tools<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Course objective<br />
The broad objective <strong>of</strong> this course is to enable<br />
you to gain an overview <strong>of</strong> the functions <strong>of</strong><br />
statistics in modern business. This course will<br />
facilitate your understanding <strong>of</strong> the concepts and<br />
your development <strong>of</strong> the skills needed to apply<br />
statistics to the business decision-making process.<br />
This course will also enable you to extend your<br />
understanding and use <strong>of</strong> computer-based<br />
statistical tools and provide opportunities to use<br />
them to analyze business problems.<br />
S<br />
S<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
-66-
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-67-
-68-
CIST 3000 Advanced Technical Writing for IS&T<br />
Department and Course Number CIST 3000<br />
Course Title<br />
Advanced Composition for IS & T<br />
Course Coordinator<br />
Sheri Hronek<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/15/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
Advanced Composition for IS & T provides students with instruction and practice in<br />
academic writing for the technical sciences. The course focuses on principles <strong>of</strong> rhetoric<br />
and composition, advanced library-based research techniques, academic modes <strong>of</strong> writing<br />
suited to the technical sciences, style, grammar, and punctuation, all with attention to<br />
adapting writing to suit the needs <strong>of</strong> various academic and pr<strong>of</strong>essional audiences.<br />
1.2 For whom course is intended.<br />
Undergraduate students in IS & T or other students interested in academic writing in the<br />
technical sciences.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
ENGL1160 (or placement in a 3 rd year writing course)<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
Students should be able to demonstrate the basic writing competencies developed during<br />
their freshman composition course work.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
2.0 Objectives:<br />
None<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
By the end <strong>of</strong> the course, students will exhibit:<br />
2.1 an advanced understanding <strong>of</strong> various academic-based writing strategies and <strong>of</strong> the genres<br />
appropriate for and expected in the technical sciences<br />
2.2 an ability to apply field-related, advanced research skills including a knowledge <strong>of</strong> scholarly, peerreviewed<br />
journals and indexes, the use <strong>of</strong> primary sources, the ability to evaluate sources, and<br />
expertise in using field-appropriate documentation<br />
-69-
2.3 a sophisticated understanding <strong>of</strong> grammar and language issues as they apply to writing generally<br />
and to the style expected in academic writing in the technical sciences<br />
2.4 developed pr<strong>of</strong>iciency in using discourse-community specific language, including vocabulary and<br />
style<br />
2.5 a sophisticated understanding <strong>of</strong> writing as a process that includes multiple drafts that<br />
productively and effectively respond to feedback<br />
2.6 an understanding <strong>of</strong> how writing functions in various academic and pr<strong>of</strong>essional communities<br />
students will encounter in their personal, pr<strong>of</strong>essional, and academic life<br />
2.7 a mature awareness <strong>of</strong> audience and the ability to adapt writing to various audiences and<br />
purposes<br />
3.0 Content and Organization:<br />
List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> hours on each).<br />
As various instructors will teach the course, the sequence <strong>of</strong> topics may vary. The following table<br />
provides a suggested sequence based on collaborative research proposals and projects (groups <strong>of</strong><br />
3-4).<br />
3.1 Discourse communities & academic/pr<strong>of</strong>essional communication practices 3<br />
3.2 Writing fundamentals overview 3<br />
3.3 Style 1: Discourse communities & tiles<br />
3.4 Style II: General Stylistic Conventions 3<br />
3.5 General technical stylistic conventions<br />
3.6 Diction & Style<br />
3.7 Theoretical/historical research overview 3<br />
3.8 Theoretical/historical research proposals<br />
3.9 Collaboration<br />
3.10 Style III Persuasive writing<br />
3.11 Using sources 3<br />
3.12 Style IV: Paragraphing<br />
3.13 Style V: Tone 3<br />
3.14 Peer Review practices<br />
3.15 Shifting from proposal to research<br />
3.16 Research project norming<br />
3.17 Style VI: Syntactical Revision Workshop 3<br />
Class Hours<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
-70-
Teaching methods may vary from instructor to instructor. The course may include any <strong>of</strong><br />
the following: lectures, writing/draft workshops, group discussion, norming sessions,<br />
library research instruction, and peer-review sessions.<br />
4.2 Student role in the course.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
The student’s role in the course flows from the objectives and content benchmarks<br />
outlined above (2.1). In general, students should seek to develop and advance their<br />
academic writing skills through active, conscientious engagement in the various writing<br />
projects and activities.<br />
3 hours<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
As writing projects may vary from instructor to instructor, the following list is suggestive<br />
only.<br />
5.1.1 Field Description (technically informed audience)<br />
5.1.2 Field Introduction (nontechnically informed audience)<br />
5.1.3 Peer-Reviewed Journal Analysis<br />
5.1.4 Library-Based Research Proposal (individual or collaborative)<br />
5.1.5 Library-Based Research Project (individual or collaborative)<br />
5.1.6 Abstract<br />
5.1.7 Project Plans<br />
5.1.8 Individual Activity Logs<br />
5.1.9 Semester <strong>Self</strong>-Assessment memos<br />
5.1.10 Research Presentation (individual or collaborative)<br />
5.1.11 Portfolio<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
The basis for determining the final may vary depending on instructors. The following is a<br />
suggestive model assessing both individual and collaborative writing efforts.<br />
5.2.1 Individual Assessments:<br />
Documentation Exams I & II 10%<br />
Field Description & Intro 5%<br />
Journal Analysis 15%<br />
-71-
5.2.2 Individual Effort & Work Participation 15%<br />
Abstract<br />
Documentation Workshop<br />
Individual Portfolio<br />
Quote, Paraphrase, Summary Ex.<br />
5.2.3 Individual’s Collaborative Effort & Work 15%<br />
5.2.4 Group Assignments:<br />
Research Proposal & Deliverables 15%<br />
Research Project & Deliverables 25%<br />
-72-
5.3 Grading scale and criteria.<br />
6.0 Resource Material<br />
98-100 A+<br />
95-97 A<br />
92-94 A-<br />
88-91 B+<br />
85-87 B<br />
82-84 B-<br />
78-81 C+<br />
75-77 C<br />
72-74 C-<br />
68-71 D+<br />
65-67 D<br />
62-64 D-<br />
-61 F<br />
An “I” or “IP” will be awarded only if a student is unable to complete the course<br />
requirements due to circumstances beyond her/his control as specified in the UNO<br />
catalog. The student must also have substantially completed the course and have a<br />
passing grade when the grade <strong>of</strong> “I” is requested.<br />
6.1 Textbooks and/or other required readings used in course.<br />
Textbook selection may vary from instructor to instructor. The following is a suggestive<br />
list.<br />
6.1.1 Hansen, K. (1998). A rhetoric for the social sciences: A guide to academic and pr<strong>of</strong>essional<br />
communication. Upper Saddle River, NJ: Prentice Hall.<br />
6.1.2 Jones, D. (1998). Technical writing style. Boston: Allyn and Bacon.<br />
6.1.3 Lunsford, A. A. (2008). The St. Martin’s handbook (6th ed.). Boston: Bedford/St.Martin’s.<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 Readings that support the students’ development as writers are recommended,<br />
particularly peer-reviewed, article-length or book-length works. Students should also<br />
become familiar with the APA Publication Manual (2001) or other style guides suitable to<br />
academic writing in the technical sciences.<br />
6.3 Other sources <strong>of</strong> information.<br />
6.3.1 Industry white papers & reports related to areas <strong>of</strong> technical research.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
-73-
6.4.1 Alred, G., Brusaw, C., & Oliu, W. (1992). The pr<strong>of</strong>essional writer: A guide for advanced<br />
technical writing. New York: St. Martin’s Press. American Psychological Association.<br />
(2001). Publication manual (5th ed.). Washington, DC: American Psychological<br />
Association.<br />
6.4.2 Coe, M. (1996). Human factors for technical communication. New York: Wiley.<br />
6.4.3 Coletta, W. J. (1992). The ideologically based use <strong>of</strong> language in scientific and technical<br />
communication. Technical Communication Quarterly, 1(1), 59-70.<br />
6.4.4 Day, R. (1988). How to write and publish scientific paper (3rd ed.). Phoenix, AZ: Oryx.<br />
6.4.5 Day , R. (1992). Scientific English: A guide for scientists and other pr<strong>of</strong>essionals. Phoenix,<br />
AZ: Oryx.<br />
6.4.6 Ede, L., & Lunsford, A. (1990). Singular texts/plural authors: Perspectives on collaborative<br />
writing. Carbondale: Southern Illinois <strong>University</strong> Press.<br />
6.4.7 Gross, A. G. (1996). The rhetoric <strong>of</strong> science. Cambridge, MA: Harvard <strong>University</strong> Press.<br />
6.4.8 Gurak, L. J. (2000). Oral presentations for technical communications. Boston: Allyn &<br />
Bacon.<br />
6.4.9 Hager, P. J., & Scheiber, H. J. (1997). Designing and delivering scientific, technical, and<br />
managerial presentations. New York: Wiley.<br />
6.4.10 Halloran, M. (1978). Technical writing and the rhetoric <strong>of</strong> science. Journal <strong>of</strong> Technical<br />
Writing and Communication, 8(2), 77-88.<br />
6.4.11 Haring-Smith, T. (1993). Learning together: An introduction to collaborative learning. New<br />
York: HarperCollins.<br />
6.4.12 H<strong>of</strong>t, N. L. (1995). International technical communication: How to export information<br />
about high technology. New York: Wiley.<br />
6.4.13 Houp, K. W., Pearsall, T. E., & Thebeaux, E. (1998). Reporting technical information (9th<br />
ed.). Boston: Allyn & Bacon.<br />
6.4.14 Locke, D. (1992). Science as writing. New Haven, CT: Yale <strong>University</strong> Press.<br />
6.4.15 Miller, C. (1984). Genre as social action. Quarterly Journal <strong>of</strong> Speech, 70, 151-167.<br />
6.4.16 Penrose, A. M., and Katz, S. B. (2004). Writing in the sciences: Exploring conventions <strong>of</strong><br />
scientific discourse (2nd ed.). Boston: Allyn and Bacon.<br />
6.4.17 Porush, D. (1995). A short guide to writing about science. New York: HarperCollins.<br />
6.4.18 Prelli, L. J. (1989). A rhetoric <strong>of</strong> science: Inventing scientific discourse. Columbia:<br />
<strong>University</strong> <strong>of</strong> South Carolina Press.<br />
6.4.19 Rude, C. D. (2002). Technical editing (3rd ed.). New York: Longman.<br />
6.4.20 Sanders, S (1988). How can technical writing be persuasive? In L. Beene & P. White (Eds.),<br />
Solving problems in technical writing (pp. 55-78). New York: Oxford <strong>University</strong> Press.<br />
6.4.21 Schindler, G. E., Jr. (1975). Why engineers and scientists write as they do— Twelve<br />
characteristics <strong>of</strong> their prose. IEEE Transactions on Pr<strong>of</strong>essional Communication, 18(1), 5-<br />
10.<br />
6.4.22 Young, J. Z. (1965). Doubt and certainty in science. In J. Harrison (Ed.), Scientists as writers<br />
(pp. 49-51). Cambridge, MA: MIT Press.<br />
7.0 (Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category<br />
Content (class time in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 0 0<br />
Networking and telecommunications 0 0<br />
Modern programming language 0 0<br />
-74-
Analysis and Design<br />
Data management<br />
Role <strong>of</strong> IS in Organizations<br />
As this course focuses on students’ development as writers, these areas are not directly addressed.<br />
Students may, however, engage any <strong>of</strong> these areas in individual/collaborative writing projects. See 8.0<br />
7.0 (Fill out for CSCI and CIST courses) Estimate Computer Science Accreditation Board (CSAB)<br />
Category Content (class time in hours):<br />
CSAB Category Core Advanced<br />
Data structures 0 0<br />
Computer organization and architecture 0 0<br />
Algorithms and s<strong>of</strong>tware design 0 0<br />
Concepts <strong>of</strong> programming languages 0 0<br />
As this course focuses on students’ development as writers, these areas are not directly addressed.<br />
Students may, however, engage any <strong>of</strong> these areas in individual/collaborative writing projects. See 8.0<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least ___6__ written reports (not including exams, tests, quizzes, or<br />
commented programs) <strong>of</strong> typically __1-20___ pages and to make ___1__ oral presentations <strong>of</strong> typically<br />
__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />
as well as for technical content, completeness, and accuracy.<br />
As this is an academic-based writing course, Instructors should present some <strong>of</strong> the basic<br />
principles <strong>of</strong> effective academic document design based on appropriate manuscript preparation<br />
style guides, such as the APA Publication Manual (2001). Students should also demonstrate their<br />
understanding <strong>of</strong> the importance <strong>of</strong> good design through their research presentations.<br />
9.0 Social and Ethical Issues:<br />
Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />
on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />
The course should address social and ethical issues related to the practice <strong>of</strong> writing. One area <strong>of</strong><br />
concern is style, particularly the importance <strong>of</strong> unbiased language use (in terms <strong>of</strong> gender,<br />
race/ethnicity, etc.), the role <strong>of</strong> the detached persona, and other elements as specified by the<br />
American Psychological Association’s Publication Manual (2001). Students should be expected to<br />
reflect awareness <strong>of</strong> pr<strong>of</strong>essional language use concerns in all their writing.<br />
-75-
10.0 Theoretical content:<br />
Another area <strong>of</strong> concern should be the ethics <strong>of</strong> working with sources, especially in terms <strong>of</strong><br />
understanding and avoiding plagiarism.<br />
All <strong>of</strong> these issues are explored and reiterated throughout the semester.<br />
Students may also explore social and ethical issues related to the technical fields through their<br />
individual or collaborative research projects.<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />
11.0 Problem analysis:<br />
The course should cover relevant rhetorical and compositional theories and practices related to<br />
the process <strong>of</strong> writing such as invention, audience analysis, stylistics, and<br />
argumentation/persuasion in technical academic writing. Theories <strong>of</strong> collaboration as a<br />
community <strong>of</strong> practice are also addressed.<br />
These theories and their application to writing are discussed throughout the semester.<br />
Students may also explore theoretical material through their individual and collaborative projects.<br />
Please describe the analysis experiences common to all course sections.<br />
12.0 Solution design:<br />
Analytical activities generally should focus on examining practical issues related to the writing &<br />
research process. These include, but are not limited to, audience analysis, research planning and<br />
coordination, self-assessment, source assessment, solving problems in the research process,<br />
solving problems in collaboration, and so forth.<br />
While all writing for the class should encourage analysis (implicitly or explicitly), one major writing<br />
project should have an explicitly analytical focus. This may vary from instructor to instructor.<br />
Please describe the design experiences common to all course sections.<br />
CHANGE HISTORY<br />
Students should be encouraged to address solution design as part <strong>of</strong> problem analysis. Forms<br />
(project planning, individual/group activity logs) may be used to help students construct effective<br />
solution decisions by encouraging them to define problems, articulate potential solutions, and the<br />
rationale for the proposed solutions. Ultimately, students’ writing should reflect their abilities to<br />
effectively handle problems with research, collaboration, the writing process, and so forth.<br />
Date Change By whom Comments<br />
5/15/08 Created Hronek<br />
-76-
-77-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Work on a team<br />
6. Computer-based tools<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> CS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 3000<br />
Course Title<br />
Advanced Technical Writing for IS&T<br />
Course Coordinator<br />
Sheri Hronek<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/15/08<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
an advanced understanding <strong>of</strong> various<br />
academic-based writing strategies and <strong>of</strong> the<br />
genres appropriate for and expected in the<br />
technical sciences<br />
an ability to apply field-related, advanced<br />
research skills including a knowledge <strong>of</strong><br />
scholarly, peer-reviewed journals and<br />
indexes, the use <strong>of</strong> primary sources, the<br />
ability to evaluate sources, and expertise in<br />
using field-appropriate documentation<br />
a sophisticated understanding <strong>of</strong> grammar<br />
and language issues as they apply to writing<br />
generally and to the style expected in<br />
academic writing in the technical sciences<br />
S<br />
S<br />
S<br />
developed pr<strong>of</strong>iciency in using discourse- S<br />
-78-
community specific language, including<br />
vocabulary and style<br />
a sophisticated understanding <strong>of</strong> writing as a<br />
process that includes multiple drafts that<br />
productively and effectively respond to<br />
feedback<br />
an understanding <strong>of</strong> how writing functions in<br />
various academic and pr<strong>of</strong>essional<br />
communities students will encounter in their<br />
personal, pr<strong>of</strong>essional, and academic life<br />
a mature awareness <strong>of</strong> audience and the<br />
ability to adapt writing to various audiences<br />
and purposes<br />
S<br />
S<br />
S<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-79-
-80-
CIST 3100 Organizations, Applications, and Technology<br />
Department and Course Number CIST 3100<br />
Course Title<br />
Organizations, Applications and Technology<br />
Course Coordinator<br />
Paul van Vliet<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/12/2008<br />
1.0 Course Description<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course<br />
This survey course provides an introduction to organizations and the role information and information<br />
systems play in supporting operations, decision-making, processes, quality management, and strategic<br />
activities <strong>of</strong> an organization. In addition, the course covers management <strong>of</strong> the IS function, strategic and<br />
regulatory issues <strong>of</strong> telecommunications, and ethical and legal issues.<br />
1.2 For whom course is intended<br />
The course is intended for undergraduate students in the schools <strong>of</strong> IS&T, Business Administration and<br />
Engineering who need to learn the fundamentals <strong>of</strong> Management Information Systems.<br />
1.3 Prerequisites <strong>of</strong> the course<br />
None<br />
1.4 Unusual circumstances <strong>of</strong> the course<br />
As <strong>of</strong> January 2007, this course is regularly <strong>of</strong>fered as an online course.<br />
2.0 Objectives:<br />
2.1 To understand the role <strong>of</strong> information systems and the subsequent challenges in today’s<br />
competitive business environment<br />
2.2 To understand the diversity <strong>of</strong> Information Systems and networks in the enterprise<br />
2.3 To understand Information Systems, organizations and management models, roles and their<br />
impact on the decision making process.<br />
2.4 To understand how Internet technology, electronic commerce, and electronic web based systems<br />
have transformed organizations, business models, supply chains and quality<br />
2.5 To understand basic computer hardware and s<strong>of</strong>tware and information systems security and<br />
control<br />
2.6 To obtain a basic understanding <strong>of</strong> s<strong>of</strong>tware applications such as operating systems, file<br />
management and data storage<br />
2.7 To gain a basis understanding <strong>of</strong> the challenges <strong>of</strong> maintaining a traditional data environment<br />
versus a database environment<br />
-81-
2.8 To gain a basis understanding <strong>of</strong> telecommunications and networks, including the Internet.<br />
2.9 To understand the business value <strong>of</strong> systems and technology<br />
2.10 To understand how organizations can use expert systems and case-based reasoning to capture<br />
knowledge<br />
2.11 To understand the legal and ethical impacts <strong>of</strong> information systems<br />
3.0 Content and Organization<br />
-82-<br />
Contact Hours<br />
3.1 Introduction to course, description <strong>of</strong> course requirements,<br />
and a discussion <strong>of</strong> expectations for the course 3<br />
3.2 Information Systems in Global Business Today. 3<br />
3.3 Global E-Business: How Businesses Use Information Systems 3<br />
3.4 Information Systems, Organizations, and Strategy 3<br />
3.5 Ethical and Social Issues in Information Systems 3<br />
3.6 IT Infrastructure and Emerging Technologies 3<br />
3.7 Foundations <strong>of</strong> Business Intelligence:<br />
Databases and Information Management 3<br />
3.8 Telecommunications, the Internet, and Wireless Technology 3<br />
3.9 Securing Information Systems 3<br />
3.10 Achieving Operation Excellence and Customer Intimacy:<br />
Enterprise Applications 3<br />
3.11 E-Commerce: Digital Markets, Digital Goods 3<br />
3.12 Managing Knowledge 3<br />
3.13 Enhancing Decision Making 3<br />
3.14 Building Systems 3<br />
3.15 Project Management: Establishing the Business Value <strong>of</strong><br />
Systems and Managing Change 3<br />
3.16 Managing Global Systems 3<br />
4.0 Teaching Methodology<br />
4.1 Methods to be used<br />
The primary teaching method will be discussion <strong>of</strong> chapter contents, case studies, lecture, and<br />
discussion questions.<br />
4.2 Student role in the course<br />
The student will attend lectures and demonstrations, participate in discussion on assigned<br />
readings, complete assigned projects and papers, and complete required examinations.<br />
4.3 Contact hours<br />
Three (3) hours per week.<br />
5.0 Evaluation<br />
Note: exact contact hours may vary for the online version <strong>of</strong> this course; however, the contents <strong>of</strong><br />
the online course follows the regular course closely.
5.1 Types <strong>of</strong> student products<br />
The student products will be: two examinations (a midterm and final) or a single comprehensive<br />
examination, a ten-page research paper, a group term project, and other small assignments as<br />
deemed useful by the instructor.<br />
5.2 Basis for determining the final grade<br />
Grades will be determined on the basis <strong>of</strong> the student’s participation in class (10%), the student’s<br />
performance on examinations (30%), development <strong>of</strong> a ten-page research report based on<br />
readings from the trade and empirical literature (30%), and completion <strong>of</strong> the term project (30%).<br />
Component<br />
Grading<br />
Examination(s) 30%<br />
Class Participation 10%<br />
Research Paper 30%<br />
Term project 30%<br />
5.3 Grading Scale and Criteria<br />
Earned Grade<br />
Grade<br />
97-100% A+<br />
93-96% A<br />
90-92% A-<br />
87-89% B+<br />
83-86% B<br />
80-82% B-<br />
77-79% C+<br />
73-76% C<br />
70-72% C-<br />
67-69% D+<br />
63-66% D<br />
60-62% D-<br />
59% F<br />
6.0 Resource Material:<br />
6.1 The latest edition <strong>of</strong> textbook(s) or other required readings used in the course, or equivalent.<br />
-83-
6.1.1 Loudon, K.C. and Loudon, J.P. (2007) Management Information Systems: Managing the<br />
Digital Firm, 10th Edition, Saddle River, NJ: Prentice Hall.<br />
6.2 Other suggested reading materials or equivalent<br />
Additional articles relating to the various topics in the course can be made available at the UNO<br />
Library or via online links. These articles are used to supplement topics presented in various<br />
chapters.<br />
6.3 Other sources for gathering information or equivalent<br />
Students are encouraged to read articles in current pr<strong>of</strong>essional and trade journals and websites<br />
that are relevant to topics in information systems. The process is particularly important in<br />
keeping current with technology and new methodologies.<br />
6.4 Current Bibliography:<br />
6.4.1 Jessup, L. & Valacich, J. (2008) Information Systems Today; Managing in the Digital World,<br />
3rd Edition, Saddle River, NJ: Prentice Hall.<br />
6.4.2 Stair, R. & Reynolds, G., (2006) Principles <strong>of</strong> Information Systems; A Managerial Approach,<br />
7th Edition, Boston, MA: Thomson Course Technology.<br />
6.4.3 Turban, E., Rainer, Jr., R.K., & Potter, R.E. (2005) Introduction to Information Technology,<br />
3rd Edition, Hoboken, NJ, John Wiley & Sons, Inc.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 3<br />
Networking and telecommunications 4<br />
Modern programming language 0<br />
Analysis and Design 2<br />
Data management 3<br />
Role <strong>of</strong> IS in Organizations 8<br />
8.0 Oral and Written Communications:<br />
Written research reports, and optional case study assignments and review questions provide<br />
opportunities for written and oral communication. The students also collaborate on written term projects<br />
which emphasize pr<strong>of</strong>essional communication practices.<br />
Note: for the online version <strong>of</strong> the course, oral student presentations are <strong>of</strong>ten impractical, and written<br />
assignments are regularly substituted.<br />
-84-
9.0 Social and Ethical Issues: Contact Hrs. 3<br />
Every student will be expected to understand the ethical impacts <strong>of</strong> information systems including:<br />
auditing <strong>of</strong> computer systems, the ethical, social and political needs <strong>of</strong> society, the ethical issues involved<br />
in any situation, ethical principles for conduct, and ethical conduct policies as they relate to information<br />
systems<br />
10.0 Theoretical content:<br />
Contact Hours<br />
10.1 Value Chain Model 1<br />
10.2 Industry Competitive Forces Model 1<br />
11.0 Problem analysis:<br />
Case studies are provided at the end <strong>of</strong> each <strong>of</strong> 15 chapters, providing the instructor with the opportunity<br />
to have the students analyze them.<br />
12.0 Solution design:<br />
Review problems are provided at the end <strong>of</strong> each <strong>of</strong> 15 chapters, providing the instructor with the<br />
opportunity to have the students develop solutions and appropriate answers to them.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
9/22/2002 Initial ABET version Van Vliet<br />
6/12/03 Remove Prerequisite. Course Change lw CIST 2010 no longer required<br />
Form 2/11/03<br />
6/24/03 ABET cleanup Wolcott<br />
9/13/2007 Change course number from CIST Van Vliet<br />
2110 to CIST 3100<br />
9/13/2007 Update document to match current Van Vliet<br />
text contents and assignments<br />
9/13/2007 Update document to include e- Van Vliet<br />
learning adjustments<br />
10/12/2008 Reviewed course document, found<br />
contents to be current.<br />
Van Vliet<br />
-85-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 3100<br />
Course Title<br />
Organizations, Applications and Technology<br />
Course Coordinator<br />
Paul van Vliet<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
To understand the role <strong>of</strong> information systems S S S S X<br />
and the subsequent challenges in today’s<br />
competitive business environment<br />
To understand the diversity <strong>of</strong> Information<br />
S S S X<br />
Systems and networks in the enterprise<br />
To understand Information Systems,<br />
S S S X X<br />
organizations and management models, roles and<br />
their impact on the decision making process.<br />
To understand how Internet technology,<br />
S S S X X X<br />
electronic commerce, and electronic web based<br />
systems have transformed organizations,<br />
business models, supply chains and quality<br />
To understand basic computer hardware and<br />
S X S<br />
s<strong>of</strong>tware and information systems security and<br />
control<br />
To obtain a basic understanding <strong>of</strong> s<strong>of</strong>tware<br />
S X S<br />
applications such as operating systems, file<br />
management and data storage<br />
To gain a basis understanding <strong>of</strong> the challenges <strong>of</strong> S X S<br />
-86-
maintaining a traditional data environment versus<br />
a database environment<br />
To gain a basis understanding <strong>of</strong><br />
telecommunications and networks, including the<br />
Internet.<br />
To understand the business value <strong>of</strong> systems and<br />
technology<br />
To understand how organizations can use expert<br />
systems and case-based reasoning to capture<br />
knowledge<br />
To understand the legal and ethical impacts <strong>of</strong><br />
information systems<br />
S X S<br />
S S X X<br />
S S S<br />
S S S X X<br />
-87-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-88-
CIST 3110 Information Technology Ethics<br />
Department and Course Number CIST 3110<br />
Course Title<br />
Information Technology Ethics<br />
Course Coordinator<br />
Leah R. Pietron<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 09/10/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The course will cover the development and need for issues regarding privacy and the application<br />
<strong>of</strong> computer ethics to information technology.<br />
1.2 For whom course is intended.<br />
This course is intended for undergraduate management information systems (MIS), computer<br />
science (CS), information assurance (IA), and bioinformatics majors.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
CIST 3110 - Organizations, Applications & Technology or equivalent.<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Introduction to Information Systems<br />
1.4.2 Review <strong>of</strong> Social, Privacy, Legal, and Ethics theory<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> student behavior.<br />
The student will:<br />
2.1 Be able to determine the impact <strong>of</strong> the privacy laws on information security policies.<br />
2.2 Understand the issues related to intellectual freedom, intellectual property, and copyright law as<br />
they relate to electronic publishing.<br />
2.3 Be able to determine and identify ethical procedures and behaviors in the organization related to<br />
information security.<br />
2.4 Be able to identify issues <strong>of</strong> pr<strong>of</strong>essional conduct in information technology case studies.<br />
-89-
2.5 Be able to apply <strong>University</strong> standards <strong>of</strong> ethical conduct in preparing assignments for all<br />
coursework.<br />
2.6 Learn the areas most impacted by ethical decisions by pr<strong>of</strong>essionals in the computing field and<br />
will gain skills in making such decisions.<br />
2.7 Identify key ethical concerns <strong>of</strong> information technology specialists.<br />
2.8 Apply theories <strong>of</strong> ethics to case situations in the context <strong>of</strong> organizational use <strong>of</strong> information<br />
technology.<br />
2.9 Appreciate how rapid changes in technology might affect ethical issues and changing norms <strong>of</strong><br />
behavior.<br />
2.10 Understand the issues related to privacy and confidentiality as they relate to information<br />
technology.<br />
2.11 Understand the ethical issues associated with gathering, storing and accessing genetic<br />
information in databases.<br />
2.12 Recognize the differences in ethical codes <strong>of</strong> conduct in different cultures and countries.<br />
2.13 Understand the ethical issues that arise from findings in genomic and bioinformatics analyses.<br />
2.14 The student will study and apply the following:<br />
2.14.1 Business Rules<br />
2.14.2 Firewalls<br />
2.14.3 Cryptography<br />
2.14.4 Privacy Laws<br />
2.14.5 Copyright Ownership<br />
2.14.6 Privacy, Publicity and Defamation<br />
2.14.7 Trademarks and Unfair Competition in Cyberspace<br />
2.14.8 Intellectual Property<br />
2.14.9 Contrast <strong>of</strong> Law vs. Ethic<br />
2.14.10 Organizational Ethical Principles<br />
3.0 Content and Organization:<br />
List <strong>of</strong> major topics to be covered in chronological sequence<br />
Contact Hours<br />
3.1 Frameworks for Ethical and Policy Analysis 3<br />
3.1.1 Moral Frameworks<br />
3.1.2 General Framework for Ethical Analysis<br />
3.2 Unwrapping the Gift<br />
3.2.1 The Ubiquity <strong>of</strong> Computers and the Rapid Pace <strong>of</strong> Change 3<br />
3.2.2 New Developments and Dramatic Impacts<br />
3.2.3 An Introduction to Some Issues and Themes<br />
3.2.4 Ethics<br />
3.3 Privacy 3<br />
3.3.1 Privacy and Computer Technology<br />
3.3.2 “Big Brother Is Watching You.”<br />
3.3.3 Diverse Privacy Topics<br />
3.3.4 Protecting Privacy: Technology, Markets, Rights and Laws<br />
3.3.5 Communications<br />
-90-
3.4 Freedom <strong>of</strong> Speech 3<br />
3.4.1 Changing Communications Paradigms<br />
3.4.2 Offensive Speech and Censorship in Cyberspace<br />
3.4.3 Anonymity<br />
3.4.4 Spam<br />
3.4.5 Ensuring Valuable and Diverse Content<br />
3.5 Intellectual Property<br />
3.5.1 Intellectual Property and Changing Technology<br />
3.5.2 Copyright Law<br />
3.5.3 Copying and Sharing<br />
3.5.4 Search Engines and Online Libraries<br />
3.5.5 Free-Speech Issues<br />
3.5.6 Free S<strong>of</strong>tware<br />
3.5.7 Issues for S<strong>of</strong>tware Developers<br />
3.6 Computer Crime 3<br />
3.6.1 Introduction<br />
3.6.2 Hacking<br />
3.6.3 Identity Theft and Credit-Card Fraud<br />
3.6.4 Scams and Forgery<br />
3.6.5 Crime Fighting Versus Privacy and Civil Liberties<br />
3.6.6 Whose Laws Rule the Web?<br />
3.7 Work 3<br />
3.7.1 Fears and Questions<br />
3.7.2 The Impact on Employment<br />
3.7.3 The Work Environment<br />
3.7.4 Employee Crime<br />
3.7.5 Employee Monitoring<br />
3.8 Evaluating and Controlling Technology 3<br />
3.8.1 Information, Knowledge, and Judgment<br />
3.8.2 Computers and Community<br />
3.8.3 The Digital Divide<br />
3.8.4 Evaluations <strong>of</strong> the Impact <strong>of</strong> Computer Technology<br />
3.8.5 Making Decisions About Technology<br />
3.9 Errors, Failures, and Risk<br />
3.9.1 Failures and Errors in Computer Systems<br />
3.9.2 Case <strong>Study</strong>: The Therac-25<br />
3.9.3 Increasing Reliability and Safety<br />
3.9.4 Dependence, Risk, and Progress<br />
3.10 Pr<strong>of</strong>essional Ethics and Responsibilities 3<br />
3.10.1 What is Pr<strong>of</strong>essional Ethics?<br />
3.10.2 Ethical Guidelines for Computer Pr<strong>of</strong>essionals<br />
3.10.3 Scenarios<br />
3.11 The S<strong>of</strong>tware Engineering Code and the ACM Code<br />
3.12 ethical Cases in Social, Legal, Privacy and Ethics 15<br />
4.0 Teaching Methodology:<br />
-91-
4.1 Methods to be used.<br />
The primary teaching methods will be instructor-led discussions, student-led small group<br />
discussions, case studies, lecture, guest speakers, and demonstration.<br />
4.2 Student role in the course.<br />
The student will attend lectures and demonstrations, analyze selected cases, lead and participate<br />
in discussions on assigned readings and cases, complete assigned projects, and complete required<br />
examinations.<br />
4.3 Contact hours.<br />
Three hours per week<br />
5.0 Evaluation:<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
The student products will be group and individual case analysis reports, article reviews, book<br />
reports, quizzes, computer projects, examinations, term paper, and oral presentations.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Grades will be determined on the following basis:<br />
Component<br />
Grading<br />
Participation in project/term paper 15%<br />
Book report 10%<br />
Case studies 10%<br />
Oral presentation 5%<br />
Quizzes on readings 10%<br />
Midterm 20%<br />
Final exam 20%<br />
In-class participation 10%<br />
5.3 Grading scale and criteria.<br />
-92-
Points<br />
97-100% A+<br />
93-96% A<br />
90-92% A-<br />
87-89% B+<br />
83-86% B<br />
80-82% B-<br />
77-79% C+<br />
73-76% C<br />
70-72% C-<br />
67-69% D+<br />
63-66% D<br />
60-62% D-<br />
6.2.11 Cato Institute, a libertarian perspective<br />
6.2.12 Thomas, Library <strong>of</strong> Congress site for bills currently going through the U.S. Congress and<br />
recent U.S. laws.<br />
6.2.13 Privacy.org, news and advocacy <strong>of</strong> strong privacy regulation (EPIC and Privacy<br />
International)<br />
6.2.14 TRUSTe<br />
6.2.15 Federal Trade Commission<br />
6.2.16 "Freedom <strong>of</strong> Speech and Information Privacy" (Eugene Volokh, UCLA Law School)<br />
6.2.17 Federal Bureau <strong>of</strong> Investigation (Use site search tool for "Carnivore," etc.)<br />
6.2.18 Echelonwatch (American Civil Liberties Union, EPIC, and others)<br />
6.2.19 Cryptography issues and legislation (Center for Democracy and Technology).<br />
6.2.20 "Cryptography's Role in Securing the Information Society" (National Academy <strong>of</strong> Sciences)<br />
6.2.21 "Encryption Policy for the 21st Century" (Cato Institute)<br />
6.2.22 CryptoRights Foundation<br />
6.2.23 National Security Agency<br />
6.2.24 EFF's archive on the Digital Millennium Copyright Act<br />
6.2.25 Digitalconsumer.org and its Consumer Technology Bill <strong>of</strong> Rights.<br />
6.2.26 American Library Association Office for Intellectual Freedom, includes the ALA Resolution<br />
on the Use <strong>of</strong> Filtering S<strong>of</strong>tware in Libraries.<br />
6.2.27 Chilling Effects Clearinghouse, information about Internet legal issues related to "ceaseand-desist"<br />
letters, letters claiming violation <strong>of</strong> copyright, trademark, and so forth, and<br />
threatening legal action if the claimed violations continue. (EFF and several major law<br />
schools)<br />
6.2.28 Recording Industry Association <strong>of</strong> America<br />
6.2.29 ACM<br />
6.2.30 IEEE Computer Society<br />
6.2.31 Online Ethics Center for Engineering and Science (Case Western Reserve <strong>University</strong>)<br />
Electronic Frontiers Australia<br />
6.2.32 Privacy Commissioner <strong>of</strong> Australia<br />
6.2.33 Privacy Commissioner <strong>of</strong> Canada<br />
6.2.34 "Privacy as Censorship A Skeptical View <strong>of</strong> Proposals to Regulate Privacy in the Private<br />
Sector" (Cato Institute)<br />
6.2.35 Genetics and Public Health in the 21st Century (2000) Muin Khoury, Wylie Burke, and<br />
Elisabeth Thomson, Eds., Oxford <strong>University</strong> Press.<br />
6.2.36 Annual Review <strong>of</strong> Genomics and Human Genetics (yearly since 2000). Eric Lander, David<br />
Page and Richard Lifton, Eds., Annual Reviews, Academic Press.<br />
6.2.37 Nuffield Council on Bioethics Reports: Reports and discussion papers assembled by an<br />
independent body that considers the ethical issues arising from developments in<br />
medicine and biology that plays a major role in contributing to policy making and<br />
stimulating debated in bioethics. http://www.nuffieldbiotethics.org/home<br />
6.3 Other sources <strong>of</strong> information.<br />
Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />
relevant to topics in systems information security privacy and ethics. The process is particularly<br />
important in keeping current with technology and new methodologies.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
-94-
6.4.1 Computer and Internet Use on Campus: A Legal Guide to Issues <strong>of</strong> Intellectual Property,<br />
Free Speech, and Privacy, by Constance S. Hawke, John Wiley & Sons, September 1, 2000<br />
6.4.2 Borders in Cyberspace: Information Policy and the Global Information Infrastructure<br />
(Publication <strong>of</strong> the Harvard Information Infrastructure Project) by Brian Kahin and Charles<br />
Nesson, MIT Press, March 1997.<br />
6.4.3 Cybercrime: Law Enforcement, Security and Surveillance in the Information Age by Tom<br />
Douglas, Routledge, and July 2000.<br />
6.4.4 Data Privacy in the Information Age by Jacqueline Klosek, Praeger Publishing, August 30,<br />
2000.<br />
6.4.5 Database Nation: The Death <strong>of</strong> Privacy in the 21st Century by Simson Garfinkel, O'Reilly &<br />
Associates, and January 2000.<br />
6.4.6 ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy<br />
Regulations, by Timothy D. Casey, Wiley, 2000.<br />
6.4.7 Technology and Privacy: The New Landscape, by Philip E. Agre, and Marc Rotenberg. , MIT<br />
Press, September 1998.<br />
6.4.8 Internet Privacy Protection Guide by J. K. Santiago, Boggy Cove, Inc. 1999.<br />
6.4.9 Building in Big Brother: The Cryptographic Policy Debate by Lance J. H<strong>of</strong>fman, Springer<br />
Verlag, April 1995.<br />
6.4.10 Computer Rules: A Guide to Formulating Computer Operating & Security Policy for Users<br />
by Randal F. Fleury, Compupol, Inc., 1998.<br />
6.4.11 Technology and Privacy: The New Landscape, by Philip E. Agre and Marc Rotenberg, MIT<br />
Press, September 1998 or most recent edition.<br />
6.4.12 Legislating Privacy: Technology, Social Values, and Public Policy, by Priscilla M. Regan,<br />
<strong>University</strong> <strong>of</strong> North Carolina Press, September 1995.<br />
6.4.13 Managing Privacy: Information Technology and Corporate America, by H. Jeff Smith,<br />
<strong>University</strong> <strong>of</strong> North Carolina Press, June 1994.<br />
6.4.14 Computers, Ethics and Social Values by Deborah G. Johnson and Helen Nissenbaum,<br />
Prentice Hall, February 2, 1995.<br />
6.4.15 Computers, Ethics, and Society by M. David Ermann, Mary B. Williams, and Michele S.<br />
Shauf, Oxford <strong>University</strong> Press, April 1997.<br />
6.4.16 Sex, Laws, and Cyberspace: Freedom and Censorship on the Frontiers <strong>of</strong> the Online<br />
Revolution, by Jonathan Wallace and Mark Mangan, Henry Holt, March 1997.<br />
6.4.17 Computer and Information Ethics by John Weckert and Douglas Adeney, Greenwood<br />
Publishing Group, May 1997.<br />
6.4.18 Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing by Tom Forester<br />
and Perry Morrison, MIT Press, December1993.<br />
6.4.19 The Information Systems Security Officer's Guide: Establishing and<br />
6.4.20 Managing an Information Protection Program, by Gerald Kovacich, Butterworth-<br />
Heinemann, 1998.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 3<br />
Networking and telecommunications 3<br />
-95-
Modern programming language<br />
Analysis and Design<br />
Data management<br />
Role <strong>of</strong> IS in Organizations 10<br />
8.0 Oral and Written Communications:<br />
Every student will be required to:<br />
(1) Complete individually the analysis <strong>of</strong> ten to fifteen in class mini-cases and actively participate<br />
in the instructor lead discussions.<br />
(2) Either individually or as a member <strong>of</strong> a small group, analyze six to ten major cases, prepare<br />
either a two to four-page point paper report or a six-page narrative report about the case, and<br />
lead or participate in the in-class discussions.<br />
(3) Lead several small group discussions about the cases<br />
(4) Prepare oral presentations <strong>of</strong> approximately 10-minute duration that present an analysis <strong>of</strong><br />
select cases.<br />
All papers and presentations will be evaluated for technical content, application <strong>of</strong> principles,<br />
appropriateness <strong>of</strong> format, use <strong>of</strong> supporting materials, and correct use <strong>of</strong> grammar and spelling rules.<br />
9.0 Social and Ethical Issues:<br />
This course focuses on the ethical, social, legal, and privacy issues in the information technology,<br />
bioinformatics, and health care industries. After extensive presentations <strong>of</strong> the fundamental theories and<br />
principles <strong>of</strong> ethical behavior, the students will apply the theories and principles to cases and real-world<br />
situations current to these industries.<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />
No coverage.<br />
11.0 Problem analysis:<br />
A major part <strong>of</strong> this course is case analysis. Throughout the presentation <strong>of</strong> the theoretical materials,<br />
there will be shore in-class exercises that provide situations for student analysis. These exercises provide<br />
the students with models and processes that will be applied to the more formal lengthier cases and to<br />
situations that the students will encounter in business and industry.<br />
12.0 Solution design:<br />
-96-
The students apply what they have learned in this class to cases and everyday events in the industries <strong>of</strong><br />
focus. Students will be expected to determine the consequences for unethical behavior and to provide<br />
solid justification for their decisions.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
2/14/03 Initial ABET version Pietron<br />
6/24/03 ABET cleanup Wolcott<br />
10/10/08 Major changes to outline, assignments, Scho<strong>of</strong>f<br />
textbook.<br />
6/23/2009 Update <strong>of</strong> the course matrix Pietron<br />
-97-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Work on a team<br />
6. Computer-based tools<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 3110<br />
Course Title<br />
Information Technology Ethics<br />
Course Coordinator<br />
Leah R. Pietron<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 9/10/08<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Be able to determine the impact <strong>of</strong> the<br />
privacy laws on information security policies.<br />
Understand the issues related to intellectual<br />
freedom, intellectual property, and copyright<br />
law as they relate to electronic publishing.<br />
Be able to determine and identify ethical<br />
procedures and behaviors in the organization<br />
related to information security.<br />
X<br />
X<br />
X X S X<br />
Be able to identify issues <strong>of</strong> pr<strong>of</strong>essional X X S X<br />
conduct in information technology case<br />
studies.<br />
Be able to apply <strong>University</strong> standards <strong>of</strong> X X S X<br />
-98-<br />
S<br />
S
ethical conduct in preparing assignments for<br />
all coursework.<br />
Learn the areas most impacted by ethical<br />
decisions by pr<strong>of</strong>essionals in the computing<br />
field and will gain skills in making such<br />
decisions.<br />
Identify key ethical concerns <strong>of</strong> information<br />
technology specialists.<br />
Apply theories <strong>of</strong> ethics to case situations in<br />
the context <strong>of</strong> organizational use <strong>of</strong><br />
information technology.<br />
Appreciate how rapid changes in technology<br />
might affect ethical issues and changing<br />
norms <strong>of</strong> behavior.<br />
Understand the issues related to privacy and<br />
confidentiality as they relate to information<br />
technology.<br />
Understand the ethical issues associated with<br />
gathering, storing and accessing genetic<br />
information in databases.<br />
Recognize the differences in ethical codes <strong>of</strong><br />
conduct in different cultures and countries.<br />
Understand the ethical issues that arise from<br />
findings in genomic and bioinformatics<br />
analyses.<br />
The student will study and apply the<br />
following:<br />
X<br />
X X S<br />
X X S<br />
X<br />
X X S<br />
X X S<br />
Business Rules x S<br />
Firewalls X X S<br />
Cryptography X X S<br />
Privacy Laws X X S<br />
Copyright Ownership X X S<br />
Privacy, Publicity and Defamation X S<br />
Trademarks and Unfair Competition in<br />
X X S<br />
Cyberspace<br />
Intellectual Property X X S<br />
Contrast <strong>of</strong> Law vs. Ethics X S<br />
Organizational Ethical Principles X S<br />
S<br />
S<br />
S<br />
S<br />
S<br />
X<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
-99-
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-100-
CIST 3600 Information Security and Policy<br />
Department and Course Number CIST 3600<br />
Course Title<br />
Course Coordinator<br />
Information Security and Policy<br />
Leah R. Pietron<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 6/23/2009<br />
1.0 Course Description<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course provides an introduction to the fundamental principles and topics <strong>of</strong> Information<br />
Assurance. The principles are laid out in such a way that computer pr<strong>of</strong>essionals not only learn<br />
about principles; they learn them in a logical order that provides a framework for developing and<br />
performing the security tasks. The course will address hardware, s<strong>of</strong>tware, processes,<br />
communications, applications, and policies and procedures relative to information assurance in<br />
the organization.<br />
This course is intended as a first course in Information Assurance at the undergraduate level. This<br />
course will be a pre-requisite for additional information and network security courses for the<br />
Information Assurance concentration in the undergraduate MIS program.<br />
1.2 For whom course is intended.<br />
This course is intended for undergraduate information assurance (IA), management information<br />
systems (MIS) and computer science (CS) majors.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 CIST 3100<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Types <strong>of</strong> Processing Systems<br />
1.4.2 Essential Concepts <strong>of</strong> Networks<br />
1.4.3 Introduction to Topologies<br />
1.4.4 Understanding <strong>of</strong> TCP/IP<br />
1.4.5 Introduction to Systems Analysis, Design, and Databases<br />
1.4.6 Principles <strong>of</strong> Management<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
-101-
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes<br />
2.1 Identify the fundamental principles <strong>of</strong> Information Security<br />
2.2 Demonstrate an understanding: the concept <strong>of</strong> threat, evaluation <strong>of</strong> assets, information assets,<br />
physical, operational, and information security – and how they are interrelated<br />
2.3 Understand risk analysis and risk management<br />
2.4 Demonstrate the ability to design and guide the development <strong>of</strong> a security policy for any<br />
corporate environment.<br />
2.5 Demonstrate an understanding <strong>of</strong> mitigation approaches – technical and administrative<br />
2.6 Understand the need for a comprehensive security model and its implications for the security<br />
manager<br />
2.7 Understand the need for the careful design <strong>of</strong> a secure corporate information infrastructure.<br />
2.8 Demonstrate an understanding <strong>of</strong> security technologies.<br />
2.9 Understand the relationship network infrastructure equipment to the implementation <strong>of</strong> a given<br />
security policy.<br />
2.10 Display an introductory understanding <strong>of</strong> basic cryptography, its implementation considerations<br />
and key management<br />
2.11 Understand the importance <strong>of</strong> secure system management - economical and corporation<br />
implications<br />
2.12 The Role <strong>of</strong> Procedures and Education in the overall Corporate Security Solution<br />
3.0 Content and Organization:<br />
3.1 The Future <strong>of</strong> Business 1.0<br />
3.2 Introduction to Information Security 1.0<br />
Contact hours<br />
3.3 Inspection 1.5<br />
3.3.1 Resource Inventory<br />
3.3.2 Threat Assessment<br />
3.3.3 Identifying Vulnerabilities<br />
3.3.4 Assigning Safeguards<br />
3.3.5 Evaluation <strong>of</strong> Current Status<br />
3.4 Protection 1.5<br />
3.4.1 Awareness<br />
3.4.2 Access<br />
3.4.3 Identification<br />
3.4.4 Authentication<br />
-102-
3.4.5 Authorization<br />
3.4.6 Availability<br />
3.4.7 Accuracy<br />
3.4.8 Confidentiality<br />
3.4.9 Accountability<br />
3.4.10 Administration<br />
3.5 Detection 1.5<br />
3.5.1 Intruder Types<br />
3.5.2 Intrusion Methods<br />
3.5.3 Intrusion Process<br />
3.5.4 Detection Methods<br />
3.6 Reaction 1.5<br />
3.6.1 Incident Determination<br />
3.6.2 Incident Notification<br />
3.6.3 Incident Containment<br />
3.6.4 Assessing Damage<br />
3.6.5 Incident Recovery<br />
3.6.6 Automated Response<br />
3.7 Reflection 1.5<br />
3.7.1 Incident Documentation<br />
3.7.2 Incident Evaluation<br />
3.7.3 Legal Prosecution<br />
3.7.4 The Future <strong>of</strong> Information Security<br />
3.8 What is Security Engineering 1.5<br />
3.9 Protocols 1.5<br />
3.10 Passwords 1.5<br />
3.11 Access Controls 1.5<br />
3.12 Cryptography 1.5<br />
3.13 Distributed Systems 1.5<br />
3.14 Multilevel Security 1.5<br />
3.15 Multilateral Security 1.5<br />
3.16 Banking and Bookkeeping 1.5<br />
3.17 Monitoring Systems 1.5<br />
3.18 Nuclear Command and Control 1.5<br />
3.19 Security Printing and Seals 1.5<br />
3.20 Biometrics 1.5<br />
3.21 Physical Tamper Resistance 1.5<br />
3.22 Emission Security 1.5<br />
3.23 Electronic and Information Warfare 1.5<br />
3.24 Telecom System Security 1.5<br />
3.25 Network Attack and Defense 1.5<br />
3.26 Protecting E-Commerce Systems 1.5<br />
-103-
3.27 Copyright and Privacy Protection 1.5<br />
3.28 E-Policy 1.5<br />
3.29 Management Issues 1.5<br />
3.30 System Evaluation and Assurance 1.5<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching method will be discussion, programming-related projects and<br />
demonstrations, case studies, lecture, expert speakers and security-related application<br />
demonstrations.<br />
4.2 Student role in the course.<br />
The student will attend lectures and demonstrations, participate in discussion on assigned<br />
readings, complete assigned programming-related projects, and complete required examinations.<br />
4.3 Contact hours<br />
3.0<br />
5.0 Evaluation:<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
The student products will be article reviews, projects, examinations, and oral presentations.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Grades will be determined on the basis <strong>of</strong> the student’s participation in research, presentation <strong>of</strong><br />
results, participation through class discussion, and achievement on examinations. The specific<br />
weights shall be specified in the outline for the particular class.<br />
5.3 Grading scale and criteria.<br />
Points Grading<br />
97 – 100% A+<br />
94 – 96% A<br />
90 – 93% A–<br />
87 – 89% B+<br />
84 – 86% B<br />
80 – 83% B–<br />
77 – 79% C+<br />
-104-
70 – 76% C<br />
70 – 73% C-<br />
67 – 69% D+<br />
64 – 66% D<br />
60 – 63% D–<br />
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 asjdkflaj<br />
6.1.2 Information Security Protecting the Global Enterprise, by Donald L. Pipkin, Prentice-Hall,<br />
2000. (or more recent text)<br />
6.1.3 Security Engineering, by Ross Anderson, Wiley Computer Publishing, 2001. (or more<br />
recent text)<br />
6.2 Other suggested reading materials, if any.<br />
Additional articles that have been collected for various topics are available at the UNO Library.<br />
These articles are used to supplement topics presented in various chapters.<br />
6.3 Other sources <strong>of</strong> information<br />
Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />
relevant to topics in systems analysis and design. The process is particularly important in keeping<br />
current with technology and new methodologies.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
6.4.1 Designing Network Security by Merike and Kaeo, Cisco Systems, Macmillan<br />
Publishing, 1999.<br />
6.4.2 Computer and Internet Use on Campus: A Legal Guide to Issues <strong>of</strong> Intellectual<br />
Property, Free Speech, and Privacy, by Constance S. Hawke, John Wiley & Sons,<br />
September 1, 2000<br />
6.4.3 Borders in Cyberspace: Information Policy and the Global Information Infrastructure<br />
(Publication <strong>of</strong> the Harvard Information Infrastructure Project) by Brian Kahin and Charles<br />
Nesson, MIT Press, March 1997.<br />
6.4.4 Cybercrime: Law Enforcement, Security and Surveillance in the Information Age by Tom<br />
Douglas, Routledge, and July 2000.<br />
6.4.5 Data Privacy in the Information Age by Jacqueline Klosek, Praeger Publishing, August 30,<br />
2000.<br />
6.4.6 ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy<br />
Regulations, by Timothy D. Casey, Wiley, 2000.<br />
6.4.7 Technology and Privacy: The New Landscape, by Philip E. Agre, and Marc Rotenberg. , MIT<br />
Press, September 1998.<br />
6.4.8 Internet Privacy Protection Guide by J. K. Santiago, Boggy Cove, Inc. 1999.<br />
-105-
6.4.9 E-Policy: How to Develop Computer, E-Policy, and Internet Guidelines to Protect Your<br />
Company and Assets by Michael R. Overly, AMACOM, September 1998.<br />
6.4.10 Computer and Information Ethics by John Weckert and Douglas Adeney, Greenwood<br />
Publishing Group, May 1997.<br />
6.4.11 Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing by Tom Forester<br />
and Perry Morrison, MIT Press, December1993.<br />
6.4.12 The Information Systems Security Officer's Guide: Establishing and Managing an<br />
Information Protection Program by Gerald Kovacich, Butterworth-Heinemann, 1998<br />
6.4.13 Information Warfare and Security by Dorothy E. Denning, Addison Wesley, 1999.<br />
6.4.14 Cyberwar 2.0: Myths, Mysteries and Realities, Alan D. Campen and Douglas H. Dearth,<br />
AFCEA Press, 1998.<br />
6.4.15 The Art <strong>of</strong> Information Warfare: Insight into the Knowledge Warrior Philosophy, by<br />
Richard Forno and Ronald Baklarz, Upublish.com, 1999.<br />
6.4.16 Big Brother NSA, and It's Little Brother; National Security Agency's Global Surveillance<br />
Network, by Cook, HSPI, March 1999.<br />
6.4.17 Maximum Security; A Hacker's Guide to Protecting Your Internet Site and Network with<br />
CDROM Anonymous / Sams Publishing, SAMS, 1998.<br />
6.4.18 Information Warfare : Chaos on the Electronic Superhighway by Winn Schwartau,<br />
Thunder's Mouth Pr. October 1996 .<br />
6.4.19 Information Warfare : Principles and Operations by Edward Waltz, Artech House,<br />
September 1998.<br />
6.4.20 Strategic Appraisal: The Changing Role <strong>of</strong> Information in Warfare by John White, Zalmay<br />
Khalilzad , Andrew W. Marshall, Rand Corporation, May 1999.<br />
6.4.21 Toward a Revolution in Military Affairs : Defense and Security at the Dawn <strong>of</strong> the Twenty-<br />
First Century (Contributions in Military Studies, No. 197) by Thierry Gongora and Harald<br />
Von Riekh<strong>of</strong>f, Greenwood Publishing Group, June 30, 2000.<br />
6.4.22 Hacker Pro<strong>of</strong>; The Ultimate Guide to Network Security with CDROM by Lars Klander,<br />
Jamsa Press, 2000.<br />
6.4.23 Hacking Exposed; Network Security Secrets and Solutions, 2000, SAMS.<br />
6.4.24 Designing Network Security by Merike Kaeo, Cisco Systems, Macmillan Publishing, 1999.<br />
7.0 Estimate Computer Science Accreditation Board (CSAB) Category Content (class time in hours):<br />
CSAB Category Core Advanced<br />
Data structures<br />
Computer organization and architecture 12<br />
Algorithms and s<strong>of</strong>tware design<br />
Concepts <strong>of</strong> programming languages<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least __2___ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically __10-20___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />
__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />
as well as for technical content, completeness, and accuracy.<br />
-106-
9.0 Social and Ethical Issues:<br />
The course will address the social and ethical issues on Information Assurance. Students will be graded on<br />
their understanding <strong>of</strong> these topics by class participation, exams, or researches.<br />
10.0 Theoretical content:<br />
10.1 The fundamental principles <strong>of</strong> Information Security 2<br />
10.2 The basic concept <strong>of</strong> threat, evaluation <strong>of</strong> assets, information assets,<br />
physical, operational, and information security and how they are related. 2<br />
Hours<br />
11.0 Problem analysis:<br />
The students will learn the principles that are used by computer pr<strong>of</strong>essionals. They will not only learn<br />
about principles; but learn them in a logical order that provides a framework for developing and<br />
performing the security tasks. The course will address hardware, s<strong>of</strong>tware, processes, communications,<br />
applications, and policies and procedures relative to information assurance in the organization.<br />
12.0 Solution design<br />
Using these established principles and frameworks, students will build and maintain secure and reliable<br />
information systems. Students also learn to design and guide the development <strong>of</strong> a security policy for any<br />
corporate environment.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
11/2/02 Initial ABET version Pietron<br />
6/25/03 ABET clean-up Wolcott<br />
10/14/08 Update to course title, description and Pietron<br />
prerequisites<br />
6/23/2009 Updated course objectives to <strong>BIS</strong> program<br />
objectives<br />
Pietron<br />
-107-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Work on a team<br />
6. Computer-based tools<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 3600<br />
Course Title<br />
Information Security and Policy<br />
Course Coordinator<br />
Leah R. Pietron<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/27/09<br />
S – Strong relationship<br />
X –Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Identify the fundamental principles <strong>of</strong><br />
Information Security<br />
Demonstrate an understanding: the<br />
concept <strong>of</strong> threat, evaluation <strong>of</strong> assets,<br />
information assets, physical, operational,<br />
and information security – and how they<br />
are interrelated<br />
Understand risk analysis and risk<br />
management<br />
Demonstrate the ability to design and<br />
guide the development <strong>of</strong> a security<br />
policy for any corporate environment.<br />
Demonstrate an understanding <strong>of</strong><br />
mitigation approaches – technical and<br />
administrative<br />
X x x x x x x x x X<br />
S S S<br />
S S S S S S<br />
S S S X X X<br />
S<br />
S<br />
-108-
Understand the need for a<br />
comprehensive security model and its<br />
implications for the security manager<br />
Understand the need for the careful<br />
design <strong>of</strong> a secure corporate information<br />
infrastructure.<br />
Demonstrate an understanding <strong>of</strong><br />
security technologies.<br />
Understand the relationship network<br />
infrastructure equipment to the<br />
implementation <strong>of</strong> a given security policy.<br />
Display an introductory understanding <strong>of</strong><br />
basic cryptography, its implementation<br />
considerations and key management<br />
Understand the importance <strong>of</strong> secure<br />
system management - economical and<br />
corporation implications<br />
The Role <strong>of</strong> Procedures and Education in<br />
the overall Corporate Security Solution<br />
s<br />
s<br />
X S S S<br />
S<br />
S S<br />
S<br />
X X<br />
X x X<br />
-109-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-110-
CIST 4360 Foundations <strong>of</strong> Information Assurance<br />
Department and Course Number CIST 4360 CSCI 4360-001 CSCI 8366-001<br />
Course Title<br />
Foundations <strong>of</strong> Information Assurance<br />
Course Coordinator<br />
Blaine Burnham and Robin Gandhi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision May 26, 2009<br />
Semester Offered Fall 2009<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The purpose <strong>of</strong> the course is to provide students with a comprehensive overview <strong>of</strong> the<br />
Information Assurance subject area starting from its foundational roots and to prepare students<br />
for more extensive study in the subject. The course topics outline what we knew during the early<br />
days <strong>of</strong> the field, what we now know, what has been done until now, and what are the<br />
challenging problems still exist.<br />
1.2 For whom course is intended.<br />
This course is intended for graduate and undergraduate students with IA majors in the College <strong>of</strong><br />
IS&T who understand how computers are organized, how they compute and how they<br />
communicate. These students need to have an uncommon passion for learning and the need to<br />
have a highly motivated curiosity. Typically the class is designed for students that are seniors or<br />
graduate students. However, admission for any qualified student may be arranged with<br />
permission <strong>of</strong> the instructor.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 Introduction to information assurance (IASC 1100, CIST 3600, or instructor permission).<br />
1.3.2 Computer networking (CSCI 3550 or ISQA 3400, or instructor permission).<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Core terms and principles <strong>of</strong> information assurance: Confidentiality, Integrity, Availability,<br />
Threats, Vulnerabilities, Types <strong>of</strong> Malware, Authorization, Access Control, Accountability,<br />
Identification, Authentication, Security Controls, and Defense in Depth.<br />
1.4.2 Computer networking topics: Media, Protocol Stacks, Protocol Encapsulation, ARP, IP<br />
addressing, IP routing, ICMP, DHCP, TCP Virtual Circuits, Network Address Translation,<br />
DNS, and HTTP.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
-111-
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
2.1 Know and comprehend the principle concepts <strong>of</strong> information assurance.<br />
2.2 Apply methods and tools associated with information assurance to<br />
engineer dependable s<strong>of</strong>tware systems.<br />
2.3 Analyze case studies related to information assurance to<br />
synthesize meaningful class presentations and discussions.<br />
2.4 Criticize current information assurance approaches.<br />
3.0 Content and Organization:<br />
List <strong>of</strong> major topics to be covered in chronological sequence. (Total 43.5 topic hours assuming a 15 week<br />
schedule and 1.5 hours for midterm)<br />
3.1 What is Information? (1 hour)<br />
3.2 Legal, Privacy and Ethical Issues (1.5 hour)<br />
3.2.1 Information and Law<br />
3.2.2 Computer crime<br />
3.2.3 Ethical reasoning<br />
3.3 Overview <strong>of</strong> Information Assurance (3 hours)<br />
3.3.1 A Taxonomy <strong>of</strong> Information Assurance<br />
3.3.2 The meaning <strong>of</strong> “Secure”<br />
3.3.3 Attacks and Computer Criminals<br />
3.3.4 A Vulnerability Taxonomy<br />
3.4 Genesis <strong>of</strong> the Field (6 hours)<br />
3.4.1 The problem description, The Ware Report<br />
3.4.2 Proposed solutions, The Anderson Report<br />
3.4.3 Design principle for secure systems<br />
3.5 General Operating System (3 hours)<br />
3.5.1 Shared Resources<br />
3.5.2 Access Control Mechanisms<br />
3.5.3 General Operating System Process Management<br />
3.5.4 Memory and Address Protection<br />
3.5.5 File Protection<br />
3.5.6 User protection<br />
-112-
3.6 Identification and Authentication (1 hours)<br />
3.6.1 Trusted Path<br />
3.7 Designing Trusted Operating System (3 hours)<br />
3.7.1 Characteristics <strong>of</strong> a Trusted Operating System<br />
3.7.2 Kernelized Design<br />
3.7.3 Separation/Isolation<br />
3.7.4 Virtualization<br />
3.7.5 Layered Design<br />
3.8 Security Models (3 hours)<br />
3.8.1 Information Classification<br />
3.8.2 Bell Lapadula<br />
3.8.3 BIBA<br />
3.8.4 Clark Wilson<br />
3.8.5 Chinese Wall Policy<br />
3.9 Case <strong>Study</strong>: Trusted Operating Systems Architecture (3 hours)<br />
3.9.1 Analysis <strong>of</strong> the Multics Ring Architecture<br />
3.10 Trusted Operating System Assurance (6 hours)<br />
3.10.1 The History <strong>of</strong> Assurance in Computer Systems<br />
3.10.2 Assurance methods<br />
3.10.3 Trusted Computer System Evaluation<br />
Criteria (TCSEC): The Orange Book<br />
3.11 Trusted Database Implementation (3 hours)<br />
3.11.1 Security requirements for databases<br />
3.11.2 Inference problems in databases<br />
3.11.3 Multilevel Databases<br />
3.12 Security in Network (3 hours)<br />
3.12.1 Common Threats to Networks<br />
3.12.2 Network Security Controls<br />
3.12.3 Firewalls and IDS<br />
3.13 Fundamentals <strong>of</strong> Cryptography (6 hours)<br />
3.13.1 Background on Cryptography<br />
3.13.2 Cryptographic Algorithms<br />
3.13.3 Applying Cryptography<br />
3.13.4 Attacks against Cryptography<br />
-113-
3.14 Risk Management (1 hour)<br />
3.14.1 Security Planning<br />
3.14.2 Risk Analysis<br />
3.14.3 Organization Security Policies<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The course will be presented primarily in lecture form. However, students will be expected to<br />
participate in discussions <strong>of</strong> the various topics as they are studied. In addition to the study <strong>of</strong> the<br />
text, students must do homework as assigned. Two tests will be given. A written paper with oral<br />
presentation as a semester project will be required.<br />
4.2 Student role in the course.<br />
The students will be involved through exams, homework, projects, and discussions with each<br />
other.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
5.1 Project.<br />
3 hours per week.<br />
Students will complete a semester long project. The purpose <strong>of</strong> the semester project is to<br />
demonstrate some in-depth knowledge <strong>of</strong> a topic related to the class subject material. Students<br />
can choose to write a research paper exploring some topic related to the class, to demonstrate a<br />
security application program, or to develop a programming project. Students will summarize the<br />
lessons learned from the project with a 10-15 page report and 20 minute conference quality<br />
power point presentation.<br />
5.2 Laboratory Assignments.<br />
The course includes a scheduled Laboratory component. The purpose <strong>of</strong> the Labs is to give<br />
students the opportunity to develop an operational understanding <strong>of</strong> many <strong>of</strong> the concepts<br />
discussed in class as well as additional ones. Each lab exercise will involve an investigation into<br />
some part <strong>of</strong> the subject matter. Each exercise will result in a 5 page written paper and a 10-<br />
minute presentation suitable for presentation at a faculty / student brown-bag forum. Laboratory<br />
assignments will generally require access to STEAL-1 outside <strong>of</strong> class.<br />
Daily Assignments.<br />
-114-
Daily assignments will be for each student to bring to each class a one page write-up <strong>of</strong> two<br />
current events articles and two web sites <strong>of</strong> substantive internet information security resource.<br />
Each <strong>of</strong> these current event articles and web site references needs to be accompanied with a<br />
short and incisive discussion <strong>of</strong> why the article or reference is relevant. The student should be<br />
prepared to discuss these them class.<br />
5.3 Exams.<br />
Student performance will be evaluated through three examinations: 2 in-class exams and a<br />
comprehensive Final Exam. All these exams will include a variety <strong>of</strong> question types to measure<br />
student understanding <strong>of</strong> the material. Tentatively, exams are scheduled every seven weeks.<br />
5.4 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Two exams will be given during the course:<br />
15% Exam 1<br />
15% Exam 2<br />
25% Lab<br />
20% Final exam<br />
15% Semester project<br />
5% Class attendance and participation<br />
5% Daily written assignments<br />
5.5 Grading scale and criteria.<br />
98 –100% A+<br />
93 – 97% A<br />
90 – 92% A-<br />
88 – 89% B+<br />
83 – 87% B<br />
80 – 82% B-<br />
78 – 79% C+<br />
72 – 77% C<br />
70 – 72% C-<br />
68 – 69% D+<br />
62 – 67% D<br />
60 – 62% D-<br />
0 – 59% F<br />
6.0 Resource Material<br />
-115-
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Pfleeger, C.P., & Pfleeger, S.L. (2003). Security in Computing (3rd ed.). Upper Saddle River,<br />
NJ: Pearson Education, Inc.<br />
6.1.2 Anderson, R. (2001). Security Engineering: A Guide to Building Dependable Distributed<br />
Systems (1st ed.). Wiley.<br />
6.1.3 Schneier, B. (2000). Secrets and Lies: Digital Security in a Networked World (1st ed.). John<br />
Wiley & Sons.<br />
6.1.4 Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook <strong>of</strong> Applied<br />
Cryptography. CRC Press Series on Discrete Mathematics and Its Applications.<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 Graff, M.G. & van Wyk, K. R. (2003). Secure Coding: Principles and Practice, O’Reilly &<br />
Associates, Inc.<br />
6.2.2 Bishop, M. (2005). Introduction to Computer Security. Addison-Wesley Pr<strong>of</strong>essional.<br />
6.3 Other sources <strong>of</strong> information.<br />
Additional materials and online resources will be identified for students at the beginning <strong>of</strong> the<br />
course and as the course progresses.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
6.4.1 Anderson, J.P. (1972). Computer Security Technology Planning <strong>Study</strong>, ESD-TR-73-51,<br />
ESD/AFSC, Hanscom AFB, Bedford, MA 01731 [NTIS AD-758 206]<br />
6.4.2 Bell, D. E & La Padula, L. (1975). Secure Computer System: Unified Exposition and Multics<br />
Interpretation, ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA 01731. [DTIC AD-<br />
A023588]<br />
6.4.3 Department <strong>of</strong> Defense. (1983, 1985). Trusted Computer System Evaluation Criteria<br />
(Orange Book). DoD 5200.28-STD<br />
6.4.4 Karger, P. A. & Schell, R. R. (1974). MULTICS Security Evaluation: Vulnerability Analysis.<br />
ESD-TR-74-193 Vol. II, ESD/AFSC, Hanscom AFB, Bedford, MA 01731.<br />
6.4.5 Ware, W. (1970) Security Controls for Computer Systems (U): Report <strong>of</strong> Defense Science<br />
Board Task Force on Computer Security. Rand Report R609-1, The RAND Corporation,<br />
Santa Monica, CA.<br />
7.0 Computer Science Accreditation Board (CSAB) Category Content (class time in hours)<br />
CSAB Category Core Advanced<br />
Data structures 5 10<br />
Computer organization and architecture 5 5<br />
Algorithms and s<strong>of</strong>tware design 10 5<br />
Concepts <strong>of</strong> programming languages 5<br />
8.0 Oral and Written Communications:<br />
-116-
Every student is required to submit at least __1 written summary per class period (not including exams,<br />
tests, quizzes, or commented programs) to typically __2__ page and to be prepared to make __1__ oral<br />
presentation per class period <strong>of</strong> typically __3-5__ minutes duration. Include only material that is graded<br />
for grammar, spelling, style, and so forth, as well as for technical content, completeness, and accuracy.<br />
Additionally, every student is required to submit at least __1 written semester project report (not<br />
including exams, tests, quizzes, or commented programs) to typically __10-15__ pages and to make __1__<br />
oral presentation <strong>of</strong> typically __20__ minutes duration.<br />
9.0 Social and Ethical Issues:<br />
Embedded in material covered throughout the course.<br />
10.0 Theoretical content<br />
Contact hours<br />
10.1 What is information assurance? 1.0<br />
10.2 Secure system engineering 0.5<br />
10.3 Intrinsic and extrinsic assurance activities and their interdependencies 1.0<br />
11.0 Problem analysis<br />
Students experience analysis <strong>of</strong> information assurance problems through class examples, homework<br />
exercises, and semester project report.<br />
12.0 Solution design<br />
The semester long project will provide the students with hands-on experience with tools and techniques<br />
for information assurance.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
02/20/2009 Initial ABET version Robin Gandhi<br />
05/26/2009 Corrected the CSCI Course No. Robin Gandhi<br />
-117-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Work on a team<br />
6. Computer-based tools<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 4360<br />
Course Title<br />
Foundations <strong>of</strong> Information Assurance<br />
Course Coordinator<br />
Blaine Burnham and Robin Gandhi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision May 26, 2009<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Know and comprehend the principle<br />
concepts <strong>of</strong> information assurance.<br />
Apply methods and tools associated with<br />
information assurance to<br />
engineer dependable s<strong>of</strong>tware systems.<br />
Analyze case studies related to<br />
information assurance to<br />
synthesize meaningful class presentations<br />
and discussions.<br />
Criticize current information assurance<br />
approaches.<br />
X S X X S X X X X<br />
S S S X S S X S S X S S S<br />
S S S S S X S X X X X S<br />
S S S S X S X X X S<br />
-118-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-119-
-120-
CIST 4370<br />
Security Administration<br />
Department and Course Number CIST 4370/IASC 4370<br />
Course Title<br />
Host Security Administration Using Windows<br />
Course Coordinator<br />
Stephen Nugen<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision Feb 17, 2009<br />
1.0 Course Description<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
Students will learn the principles and practice <strong>of</strong> secure system administration <strong>of</strong><br />
host computers using Micros<strong>of</strong>t Windows operating systems. Lecture,<br />
demonstrations, and hands-on assignments include installation, storage<br />
management, account management, service management, and scripting. Students<br />
will learn how to assess and harden Windows-based hosts operating in server and<br />
client roles.<br />
1.2 For whom course is intended.<br />
This course is intended to be a second course for the Information Assurance degree<br />
or the Information Assurance concentration at the undergraduate level; and a<br />
foundation course for graduate study.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 Computer networking (CSCI 3550 or ISQA 3400, or instructor permission).<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Core terms and principles <strong>of</strong> Information Assurance such as: Confidentiality,<br />
Integrity, Availability, Threats, Vulnerabilities, Types <strong>of</strong> Malware,<br />
Authorization, Access Control, Accountability, Identification, Authentication,<br />
Security Controls, Defense in Depth, Certification and Accreditation.<br />
1.4.2 Understanding <strong>of</strong> networking topics such as: Media, Protocol Stacks, Protocol<br />
Encapsulation, Ethernet, TCP/IP suite, IP addressing, IP routing, TCP Virtual<br />
Circuits, and Network Address Translation.<br />
1.4.3 Understanding the role <strong>of</strong> network application protocols like ARP, ICMP,<br />
DHCP, DNS, and HTTP.<br />
1.4.4 Understanding basic programming constructs sufficient to understand<br />
presented content on Shell Scripting.<br />
-121-
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives<br />
2.1 Understand core principles <strong>of</strong> Information Assurance with respect to host security.<br />
2.2 Identify key sources for Information Assurance requirements with respect to how<br />
operating systems are installed, configured, and maintained.<br />
2.3 Understand the system administration and security impacts <strong>of</strong> different host<br />
architectures.<br />
2.4 Understand and demonstrate different options for installing the host operating<br />
system.<br />
2.5 Understand and demonstrate different options for user interfaces with respect to<br />
host security.<br />
2.6 Understand and demonstrate how to configure, inspect, and monitor host storage<br />
mechamisms, including disks, partitions and volumes, file systems, and access<br />
controls.<br />
2.7 Understand and demonstrate how to write system administration scripts.<br />
2.8 Understand and demonstrate how to configure operating system services.<br />
2.9 Understand and demonstrate how to configure and manage Windows domains,<br />
including domain user credentials.<br />
2.10 Understand and demonstrate how to securely configure and manage Windows<br />
networking and host firewall.<br />
2.11 Identify options for host vulnerability assessments, including frameworks and tools.<br />
3.0 Content and Organization<br />
Contact hours<br />
3.1 Introduction and context 1.5<br />
3.2 Core security principles and requirements 3.0<br />
3.3 Host considerations 3.0<br />
3.4 Boot process and operating system installations 4.5<br />
3.5 Configuring and inspecting host system state 6.0<br />
3.6 Special focus on storage management 3.0<br />
3.7 Special focus on scripting 6.0<br />
3.8 Windows domains 3.0<br />
3.9 Windows networking 4.5<br />
3.10 Operating system services 6.0<br />
3.11 Host assessments 4.5<br />
4.0 Teaching Methodology<br />
4.1 Methods to be used.<br />
-122-
The primary teaching methods will be lecture, discussion, demonstrations, lab<br />
exercises, and reading assignments.<br />
4.2 Student role in the course.<br />
Students will attend lectures and demonstrations, participate in discussions,<br />
complete and submit lab and other assignments, and complete required<br />
examinations.<br />
4.3 Contact hours.<br />
5.0 Evaluation<br />
In-class contact consists <strong>of</strong> two 75-minute lectures per week (3.0 contact<br />
hours/week).<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For<br />
Laboratory projects, specify the number <strong>of</strong> weeks spent on each project.<br />
Students will complete individual assignments requiring independent study and<br />
preparing short written responses to instructor-provided questions.<br />
Students will also complete small and large laboratory assignments and projects with<br />
specified deliverables such as: Report <strong>of</strong> Findings; Test Cases; and Annotated Source<br />
Code. Most laboratory assignments will be be due within one to two weeks <strong>of</strong><br />
assignment. Some laboratory assignments will be started in-class. Laboratory<br />
assignments will require access to STEAL-1 outside <strong>of</strong> class.<br />
Student performance will also be evaluated through two examinations: Midterm and<br />
a comprehensive Final Exam. Both <strong>of</strong> these exams will include a variety <strong>of</strong> question<br />
types to measure student understanding <strong>of</strong> the material.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Grades will be determined on the following basis:<br />
Assignments 55%<br />
Midterm 20%<br />
Final Exam 25%<br />
-123-
100%<br />
5.3 Grading scale and criteria.<br />
Points Grading<br />
99 – 100% A+<br />
92 – 98% A<br />
90 – 91% A–<br />
88 – 89% B+<br />
82 – 87% B<br />
80 – 81% B–<br />
78 – 79% C+<br />
72 – 77% C<br />
70 – 71% C-<br />
68 – 69% D+<br />
62 – 67% D<br />
60 – 61% D–<br />
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course. No required textbook.<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 Mueller, J.P. (2007). Windows Administration at the Command Line.<br />
Indianapolis, Wiley.<br />
6.2.2 Northrup, T. & Thomoas, O. (2004). Implementing and Administering Security<br />
in a Micros<strong>of</strong>t Windows Server 2003 Network. Redmond, WA: Micros<strong>of</strong>t Press.<br />
6.2.3 Russel, C., Crawford, S., & Gerend, J. (2003). Micros<strong>of</strong>t Windows Server 2003<br />
Administrator's Companion. Redmond, WA: Micros<strong>of</strong>t Press.<br />
6.2.4 Russinovich, M. & Solomon, D. (2005). Micros<strong>of</strong>t Windows Internals, Fourth<br />
Edition. Redmond, WA: Micros<strong>of</strong>t Press.<br />
6.2.5 Scambray, J. & McClure, S. (2003). Hacking Exposed Windows Server 2003.<br />
New York, McGraw-Hill.<br />
6.2.6 Scambray, J. & McClure, S. (2008). Hacking Exposed Windows: Windows<br />
Security Secrets & Solutions, Third Ed. New York, McGraw-Hill.<br />
6.2.7 Stanek, W. R. (2004). Micros<strong>of</strong>t Windows Server 2003 Inside Out. Redmond,<br />
WA: Micros<strong>of</strong>t Press.<br />
6.2.8 Stanek, W. R. (2007). Windows Vista Administrator's Pocket Reference.<br />
Redmond, WA: Micros<strong>of</strong>t Press.<br />
6.2.9 Stanek, W. R. (2008). Micros<strong>of</strong>t Windows Command-Line Administrator’s<br />
Pocket Consultant, Second Edition. Redmond, WA: Micros<strong>of</strong>t Press.<br />
-124-
6.3 Other sources <strong>of</strong> information.<br />
Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals<br />
that are relevant to security administration using Windows. The process is<br />
particularly important in keeping current with technology and new methodologies.<br />
6.4 Current bibliography <strong>of</strong> online resources for student’s information.<br />
6.4.1 Carnegie Mellon S<strong>of</strong>tware Engineering Institute. (2009). CERT Coordination<br />
Center. Available from http://www.cert.org/<br />
6.4.2 CERIAS (Purdue). (2009). CERIAS Blog. Available from<br />
http://www.cerias.purdue.edu/site/blog<br />
6.4.3 Defense Information Systems Agency: Information Assurance Support<br />
Environment. (2009). Security Technical Implementation Guides (STIGS) and<br />
Supporting Documents. Available from http://iase.disa.mil/stigs/index.html<br />
6.4.4 Department <strong>of</strong> Homeland Security. (2009). National Vulnerability Database.<br />
Available from http://nvd.nist.gov/<br />
6.4.5 Intini, F. (2008.) Feliciano Intini's Micros<strong>of</strong>t Security Taxonomy 2.0. Available<br />
from http://blogs.technet.com/feliciano_intini/pages/<br />
micros<strong>of</strong>t-blogs-and-web-resources-about-security.aspx<br />
6.4.6 Jones, J. (2009). Jeff Jones Security Blog. Available from<br />
http://blogs.technet.com/security/default.aspx<br />
6.4.7 LeBlanc, D. (2009). David LeBlanc's Web Log. Available from<br />
http://blogs.msdn.com/david_leblanc/<br />
6.4.8 Margois, A. (n.d.) Aaron Margosis' "Non-Admin" WebLog. Available from<br />
http://blogs.msdn.com/Aaron_Margosis/<br />
6.4.9 Micros<strong>of</strong>t. (2006). BOOT.INI and ARC Path Naming Conventions and Usage.<br />
Available from http://support.micros<strong>of</strong>t.com/kb/102873/EN-US/<br />
6.4.10 Micros<strong>of</strong>t. (2006). Adding Optional Components to Add/Remove Programs<br />
Tool. Available from http://support.micros<strong>of</strong>t.com/kb/223182/en-us<br />
6.4.11 Micros<strong>of</strong>t. (2006). Security Monitoring and Attack Detection. Available from<br />
http://www.micros<strong>of</strong>t.com/downloads/details.aspx?<br />
FamilyID=1E194D99-5734-4B02-9CAA-C80F5C0FB0C0&displaylang=en<br />
6.4.12 Micros<strong>of</strong>t. (2007). How To Add, Modify, Or Delete Registry Subkeys And<br />
Values By Using A Registration Entries (.Reg) File. Available from<br />
http://support.micros<strong>of</strong>t.com/kb/310516/<br />
6.4.13 Micros<strong>of</strong>t. (2008). Windows Registry Information for Advanced Users.<br />
Available from http://support.micros<strong>of</strong>t.com/kb/256986/<br />
6.4.14 Micros<strong>of</strong>t. (2009). Micros<strong>of</strong>t Malware Protection Center: Threat Research &<br />
Response Blog. Available from http://blogs.technet.com/mmpc/<br />
6.4.15 Micros<strong>of</strong>t. (2009). Security Research & Defense. Available from<br />
http://blogs.technet.com/swi/default.aspx<br />
6.4.16 Micros<strong>of</strong>t. (2009). The Micros<strong>of</strong>t Security Response Center (MSRC). Available<br />
from http://blogs.technet.com/msrc/default.aspx<br />
-125-
6.4.17 Micros<strong>of</strong>t. (2009). Windows Client TechCenter. Available from<br />
http://technet.micros<strong>of</strong>t.com/en-us/windows/default.aspx<br />
6.4.18 Micros<strong>of</strong>t. (2009). Windows Server TechCenter. Available from<br />
http://technet.micros<strong>of</strong>t.com/en-us/windowsserver/default.aspx<br />
6.4.19 National Information Assurance Training and Education Center. (2009). Home<br />
Page. Available from http://niatec.info/ViewPage.aspx?id=0.<br />
6.4.20 National Institute <strong>of</strong> Standards and Technology: Computer Security Division.<br />
(2009). Computer Security Resource Center. Available from<br />
http://csrc.nist.gov/index.html<br />
6.4.21 Schneirer, B. (2009). Schneier on Security. Available from:<br />
http://www.schneier.com/blog/<br />
6.4.22 US-CERT. (2009). Technical Users. Available from http://www.uscert.gov/nav/t01/<br />
7.0 CSAB and CAC Category Content (class time in hours)<br />
(CS Program) Estimate Computer Science Accreditation Board (CSAB) Category Content<br />
CSAB Category Core Advanced<br />
Data structures 1 2<br />
Computer organization and<br />
2<br />
6<br />
architecture<br />
Algorithms and s<strong>of</strong>tware design 3<br />
Concepts <strong>of</strong> programming languages 3<br />
8.0 Oral and Written Communications<br />
All student submissions will be evaluated for technical content, application <strong>of</strong> principles,<br />
completeness, accuracy, and use <strong>of</strong> use <strong>of</strong> supporting materials.<br />
Student submittals such as justification <strong>of</strong> test cases or why certain attributes are more<br />
valued in system administrators than other attributes will be also be graded for clarity <strong>of</strong> the<br />
communication which includes: structure, grammar, spelling, for formatting.<br />
Every student will be required to participate in classroom discussion.<br />
Every student will be encouraged to help other students resolve laboratory problems and to<br />
share their experiences and lessons-learned.<br />
9.0 Social and Ethical Issues<br />
The course will address the social and ethical issues related to the special role <strong>of</strong> System<br />
Administration, including: individual privacy, sensitivity <strong>of</strong> information, and investigating<br />
-126-
potential misuse. Students will be graded on their understanding <strong>of</strong> these topics through<br />
participation, assignments, and examinations.<br />
10.0 Theoretical Content<br />
10.1 Transforming broad security policies into specific security controls 6.0<br />
(e.g., access controls and audit).<br />
10.2 Analyzing trade<strong>of</strong>fs between decreased attack surface and diminished 6.0<br />
functionality.<br />
11.0 Problem Analysis<br />
Students will learn the principles <strong>of</strong> host system administration, illustrated through<br />
Micros<strong>of</strong>t Windows operating system environment. Students will demonstrate and extend<br />
their understanding <strong>of</strong> those principles by solving problems in Windows system<br />
administration.<br />
12.0 Solution design<br />
Students will develop command pipelines and scripts for secure host system administration,<br />
choosing the appropriate commands and structures. Students will develop resourceconstrained<br />
host security assessment approaches, defending their trade<strong>of</strong>f choices.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
02/17/2009 Revised ABET version Nugen Prerequisites changed.<br />
-127-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Work on a team<br />
6. Computer-based tools<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 4370/IASC 4370<br />
Course Title<br />
Host Security Administration Using Windows<br />
Course Coordinator<br />
Stephen Nugen<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision Feb 17, 2009<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand core principles <strong>of</strong><br />
Information Assurance with respect<br />
to host security.<br />
Identify options for host<br />
vulnerability assessments, including<br />
frameworks and tools.<br />
Identify key sources for Information<br />
Assurance requirements with<br />
respect to how operating systems<br />
are installed, configured, and<br />
maintained.<br />
Understand the system<br />
administration and security impacts<br />
<strong>of</strong> different host architectures.<br />
Understand and demonstrate<br />
different options for installing the<br />
X<br />
X<br />
X X X<br />
X<br />
X<br />
-128-
host operating system.<br />
Understand and demonstrate<br />
different options for user interfaces<br />
with respect to host security.<br />
Understand and demonstrate how<br />
to configure, inspect, and monitor<br />
host storage mechamisms, including<br />
disks, partitions and volumes, file<br />
systems, and access controls.<br />
Understand and demonstrate how<br />
to write system administration<br />
scripts.<br />
Understand and demonstrate how<br />
to configure operating system<br />
services.<br />
Understand and demonstrate how<br />
to configure and manage Windows<br />
domains, including domain user<br />
credentials.<br />
Understand and demonstrate how<br />
to securely configure and manage<br />
Windows networking and host<br />
firewall.<br />
X<br />
X<br />
X<br />
X<br />
X<br />
X<br />
X<br />
X<br />
X<br />
-129-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-130-
CIST 4540<br />
Computer Security Management<br />
Department and Course Number CIST 4540<br />
Course Title<br />
Computer Security Management<br />
Course Coordinator<br />
Dwight Haworth<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision November 15, 2008<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The purpose <strong>of</strong> this course is to integrate concepts and techniques from security assessment,<br />
risk mitigation, disaster planning, and auditing to identify, understand, and propose solutions<br />
to problems <strong>of</strong> computer security and security administration.<br />
1.2 For whom course is intended.<br />
This course is intended for all students in the College <strong>of</strong> Information Science and Technology<br />
who desire to increase their understanding <strong>of</strong> computer security management.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 CIST 4360 – Foundations <strong>of</strong> Information Assurance<br />
1.3.2 or permission <strong>of</strong> the instructor.<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Familiarity with computer hardware and system s<strong>of</strong>tware.<br />
1.4.2 Familiarity with the glossary <strong>of</strong> computer security.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None.<br />
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes. The student will be<br />
able to<br />
2.1 Plan an organizational security assessment,<br />
2.2 Specify the required characteristics <strong>of</strong> a system for a specific application,<br />
2.3 Specify a network architecture to support given policy requirements,<br />
2.4 Create a Disaster Response Plan, and<br />
Identify the informational needs <strong>of</strong> a Computer Security Manager.<br />
-131-
3.0 Content and Organization:<br />
List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> contact hours on each).<br />
Hours<br />
3.1 Management responsibilities and liabilities 3.0<br />
3.2 Turquoise Book 3.0<br />
3.3 Vulnerability Assessment 3.0<br />
3.4 Physical threats 3.5<br />
3.5 Protecting Internet-visible systems 3.0<br />
3.6 Orange Book 6.0<br />
3.7 Common Criteria Standards 3.0<br />
3.8 S<strong>of</strong>tware Development Issues 1.5<br />
3.9 Continuity planning 3.0<br />
3.10 Disaster recovery 6.0<br />
3.11 Computer emergency response teams 4.0<br />
3.12 Auditing Computer Security 3.0<br />
3.13 Monitoring and Control Systems 1.5<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
4.1.1 Lecture and discussion <strong>of</strong> assigned material<br />
4.1.2 The student is to prepare reports that require the application <strong>of</strong> principles and techniques<br />
presented in class.<br />
4.1.3 The student will read print media for articles related to the subject matter for the week<br />
and submit a brief synopsis <strong>of</strong> the article.<br />
4.2 Student role in the course.<br />
The student will attend lectures and demonstration, participate in discussion on assigned<br />
readings, take required quizzes, complete assigned projects, and complete required<br />
examinations<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three contact hours per week<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
5.1.1 Informational Analysis <strong>of</strong> Value Chain Activity (3)<br />
5.1.2 Design <strong>of</strong> a network security architecture (2)<br />
5.1.3 Recovery Process Planning (2)<br />
-132-
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Component Grading<br />
Quizzes 10%<br />
Two Examinations 50%<br />
Assignments 40%.<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
97-100% A+<br />
93-96% A<br />
90-92% A-<br />
87-89% B+<br />
83-87% B<br />
80-82% B-<br />
77-79% C+<br />
73-76% C<br />
70-72% C-<br />
67-69% D+<br />
63-66% D<br />
60-62% D-<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 3<br />
Networking and telecommunications 3<br />
Modern programming language 0.5<br />
Analysis and Design 12<br />
Data management<br />
Role <strong>of</strong> IS in Organizations 4.5<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least __2___ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically __10___ pages and to make __0___ oral presentations <strong>of</strong> typically<br />
_____ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as<br />
well as for technical content, completeness, and accuracy. Each graduate student will submit one paper<br />
<strong>of</strong> at least 15 pages (excluding front- and back-matter).<br />
9.0 Social and Ethical Issues:<br />
Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />
on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />
None<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />
None.<br />
11.0 Problem analysis:<br />
Please describe the analysis experiences common to all course sections.<br />
The student will analyze the value chain <strong>of</strong> a real company to identify critical informational flows along<br />
with material flows necessary to maintain the operation <strong>of</strong> the value chain processes.<br />
12.0 Solution design:<br />
Please describe the design experiences common to all course sections.<br />
The student will design a partitioned network structure to achieve varying levels <strong>of</strong> protection for the<br />
information resources within each partition.<br />
-134-
CHANGE HISTORY<br />
Date Change By whom Comments<br />
11/15/08 Projects Changed DAH CC Toolbox Not Available<br />
-135-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Work on a team<br />
6. Computer-based tools<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number CIST 4540<br />
Course Title<br />
Computer Security Management<br />
Course Coordinator<br />
Dwight A. Haworth<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 11/15/08<br />
S – Strong relationship<br />
X –Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Plan an organizational security<br />
assessment<br />
Specify the required characteristics <strong>of</strong> a<br />
system for a specific application<br />
Specify a network architecture to support<br />
given policy requirements<br />
Create a Disaster Response Plan<br />
Identify the informational needs <strong>of</strong> a<br />
Computer Security Manager<br />
X<br />
X<br />
X<br />
X X X<br />
X<br />
-136-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-137-
-138-
CSCI 1620<br />
Introduction to Computer Science II<br />
Department and Course Number CSCI 1620<br />
Course Title<br />
Introduction to Computer Science II<br />
Course Coordinator<br />
John Clark<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision December 12, 2008<br />
1.0 Course Description<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (catalog description)<br />
Advanced topics in programming; topics in data representation and manipulation, data structures,<br />
problem solving and algorithm design.<br />
1.2 For whom course is intended<br />
This course is designed primarily for computer science and information systems majors.<br />
1.3 Prerequisites <strong>of</strong> the course (courses)<br />
CSCI 1610 or CIST 1400 with a grade <strong>of</strong> “C” or better<br />
1.4 Prerequisites <strong>of</strong> the course (topics).<br />
Basic programming skills and facility with:<br />
1.4.1 Input/output<br />
1.4.2 Control structures<br />
1.4.3 Using functions<br />
1.4.4 Arrays<br />
1.4.5 Pointers<br />
1.4.6 Basic object properties<br />
1.5 Unusual circumstances <strong>of</strong> the course<br />
None<br />
2.0 Objectives<br />
2.1 sdfgskdl<br />
2.2 Describe the basic data types used in algorithms and discuss their implementation on modern<br />
computer systems.<br />
2.3 Discuss the concept <strong>of</strong> an abstract data type and how it is related to the concept <strong>of</strong> an object in<br />
the context <strong>of</strong> object-oriented programming.<br />
2.4 Characterize the ways in which the scope <strong>of</strong> an object can be controlled, with specific references<br />
to the features available in C++ for controlling object lifetimes.<br />
2.5 Discuss the use <strong>of</strong> recursion and iteration as alternate techniques for solving problems. Comment<br />
on the manner in which local variables are preserved, and on the space/time trade<strong>of</strong>fs in each<br />
approach.<br />
2.6 Describe several elementary sorting algorithms and comment on their running times using the<br />
“big O” notation. Describe efficient algorithms to identify all permutations <strong>of</strong> a set <strong>of</strong> items, and<br />
-139-
to identify all possible combinations <strong>of</strong> a set <strong>of</strong> items. Comment on the running time <strong>of</strong> these<br />
algorithms.<br />
2.7 Comment on the design <strong>of</strong> algorithms, specifically with regard to verifying their correctness.<br />
Discuss the potential effects <strong>of</strong> the failure <strong>of</strong> an algorithm.<br />
2.8 Discuss operator overloading, specifically as it is used in the C++ programming language. Indicate<br />
its purpose, appropriate circumstances for its use, and how the compiler decides which function<br />
to use when an overloaded operated is utilized.<br />
2.9 Illustrate the use <strong>of</strong> templates in the C++ programming language. Indicate how the appropriate<br />
use <strong>of</strong> templates can reduce the size <strong>of</strong> a source program. Comment on whether the size <strong>of</strong> the<br />
object program is also reduced when templates are employed.<br />
2.10 Comment on techniques for defining objects that store collections <strong>of</strong> other objects. Indicate<br />
typical ways in which the objects in these collections may be accessed, including specific coding<br />
examples in C++.<br />
2.11 Describe the stack, queue, and list abstract data types. Provide example implementations in the<br />
C++ programming language. Illustrate the use <strong>of</strong> these data types in several classic applications.<br />
2.12 Define a generic tree abstract data type. Discuss how a generic tree differs from a search tree.<br />
Demonstrate implementation <strong>of</strong> binary trees and binary search trees in the C++ programming<br />
language. Illustrate the use <strong>of</strong> tree is solutions to several classic applications.<br />
3.0 Content and Organization<br />
3.1 Data Representation (2 hours)<br />
3.1.1 Basic Data Types<br />
3.1.2 Computer Storage <strong>of</strong> Basic Data Types<br />
3.2 Abstract Data Types & Objects (4 hours)<br />
3.2.1 Abstract Data Type Specification<br />
3.2.2 Object Specification<br />
3.2.3 Object Implementation<br />
3.2.4 Object Instantiation<br />
3.3 Dynamic Memory Management (3 hours)<br />
3.4 Recursion (5 hours)<br />
3.4.1 Space, Time and Computability Considerations<br />
3.4.2 Run Time Stack<br />
3.4.3 Combinations & Permutations<br />
3.5 Basic sorting techniques (4 hours)<br />
3.5.1 Definition <strong>of</strong> sorting<br />
3.5.2 Basic algorithms for sorting<br />
3.5.3 The “big O” notation<br />
3.5.4 Recursion and sorting<br />
-140-
3.6 Object Oriented Techniques (6 hours)<br />
3.6.1 Operator Overloading<br />
3.6.2 Template Objects<br />
3.7 Collection Classes (4 hours)<br />
3.7.1 Composite Objects<br />
3.7.2 Access Collections<br />
3.7.3 Group Collections<br />
3.7.4 Organizing Collections<br />
3.8 Stacks & Queues (5 hours)<br />
3.8.1 Expression Analysis<br />
3.8.2 Priority Queues<br />
3.8.3 Resource Allocation<br />
3.8.4 Event Driven Simulations<br />
3.9 Linked Lists (4 hours)<br />
3.9.1 Singly Linked<br />
3.9.2 Circular<br />
3.9.3 Doubly Linked<br />
3.10 Trees (8 hours)<br />
3.10.1 Structure<br />
3.10.2 Binary<br />
3.10.3 Binary Search Trees<br />
3.10.4 Parsing<br />
4.0 Teaching Methodology<br />
4.1 Methods to be used<br />
This course is presented primarily through lectures.<br />
4.2 Student role in the course<br />
The student in this course will analyze algorithms, code object oriented and linear data structure<br />
programs, write programs, and work on group projects.<br />
4.3 Contact hours<br />
Three hours per week<br />
-141-
5.0 5.0 Evaluation<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
The grade for a student will be based on a combination <strong>of</strong> homework, group projects and<br />
examinations. Between one and two weeks will be spent on each laboratory project.<br />
5.2 Basis for determining the final grade<br />
Traditionally, approximately 60 to 70 percent <strong>of</strong> the grade will be determined by<br />
performance on between 7 and 9 laboratory projects. Scores on examinations and<br />
quizzes will be the basis for the remaining part <strong>of</strong> the grade, with a midterm examination<br />
having a typical weight <strong>of</strong> 10 percent, and a final examination having a weight <strong>of</strong> 20<br />
percent..<br />
Laboratory assignments will be evaluated using the following components and weights:<br />
40 percent for correctness, 40 percent for documentation/ease <strong>of</strong> use and ease <strong>of</strong><br />
maintenance, and 20 percent for having all required components submitted (source files,<br />
output examples, etc.). Suitable penalties for tardiness will be imposed (e.g. 15 percent if<br />
an submission is more than three days late).<br />
5.3 Grading scale and criteria<br />
Points<br />
Grade<br />
97 – 100% A+<br />
93 – 96% A<br />
90 – 92% A-<br />
87 – 89% B+<br />
83 – 86% B<br />
80 – 82% B-<br />
77 – 79% C+<br />
73 – 76% C<br />
70 – 72% C-<br />
67 – 69% D+<br />
63 – 66% D<br />
60 – 62% D-<br />
0 – 59% F<br />
6.0 Resource Material<br />
-142-
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Ford & Topp,. Data Structures With C++ , Prentice Hall, 1996 (or a more recent<br />
text)<br />
6.2 Other suggested reading materials, if any<br />
None<br />
6.3 Other sources <strong>of</strong> information<br />
None<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information<br />
None<br />
7.0 Computer Science Accreditation Board (CSAB) Category Content (class time in hours)<br />
CSAB Category Core Advanced<br />
Data structures 15<br />
Computer organization and architecture<br />
Algorithms and s<strong>of</strong>tware design 10<br />
Concepts <strong>of</strong> programming languages 20<br />
8.0 Oral and Written Communications<br />
Every student is required to submit at least __0___ written reports (not including exams, tests,<br />
quizzes, or commented programs) to typically _____ pages and to make ___0__ oral<br />
presentations <strong>of</strong> typically _____ minutes duration. Include only material that is graded for<br />
grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />
accuracy<br />
9.0 Social and Ethical Issues<br />
The importance <strong>of</strong> testing algorithms is made clear to students. Examples <strong>of</strong> algorithm failure<br />
and the impact <strong>of</strong> these failures are presented.<br />
10.0 Theoretical content<br />
This course introduces algorithmic problem-solving in the context <strong>of</strong> a modern programming language.<br />
Such topics as problem solving strategies, basic data structures, data and procedural abstraction, and<br />
algorithmic complexity are treated.<br />
-143-
Contact Hours<br />
10.1 Data Representation 2.0<br />
10.2 Abstract Data Types and Objects 4.0<br />
10.3 Dynamic Memory Management 3.0<br />
10.4 Recursion 5.0<br />
10.5 Object Oriented Techniques 6.0<br />
10.6 Collection Classes 4.0<br />
10.7 Stacks & Queues 5.0<br />
10.8 Linked Lists 4.0<br />
10.9 Trees 8.0<br />
11.0 Problem analysis<br />
Basic problem analysis is a focal point <strong>of</strong> this course. While learning the techniques <strong>of</strong> abstraction and<br />
encapsulation for basic data structures, the programming exercises provide opportunities to use the<br />
analysis techniques discussed in class.<br />
12.0 Solution design<br />
This course amplifies the object-oriented programming techniques introduced in CIST 1400. Students<br />
learn fundamental techniques for organizing data using a variety <strong>of</strong> classic data structures. Treatment <strong>of</strong><br />
memory management and recursion complement the discussion <strong>of</strong> these data structures. The significance<br />
<strong>of</strong> choosing the appropriate data structure for a solution is illustrated throughout the design <strong>of</strong> solutions<br />
to the programming exercises.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
02/20/1998 Original version Clark<br />
06/13/2003 Cleanup, ABET-specific material Wileman<br />
12/2/2008 Cleanup, ABET-specific material Clark<br />
-144-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Work on a team<br />
6. Computer-based tools<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number CSCI 1620<br />
Course Title<br />
Introduction to Computer Science II<br />
Course Coordinator<br />
John W. Clark<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 12/2/2008<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Describe the basic data types<br />
Abstract data types and objectoriented<br />
programming<br />
Object scope<br />
Recursion and iteration techniques for<br />
solving problems<br />
Searching, sorting and “big O”<br />
notation<br />
Operator overloading<br />
C++ templates<br />
S<br />
S<br />
S<br />
X X X<br />
X S S<br />
Collections and storage classes S X<br />
Linear storage types ( stack, queue,<br />
S<br />
X<br />
and list )<br />
X<br />
S<br />
S<br />
-145-
Trees and binary search trees S X<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-146-
ISQA 3150 Principles <strong>of</strong> Quantitative Analysis<br />
Department and Course Number ISQA 3150<br />
Course Title<br />
Principles <strong>of</strong> Quantitative Analysis<br />
Course Coordinator<br />
Yong Shi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/02/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The course is designed to give students the principles <strong>of</strong> Quantitative Analysis, a scientific<br />
approach to decision making that involves the operations <strong>of</strong> organizational systems.<br />
Quantitative Analysis attempts to solve the conflicts <strong>of</strong> interest among the components <strong>of</strong><br />
the organization in a way that is best for the organization as a whole.<br />
1.2 For whom course is intended.<br />
This course is intended for upper division undergraduate MIS majors who wish to<br />
understand the principles <strong>of</strong> Quantitative Analysis. It is one <strong>of</strong> elective courses for<br />
undergraduates who wish to pursue Data Mining and Business Intelligence.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
CIST 1100 and CIST 2500<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Introduction to Visual Basic Programming,<br />
1.4.2 Program development cycle<br />
1.4.3 Training in spreadsheets and database<br />
1.4.4 Statistics in information science and technology<br />
1.4.5 A well-known computer package being used to support the problem-solving<br />
process.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
2.1 To structure the real-life situation into a mathematical model, and abstract the essential elements<br />
so that a solution relevant to the decision maker’s objective can be sought. This involves looking<br />
at the problem in the context <strong>of</strong> the entire organizational system;<br />
2.2 To explore the structure <strong>of</strong> such solutions and develop systematic procedures for obtaining them;<br />
-147-
2.3 To develop a solution that yields an optimal value <strong>of</strong> the organizational system measure <strong>of</strong><br />
desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong> desirability.<br />
3.0 Content and Organization:<br />
3.1 Introduction 3<br />
3.2 Linear Programming: Model Formulation & Graphical<br />
3.3 Solution, Computer Solution and Modeling Examples 12<br />
3.4 Integer Programming 6<br />
3.5 Transportations 6<br />
3.6 Multi-criteria Decision Making 6<br />
3.7 Decision Analysis 6<br />
3.8 Forecasting 6<br />
3.9 Inventory Management 6<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will be lectures.<br />
4.2 Student role in the course.<br />
-148-<br />
Contact hours<br />
The student will attend lectures, participate in discussion, complete required<br />
examinations, homework and the class project.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
The student will attend lectures, participate in discussion, complete required<br />
examinations, homework and the class project.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Components<br />
Grading<br />
Exams 60%<br />
Class Project 25%
Class Participation / Homework 15%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
96 – 100% A+<br />
90 – 95% A<br />
86 – 89% B+<br />
80 – 85% B<br />
76 – 79% C+<br />
70 – 75% C<br />
66 – 69% D+<br />
60 – 65% D<br />
< 60% F<br />
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 B. W. Taylor III, Management Science, Prentice Hall, 9th Ed.<br />
6.1.2 B. Render, R. M. Star JR, and N. Balakrishnan, Managerial Decision Modeling,<br />
Prentice Hall, 2nd Ed.<br />
6.1.3 B. Render, R. M. Star JR, and M. E. Hanna, Quantitative Analysis for Management,<br />
Prentice Hall, 8th Ed. (or more recent text)<br />
6.2 Other suggested reading materials, if any.<br />
None<br />
6.3 Other sources <strong>of</strong> information.<br />
None<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
None<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
-149-
Modern programming language 12<br />
Analysis and Design 9<br />
Data management<br />
Role <strong>of</strong> IS in Organizations 6<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least ___3__ written reports (not including exams, tests,<br />
quizzes, or commented programs) to typically __30___ pages and to make __1___ oral<br />
presentations <strong>of</strong> typically __10___ minutes duration. Include only material that is graded for<br />
grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />
accuracy.<br />
9.0 Social and Ethical Issues:<br />
No coverage<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />
coverage.<br />
Hours<br />
10.1 Linear Programming 12<br />
10.2 Integer Programming 6<br />
10.3 Transportations 6<br />
10.4 Multi-criteria Decision Making 6<br />
10.5 Decision Analysis 6<br />
10.6 Forecasting 6<br />
11.0 Problem analysis:<br />
Students learn the principles <strong>of</strong> Quantitative Analysis, a scientific approach to decision making<br />
that involves the operations <strong>of</strong> organizational systems. They learn to solve the conflicts <strong>of</strong><br />
interest among the components <strong>of</strong> the organization in a way that is best for the organization as a<br />
whole.<br />
12.0 Solution design:<br />
Students learn to develop a solution that yields an optimal value <strong>of</strong> the organizational system<br />
measure <strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />
desirability.<br />
-150-
CHANGE HISTORY<br />
Date Change By whom Comments<br />
12/2002 Initial ABET version Shi<br />
6/25/03 ABET cleanup Wolcott<br />
10/09/07 Update <strong>of</strong> resource material Shi<br />
10/02/08 Review completed Shi<br />
-151-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 3150<br />
Course Title<br />
Principles <strong>of</strong> Quantitative Analysis<br />
Course Coordinator<br />
Yong Shi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Structure the real-life situation into a<br />
mathematical model, and abstract the<br />
essential elements so that a solution<br />
relevant to the decision maker’s objective<br />
can be sought. This involves looking at<br />
the problem in the context <strong>of</strong> the entire<br />
organizational system;<br />
Explore the structure <strong>of</strong> such solutions<br />
and develop systematic procedures for<br />
obtaining them;<br />
Develop a solution that yields an optimal<br />
value <strong>of</strong> the organizational system<br />
measure <strong>of</strong> desirability, or compare<br />
alternative courses <strong>of</strong> action by<br />
evaluating their measure <strong>of</strong> desirability.<br />
S<br />
S<br />
S<br />
X<br />
S<br />
S<br />
-152-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-153-
-154-
ISQA 3210 Advanced Technology for Personal Productivity<br />
Department and Course Number ISQA 3210<br />
Course Title<br />
Advanced Technology for Personal Productivity<br />
Course Coordinator<br />
Leah R. Pietron<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/13/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The purpose <strong>of</strong> this class is to give students extensive coverage in the area <strong>of</strong> the<br />
microcomputers and its components, operating systems (Windows XP, Windows Vista),<br />
an <strong>of</strong>fice suite (Micros<strong>of</strong>t Office 2007), and e-commerce site/intranet/internet design<br />
(HTML/XML).<br />
1.2 For whom course is intended.<br />
This course is intended for undergraduate MIS majors and minors who wish to study<br />
Advanced Technology for Personal Productivity including the area <strong>of</strong> the microcomputers<br />
and its components, operating systems, an <strong>of</strong>fice suite, and e-commerce<br />
site/intranet/internet design.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
CIST 1100<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Fundamental Competencies in Word, Excel, Access, and PowerPoint<br />
1.4.2 Basic Operating Systems operations<br />
1.4.3 Understanding <strong>of</strong> Hardware Components<br />
1.4.4 Proposal Development<br />
1.4.5 HTML and Web Design<br />
1.4.6 Basic HTML<br />
1.4.7 Introduction to Graphics<br />
1.4.8 Basic Web Design Principles<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
-155-
2.0 Objectives:<br />
2.1 Build and maintain personal computers: Students will complete an End User Needs<br />
Analysis and complete specifications for a proposed client. They will use a lab<br />
environment to build and repair current problems with personal computers.<br />
2.2 Learn to configure and install operating systems (Windows 98/Windows 2000/Windows<br />
XP): Students will deal with configuration and installation <strong>of</strong> an operating system in a LAN<br />
environment, if labs and time are available.<br />
2.3 Develop an e-commerce site/intranet/internet and develop personal and client home<br />
pages using HTML/DHTML/JavaScript. If time allows, students will be given instruction on<br />
using Cold Fusion.<br />
2.4 Learn to use word processing (Word 2000/XP), spreadsheets (Excel 2000/XP), database<br />
management (Access 2000/XP), and presentation graphics (PowerPoint 2000/XP)<br />
programs. In addition, desktop publishing (Publisher 2000) and photo editor (PhotoDraw<br />
2000) might be covered.<br />
3.0 Content and Organization:<br />
3.1 Managing and Maintaining PC 3.0<br />
3.2 End User Analysis Project 3.0<br />
3.3 Operating Systems - Windows 98 & Windows NT/2000/XP 3.0<br />
3.4 HTML 15.0<br />
3.5 DHTML 6.0<br />
3.6 Word 2000 3.0<br />
3.7 Excel 2000 3.0<br />
3.8 Access 2000 3.0<br />
3.9 PowerPoint 2000 3.0<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
Contact hours<br />
The primary teaching methods include lectures, hands-on demonstrations, and guidance<br />
on the semester projects.<br />
4.2 Student role in the course.<br />
Students will attend lectures, complete homework assignments, and unit projects<br />
4.3 Contact hours.<br />
-156-
5.0 Evaluation:<br />
Three (3) hours per week.<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
Operating Systems Exercises<br />
End User Analysis project<br />
Office XP/2000 Word, Excel, Access, and PowerPoint projects<br />
E-Commerce Web Design Project<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Component<br />
Grading<br />
End User Analysis Project 15%<br />
HTML Projects 35%<br />
Web Design/Page Project 10%<br />
Word 2000 10%<br />
Excel 2000 10%<br />
Access 2000 10%<br />
PowerPoint 2000 10%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
97% - 100% A+<br />
93% - 96% A<br />
90% - 92% A-<br />
87% - 89% B+<br />
83% - 86% B<br />
80% - 82% B-<br />
77% - 79% C+<br />
73% - 76% C<br />
70% - 72% C-<br />
67% - 69% D+<br />
63% - 66% D<br />
60% - 62% D-<br />
0% - 59% F<br />
-157-
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Micros<strong>of</strong>t Office 2000, Advanced Concepts and Techniques by Gary B. Shelly,<br />
Thomas J. Cashman, and Misty E. Vermaat. Course Technology, 2000.<br />
6.1.2 Creating Web Pages with HTML and Dynamic HTML by Patrick Carey, Course<br />
Technology, 2001.<br />
6.1.3 Micros<strong>of</strong>t XP New Features Guide: Changes from Office 2000 to Office XP<br />
(packaged with Micros<strong>of</strong>t Office 2000 textbook)<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 Web Style Guide: Basic Design Principles for Creating Web Sites by Patrick Lynch<br />
and Sarah Horton, Prentice-Hall, 2001.<br />
6.2.2 Principles <strong>of</strong> Web Design by Joel Skalar, Course Technology, 2001<br />
6.2.3 Cold Fusion by Kapathi & Kapathi, Course Technology, 2002.<br />
6.2.4 A+ Guide to Managing and Maintaining Your PC, Third Edition by Jean Andrews,<br />
Course Technology, 2002.<br />
6.2.5 Designing Web Pages with Cascading Style Sheets by Joel Skalar, Course<br />
Technology, 2001.<br />
6.2.6 Cascading Style Sheets: Designing for the Web, Second Edition by Hakon Wium Lie<br />
and Bert Bos, Addison Wesley, 2001.<br />
6.2.7 Creative HTML Design by Lynda Weinman & William Weinman, Prentice-Hall,<br />
2000.<br />
6.2.8 Micros<strong>of</strong>t Windows 98 for Power Users by Harry L.Phillips, Course Technology,<br />
2000.<br />
6.2.9 Micros<strong>of</strong>t Windows 2000 for Power Users by Harry L.Phillips, Course Technology,<br />
2001.<br />
6.2.10 Micros<strong>of</strong>t MS-DOS Command Line - Comprehensive by Harry L.Phillips, Course<br />
Technology, 2001.<br />
6.3 Other sources <strong>of</strong> information.<br />
Additional course content, either with pages developed especially for this course or with<br />
links to additional course materials, will be provided during the semester.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
None.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />
in hours):<br />
-158-
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 10<br />
Networking and telecommunications 6<br />
Modern programming language 6<br />
Analysis and Design 10<br />
Data management 6<br />
Role <strong>of</strong> IS in Organizations 8<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least __2___ written reports (not including exams, tests,<br />
quizzes, or commented programs) to typically __15-50___ pages and to make __1___ oral<br />
presentations <strong>of</strong> typically __10___ minutes duration. Include only material that is graded for<br />
grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />
accuracy.<br />
9.0 Social and Ethical Issues:<br />
Social and ethical issues are threaded throughout all the units <strong>of</strong> this course: operating systems,<br />
personal computer maintenance, end user analysis project, Office XP, and the development <strong>of</strong> an<br />
e-commerce site. Topics include piracy <strong>of</strong> s<strong>of</strong>tware, inappropriate duplication <strong>of</strong> s<strong>of</strong>tware,<br />
privacy and security issues regarding data collected on the web sites.<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />
coverage.<br />
No coverage.<br />
11.0 Problem analysis:<br />
The students will complete an End User Needs Analysis project that involves solving a problem<br />
presented to them in a scenario. They have to conduct the research and make recommendations<br />
based on the request for proposals (RFP) presented by the proposal client.<br />
Students learn to analyze configurations, operating and network, and conduct routine<br />
maintenance on their personal and business machines. The learn how to load two major types <strong>of</strong><br />
operating systems: Windows (2000/XP) and Linux (Red Hat 7.4).<br />
-159-
Each student or group <strong>of</strong> two students must create a web site for a client. The student must<br />
analyze the needs <strong>of</strong> the web site and use the appropriate tools to develop and design the web<br />
application.<br />
12.0 Solution design:<br />
The end user project provides the analysis to select the appropriate s<strong>of</strong>tware and hardware<br />
solve the problem for the client. Based on this research, the student recommends systems<br />
configuration, network implications and solutions, and application solutions.<br />
Student will learn to develop an e-commerce site/intranet/internet and develop personal and<br />
client home pages using HTML/DHTML/JavaScript. If time allows, students will be given<br />
instruction on using Cold Fusion and Photoshop. The students will learn not only the code, but<br />
the design elements behind the development <strong>of</strong> pages, graphics, and web sites.<br />
Students will also learn design features <strong>of</strong> the <strong>of</strong>fice suite including word processing (Word<br />
2000/XP), spreadsheets (Excel 2000/XP), database management (Access 2000/XP), and<br />
presentation graphics (PowerPoint 2000/XP) programs. In addition, desktop publishing (Publisher<br />
2000) and photo editor (PhotoDraw 2000) might be covered.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
11/2/02 Initial ABET version Pietron<br />
6/25/03 ABET cleanup Wolcott<br />
10/13/08 Update to course description and<br />
prerequisites<br />
Pietron<br />
-160-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Department and Course Number ISQA 3210<br />
Course Title<br />
Advanced Technology for Personal Productivity<br />
Course Coordinator<br />
Leah R. Pietron<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Build and maintain personal computers:<br />
Students will complete an End User<br />
Needs Analysis and complete<br />
specifications for a proposed client. They<br />
will use a lab environment to build and<br />
repair current problems with personal<br />
computers<br />
Learn to configure and install operating<br />
systems (Windows 98/Windows<br />
2000/Windows XP): Students will deal<br />
with configuration and installation <strong>of</strong> an<br />
operating system in a LAN environment,<br />
if labs and time are available.<br />
Develop an e-commerce<br />
site/intranet/internet and develop<br />
personal and client home pages using<br />
HTML/DHTML/JavaScript. If time allows,<br />
students will be given instruction on<br />
using Cold Fusion.<br />
X<br />
-161-<br />
X<br />
X<br />
X
Learn to use word processing (Word<br />
2000/XP), spreadsheets (Excel 2000/XP),<br />
database management (Access 2000/XP),<br />
and presentation graphics (PowerPoint<br />
2000/XP) programs. In addition, desktop<br />
publishing (Publisher 2000) and photo<br />
editor (PhotoDraw 2000) might be<br />
covered.<br />
S<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-162-
ISQA 3250 Intermediate Quantitative Analysis<br />
Department and Course Number ISQA 3250<br />
Course Title<br />
Intermediate Quantitative Analysis<br />
Course Coordinator<br />
Yong Shi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/02/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The course is designed to provide students advanced decision making models in solving<br />
business case problems. These models include transportation models, integer<br />
programming, goal programming, simulation applications, Markov process in market<br />
shares and dynamic programming. A variety <strong>of</strong> computer s<strong>of</strong>tware will be applied to<br />
formulate and solve both case-study and real-life problems.<br />
1.2 For whom course is intended.<br />
This course is intended for upper division undergraduate MIS majors who wish to<br />
understand the advanced Quantitative Analysis. It is one <strong>of</strong> elective courses for<br />
undergraduates who wish to pursue Knowledge Management, Data Mining and Business<br />
Intelligence.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 CIST 1100<br />
1.3.2 CIST 2500<br />
1.3.3 ISQA 3150<br />
1.3.4 or equivalent<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Introduction to Visual Basic Programming,<br />
1.4.2 Program development cycle<br />
1.4.3 Training in spreadsheets and database<br />
1.4.4 Statistics in information science and technology<br />
1.4.5 A well-known computer package being used to support the problem-solving<br />
process.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
-163-
None<br />
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
2.1 To structure the real-life situation into advanced mathematical models, and abstract the<br />
essential elements so that a solution relevant to the decision maker’s objective can be<br />
sought. This involves looking at the problem in the context <strong>of</strong> the entire organizational<br />
system;<br />
2.2 To explore the structure <strong>of</strong> such solutions and develop systematic procedures for<br />
obtaining them;<br />
2.3 To develop a solution that yields an optimal value <strong>of</strong> the organizational system measure<br />
<strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />
desirability.<br />
3.0 Content and Organization:<br />
Contact hours<br />
3.1 Introduction 3<br />
3.2 Transportation Models: Part I 6<br />
3.3 Transportation Models: Part II 6<br />
3.4 Integer Programming 9<br />
3.5 Goal Programming 6<br />
3.6 Simulation 6<br />
3.7 Markov Processes 6<br />
3.8 Dynamic Programming 6<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will be lectures.<br />
4.2 Student role in the course.<br />
The student will attend lectures, participate in discussion, complete required<br />
examinations, homework and the class project.<br />
4.3 Contact hours.<br />
Three (3) hours per week<br />
-164-
5.0 Evaluation:<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
The student will attend lectures, participate in discussion, complete required<br />
examinations, homework and the class project.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Components<br />
Grading<br />
Exams 60%<br />
Class Project 25%<br />
Class Participation / Homework 15%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
96 – 100% A+<br />
90 – 95.9% A<br />
86 – 89.9% B+<br />
80 – 85.9% B<br />
76 – 79.9% C+<br />
70 – 75.9% C<br />
66 – 69.9% D+<br />
60 – 65.9% D<br />
< 60% F<br />
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 B. W. Taylor III, Management Science, Prentice Hall, 9th Ed.<br />
6.1.2 B. Render, R. M. Star JR, and N. Balakrishnan, Managerial Decision Modeling,<br />
Prentice Hall, 2nd Ed.<br />
6.1.3 B. Render, R. M. Star JR, and M. E. Hanna, Quantitative Analysis for Management,<br />
Prentice Hall, 8th Ed. (or more recent text)<br />
6.2 Other suggested reading materials, if any.<br />
-165-
None<br />
6.3 Other sources <strong>of</strong> information.<br />
None<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
None<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language 12<br />
Analysis and Design 6<br />
Data management<br />
Role <strong>of</strong> IS in Organizations 3<br />
8.0 Oral and Written Communications<br />
Every student is required to submit at least ___3__ written reports (not including exams, tests,<br />
quizzes, or commented programs) to typically ___30__ pages and to make _1____ oral<br />
presentations <strong>of</strong> typically ___10__ minutes duration. Include only material that is graded for<br />
grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />
accuracy.<br />
9.0 Social and Ethical Issues:<br />
No coverage<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />
coverage.<br />
Hours<br />
10.1 Integer Programming 9<br />
10.2 Transportations 12<br />
10.3 Goal Programming 6<br />
10.4 Markov Processes 6<br />
10.5 Dynamic Programming 6<br />
-166-
11.0 Problem analysis:<br />
Students learn the advanced models <strong>of</strong> Quantitative Analysis, a scientific approach to decision<br />
making that involves the operations <strong>of</strong> organizational systems. They learn to solve the conflicts<br />
<strong>of</strong> interest among the components <strong>of</strong> the organization in a way that is best for the organization<br />
as a whole.<br />
12.0 Solution design:<br />
Students learn to develop a solution that yields an optimal value <strong>of</strong> the organizational system<br />
measure <strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />
desirability.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
Fall 2001 Created Shi<br />
6/25/03 ABET cleanup Wolcott<br />
10/09/07 Update <strong>of</strong> resource material Shi<br />
10/02/08 Review completed Shi<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 3250<br />
Course Title<br />
Intermediate Quantitative Analysis<br />
Course Coordinator<br />
Yong Shi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
-167-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Course objective<br />
Structure the real-life situation into<br />
advanced mathematical models, and<br />
abstract the essential elements so that a<br />
solution relevant to the decision maker’s<br />
objective can be sought. This involves<br />
looking at the problem in the context <strong>of</strong><br />
the entire organizational system<br />
Explore the structure <strong>of</strong> such solutions<br />
and develop systematic procedures for<br />
obtaining them<br />
Develop a solution that yields an optimal<br />
value <strong>of</strong> the organizational system<br />
measure <strong>of</strong> desirability, or compare<br />
alternative courses <strong>of</strong> action by<br />
evaluating their measure <strong>of</strong> desirability<br />
S<br />
S<br />
X S X<br />
S S X<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
-168-
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-169-
-170-
ISQA 3300 File Structures for Information Systems<br />
Department and Course Number ISQA 3300<br />
Course Title<br />
File Structures for Information Systems<br />
Course Coordinator<br />
Dwight Haworth<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/30/09<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The purpose <strong>of</strong> this course is to introduce the student to computer file organizations<br />
and access methods. A fundamental understanding <strong>of</strong> the performance implications<br />
<strong>of</strong> each file organization is developed to allow the students to make information<br />
systems design choices that will optimize the performance <strong>of</strong> business information<br />
systems.<br />
1.2 For whom course is intended.<br />
This course is intended for undergraduate students in the College <strong>of</strong> Information<br />
Science and Technology who wish to pursue the Bachelor <strong>of</strong> Science in Management<br />
Information Systems (<strong>BIS</strong>) degree. It is one <strong>of</strong> the required courses for the degree.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
CSCI 1620 - Introduction Computer Science II.<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Ability to program using procedural logic.<br />
1.4.2 Ability to use Micros<strong>of</strong>t Excel.<br />
1.4.3 Familiarity with probability distributions.<br />
1.4.4 Familiarity with computer hardware and s<strong>of</strong>tware.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None.<br />
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes. The student will be<br />
able to<br />
2.1 Comprehension <strong>of</strong> computer hardware components,<br />
2.2 Comprehension <strong>of</strong> the attributes and functions <strong>of</strong> file systems,<br />
2.3 Application <strong>of</strong> storage devices to meet specified requirements,<br />
2.4 Analysis <strong>of</strong> file organizations to meet specified response time and storage constraints,<br />
2.5 Evaluate the output <strong>of</strong> processing algorithms with respect to selected performance criteria, and<br />
2.6 Program file processing algorithms (application) using pseudocode.<br />
-171-
3.0 Content and Organization:<br />
List <strong>of</strong> major topics to be covered in chronological sequence (specify approximate number <strong>of</strong> contact<br />
hours on each).<br />
Hours<br />
3.1.1 Computer hardware capabilities and limitations 3.0<br />
3.1.2 File programming fundamentals 3.0<br />
3.1.3 Physical storage organization 3.0<br />
3.1.4 File system implementations (Windows and Unix) 6.0<br />
3.1.5 Techniques for evaluating file performance 3.0<br />
3.1.6 Sorting, searching, and indexing 6.0<br />
3.1.7 Sort-merge and the balance line algorithm 3.0<br />
3.1.8 Indexes 3.0<br />
3.1.9 Tree structures and their maintenance 5.0<br />
3.1.10 Static Hashing 4.0<br />
3.1.11 Extendible Hashing 3.0<br />
3.1.12 Continuous track storage (CDROM, DVD, etc) 1.5<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
4.1.1 Lecture and discussion <strong>of</strong> assigned material<br />
4.1.2 The student is to use a modern programming language to implement selected file<br />
structures and access algorithms.<br />
4.1.3 Laboratory: The student must use a computer to solve assigned problems. The student is<br />
to arrange his/her own laboratory time as needed to complete each assignment. Students<br />
may use their own microcomputer to complete assigned problems.<br />
4.2 Student role in the course.<br />
The student will attend lectures and demonstration, participate in discussion on assigned<br />
readings, take required quizzes, complete assigned projects, and complete required<br />
examinations.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three contact hours per week<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
5.1.1 History <strong>of</strong> storage technologies (1)<br />
5.1.2 Programming the priming read algorithm (1)<br />
5.1.3 Storage utilization efficiency using blocking (1)<br />
5.1.4 Balance line programming (2)<br />
5.1.5 Static Hashing Algorithm Evaluation (2)<br />
5.1.6 Static hashing programming (2)<br />
-172-
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Component Approx.<br />
Weight<br />
Quizzes 10%<br />
Two Examinations 50%<br />
Assignments 40%.<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
97-100% A+<br />
93-96% A<br />
90-92% A-<br />
87-89% B+<br />
83-87% B<br />
80-82% B-<br />
77-79% C+<br />
73-76% C<br />
70-72% C-<br />
67-69% D+<br />
63-66% D<br />
60-62% D-<br />
6.4.3 File Systems: Structures and Algorithms, by T. Harbron (1988)<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 9<br />
Networking and telecommunications<br />
Modern programming language 6<br />
Analysis and Design 24<br />
Data management 4<br />
Role <strong>of</strong> IS in Organizations<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least __0___ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically _____ pages and to make __0___ oral presentations <strong>of</strong> typically _____<br />
minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as<br />
for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues:<br />
Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />
on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />
None<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />
File processing theory 1.5<br />
Probability theory (Poisson Distribution) 1.5<br />
11.0 Problem analysis:<br />
Please describe the analysis experiences common to all course sections.<br />
The student will analyze various file access alternatives to determine which produces the most efficient<br />
storage utilization. The student will analyze hashing algorithms to determine which produces the fewest<br />
collisions.<br />
12.0 Solution design:<br />
Please describe the design experiences common to all course sections.<br />
The student will use a balance line algorithm to implement one <strong>of</strong> three types <strong>of</strong> problem solutions. The<br />
student will design a static hashing system store a specified number <strong>of</strong> records.<br />
-174-
CHANGE HISTORY<br />
Date Change By whom Comments<br />
6/12/03 Change prerequisite. Course Change Form<br />
5/15/03.<br />
Lw<br />
Change prereq. From CIST 1400 to<br />
CSCI 1620 so students have more<br />
programming experience.<br />
6/25/03 ABET cleanup Wolcott<br />
3/25/08 Update content and required textbook Haworth<br />
5/30/09 Update student outcomes and map<br />
outcomes to Program outcomes<br />
Haworth<br />
-175-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Work on a team<br />
6. Computer-based tools<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 3300<br />
Course Title<br />
File Structures for Information Systems<br />
Course Coordinator<br />
Dwight A. Haworth<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/30/09<br />
S – Strong relationship<br />
X –Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Comprehension <strong>of</strong> computer hardware<br />
components<br />
Comprehension <strong>of</strong> the attributes and<br />
functions <strong>of</strong> file systems<br />
Application <strong>of</strong> storage devices to meet<br />
specified requirements<br />
Analysis <strong>of</strong> file organizations to meet<br />
specified response time and storage<br />
constraints<br />
Evaluate the output <strong>of</strong> processing<br />
algorithms with respect to selected<br />
performance criteria<br />
Program file processing algorithms<br />
(application) using pseudocode<br />
X<br />
X<br />
X<br />
X<br />
X<br />
X<br />
X<br />
X<br />
X<br />
-176-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-177-
-178-
ISQA 3310 Managing the Database Environment<br />
Department and Course Number ISQA 3310<br />
Course Title<br />
Managing the Database Environment<br />
Course Coordinator<br />
Peter Wolcott<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 1/31/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
Introduction to business database design and management functions. The focus is on the use <strong>of</strong><br />
current database management systems (DBMS) to support the data management function <strong>of</strong> an<br />
organization. Topics include data modeling, database design, SQL, data management and<br />
database administration. Hands-on experience in database design, creation, and use is provided.<br />
1.2 For whom course is intended.<br />
This course is intended for the undergraduates who wish to pursue the Bachelor <strong>of</strong> Science in<br />
Management Information Systems (<strong>BIS</strong>) degree. It is one <strong>of</strong> the required courses for the degree.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 ISQA 3210 Advanced Technology for Personal Productivity (co-requisite)<br />
1.3.2 CIST 1100 Introduction to Personal Programming<br />
1.3.3 CIST 3100 Organizations, Applications, and Technology<br />
or equivalent.<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 General knowledge <strong>of</strong> Windows environment from user’s perspective<br />
1.4.2 Introductory exposure to Micros<strong>of</strong>t Access<br />
1.4.3 Knowledge <strong>of</strong> basic storage architecture and terminology<br />
1.4.4 Basic familiarity with the role <strong>of</strong> data within organizations<br />
1.4 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
-179-
2.0 Objectives:<br />
2.1 Distinguish between ‘data’ and ‘information’.<br />
2.2 Define the terms 'database', 'database management system' and distinguish between such<br />
systems and their predecessors.<br />
2.3 Define the characteristics and benefits <strong>of</strong> the relational database model.<br />
2.4 Use SQL to define and modify database objects, and retrieve data.<br />
2.5 Describe the database development process, and explain how it fits into the broader context <strong>of</strong><br />
systems analysis, design, and implementation.<br />
2.6 Use data modeling techniques and tools to develop data models.<br />
2.7 Design appropriately normalized relations in a relational DBMS.<br />
2.8 Design and implement a relational database system <strong>of</strong> modest size using a contemporary DBMS.<br />
2.9 Identify the data integrity and security issues associated with database systems and explain how<br />
these are addressed in contemporary database management systems.<br />
2.10 Discuss the issues and techniques used with databases in a distributed environment, including the<br />
Internet.<br />
2.11 Explain the purpose, architecture, and associated terminology <strong>of</strong> data warehousing.<br />
3.0 Content and Organization:<br />
Contact hours<br />
3.1 File processing systems definition and components <strong>of</strong> database system 3.0<br />
3.2 Micros<strong>of</strong>t Access DBMS 1.5<br />
3.3 The Relational Model 1.5<br />
3.4 SQL & PL/SQL 9.0<br />
3.5 Database development process 4.5<br />
3.6 Data modeling & Entity-Relationship Diagramming 6.0<br />
3.7 Logical database design: ERD to tables, Functional dependencies 4.5<br />
3.8 Logical database design: Normalization 3.0<br />
3.9 Transaction Processing & Concurrency Control 3.0<br />
3.10 Business Intelligence and Data Warehousing 3.0<br />
3.11 Databases and the Internet 3.0<br />
-180-
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods are lectures, discussion, and in-class demonstrations. Both the<br />
normal class meeting and the Internet-only teaching are available.<br />
4.2 Student role in the course.<br />
The student attends lectures, participate in the class discussion and complete assignments,<br />
required examinations and the semester database project.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three hours per week.<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Students participate in the class discussion and complete assignments, required examinations and<br />
the semester database project.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Components Grading<br />
Exams 30%<br />
Assignments 50%<br />
Project 15%<br />
Participation 5%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
97-100% A+<br />
93-96% A<br />
90-92% A-<br />
87-89% B+<br />
83-86% B<br />
80-82% B-<br />
77-79% C+<br />
73-76% C<br />
70-72% C-<br />
67-69% D+<br />
63-66% D<br />
60-62% D-<br />
-181-
students primarily learn the relational model; in the part <strong>of</strong> databases in the distributed environment,<br />
students learn distributed databases and the relationship between databases and Internet.<br />
12.0 Solution design:<br />
Students learn the methods and processes needed to develop and design databases: the data modeling<br />
and logical database design. Students will complete the semester database project by designing and<br />
implementing a modest-size, but realistic database application.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
12/19/02 Time spent with Access limited to just<br />
database construction<br />
Wolcott The how-tos <strong>of</strong> interface design will<br />
be provided via links to optional<br />
tutorial. The database class will<br />
focus on the database issues, not<br />
12/19/02 Database administration dropped from<br />
content<br />
12/19/02 Amount <strong>of</strong> time on databases in a<br />
distributed environment, data<br />
warehousing, databases and the Internet<br />
reduced to 1.5 weeks total<br />
6/12/03 Change course description and<br />
prerequisites.<br />
Wolcott<br />
Wolcott<br />
Wild<br />
complete systems development.<br />
ISQA 4300 Database Administration<br />
is available, and more time is<br />
needed in ISQA 3310 for core<br />
concepts.<br />
Databases and the Internet and<br />
databases in a distributed<br />
environment covered in ISQA 4380.<br />
More room left for core topics<br />
Change description to reflect actual<br />
course content and update<br />
prerequisites needed.<br />
6/25/03 ABET cleanup Wolcott Updated prerequisite topics to<br />
reflect new requirement for CIST<br />
1100<br />
10/3/07 Updated resource material Wolcott Update <strong>of</strong> textbook<br />
1/31/08 Insertion <strong>of</strong> table mapping course<br />
objectives to program outcomes<br />
1/31/08 Course objectives updated to improve<br />
wording.<br />
Wolcott<br />
Wolcott<br />
‘Understand’ changed to a more<br />
active verb, e.g. ‘explain’, ‘describe’<br />
in many cases.<br />
10/13/08 Included more business intelligence Wolcott<br />
coverage<br />
10/31/08 Included PL/SQL coverage Wolcott In response to demand by students<br />
and IS&T advisory group.<br />
2/12/09 Updated resource material to APA citation<br />
format.<br />
Wolcott<br />
-183-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 3310<br />
Course Title<br />
Managing the Database Environment<br />
Course Coordinator<br />
Peter Wolcott<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 1/31/08<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Distinguish between ‘data’ and<br />
‘information’.<br />
Define the terms 'database', 'database<br />
management system' and distinguish<br />
between such systems and their<br />
predecessors.<br />
Define the characteristics and benefits <strong>of</strong><br />
the relational database model.S<br />
Use SQL to define and modify database<br />
objects, and retrieve data.<br />
Describe the database development<br />
process, and explain how it fits into the<br />
broader context <strong>of</strong> systems analysis,<br />
design, and implementation.<br />
Use data modeling techniques and tools<br />
to develop data models.<br />
Design appropriately normalized relations<br />
in a relational DBMS.<br />
Design and implement a relational<br />
X<br />
X<br />
X<br />
X<br />
S<br />
X<br />
X<br />
S<br />
S<br />
S<br />
-184-
database system <strong>of</strong> modest size using a<br />
contemporary DBMS.<br />
Identify the data integrity and security<br />
issues associated with database systems<br />
and explain how these are addressed in<br />
contemporary database management<br />
systems.<br />
Discuss the issues and techniques used<br />
with databases in a distributed<br />
environment, including the Internet.<br />
Explain the purpose, architecture, and<br />
associated terminology <strong>of</strong> data<br />
warehousing.<br />
X<br />
X<br />
X<br />
-185-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-186-
ISQA 3400 Business Data Communications<br />
Department and Course Number ISQA 3400<br />
Course Title<br />
Business Data Communications<br />
Course Coordinator<br />
Kerry Ward<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/01/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
Data Communications principles and service operations with computers and telecommunication<br />
systems for operational analysis and decision making. This course will focus on breath, not depth<br />
-- concepts rather than specific technologies because concepts remain constant over time, while<br />
technologies change from year to year. Students are expected to master the basic terminologies<br />
and concepts, not necessarily to become experts in computer networking, nor to know the<br />
engineering details <strong>of</strong> any technology.<br />
1.2 For whom course is intended.<br />
This course is required for those students pursuing undergraduate and graduate degrees. It is one<br />
<strong>of</strong> the required courses for <strong>BIS</strong> degree.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 CIST 3100 Organizations, Applications, and Technology<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Computer architecture basics<br />
1.4.2 Transmission links<br />
1.4.3 Network topologies<br />
1.4.4 Network security and management<br />
1.4.5 Network protocols<br />
1.4.6 Network standards<br />
1.4.7 OSI model<br />
1.4.8 Internetworking<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
2.1 Learn data communications principles and service operations with computers and<br />
telecommunication systems for operational analysis and decision making.<br />
-187-
2.2 Master the basic terminology and concepts <strong>of</strong> data communications.<br />
2.3 Analyze and design a system or a sub-system <strong>of</strong> a large scale system for the semester project<br />
applying the tools and techniques learn in the course.<br />
2.4 Carry out hands-on projects to understand data communications models.<br />
2.5 Understand network implementation, management, and use.<br />
3.0 Content and Organization:<br />
Contact hours<br />
3.1 Data Transmission 12.0<br />
3.1.1 asjdklaj<br />
3.1.2 Introduction<br />
3.1.3 Internet Trends<br />
3.1.4 Naming With the Domain Name System<br />
3.1.5 Transmission Media<br />
3.1.6 Long-Distance Communication (carriers,<br />
3.1.7 Modulation, and Modems)<br />
3.2 Networking and Packet Transmission 21.0<br />
3.2.1 Packets, Frames, and Error Detection<br />
3.2.2 LAN Technologies and Network Topology<br />
3.2.3 Hardware Addressing and Frame Type Identification<br />
3.2.4 LAN Wiring, Physical Topology, and Interface Hardware<br />
3.2.5 Extending LANs: Fiber Modems, Repeaters, Bridges, and Switches<br />
3.2.6 Long-Distance Digital Connection Technologies<br />
3.2.7 WAN Technologies and Routing<br />
3.2.8 Connection-Oriented Networking and ATM<br />
3.2.9 Network characteristics: Ownership, Service Paradigm, and Performance<br />
3.2.10 Protocols and Layering<br />
3.3 Internetworking 9.0<br />
3.3.1 Internetworking: Concepts, Architecture, and Protocols<br />
3.3.2 IP: Internet Protocol and Addresses<br />
3.3.3 Binding Protocol Addresses (ARP)<br />
3.3.4 IP Datagrams and Datagram Forwarding<br />
3.3.5 IP Encapsulation, Fragmentation, and Reassembly<br />
3.3.6 The Future IP (Ipv6)<br />
3.3.7 An Error Reporting Mechanism (ICMP)<br />
3.3.8 TCP: Reliable Transport Service<br />
3.3.9 Network Security<br />
4.0 Teaching Methodology:<br />
-188-
4.1 Methods to be used.<br />
The primary teaching methods will be interactive lectures, article discussions and actual cases.<br />
4.2 Student role in the course.<br />
The student will attend lectures, participate in in-class discussion, complete quizzes, exams,<br />
assignments and the semester project.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Students will complete quizzes, exams, assignments and semester projects.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Component<br />
Grading<br />
Exams 37.5%<br />
Quizzes 6.25%<br />
Class Participation 6.25%<br />
Class Assignments 12.5%<br />
Class Project Report 25%<br />
Final Exam 12.5%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
98 – 100% A+<br />
90 – 97% A<br />
87 – 89% A-<br />
84 – 86% B+<br />
80 – 83% B<br />
77 – 79% B-<br />
74 – 76% C+<br />
70 – 73% C<br />
67 – 69% C-<br />
64 – 66% D+<br />
-189-
60 – 63% D<br />
57 – 59% D-<br />
Note: For the class project report, a student is expected to work alone or work in project team <strong>of</strong> 2 or 3<br />
students and complete a report and one presentation. The individual assignment requires a student to<br />
complete a summary and one presentation. The student is also expected to complete the team<br />
assignment including a report and one presentation.<br />
9.0 Social and Ethical Issues:<br />
No coverage<br />
10.0 Theoretical content:<br />
This course primarily provides an overview <strong>of</strong> data communication and computer networking concepts,<br />
and includes the following topics:<br />
10.1 Data Transmission (3 hours)<br />
10.2 Packet Transmission (3 hours)<br />
10.3 OSI Reference model (3 hours)<br />
10.4 Internetworking concepts (3 hours)<br />
11.0 Problem analysis:<br />
Students learn data communications principles and service operations with computers and<br />
telecommunication systems for operational analysis and decision making. Students will learn to analyze a<br />
systems or a sub system <strong>of</strong> a large scale system for the semester project applying the tools and<br />
techniques learn in the course.<br />
12.0 Solution design:<br />
Students will learn to design a systems or a sub system <strong>of</strong> a large scale system applying the tools and<br />
techniques learn in the course. Specially, they will complete the design document for the semester<br />
project.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
6/12/03 Prerequisite from CSCI 2010 to 2110.<br />
Course Change Form 2/21/03<br />
Wild Course 2010 no longer required for<br />
degree.<br />
6/25/03 ABET cleanup Wolcott<br />
10/09/07 Minor Revisions/Updates Ward<br />
10/1/08 Minor Revisions/Updates, including change<br />
in prerequisite course number from CIST<br />
2110 to CIST 3100<br />
Ward<br />
-191-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 3400<br />
Course Title<br />
Business Data Communications<br />
Course Coordinator<br />
Kerry Ward<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 01/22/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Learn data communications principles<br />
and service operations with computers<br />
and telecommunication systems for<br />
operational analysis and decision making.<br />
Master the basic terminology and<br />
concepts <strong>of</strong> data communications.<br />
To understand how the Internet and<br />
specific organizational networks function<br />
Analyze a specific aspect <strong>of</strong> business data<br />
communications in depth as a small<br />
group project.<br />
Carry out hands-on projects to<br />
understand data communications<br />
models.<br />
Understand network implementation,<br />
management, and use.<br />
X<br />
X<br />
X<br />
S<br />
S<br />
X X X<br />
X X X<br />
X<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
-192-
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-193-
-194-
ISQA 3420 Managing in a Digital World<br />
Department and Course Number ISQA 3420<br />
Course Title<br />
Managing in a Digital World<br />
Course Coordinator<br />
Stacie Petter<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/08/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course introduces the fundamentals <strong>of</strong> management as they apply in businesses and other<br />
organizations, particularly from an information systems/technology (IS/T) management lens. In<br />
particular, the course examines the various roles, responsibilities, and skills essential to<br />
managerial success in the context in which the IT manager operates today -- a dynamic<br />
environment <strong>of</strong> workforce diversity, a global economy, and concern for ethics and social<br />
responsibility.<br />
1.2 For whom course is intended.<br />
The course is intended for undergraduate students in Information Systems, Computer Science and<br />
related areas who are interested in learning the basics <strong>of</strong> management theory and its application<br />
to the practice <strong>of</strong> IS/T management.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
CIST 3100 or permission from the instructor<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
None<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
The goal <strong>of</strong> this course is to discuss and interpret management theory from an IS/T management lens.<br />
Students examine opportunities and challenges in a world that is increasingly connected to one another<br />
via technology. In this course, students will:<br />
-195-
2.1 Increase awareness <strong>of</strong> how a dynamic and changing information-intensive environment affects IS<br />
managers.<br />
2.2 Appreciate challenges and opportunities <strong>of</strong> IS management in context <strong>of</strong> 21st century<br />
organizations.<br />
2.3 Understand the international aspects <strong>of</strong> IS management to develop a global and multi-cultural<br />
view.<br />
2.4 Understand the importance <strong>of</strong> having a competitive advantage and the potential role <strong>of</strong> IT in<br />
developing a competitive advantage.<br />
2.5 Become familiar with environmental challenges that IS managers face in managing diversity,<br />
quality, information technology, and knowledge for competitive advantage in the 21st century.<br />
2.6 Become familiar with the foundations <strong>of</strong> ethical managerial behavior, using information ethically,<br />
and issues/challenges as it pertains to IS/T management<br />
2.7 Understand IS planning processes as basic managerial responsibilities.<br />
2.8 Understand strategy formulation and business models in a competitive IS/T environment.<br />
2.9 Understand controls and organizational systems for control for the IS/T function.<br />
2.10 Understand the challenges <strong>of</strong> attracting, developing, and maintaining a high quality IT workforce<br />
2.11 Understand ways <strong>of</strong> organizing the workplace, with special emphasis high performance work<br />
designs in IT organizations.<br />
2.12 Identify how work can be altered with the use <strong>of</strong> information system and technology.<br />
2.13 Understand the challenges <strong>of</strong> IS leadership, leadership theories and models, and the role <strong>of</strong> the<br />
Chief Information Officer.<br />
2.14 Understand issues affecting the management <strong>of</strong> global IS/T, particularly challenges <strong>of</strong> and best<br />
practices for managing teleworkers and virtual teams<br />
2.15 Appreciate the IT-enabled change process, including change strategies, resistance to change and<br />
the nature <strong>of</strong> organization development.<br />
2.16 Understand models for technology adoption and diffusion <strong>of</strong> technological innovations.<br />
3.0 Content and Organization:<br />
List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> weeks on each).<br />
3.1 The Changing Organization and Workplace 1 week<br />
3.2 Globalization 1 week<br />
3.3 IT Management Environment and Role <strong>of</strong> IT for Competitive Advantage – 1 week<br />
3.4 Ethics in the Digital World 1 week<br />
3.5 IS/IT Planning ½ week<br />
3.6 Business and IS Strategy; Business Models 1 ½ weeks<br />
3.7 Control and Audit <strong>of</strong> Information Systems and Services ½ week<br />
3.8 Managing and Retaining IS/T Employees 1 week<br />
3.9 Motivating IS/T Employees 1 week<br />
3.10 IS Organization Structure ½ week<br />
3.11 Design <strong>of</strong> Work Using IS/IT 1 week<br />
3.12 Organizational Culture and IS 1 week<br />
3.13 IS Leadership 1 week<br />
3.14 Teams, Teamwork, Virtual Teams ½ week<br />
3.15 IT Enabled Change Management 1 week<br />
-196-
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will include class discussion, case study, and lecture.<br />
4.1 Student role in the course.<br />
The student will attend lectures, participate in class discussion on assigned readings, complete<br />
assigned projects and papers, and complete required examinations.<br />
Each student will be assigned to a learning group to participate in a project during the course <strong>of</strong><br />
the semester. These learning groups will examine a topic in more depth outside <strong>of</strong> the classroom.<br />
Tasks that may be performed by learning groups would be the analysis <strong>of</strong> a case study or the<br />
completion <strong>of</strong> a project in a virtual context.<br />
4.2 Contact hours.<br />
5.0 Evaluation:<br />
3 hours<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Students will be evaluated on the following basis.<br />
Class participation: Students are expected to attend each and every class and be prepared to<br />
actively participate in the discussion. Much <strong>of</strong> the class will be conducted using an open<br />
discussion approach, and the success <strong>of</strong> the class will be dependent on students’ ability to identify<br />
and discuss relevant issues.<br />
Exams: There will be three examinations.<br />
Class Project: Each person will be assigned to a learning group to complete a case study or class<br />
project which relates to one or more topic in the course.<br />
Assignments: Students will receive assignments to be completed in class or outside <strong>of</strong> class to<br />
reinforce material discussed in the classroom or in the readings.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
The grade base for the course for undergraduate students will consist <strong>of</strong> the following:<br />
Available points<br />
-197-
Class Participation 15%<br />
Class Project 35%<br />
Exams 35%<br />
Assignments 15%<br />
5.3 Grading scale and criteria.<br />
The grading scale is as follows:<br />
GRADE POINT VALUE<br />
A 93%
6.2.6 “Mastering the Three Worlds <strong>of</strong> Information Technology.” McAfee, A. Harvard Business<br />
Review, Nov. 1, 2006.<br />
6.2.7 CASE: “Going Up Against Google.” Fitzgerald, M. Inc. Magazine, February 2006.<br />
6.2.8 “What’s Wrong with Being ‘Borderline Ethical’?” Liebowitz, B., Healthcare Financial<br />
Management, September 2003.<br />
6.2.9 CASE: “The End <strong>of</strong> Enron's Empire.” Wang, J., Chen, Q., Yao, J., and Xing, R. Idea Group<br />
Publishing, 2006.<br />
6.2.10 “Getting IT Right.” Charlie S. Feld and Donna B. Stoddard. Harvard Business Review, Vol.<br />
82 Issue 2, Feb 2004.<br />
6.2.11 “Chapter 1: The Information Systems Strategy Triangle”, Pearlson, K.E. and Saunders, C.S.<br />
Managing and Using Information Systems: A Strategic Approach, 2006.<br />
6.2.12 CASE: “MySQL Open Source Database in 2004.” Burgelman, Robert A. Graduate School <strong>of</strong><br />
Business Stanford <strong>University</strong>, 2004.<br />
6.2.13 CASE: “The True Meaning <strong>of</strong> Twitter.” Lashinksy, A. Fortune, August 7, 2008.<br />
6.2.14 “How to Hook the IT Pr<strong>of</strong>essionals you Need.” Overby, S. CIO.com, June 2007.<br />
6.2.15 “Closing the Geek Gap.” Zetlin, M. Pr<strong>of</strong>it Magazine, November 2006.<br />
6.2.16 CASE: “Lucent Technologies: Halting Information Technology Employee Turnover.”<br />
Schneberger, S.L. and Mark, K. Richard Ivey School <strong>of</strong> Business, 2001.<br />
6.2.17 CASE: “Micros<strong>of</strong>t.NET (Abridged).” MacCormack, A. and Herman, K. Harvard Business<br />
School Publishing, 2004.<br />
6.2.18 CASE: “Sealed Air Corporation: Globalization and Corporate Culture.” Paine, L.S. and<br />
Wruck, K.H. Harvard Business School Publishing, 2006.<br />
6.2.19 “Seeking Loyal, Devoted Workers? Let Them Stay Home” Coombes, A. Wall Street Journal,<br />
Sep. 11, 2007.<br />
6.2.20 “Creating and Sustaining Trust in Virtual Teams” Greenberg, P.S., Greenberg, R.H.,<br />
Lederer A.Y. Business Horizons, 2007.<br />
6.2.21 “Note on Innovation Diffusion: Rogers' Five Factors.” John T. Gourville. Harvard Business<br />
School Publishing, 2005<br />
6.2.22 “What to do when employees resist change.” Gregory J Iskat, Jay Liebowitz. SuperVision,<br />
Vol. 64, Iss. 8. Aug 2003.<br />
6.2.23 CASE: “Apple Inc., 2008.” Y<strong>of</strong>fie, D. and Slind, M. Harvard Business School Publishing;<br />
2008.<br />
6.3 Other suggested reading materials, if any.<br />
6.3.1 Schermerhorn, J. R., Jr. (2004 or current edition). Core Concepts <strong>of</strong> Management. John<br />
Wiley & Sons, Inc.<br />
6.4 Other sources <strong>of</strong> information.<br />
Guest speakers or other current articles from reputable journals, magazines, or media outlets.<br />
6.5 Current bibliography <strong>of</strong> resource for student’s information.<br />
Same as above.<br />
7.0 (Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category<br />
Content (class time in hours):<br />
-199-
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 0 0<br />
Networking and telecommunications 0 0<br />
Modern programming language 0 0<br />
Analysis and Design 3 0<br />
Data management 0 0<br />
Role <strong>of</strong> IS in Organizations 6 30<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least ___7__ written reports (not including exams, tests, quizzes, or<br />
commented programs) <strong>of</strong> typically __2-3___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />
__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />
as well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues:<br />
Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />
on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />
Ethics is discussed as a course topic for a one week period. The first half <strong>of</strong> the week is devoted to lecture<br />
and discussion and students focus on the following learning objectives related to ethics:<br />
• Become familiar with the foundations <strong>of</strong> ethical managerial behavior and the issues/challenges<br />
that pertain to IS/T management<br />
• Define basic concepts related to ethical behavior<br />
• Become familiar with ethical codes for our pr<strong>of</strong>ession<br />
• Recognize ethical dilemmas and forces that create them<br />
• Identify different perspectives and approaches to resolve an ethical dilemma<br />
Students then apply these concepts to a case study in which ethical dilemmas are discussed in more detail<br />
and within the context <strong>of</strong> a specific situation. Students are graded based on class participation in this<br />
discussion and test questions.<br />
Social issues, as related to computing, are discussed throughout the semester. However, these topics are<br />
brought to the forefront when we discuss globalization, competitive advantage, and IS culture. Students<br />
are evaluated on their understanding <strong>of</strong> these issues via class participation, test questions, essay<br />
questions, and homework assignments.<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />
-200-
Several theoretical concepts related to IS are discussed in this course, such as:<br />
10.1 The organization as a system – 1 week<br />
10.2 Ethical frameworks as they relate to IS – 1 week<br />
10.3 Business strategy frameworks – 1 ½ weeks<br />
10.4 Employee turnover and retention models – ½ week<br />
10.5 Motivational theories – 1 week<br />
10.6 Leadership theories – 1 week<br />
10.7 Change management and technology acceptance – 1 week<br />
11.0 Problem analysis:<br />
Please describe the analysis experiences common to all course sections.<br />
Students read and discuss case studies throughout the semester. At least eight case studies are read and<br />
discussed in class. In these discussions, students identify problems occurring in organizations as it relates<br />
to concepts discussed in class.<br />
The class project, regardless <strong>of</strong> its format, requires students to analyze a problem using frameworks and<br />
ideas presented in class.<br />
12.0 Solution design:<br />
Please describe the design experiences common to all course sections.<br />
Students develop solutions to problems identified from readings in case studies. These are discussed in<br />
small groups and as a class. Students are also expected to identify solutions to specific problems that<br />
occur in managing in a digital world via essay questions on exams.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
3/10/06 Syllabus created Khazanchi<br />
10/8/08 Revision <strong>of</strong> syllabus to reflect current<br />
course content. More detail<br />
provided in template to conform to<br />
ABET standards.<br />
Stacie<br />
Petter<br />
Lecture topics remained the<br />
same; however, readings<br />
reflect most current cases and<br />
articles used in the course.<br />
-201-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 3420<br />
Course Title<br />
Managing in a Digital World<br />
Course Coordinator<br />
Stacie Petter<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/8/08<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
The goal <strong>of</strong> this course is to discuss and<br />
interpret management theory from an<br />
IS/T management lens.<br />
Increase awareness <strong>of</strong> how a dynamic<br />
and changing information-intensive<br />
environment affects IS managers.<br />
Appreciate challenges and opportunities<br />
<strong>of</strong> IS management in context <strong>of</strong> 21st<br />
century organizations.<br />
Understand the international aspects <strong>of</strong><br />
IS management to develop a global and<br />
multi-cultural view.<br />
Understand the importance <strong>of</strong> having a<br />
competitive advantage and the potential<br />
role <strong>of</strong> IT in developing a competitive<br />
advantage.<br />
Become familiar with environmental<br />
challenges that IS managers face in<br />
managing diversity, quality, information<br />
S X S X X X<br />
S X S X X X X<br />
S S X X X S<br />
S S X X X<br />
S S<br />
S X S X X X<br />
-202-
technology, and knowledge for<br />
competitive advantage in the 21st<br />
century.<br />
Become familiar with the foundations <strong>of</strong><br />
ethical managerial behavior, using<br />
information ethically, and<br />
issues/challenges as it pertains to IS/T<br />
management<br />
Understand IS planning processes as<br />
basic managerial responsibilities.<br />
Understand strategy formulation and<br />
business models in a competitive IS/T<br />
environment<br />
Understand controls and organizational<br />
systems for control for the IS/T function.<br />
Understand the challenges <strong>of</strong> attracting,<br />
developing, and maintaining a high<br />
quality IT workforce<br />
Understand ways <strong>of</strong> organizing the<br />
workplace, with special emphasis high<br />
performance work designs in IT<br />
organizations.<br />
Identify how work can be altered with the<br />
use <strong>of</strong> information system and<br />
technology.<br />
Understand the challenges <strong>of</strong> IS<br />
leadership, leadership theories and<br />
models, and the role <strong>of</strong> the Chief<br />
Information Officer.<br />
Understand issues affecting the<br />
management <strong>of</strong> global IS/T, particularly<br />
challenges <strong>of</strong> and best practices for<br />
managing teleworkers and virtual teams<br />
Appreciate the IT-enabled change<br />
process, including change strategies,<br />
resistance to change and the nature <strong>of</strong><br />
organization development.<br />
Understand models for technology<br />
adoption and diffusion <strong>of</strong> technological<br />
innovations.<br />
S S S<br />
S X X<br />
S S X X<br />
S X X X<br />
S S X<br />
S S X X<br />
S S X<br />
S S X X<br />
S S S S X X<br />
S S X X<br />
S X S X X X X<br />
-203-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-204-
ISQA 3520 Graphic User Interface Design<br />
Department and Course Number ISQA 3520<br />
Course Title<br />
Graphical User Interface Design<br />
Course Coordinator<br />
Sidney Davis<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/12/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The purpose <strong>of</strong> this course is to introduce the principles <strong>of</strong> interface design. In this course,<br />
students will learn principles that have been used successfully in the past and apply them to<br />
everyday examples from business and industry; students will become aware <strong>of</strong> the roles <strong>of</strong><br />
different disciplines (e.g., computer science, psychology, sociology, anthropology) and will<br />
understand how to begin to draw on them to create usable and useful computer s<strong>of</strong>tware;<br />
students will study formal methods <strong>of</strong> analysis that may be used to complement less structured<br />
aspects <strong>of</strong> design.<br />
1.2 For whom course is intended.<br />
This course is intended for the undergraduate MIS or CS majors who wish to study the principles<br />
<strong>of</strong> interface design. It is one <strong>of</strong> the specialization elective courses for the Bachelor <strong>of</strong> Science in<br />
Management Information Systems (<strong>BIS</strong>) degree.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 ISQA 3210 Advanced Technology for Personal Productivity (students should have at least<br />
a basic understanding <strong>of</strong> how to create Web-based applications)<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Introduction to Personal Computing<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
2.1 Understand the principles <strong>of</strong> interface design.<br />
2.2 Understand that interface design requires the integration <strong>of</strong> multiple disciplines and skills and<br />
know how to draw on them to create usable and useful computer s<strong>of</strong>tware.<br />
-205-
2.3 Learn design principles and concepts that have been used successfully in the past and apply them<br />
to everyday examples from business and industry.<br />
3.0 Content and Organization:<br />
3.1 Introduction 1.5<br />
3.2 Framework for Design 7.0<br />
3.2.1 What is interaction design<br />
3.2.2 Understanding and conceptualizing interaction<br />
3.2.3 Designing for collaboration and communication<br />
3.3 Interactive System Design 9.0<br />
3.3.1 The process <strong>of</strong> interaction design<br />
3.3.2 Needs and requirements<br />
3.3.3 Design, prototyping, and construction<br />
3.4 System Evaluation 10.0<br />
3.4.1 Heuristic evaluation and walkthroughs<br />
3.4.2 Evaluation <strong>of</strong> design<br />
3.4.3 Predictive evaluation<br />
3.4.4 Requirements definition<br />
3.5 User Interface 9.0<br />
3.5.1 Interaction styles<br />
3.5.2 Affective aspects<br />
3.5.3 User’s mental model<br />
Contact Time<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will be lectures and in-class discussions.<br />
4.2 Student role in the course.<br />
The student will attend lecture, participate in discussion on assigned readings, complete quizzes,<br />
exams, the interface design project, and homework.<br />
4.3 Contact hours.<br />
Three (3) hours per week.<br />
-206-
5.0 Evaluation:<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Students will complete quizzes, homework assignments, individual interface design literature<br />
reports and presentations, team project assignments, participate in in-class discussions, and takehome<br />
exams. A team project will be assigned in 4 phases – with each phase taking from one to<br />
seven weeks to complete. Graduate students will be graded based on higher standards <strong>of</strong><br />
completeness, accuracy, and application <strong>of</strong> design principles on their design projects. Also,<br />
graduate students will be required to answer additional questions (over and above those <strong>of</strong> the<br />
undergraduates) on quizzes and exams.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Components<br />
Grading<br />
Quizzes 10%<br />
Homework 5%<br />
Class Participation 5%<br />
Exams 30%<br />
Team Project<br />
35%<br />
Assignments<br />
Interface Design<br />
5%<br />
Report and<br />
Presentation<br />
S<strong>of</strong>tware projects 10%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
95.5 – 100 A+<br />
92.5 – 95.4 A<br />
89.5 – 92.4 A-<br />
85.5 – 89.4 B+<br />
82.5 – 85.4 B<br />
79.5 – 82.4 B-<br />
75.5 – 79.4 C+<br />
72.5 – 75.4 C<br />
69.5 – 72.4 C-<br />
65.5 – 69.4 D+<br />
62.5 – 65.4 D<br />
59.5 – 62.4 D-<br />
59.4 or below F<br />
-207-
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Sharp, H., Rogers, Y., Preece, J. (2007). Interaction Design, Second Edition, John Wiley &<br />
Sons, Ltd. (ISBN: 978-0-470-01866-8).<br />
6.2 Other suggested reading materials, if any.<br />
None<br />
6.3 Other sources <strong>of</strong> information.<br />
Web-based resources on computer interface design.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
None<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language<br />
Analysis and Design 30<br />
Data management<br />
Role <strong>of</strong> IS in Organizations<br />
8.0 Oral and Written Communications:<br />
Student teams (3-4 students each) are required to submit at least __3___ written reports (not including<br />
exams, tests, quizzes, or commented programs) to typically __8___ pages and to make __1___ oral<br />
presentations <strong>of</strong> typically __20___ minutes duration. Also, each student will write __1__ interface design<br />
literature report and will make __1__ presentation <strong>of</strong> typically __10___ minutes duration. Include only<br />
material that is graded for grammar, spelling, style, and so forth, as well as for technical content,<br />
completeness, and accuracy.<br />
Note: student teams will complete final reports and oral presentations for the interface design project.<br />
9.0 Social and Ethical Issues:<br />
No coverage.<br />
-208-
10.0 Theoretical content:<br />
This course deals mostly with the principles <strong>of</strong> interface design. It includes relevant theories and<br />
frameworks to analyze and solve problems.<br />
Hours<br />
10.1 Conceptual design models 1.5<br />
10.2 Users’ mental models 1.5<br />
10.3 Design principles for usability 1.0<br />
10.4 Design principles for user experience 1.0<br />
10.5 Evaluation framework 1.5<br />
10.6 Predictive models <strong>of</strong> usability 3.0<br />
10.7 Cognitive walkthrough 1.0<br />
10.8 Heuristic evaluation 1.0<br />
11.0 Problem analysis:<br />
Students learn to analyze and understand the problems associated with the design context. This course<br />
introduces formal methods <strong>of</strong> analysis that may be used to complement less structured aspects <strong>of</strong> design.<br />
12.0 Solution design:<br />
Students learn to apply relevant theories and frameworks to solving the problems that have been found<br />
in the process <strong>of</strong> problem analysis. This course also emphasizes the fact that interface design requires the<br />
integration <strong>of</strong> multiple disciplines and skills (from information systems analysis and design, human<br />
psychology, and computer science)<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
6/12/03 Change prerequisite from CIST 1100 and<br />
CIST 1400. Course Change Form<br />
5/15/03.<br />
Wild<br />
Prerequisites changed to match<br />
need <strong>of</strong> course content.<br />
6/25/03 ABET cleanup Wolcott<br />
10/12/08 Complete reworking <strong>of</strong> course content Davis Completely revamped course<br />
description to reflect most current<br />
content and teaching methods<br />
-209-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 3520<br />
Course Title<br />
Graphical User Interface Design<br />
Course Coordinator<br />
Sidney Davis<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/12/08<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand the principles <strong>of</strong> good<br />
interface design.<br />
Understand that interface design requires<br />
the integration <strong>of</strong> multiple disciplines and<br />
skills and know how to draw on them to<br />
create usable and useful computer<br />
s<strong>of</strong>tware.<br />
Learn to apply design principles and<br />
concepts that have been used<br />
successfully in the past to everyday<br />
examples from business and industry.<br />
X S S S S<br />
S S S S S<br />
S S S S<br />
-210-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-211-
-212-
ISQA 4010 Business Intelligence<br />
Department and Course Number ISQA 4010<br />
Course Title<br />
Business Intelligence<br />
Course Coordinator<br />
Yong Shi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/02/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The course focuses on the various topics on knowledge management by utilizing both<br />
behavioral approaches and information technology tools. It includes data collection and<br />
analysis, intelligent agents, business concerns on data warehousing and data mining,<br />
customer relationship management. The course will also cover information overload,<br />
human expert systems vs. artificial intelligent systems and intelligent decision making.<br />
1.2 For whom course is intended.<br />
This course is intended for upper division undergraduate MIS majors who wish to<br />
understand the advanced Quantitative Analysis. It is one <strong>of</strong> elective courses for<br />
undergraduates who wish to pursue Knowledge Management, Knowledge Engineering<br />
and Decision Support Tracks.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 CIST 1400 Introduction to Computer Programming<br />
1.3.2 CIST 2500 Introduction to Applied Statistics for IS&T<br />
1.3.3 ISQA 3150 Principles <strong>of</strong> Quantitative Analysis<br />
1.3.4 ISQA 3210 Advanced Technology for Personal Productivity<br />
1.3.5 ISQA 3250 Intermediate Quantitative Analysis<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Introduction to Visual Basic Programming,<br />
1.4.2 Program development cycle<br />
1.4.3 Training in spreadsheets and database<br />
1.4.4 Statistics in information science and technology<br />
1.4.5 A well-known computer package being used to support the problem-solving<br />
process.<br />
1.5 1.4 Unusual circumstances <strong>of</strong> the course.<br />
-213-
None<br />
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
2.1 Data, Information, and Knowledge<br />
2.2 Knowledge Management vs. Knowledge Technology<br />
2.3 Knowledge represented by Data<br />
2.4 Artificial Intelligence, Expert system vs. Data Mining<br />
2.5 Analytic Customer Management<br />
3.0 Content and Organization:<br />
Contact hours<br />
3.1 Introduction 3<br />
3.2 Data Collection and Information 6<br />
3.3 Information Overload 6<br />
3.4 Information and Knowledge 8<br />
3.5 Knowledge Management 6<br />
3.6 Knowledge Technology 4<br />
3.7 Business Intelligence 6<br />
3.8 Analytic Customer Relation Management 6<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will be lectures and group discussions.<br />
4.2 Student role in the course.<br />
The student will attend lectures, participate in discussion, complete required<br />
examinations, homework and the class project.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week<br />
-214-
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
The student will attend lectures, participate in discussion, complete required<br />
examinations, homework and the class project.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Components<br />
Grading<br />
Exams 60%<br />
Class Project 25%<br />
Class Participation / Homework 15%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
96 – 100% A+<br />
90 – 95.9% A<br />
86 – 89.9% B+<br />
80 – 85.9% B<br />
76 – 79.9% C+<br />
70 – 75.9% C<br />
66 – 69.9% D+<br />
60 – 65.9% D<br />
< 60% F<br />
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Amrit Tiwana, Knowledge Management Toolkit, Prentice Hall, 2002. (or more<br />
recent text)<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 T. Sowell, Knowledge and Decisions, Basic Books, 1980.<br />
6.2.2 J. W. Cortada and J. A. Woods, The Knowledge Management Yearbook,<br />
Butterworth-Heinemann, 1999.<br />
-215-
6.3 Other sources <strong>of</strong> information.<br />
6.3.1 Y. Shi, “Humancasting: A Fundamental Method to Overcome User Information<br />
Overload,” Information – International Inter-discipline Journal, Vol. 3, 127-143,<br />
2000.<br />
6.3.2 M. Zeleny, “Knowledge <strong>of</strong> Enterprise: Knowledge Mangement or Knowledge<br />
Technology,” International Journal <strong>of</strong> Information Technology and Decision<br />
Making, Vol.1, 181-208, 2002<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
None<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />
in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 4<br />
Networking and telecommunications<br />
Modern programming language<br />
Analysis and Design 6<br />
Data management 26<br />
Role <strong>of</strong> IS in Organizations 6<br />
8.0 Oral and Written Communications<br />
Every student is required to submit at least ___3__ written reports (not including exams, tests,<br />
quizzes, or commented programs) to typically ___30__ pages and to make _1____ oral<br />
presentations <strong>of</strong> typically ___10__ minutes duration. Include only material that is graded for<br />
grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />
accuracy.<br />
9.0 Social and Ethical Issues:<br />
No coverage<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />
coverage.<br />
10.1 Data Mining<br />
10.2 Expert System<br />
-216-
11.0 Problem analysis:<br />
Students learn the advanced models <strong>of</strong> Quantitative Analysis, a scientific approach to decision<br />
making that involves the operations <strong>of</strong> organizational systems. They learn to solve the conflicts<br />
<strong>of</strong> interest among the components <strong>of</strong> the organization in a way that is best for the organization<br />
as a whole.<br />
12.0 Solution design:<br />
Students learn to develop a solution that yields an optimal value <strong>of</strong> the organizational system<br />
measure <strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />
desirability.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
6/12/03 Change prerequisites as needed. Wild<br />
Course change form 5/15/03.<br />
10/2/08 Review completed Shi<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4010<br />
Course Title<br />
Business Intelligence<br />
Course Coordinator<br />
Yong Shi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
-217-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Course objective<br />
Data, Information, and Knowledge S S S<br />
Knowledge Management vs. Knowledge S S X<br />
Technology<br />
Knowledge represented by Data S X S<br />
Artificial Intelligence, Expert system vs. S<br />
S<br />
Data Mining<br />
Analytic Customer Management S S S<br />
-218-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-219-
-220-
ISQA 4100 Information Systems Architecture and Organization<br />
Department and Course Number ISQA 4100<br />
Course Title<br />
Information Systems Architecture & Organization<br />
Course Coordinator<br />
Paul J.A. van Vliet<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/12/2008<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course examines the frameworks and tools used to develop an organization's<br />
information system architecture. It provides the analytical skills and conceptual<br />
frameworks with which to make recommendations and decisions regarding the<br />
integration <strong>of</strong> information technology components into an information system<br />
architecture.<br />
1.2 For whom course is intended.<br />
This course is intended for upper division undergraduate MIS majors and graduate MIS<br />
majors who wish to study advanced topics pertaining to an organization's information<br />
system architecture.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 CIST 3100 - Organizations, Applications, and Technology<br />
1.3.2 ISQA 3310 - Managing the Database Environment<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Working knowledge <strong>of</strong> business foundations.<br />
1.4.2 Working knowledge <strong>of</strong> computer information systems.<br />
1.4.3 Working knowledge <strong>of</strong> information systems development.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
2.1 Understand the issues involved in architecting the information systems infrastructure in<br />
medium- and large-sized organizations.<br />
-221-
2.2 Understand the frameworks and tools used to develop an organization's information<br />
systems architecture.<br />
2.3 Understand and apply the conceptual frameworks developed for managing information<br />
systems architectures.<br />
2.4 Understand the Unified Modeling Language (UML) as a tool for modeling the various<br />
aspects <strong>of</strong> information systems architectures.<br />
3.0 Content and Organization:<br />
Contact hours<br />
3.1 The Role <strong>of</strong> IS in the Enterprise & the Problems <strong>of</strong> Large/Complex IS 3.0<br />
3.2 The Concept <strong>of</strong> Information Systems Architecture 1.0<br />
3.3 Initial Attempts at IS Architecture 2.0<br />
3.4 Heuristics and Conceptual Building Blocks <strong>of</strong> ISA 2.0<br />
3.5 Technical Building Blocks <strong>of</strong> IS Architecture 2.0<br />
3.6 Builder-Architected Systems 1.0<br />
3.7 The Zachman Information Systems Architecture Framework 2.0<br />
3.8 Manufacturing Systems 1.0<br />
3.9 The Data Warehouse Architecture Framework 2.0<br />
3.10 Social Systems 1.0<br />
3.11 S<strong>of</strong>tware Systems 1.0<br />
3.12 Collaborative Systems 1.0<br />
3.13 Representation Models and System Architecting 1.0<br />
3.14 The Architecture Process 3.0<br />
3.15 Integrated Modeling Methodologies 1.0<br />
3.16 Architecture Frameworks 1.0<br />
3.17 The Political Process <strong>of</strong> Systems Architecting 2.0<br />
3.18 The pr<strong>of</strong>essionalization <strong>of</strong> Systems Architecting 2.0<br />
3.19 Architecture Management, Measurement, and Maintenance 2.0<br />
3.20 Overview <strong>of</strong> the Unified Modeling Language (UML) 1.0<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will include lectures, discussion, and guidance on the<br />
group project.<br />
4.2 Student role in the course.<br />
-222-
Students will attend lectures, participate in the in-class discussion, complete the<br />
individual presentation assignment, complete individual assignments, and participate in<br />
the group project.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
Students will participate in the in-class discussions. Students will conduct an individual<br />
presentation on a research topic related to the course; graduate students will also<br />
complete an accompanying written report. Students will participate in the completion <strong>of</strong><br />
a group project which brings together analysis, design, modeling, communications, and<br />
research skills.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Component<br />
Grading<br />
Presentation 30%<br />
Individual Assignments 30%<br />
Team Project 30%<br />
Class Participation 10%<br />
5.3 Grading scale and criteria.<br />
Points<br />
Grade<br />
96% - 100% A+<br />
92% - 95% A<br />
89% - 91% A-<br />
86% - 88% B+<br />
82% - 85% B<br />
79% - 81% B-<br />
76% - 78% C+<br />
72% - 75% C<br />
69% - 71% C-<br />
66% - 68% D+<br />
-223-
62% - 65% D<br />
59% - 61% D-<br />
< 59% F<br />
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Eberhardt Rechtin & Mark W. Maier. The Art <strong>of</strong> Systems Architecting, 2nd Edition<br />
CRC Press, 2000 (or more recent text)<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 On-line: Intranet Architecture - Integrating Information Design with Business<br />
Planning (http://www.intrack.com/intranet/iarchi.shtml)<br />
6.2.2 On-line: The IntraNet Architecture: Managing information in the new paradigm<br />
(http://www.iorg.com/papers/amdahl/infra.html)<br />
6.2.3 On-line: Intranet Cost<br />
Calculator(http://www.intrack.com/intranet/costs/index.shtml)<br />
6.2.4 On-line: Complexity problems: the IRS<br />
(http://cnnfn.com/1999/03/01/economy/irs/)<br />
6.2.5 On-line: Multi-vendor problems: MCI<br />
6.2.6 (http://cnn.com/TECH/computing/9908/23/network.nono.idg/index.html)<br />
6.2.7 On-line: Definition <strong>of</strong> Architecture, as per the <strong>University</strong> <strong>of</strong> Leuven<br />
(http://www.mech.kuleuven.ac.be/pma/project/goa/extracts/architec.htm)<br />
6.2.8 On-line: How Do You Define S<strong>of</strong>tware Architecture? as per the S<strong>of</strong>tware<br />
Engineering Institute at Carnegie Mellon <strong>University</strong><br />
(http://www.sei.cmu.edu/architecture/definitions.html)<br />
6.2.9 On-line: What an Information Architect Does (PDF file)<br />
(http://www.jjg.net/ia/iadoes0700.pdf)<br />
6.2.10 On-line: The power <strong>of</strong> standardization: A Brief Overview <strong>of</strong> GSM (http://kbs.cs.tuberlin.de/~jutta/gsm/js-intro.html)<br />
6.2.11 On-line: The power <strong>of</strong> heuristics: Usability Heuristics for the Web<br />
(http://www.webreview.com/1997/10_10/strategists/10_10_97_2.shtml)<br />
6.2.12 On-line: The power <strong>of</strong> patterns: Essential Concepts and Terminology<br />
(http://www.enteract.com/~bradapp/docs/patterns-intro.html)<br />
6.2.13 On-line: Technology: Computer User's High-Tech Dictionary<br />
(http://www.computeruser.com/resources/dictionary/dictionary.html)<br />
6.2.14 On-line: Technology: Information Technology Association <strong>of</strong> America<br />
(http://www.itaa.org/)<br />
6.2.15 On-line: UML: Rational S<strong>of</strong>tware's UML site (http://www.rational.com/uml/)<br />
6.2.16 On-line: UML: UML Dictionary (http://s<strong>of</strong>tdocwiz.com/UML.htm)<br />
-224-
6.2.17 On-line: UML: A Unified Object Modeling Approach<br />
(http://www.iconixsw.com/Spec_Sheets/UnifiedOM.html)<br />
6.2.18 On-line: Explore the Zachman Architecture<br />
6.2.19 On-line: John Zachman's Homepage<br />
(http://www.ozemail.com.au/~ieinfo/zachman.htm)<br />
6.2.20 On-line: Getting Beyond the "Legacy," by John A. Zachman.<br />
(http://www.ies.aust.com/~visible/papers/zachman1.htm)<br />
6.2.21 On-line: The Challenge is Change: A Management Paper, by John A. Zachman<br />
(http://www.ies.aust.com/~visible/papers/zachman2.htm)<br />
6.2.22 On-line: Framework S<strong>of</strong>tware (http://www.frameworks<strong>of</strong>t.com/)<br />
6.2.23 On-line: The Zachman Framework: An Introduction, by David C. Hay<br />
(http://www.essentialstrategies.com/publications/methodology/zachman.htm)<br />
6.2.24 On-line: The Framework for Enterprise Architecture, by the Zachman Institute for<br />
Framework Advancement (http://www.zifa.com/zifajz02.htm)<br />
6.2.25 On-line: An overview <strong>of</strong> the Zachman Framework, by Momentum Systems, Inc.<br />
(http://www.momentumsystems.com/zframework.html)<br />
6.2.26 On-line: Pattern Based Reengineering, Michael A. Beedle Ph. D. (This article<br />
combines the topics <strong>of</strong> object-oriented s<strong>of</strong>tware engineering, patterns, the<br />
Zachman Framework, and the UML.)<br />
6.2.27 On-line: Implementing the Zachman Framework for Enterprise Architecture, by<br />
Alan Perkins. (http://www.ies.aust.com/~visible/papers/Zachman.html)<br />
6.2.28 On-line: The Zachman Framework, by Dr. John K. Sharp (By the way, note the 7th<br />
reference <strong>of</strong> this article - a reference to an earlier version <strong>of</strong> this course.)<br />
(http://www.inconcept.com/JCM/February1999/print/sharp.html)<br />
6.2.29 On-line: The Zachman Framework for the Data Administration function, as used by<br />
the Forest Service <strong>of</strong> British Columbia.<br />
(http://www.for.gov.bc.ca/isb/datadmin/framewrk.htm)<br />
6.2.30 On-line: The Zachman Framework for Healthcare Informatics Standards<br />
(http://www.ansi.org/rooms/room_41/public/documents/zach_isa.pdf)<br />
6.2.31 On-line: The Zachman Framework for Enterprise Architecture by Andrew Faulkner<br />
(http://www.datagruven.com/CIPS/Zachman.html)<br />
6.2.32 On-line: Formalization <strong>of</strong> Multi-level Zachman Frameworks by Richard Martin and<br />
Edward L. Robertson ( ftp://ftp.cs.indiana.edu/pub/techreports/TR522.pdf)<br />
6.2.33 On-line: Explore the Data Warehousing Architecture<br />
6.2.34 On-line: Data Warehousing resources on the World Wide Web<br />
(http://www.datawarehousing.com/)<br />
6.2.35 On-line: Data Warehousing Overview<br />
(http://www.sas.com/rnd/warehousing/dwo_web.html)<br />
6.2.36 On-line: Introduction to Business Modeling Using the Unified Modeling Language<br />
(UML) (http://www.therationaledge.com/content/mar_01/m_uml_jh.html)<br />
6.2.37 On-line: Use Case Modeling Introduction<br />
(http://www.zoo.co.uk/~z0001039/PracGuides/pg_use_cases.htm)<br />
-225-
6.2.38 On-line: Top Ten Use Case Mistakes<br />
(http://www.sdmagazine.com/documents/s=815/sdm0102c/)<br />
6.2.39 On-line: Use case modeling tips (http://www-<br />
106.ibm.com/developerworks/java/library/tip-uml2.html)<br />
6.2.40 On-line: Use and Abuse Cases, by Martin Fowler (PDF Format)<br />
(http://www.awl.com/cseng/titles/0-201-89542-0/articles/abuse.pdf)<br />
6.2.41 On-line: 7 tips for writing better use cases<br />
(http://www.class.com.au/newsletr/97sep/usecases.htm)<br />
6.2.42 On-line: Use Case Fundamentals, by Alistair Cockburn<br />
(http://members.aol.com/acockburn/papers/AltIntro.htm)<br />
6.2.43 On-line: Formalizing Use Cases with Message Sequence Charts, a Masters Thesis<br />
by Michael Andersson & Johan Bergstrand<br />
(http://www.efd.lth.se/~d87man/EXJOBB/ExBookTOC.doc.html)<br />
6.2.44 On-line: Why Are Use Cases So Painful?<br />
(http://www.evanetics.com/Articles/ObjectModeling/why_are_use_cases_so_pai<br />
nful.htm)<br />
6.2.45 On-line: Worldwide Institute <strong>of</strong> S<strong>of</strong>tware Architects (http://www.wwisa.org/)<br />
6.2.46 On-line: Introduction to Objects (incl. Java code examples)<br />
(http://www.comp.nus.edu.sg/~hengak/IC1101J/IC1101/content/ch8p1.html)<br />
6.2.47 On-line: Object-Oriented Computing - What's the Big Deal?<br />
(http://www.firststep.com.au/education/solid_ground/oo.html)<br />
6.2.48 On-line: The Object-Oriented Advantage<br />
(http://www.firststep.com.au/education/solid_ground/oo_dev.html)<br />
6.2.49 On-line: What is Object-Oriented<br />
S<strong>of</strong>tware?(http://catalog.com/s<strong>of</strong>tinfo/objects.html)<br />
6.2.50 On-line: A collaborative systems example: CORBA<br />
(http://www.cs.wustl.edu/~schmidt/corba.html)<br />
6.2.51 On-line: State-Transition diagram<br />
(http://cobra.csc.calpoly.edu/~gfisher/projects/work/inferno/documentation/uml<br />
/notation/notation9a.html#9.1)<br />
6.2.52 On-line: An Atlas <strong>of</strong> Cyberspaces - visual modeling at its finest<br />
(http://www.cybergeography.org/atlas/atlas.html)<br />
6.2.53 On-line: Sample Sequence Diagrams<br />
(http://web.dis.unimelb.edu.au/undergrad/1997/cuc/245Project/Sequence3.htm)<br />
6.2.54 On-line: Collaboration Diagrams<br />
(http://193.174.33.104:7776/UMT/notation_guide_ch7.html)<br />
6.2.55 On-line: Architecting for Business: An Executive Overview, by Unisys<br />
6.2.56 (http://www.corp.unisys.com/UNISYS/ACEweb.NSF/LookupView/Executive+Overv<br />
iew?OpenDocument#apoverview)<br />
6.2.57 On-line: Building Blocks and the Architecture Development Method, by The Open<br />
Group (http://www.opengroup.org/public/arch/p4/bbs/bbs_adm.htm)<br />
6.2.58 On-line: The Hatley-Pirbhai Methodology<br />
(http://www.turbocase.com/method.html)<br />
-226-
6.2.59 On-line: Quality Function Deployment Institute (http://www.qfdi.org/)<br />
6.2.60 On-line: UML Resource Center (http://www.rational.com/uml/index.jtmpl)<br />
6.2.61 On-line: The Zachman Architecture<br />
6.2.62 On-line: U.S. Department <strong>of</strong> Energy Information Systems Architecture - a vast online<br />
resource (http://cio.doe.gov/iap/)<br />
6.2.63 On-line: ZDNet's Net.Politics site<br />
(http://www.zdnet.com/products/netpolitics.html)<br />
6.2.64 On-line: HotWired News' Politics site (http://www.wired.com/news/politics/)<br />
6.2.65 On-line: INCOSE - International Council on Systems Engineering<br />
(http://www.incose.org/)<br />
6.2.66 On-line: INCOSE Systems Architecting Working Group<br />
(http://www.incose.org/cmtes/sawg.html)<br />
6.2.67 On-line: IEEE S<strong>of</strong>tware Engineering Standards Committee Architecture Working<br />
Group (http://www.pithecanthropus.com/~awg/index.html)<br />
6.2.68 On-line: TiAC - The Information Architects Cooperative<br />
(http://www.infoed.com/default.htm)<br />
6.3 Other sources <strong>of</strong> information.<br />
Additional handouts may be used when deemed necessary by the instructor.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
None<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />
in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 12<br />
Networking and telecommunications 6<br />
Modern programming language<br />
Analysis and Design 6<br />
Data management 12<br />
Role <strong>of</strong> IS in Organizations 18<br />
8.0 Oral and Written Communications:<br />
As part <strong>of</strong> the group term project assignment, the students are required to submit 5 written<br />
reports which are typically 5-15 pages long. Individually, each student makes 1 oral presentation<br />
<strong>of</strong> typically 25 minutes duration. This presentation includes research, development <strong>of</strong> original<br />
presentation materials, and oral presentation skills.<br />
-227-
1.0 Social and Ethical Issues:<br />
Students are presented with problems that arise from poorly developed and/or managed<br />
information systems, and discuss potential solutions. A chapter on Social Systems specifically<br />
addresses the impact <strong>of</strong> information systems on social structures.<br />
9.0 Theoretical content:<br />
Zachman Framework for Information Systems/Enterprise Architecture (4 hours)<br />
10.0 Problem analysis:<br />
Students will explore the need for information system architectures in medium and large-sized<br />
organizations. Students will explore the conceptual frameworks developed for managing<br />
information systems architectures. Students will explore the Unified Modeling Language as a<br />
tool for architecture representation.<br />
11.0 Solution design:<br />
The students will develop and apply analytical skills, as well as their understanding <strong>of</strong><br />
architectural frameworks and the Unified Modeling Language. The students will combine these<br />
new skills with existing knowledge and skills in the area <strong>of</strong> information systems development in<br />
order to design an integrative architecture for a real-world organization.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
4/8/2003 Added prerequisites: CIST 2110 and<br />
ISQA 3310. Course Change Form<br />
4/22/03.<br />
Paul van<br />
Vliet<br />
Prerequisites suggested by ISQA<br />
faculty undergraduate curriculum<br />
review.<br />
6/25/03 ABET cleanup Wolcott<br />
9/13/2007 Updated syllabus contents; changed Van Vliet<br />
prerequisite from CIST 2110 to CIST<br />
3100 as this course was renumbered.<br />
10/12/2008 Updated section 5.1 to more accurately Van Vliet<br />
reflect the current term project<br />
10/12/2008 Updated section 8.0 to more accurately Van Vliet<br />
reflect course administration<br />
10/12/2008 Updated section 9.0 to reflect current Van Vliet<br />
course content<br />
10/12/2008 Updated section 10 to reflect change in Van Vliet<br />
nomenclature <strong>of</strong> theoretical model<br />
-228-
-229-
14. Local and global role <strong>of</strong> iS<br />
15. Knowledge <strong>of</strong> computing<br />
16. Analysis and design<br />
17. Communication<br />
18. Computer-based tools<br />
19. Work on a team<br />
20. Pr<strong>of</strong>essional, legal, ethical standards<br />
21. Model processes and data<br />
22. Design, implement, evaluation IS<br />
23. Manage projects<br />
24. Manage IS within application env.<br />
25. Manage change<br />
26. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4100<br />
Course Title<br />
Information Systems Architecture & Organization<br />
Course Coordinator<br />
Paul J.A. van Vliet<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/12/08<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand the issues involved in<br />
architecting the information systems<br />
infrastructure in medium- and large-sized<br />
organizations.<br />
Understand the frameworks and tools<br />
used to develop an organization's<br />
information systems architecture.<br />
Understand and apply the conceptual<br />
frameworks developed for managing<br />
information systems architectures.<br />
Understand the Unified Modeling<br />
Language (UML) as a tool for modeling<br />
the various aspects <strong>of</strong> information<br />
systems architectures.<br />
S S S S X S X<br />
S S S X X<br />
S S S X X<br />
S S S<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
-230-
14. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
1. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
2. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
3. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
4. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
7. understand and model organizational processes and data.<br />
8. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
9. manage projects.<br />
10. manage information systems within a specific application environment.<br />
11. manage change.<br />
12. recognize the need for continuing pr<strong>of</strong>essional development<br />
-231-
-232-
ISQA 4110 Information Systems Analysis<br />
Department and Course Number ISQA 4110<br />
Course Title<br />
Information Systems Analysis<br />
Course Coordinator<br />
Leah R. Pietron<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 05/29/2009<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The course presents an overview <strong>of</strong> information systems and the system development life<br />
cycle for the systems analyst. The course emphasis focuses on tools and techniques that<br />
the analyst, designer, and programmer can use to document information systems.<br />
The classical and structured tools for describing data flow, data structures, process flow,<br />
and logical design requirements will be applied to documenting systems. Emphasis will be<br />
placed on the integrated use <strong>of</strong> the classical and structured tools, requirements<br />
definition, project management, and cost/benefit analysis.<br />
1.2 For whom course is intended.<br />
This course is intended for undergraduate MIS majors who wish to study topics on<br />
systems analysis and design.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses)<br />
1.3.1 CIST 3100 - Organizations, Applications, and Technology<br />
1.3.2 ISQA 3210 - Advanced Technology for Personal Productivity (prior or concurrent<br />
enrollment)<br />
1.3.3 ISQA 3310 - Database Management (prior or concurrent enrollment)<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Types <strong>of</strong> Processing Systems<br />
1.4.2 Essential Concepts <strong>of</strong> Networks<br />
1.4.3 Essential Concepts in DSS, Artificial Intelligence and other technologies<br />
1.4.4 Essential Concepts in Systems Analysis, Design, and Databases<br />
1.4.5 Introduction to Data Modeling – ER Diagrams<br />
1.4.6 Essential techniques in Word, Excel, Access, and PowerPoint<br />
1.4.7 Understanding <strong>of</strong> Operating Systems (Windows and Unix)<br />
-233-
1.4.8 Essential Techniques in Technical Writing<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
2.1 asdfa<br />
2.2 The students will be able to develop a better understanding <strong>of</strong> the entire information<br />
system development process: from the identification <strong>of</strong> the business problems and needs<br />
to the design <strong>of</strong> an improved system to the writing <strong>of</strong> documentation.<br />
2.3 The students will improve their technical and group communication skills. The students’<br />
ability to communicate with both technical and non-technical people should be improved<br />
through the proper use <strong>of</strong> the tools. Their writing and speaking skills may also be<br />
enhanced as they learn how to present their documentation to the instructor.<br />
2.4 The student systems analyst will learn how to utilize critical thinking skills, problem<br />
solving, change management, and project management. These essential skills will enable<br />
them to work with their clients and define the client project. This process includes ethical<br />
decision making and determine appropriate solutions for their client.<br />
2.5 The students will apply technical and theoretical knowledge to the client project.<br />
Students will be able to apply their specific strategies and methodologies such as cost<br />
benefit analysis, process modeling, use diagrams, and documentation to their project.<br />
2.6 The student will apply their technical knowledge to the client project. This knowledge<br />
applies to the selection <strong>of</strong> hardware, s<strong>of</strong>tware, operating systems, and networking<br />
solutions.<br />
2.7 The student will have a better understanding <strong>of</strong> information systems in general. Students<br />
will learn many capabilities and characteristics <strong>of</strong> good information systems. This process<br />
will help students design more effective systems, encourage additional education and<br />
certification during their careers.<br />
3.0 Content and Organization:<br />
-234-<br />
Contact hours<br />
3.1 Introduction to ISQA 4110, The Systems Development Environment<br />
& Overview <strong>of</strong> S<strong>of</strong>tware Applications 3.0<br />
3.2 The Origins <strong>of</strong> S<strong>of</strong>tware 3.0<br />
3.3 Managing the Information Systems Project<br />
& Introduction to Micros<strong>of</strong>t Project 2007 3.0<br />
3.4 Identifying and Selecting Systems Development Project 3.0<br />
3.5 Initiating and Planning Systems Development Projects 3.0<br />
3.6 Information Security 3.0<br />
3.7 Risk Analysis for Information Systems 3.0<br />
3.8 Determining Systems Requirements 3.0
3.9 Structuring Systems Requirements: Process Modeling<br />
& Structuring Systems Requirements: Logic Modeling 3.0<br />
3.10 Rapid Application Development<br />
& Object-Oriented Analysis and Design 3.0<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods include lectures, in-class exercises, s<strong>of</strong>tware tutorials, and<br />
guidance on the semester project.<br />
4.2 Student role in the course.<br />
Students will attend lectures, complete in-class exercises and quizzes, complete two<br />
examinations, complete and present class projects.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
Students will complete in-class exercises and quizzes, take two examinations, complete<br />
and present class projects.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Component<br />
Grading<br />
In-class Exercises and Quizzes 5%<br />
Examinations 40%<br />
Class Project 50%<br />
Class Presentation 5%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
97% - 100% A+<br />
90% - 96% A<br />
87% - 89% B+<br />
80% - 86% B<br />
-235-
77% - 79% C+<br />
70% - 76% C<br />
67% - 69% D+<br />
60% - 66% D<br />
0% - 59% F<br />
-236-
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Jeffrey A. H<strong>of</strong>fer, Joey F. George, and Joseph S. Valacich. Modern Systems Analysis<br />
and Design, Fifth Edition. Addison Wesley Longman. 2008.<br />
6.1.2 Rachel Biheller Bunin. Micros<strong>of</strong>t Project 2007, Introductory. Course Technology.<br />
2008.<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 Systems Analysis and Design Methods by Jeffrey Whitten and Lonnie Bentley,<br />
McGraw-Hill/Irwin, 7th Edition, 2005<br />
6.2.2 Systems Analysis and Design by Allan Dennis, Barbara Wixom, and Roberta Roth,<br />
Wiley Publishing, 2008.<br />
6.2.3 Systems Analysis and Design, Seventh Edition, by Gary Shelley, Thomas Cashman,<br />
and Harry Rosenblatt, Course Technology, 2007.<br />
6.2.4 Systems Analysis and Design, 7th Edition, by Kenneth Kendall and Julie Kendall,<br />
Prentice-Hall, 2007.<br />
6.2.5 Systems Analysis and Design with UML, by Allan Dennis, Barbara Wixom, and<br />
David Tegarden, Wiley Publishing, 2007.<br />
6.2.6 Systems Anlaysis and Design in a Changing World, by John Satzinger, Robert<br />
Jackson, and Stephen Burd, Course Technology, 2008.<br />
6.2.7 Essentials <strong>of</strong> Systems Analysis and Design, 4th Edition, by Jeffrey H<strong>of</strong>fer, Joey<br />
George, and Joseph Valacich, Prentice-Hall, 2009.<br />
6.2.8 Information Systems Methodologies by Olle, Addison-Wesley Publishing<br />
6.3 Other sources <strong>of</strong> information.<br />
Additional course content, either with pages developed especially for this course or with<br />
links to additional course materials, will be provided during the semester.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
None.<br />
-237-
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />
in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 6<br />
Networking and telecommunications 3<br />
Modern programming language<br />
Analysis and Design 21<br />
Data management<br />
Role <strong>of</strong> IS in Organizations<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least ___4__ written reports (not including exams, tests,<br />
quizzes, or commented programs) to typically _5-25____ pages and to make __1___ oral<br />
presentations <strong>of</strong> typically __20___ minutes duration. Include only material that is graded for<br />
grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />
accuracy.<br />
9.0 Social and Ethical Issues:<br />
The course deals with information security and risk analysis for information systems. These<br />
topics will partly be concerning social and ethical issues. Students will be graded on their<br />
understanding <strong>of</strong> these topics by in-class exercises, quizzes or exams.<br />
10.0 Theoretical content:<br />
None.<br />
11.0 Problem analysis:<br />
Students select a project in which they will analyze a real-world organization and their<br />
information systems need. Students will review systems development requirements and identify<br />
the data that is required for the systems design. The students develop alternatives and present<br />
these solutions for the client.<br />
Student will learn the definition <strong>of</strong> systems planning, systems analysis and tools and techniques<br />
that the programmer or analyst can use to document information systems. Classical and<br />
structured tools about the problem analysis include ones for describing data flow, data structure,<br />
and process flow. Time permitting, the course will survey other important skills for the systems<br />
analyst such as data gathering and reporting, project management, and cost/benefit analysis.<br />
-238-
12.0 Solution design:<br />
Students will use the theory and established practices <strong>of</strong> information systems analysis and design<br />
to develop a functional design specification document and determine information systems<br />
security requirements. The project groups develop appropriate models (process models, state<br />
transition diagrams, use case diagrams, and logic modeling) and supporting documentation<br />
through the use <strong>of</strong> the above tools.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
11/2/02 Initial ABET version created Pietron<br />
6/25/03 ABET cleanup Wolcott<br />
7/10/03 Change Prerequisite (Course Change Wild Update course prerequisites.<br />
Form – 4-22-03)<br />
10/13/08 Update to course description and Pietron<br />
prerequisites<br />
4/05/2009 Update to course objectives Pietron Updated the course objectives<br />
to be in alignment ABET<br />
outcomes<br />
5/29/2009 Updating bibliography and<br />
assignments<br />
Pietron Updating references<br />
-239-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Work on a team<br />
6. Computer-based tools<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. Course Objectives<br />
Department and Course Number ISQA 4110<br />
Course Title<br />
Information Systems Analysis<br />
Course Coordinator<br />
Leah R. Pietron<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 05/29/2009<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
The students will be able to develop a S S S<br />
better understanding <strong>of</strong> the entire<br />
information system development<br />
process: from the identification <strong>of</strong> the<br />
business problems and needs to the<br />
design <strong>of</strong> an improved system to the<br />
writing <strong>of</strong> documentation<br />
The students will improve their technical S S S S S S X S S X X<br />
and group communication skills. The<br />
students’ ability to communicate with<br />
both technical and non-technical people<br />
should be improved through the proper<br />
use <strong>of</strong> the tools. Their writing and<br />
speaking skills may also be enhanced as<br />
they learn how to present their<br />
documentation to the instructor.<br />
The student systems analyst will learn X S S S S X S S S<br />
-240-
how to utilize critical thinking skills,<br />
problem solving, change management,<br />
and project management. These<br />
essential skills will enable them to work<br />
with their clients and define the client<br />
project. This process includes ethical<br />
decision making and determine<br />
appropriate solutions for their client<br />
The students will apply technical and<br />
theoretical knowledge to<br />
the client project. Students will be able<br />
to apply their specific<br />
strategies and methodologies such as<br />
cost benefit analysis, process<br />
modeling, use diagrams, and<br />
documentation to their project<br />
The student will apply their technical<br />
knowledge to the project. This<br />
knowledge applies to the selection <strong>of</strong><br />
hardware, s<strong>of</strong>tware, operating systems<br />
and networking solutions.<br />
The student will have a better<br />
understanding <strong>of</strong> information systems in<br />
general. Students will learn many<br />
capabilities and characteristics <strong>of</strong> good<br />
information systems. This process will<br />
help students design more effective<br />
systems, encourage additional education<br />
and certification during their careers.<br />
S S S X<br />
X X S<br />
S S X X S S<br />
-241-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-242-
ISQA 4120 System Design and Implementation<br />
Department and Course Number ISQA 4120<br />
Course Title<br />
Information Systems Design & Implementation<br />
Course Coordinator<br />
Paul J.A. van Vliet<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/12/2008<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This is the second course in a sequence in computer information systems analysis, design,<br />
and implementation. This course extends the basic foundations <strong>of</strong> systems development<br />
started in ISQA 4110 and examines the activities comprising the design, construction and<br />
implementation <strong>of</strong> information systems.<br />
1.2 For whom course is intended.<br />
This course is intended for undergraduate MIS majors who wish to study advanced topics<br />
pertaining to information systems design and implementation. It is a required course for<br />
the Bachelor <strong>of</strong> Science in MIS degree.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 ISQA 4110 Information Systems Analysis<br />
1.3.2 ISQA 3310 Managing the Database Environment<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Data modeling using the relational database model<br />
1.4.2 Systems analysis<br />
1.4.3 Database development using Micros<strong>of</strong>t Access<br />
1.4.4 Project management basics<br />
1.4.5 Technical writing<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
2.1 Complete the development <strong>of</strong> the projects started in the previous semester in ISQA 4110.<br />
2.2 Be able to successfully design and construct a s<strong>of</strong>tware application.<br />
-243-
2.3 Be able to critically assess systems development alternatives.<br />
2.4 Be able to develop high quality systems documentation.<br />
3.0 Content and Organization:<br />
Contact hours<br />
3.1 Overview <strong>of</strong> Systems Design approaches 3.0<br />
3.2 Data Model Design 3.0<br />
3.3 Database Design 3.0<br />
3.4 User Interface Design 3.0<br />
3.5 Systems Architecture Design 3.0<br />
3.6 Systems Controls Design 3.0<br />
3.7 Process Design & Code Development 3.0<br />
3.8 Documentation Development 3.0<br />
3.9 Design <strong>of</strong> Testing Procedures 3.0<br />
3.10 Systems Installation Issues 3.0<br />
3.11 Distributed Systems Design 3.0<br />
3.12 System Maintenance 3.0<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will include lectures, discussion, and intense guidance on<br />
the systems development project.<br />
4.2 Student role in the course.<br />
Student will attend lectures, read assignment readings, complete exams, participate in<br />
the systems development project and take part in the formal presentation <strong>of</strong> the project.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
Student will complete two individual exams. Students – in groups <strong>of</strong> 3 to 5 - will<br />
participate in the completion <strong>of</strong> the project milestones, the project application, the<br />
project documentation, and the presentation <strong>of</strong> the project.<br />
-244-
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Component<br />
Grading<br />
Exams 33.3%<br />
Project milestones 33.3%<br />
Final project and presentation 33.3%<br />
5.3 Grading scale and criteria.<br />
6.0 Resource Material<br />
Points<br />
Grade<br />
96% - 100% A+<br />
92% - 95% A<br />
89% - 91% A-<br />
86% - 88% B+<br />
82% - 85% B<br />
79% - 81% B-<br />
76% - 78% C+<br />
72% - 75% C<br />
69% - 71% C-<br />
66% - 68% D+<br />
62% - 65% D<br />
59% - 61% D-<br />
00% - 58% F<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Modern Systems Analysis and Design - Fifth Edition, by Jeffrey A. H<strong>of</strong>fer, Joey F.<br />
George, and Joseph S. Valacich, Pearson/Prentice Hall, 2008.(or more recent text)<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 asdjaklsd<br />
6.2.2 On-Line: A Relational Model <strong>of</strong> Data for Large Shared Data Banks - Ed Codd's<br />
original article (http://www.acm.org/classics/nov95/)<br />
6.2.3 On-Line Tutorial: Getting Started with ERwin - A tutorial created by Dr. Wolcott<br />
(http://www.isqa.unomaha.edu/wolcott/tutorials/erwin/erwin.html)<br />
6.2.4 On-Line: Normalization Overview<br />
(http://www.troubleshooters.com/littstip/ltnorm.html)<br />
6.2.5 On-Line: Normalization beyond 3NF<br />
(http://www.utexas.edu/cc/database/datamodeling/rm/rm8.html)<br />
-245-
6.2.6 On-Line: The Interface Hall <strong>of</strong> Shame (http://www.iarchitect.com/shame.htm)<br />
6.2.7 On-Line: No<strong>of</strong>ace - in search <strong>of</strong> the post-PC interface (http://www.no<strong>of</strong>ace.net/)<br />
6.2.8 Special On-Line Reading: The Undead<br />
(http://www.wired.com/wired/archive/7.03/punchcards_pr.html)<br />
6.2.9 On-Line: Applicability <strong>of</strong> ISO 9001 to S<strong>of</strong>tware Development<br />
(http://www.tantara.ab.ca/iso90003.htm)<br />
6.2.10 On-Line: DevX - A s<strong>of</strong>tware developer resource portal (http://www.devx.com/)<br />
6.2.11 On-Line: High tech's missionaries <strong>of</strong> sloppiness - A great article on the need for<br />
s<strong>of</strong>tware quality.<br />
(http://www.salon.com/tech/feature/2000/12/06/bad_computers/index.html)<br />
6.2.12 On-Line: Implementation Pitfalls & Lessons (PDF file)<br />
(http://www.acu.ac.uk/chems/onlinepublications/930916507.pdf)<br />
6.2.13 On-Line: Mother Earth Mother Board, Neal Stephenson's lengthy chronicle <strong>of</strong> the<br />
laying <strong>of</strong> the longest wire on Earth.<br />
(http://www.wired.com/wired/archive/4.12/ffglass.html)<br />
6.3 Other sources <strong>of</strong> information.<br />
Additional handouts may be used when deemed necessary by the instructor.<br />
6.4 Current bibliography <strong>of</strong> resources for student’s information.<br />
None.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />
in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 9<br />
Networking and telecommunications 3<br />
Modern programming language 3<br />
Analysis and Design 33<br />
Data management 1.5<br />
Role <strong>of</strong> IS in Organizations 12<br />
8.0 Oral and Written Communications:<br />
As part <strong>of</strong> the group term project, all students contribute to the submission <strong>of</strong> 5 written reports<br />
(not including exams, tests, quizzes, or commented programs) to typically 15-45 pages. In<br />
addition, all students participate in 2 oral presentations <strong>of</strong> typically 10 and 25 minutes respective<br />
duration.<br />
9.0 Social and Ethical Issues:<br />
-246-
The concept <strong>of</strong> ethical behavior in the role as system developer is discussed throughout.<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />
coverage.<br />
No coverage<br />
11.0 Problem analysis:<br />
Students will continue their analysis <strong>of</strong> a real-world organization’s information system needs.<br />
Students will review systems design and development options so as to develop an appropriate<br />
systems solution for the target organization.<br />
12.0 Solution design:<br />
Students will use the theory and established practices <strong>of</strong> information systems design to develop a<br />
database design, a user interface design, a systems security and controls design, an application<br />
process design, a network design (if needed), as well as a complete set <strong>of</strong> systems and end user<br />
documentation for the real-world organization for which they undertake their systems<br />
development project.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
10/3/02 Initial ABET version van Vliet<br />
6/25/03 ABET cleanup Wolcott<br />
9/13/07 Document updated as needed Van Vliet<br />
10/12/2008 Updated Section 8.0 to more accurately Van Vliet<br />
reflect course administration<br />
-247-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4120<br />
Course Title<br />
Information Systems Design & Implementation<br />
Course Coordinator<br />
Paul J.A. van Vliet<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Complete the development <strong>of</strong> the<br />
projects started in the previous semester<br />
in ISQA 4110.<br />
Be able to successfully design and<br />
construct a s<strong>of</strong>tware application.<br />
Be able to critically assess systems<br />
development alternatives.<br />
Be able to develop high quality systems<br />
documentation.<br />
S S S S S S S S S X<br />
S S S S X X S S S<br />
S S S S X S S X<br />
S X S S S X<br />
-248-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-249-
-250-
ISQA 4150 Advanced Statistical Methods for IS&T<br />
Department and Course Number ISQA 4150<br />
Course Title<br />
Advanced Statistical Methods for IS&T<br />
Course Coordinator<br />
Lotfollah Najjar<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 03/31/09<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course emphasizes the application and interpretation <strong>of</strong> statistical methods including<br />
design <strong>of</strong> experiments, analysis <strong>of</strong> variance, multiple regression, and nonparametric<br />
procedures and the use <strong>of</strong> statistical computer packages. The intent is to develop<br />
quantitative abilities needed for quantitatively intensive jobs and for advanced study in<br />
management information systems, computer science and information technology.<br />
1.2 For whom course is intended.<br />
This course is intended for upper division undergraduate MIS majors who wish to study<br />
advanced topics pertaining to the application <strong>of</strong> statistics. It is one <strong>of</strong> elective courses for<br />
undergraduates who wish to pursue Knowledge Engineering and Decision Support Track<br />
1.3 Prerequisites <strong>of</strong> the course (Courses)<br />
1.3.1 CIST 2500 Introduction to Applied Statistics for IS&T<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Statistics in information science and technology including such topics as<br />
descriptive statistical measures, probability, discrete probability, sampling,<br />
estimation analysis, hypothesis testing, regression, and analysis <strong>of</strong> variance.<br />
1.4.2 A well-known computer package (e.g. SAS) will be used to support the problemsolving<br />
process.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
2.1 Understand advanced statistical analysis and how to apply them in real life situation.<br />
2.2 Understand the sampling survey and how to collect the data, design the appropriate<br />
experimental design.<br />
-251-
3.0 Content and Organization:<br />
3.1 Review some topics from CIST2500 3<br />
3.2 Inferences about Population Variances 3<br />
3.3 Analysis <strong>of</strong> Variance and Experimental Design 6<br />
3.4 Simple Linear Regression 6<br />
3.5 Multiple Regression 6<br />
3.6 Regression Analysis: Model Building 3<br />
3.7 Tests <strong>of</strong> Goodness <strong>of</strong> Fit and Independence 3<br />
3.8 Nonparametric Statistics 6<br />
3.9 Sampling Survey 4<br />
3.10 Forecasting 4<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
Contact hours<br />
A combination <strong>of</strong> faculty and student lectures on textbook and journal research.<br />
4.2 Student role in the course.<br />
Students will attend the lectures, participate in discussions, complete projects and<br />
homework.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
Students complete computer projects and homework.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Component<br />
Grading<br />
Projects 62.5%<br />
Homework 25.0%<br />
Attendance &Participation 12.5%<br />
-252-
5.3 Grading scale and criteria.<br />
Points Grade<br />
98 – 100% A+<br />
90 – 97% A<br />
87 – 89% A-<br />
84 – 86% B+<br />
80 – 83% B<br />
77 – 79% B-<br />
74 – 76% C+<br />
70 – 73% C<br />
67 – 69% C-<br />
64 – 66% D+<br />
60 – 63% D<br />
57 – 59% D-<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />
in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language 10<br />
Analysis and Design 6<br />
Data management 3<br />
Role <strong>of</strong> IS in Organizations 7<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least ___6__ written reports (not including exams, tests,<br />
quizzes, or commented programs) to typically _10____ pages and to make ___1__ oral<br />
presentations <strong>of</strong> typically __15___ minutes duration. Include only material that is graded for<br />
grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />
accuracy.<br />
9.0 Social and Ethical Issues:<br />
No coverage.<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />
coverage.<br />
Hours<br />
10.1 Simple Linear Regression 6<br />
10.2 Multiple Regression 6<br />
10.3 Regression Analysis: Model Building 3<br />
10.4 Tests <strong>of</strong> Goodness <strong>of</strong> Fit and Independence 3<br />
10.5 Nonparametric Statistics 6<br />
10.6 Forecasting. 4<br />
11.0 Problem analysis:<br />
Students as a team will study and analyze an organization, preferably their workplace. They use<br />
a sampling survey to collect the data in the areas <strong>of</strong> product quality, service quality, and<br />
information quality in order to pinpoint the areas <strong>of</strong> inefficiency.<br />
-254-
12.0 Solution design:<br />
Student design the appropriate experimental design using statistical models and a well known<br />
statistical s<strong>of</strong>tware such as SAS or MINITAB. Then the appropriate conclusions will be drawn from<br />
the results for a better decision-making.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
Spring Initial ABET version<br />
Najjar<br />
2003<br />
11/6/2002 Change <strong>of</strong> title from “Cases in Applied Najjar<br />
Statistics” to “Advanced Statistical<br />
Methods for IS&T”<br />
6/25/03 ABET cleanup Wolcott<br />
7/10/03 Change title & course description –<br />
Course Change Form – 12-6-02<br />
Wild Update course description and<br />
title to reflect focus <strong>of</strong> class<br />
03/31/09 Change title & course description –<br />
Course Change Form – 06/25/03<br />
Najjar Update course description and<br />
added bibliography<br />
-255-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4150<br />
Course Title<br />
Advanced Statistical Methods for IS&T<br />
Course Coordinator<br />
Lotfollah Najjar<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand advanced statistical analysis<br />
and how to apply them in real life<br />
situation.<br />
Understand the sampling survey and how<br />
to collect the data, design the<br />
appropriate experimental design.<br />
X X X<br />
S<br />
S<br />
-256-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-257-
-258-
ISQA 4180 Electronic Commerce<br />
Department and Course Number ISQA 4180<br />
Course Title<br />
Electronic Commerce<br />
Course Coordinator<br />
Sajda Qureshi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 6/8/09<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course will <strong>of</strong>fer a critical examination <strong>of</strong> issues, technologies, standards, and business<br />
and social implications <strong>of</strong> electronic commerce in cyberspace. Some key topics will include<br />
history <strong>of</strong> the Internet, managing electronic commerce funds transfer, reinventing the future<br />
<strong>of</strong> business through electronic commerce, business opportunities in electronic commerce,<br />
electronic commerce Web site design, social, political and ethical issues associated with<br />
electronic commerce, and business plans for technology ventures. The fundamental goal <strong>of</strong><br />
this course is to educate a new generation <strong>of</strong> managers, planners, analysts, and programmers<br />
<strong>of</strong> the realities and potential for electronic commerce.<br />
1.2 For whom course is intended.<br />
This course is intended for students who wish to know the realities and potential for<br />
electronic commerce. It is one <strong>of</strong> elective courses for the Bachelor <strong>of</strong> Science in MIS degree.<br />
The fundamental goal <strong>of</strong> this course is to educate a new generation <strong>of</strong> managers, planners,<br />
analysts, and programmers <strong>of</strong> the realities and potential for electronic commerce.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses)<br />
1.3.1 ISQA 3400 or equivalent.<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
2.1 To learn about Electronic Commerce concepts and business models;<br />
2.2 To familiarize individuals with current and emerging Electronic Commerce technologies;<br />
2.3 To be able to apply electronic commerce practices by producing and presenting an e-business<br />
plan, and create a web site for a client organization.<br />
3.0 Content and Organization:<br />
Contact time<br />
-259-
3.1 Introduction to Electronic Commerce 6<br />
3.2 The Internet and the Web: infrastructure for Electronic Commerce 3<br />
3.3 Web-based tools for Electronic Commerce 3<br />
3.4 Electronic Commerce s<strong>of</strong>tware 3<br />
3.5 Security threats to Electronic Commerce 3<br />
3.6 Implementing security for Electronic Commerce 3<br />
3.7 Electronic payment systems 2<br />
3.8 Strategies for marketing, sales, and promotion 6<br />
3.9 Strategies for purchasing and support activities 6<br />
3.10 Strategies for Web auctions, virtual communities and Web portals 3<br />
3.11 International, legal, ethical and tax issues 3<br />
3.12 Implementing Electronic Commerce 3<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will be lectures and in-class discussions. A problem based<br />
learning approach is used through which students will 1) learn electronic commerce concepts<br />
and business models, 2) apply these in case study situations and 3) explain and resolve<br />
electronic commerce related issues through a problem solving process.<br />
4.2 Student role in the course.<br />
Students must complete all course requirements including, projects, discussions, and exams<br />
by their deadlines and to the satisfaction <strong>of</strong> the instructor. Students will work out several inclass<br />
and out-<strong>of</strong>-class exercises individually and in groups. Students must come prepared<br />
with the assigned readings so that students can initiate and participate in meaningful<br />
discussions.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Grades conform to the degree to which each <strong>of</strong> the requirements stressed in class is met in<br />
the various assignments and projects. To be eligible for a passing grade in the class, a student<br />
must complete all course requirements including, in-class assignments, homework, projects,<br />
discussions, and exams by their deadlines and to the satisfaction <strong>of</strong> the instructor.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
-260-
Your final grade is based on the percentage <strong>of</strong> points that you receive out <strong>of</strong> the total possible<br />
points for the course. A curve may be used to scale the entire class higher, if necessary, but<br />
scaling down will not be done.<br />
Component<br />
Grading<br />
Individual Assignments (case analysis) 40%<br />
Group Term Project (Proposal, E-business plan and commercial web site) 40%<br />
Group Project Presentation (Peer evaluation ) 10%<br />
Class Participation 10%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
98-100% A+<br />
92-97% A<br />
90-91% A-<br />
86-89% B+<br />
82-85% B<br />
80-81% B-<br />
76-79% C+<br />
72-75% C<br />
70-71% C-<br />
66-69% D+<br />
62-65% D<br />
60-61% D-<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 6<br />
Networking and telecommunications 6<br />
Modern programming language<br />
Analysis and Design 6<br />
Data management<br />
Role <strong>of</strong> IS in Organizations 18<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least __3___ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically __5-10___ pages and to make _1____ oral presentations <strong>of</strong> typically<br />
__15-20___ minutes duration. Include only material that is graded for grammar, spelling, style, and so<br />
forth, as well as for technical content, completeness, and accuracy.<br />
8.1 Two case analysis assignments: every student will complete a paper with 5 single-spaced pages or<br />
10 double-spaced pages (maximum).<br />
8.2 One Web site analysis project (group)<br />
8.3 One e-business plan and Web site project (group): every group will complete the business plan,<br />
the Web site implementation and the presentation lasting 20 minutes followed by a ten-minute<br />
question and answer session (All members <strong>of</strong> the group are expected to actively participate in the<br />
presentation.).<br />
9.0 Social and Ethical Issues:<br />
The course will cover international, legal, ethical and tax issues related to Electronic Commerce. Three (3)<br />
hours will be spent on the topic. The student in the course will be graded on their understanding <strong>of</strong> the<br />
topic in test questions.<br />
10.0 Theoretical content:<br />
The course deals with various concepts and terms <strong>of</strong> Electronic Commerce (12 contact hours).<br />
11.0 Problem analysis:<br />
Students learn to analyze issues, technologies, standards, and business and social implications <strong>of</strong><br />
electronic commerce in cyberspace. In topical analysis assignments, students will analyze current EC<br />
news events by applying/integrating concepts, models, and terminology learned in the chapters specified<br />
on the syllabus and related class discussion. In the case analysis assignment, students will analyze a<br />
"problem solving approach" or “educational ”case . In the Web site analysis project, students will analyze<br />
Web sites with two categories <strong>of</strong> criteria: the technical dimension and business evaluation. In the e-<br />
-262-
usiness plan and Web site project (group), every group will assess a client firm (or develop their own<br />
business) user needs, develop an e-business plan, and implement it in the form <strong>of</strong> a commercial Web site.<br />
12.0 Solution design:<br />
In the e-business plan and Web site project (group), every group will develop an e-business plan, and<br />
implement it in the form <strong>of</strong> a commercial Web site.<br />
CHANGE HISTORY<br />
Date Change By Whom Comments<br />
10/28/02 Initial ABET version Qureshi<br />
August<br />
2002<br />
Removed section on “Strategies for marketing, sales,<br />
and promotion”<br />
Sajda<br />
Qureshi<br />
Students do not have<br />
the background to be<br />
able to conduct a<br />
January<br />
2003<br />
January<br />
2003<br />
January<br />
2003<br />
Grade Weights: Class Participation weight reduced to<br />
5% and Peer evaluation made part <strong>of</strong> the Group Project<br />
grade. More weight has been given to the website<br />
analysis project. These changes are reflected in this<br />
course outline.<br />
Books: Saloner, G and A.M. Spence "Creating and<br />
Capturing Value. Perspectives and cases on Electronic<br />
Commerce". Wiley and Sons (2002) made required text<br />
along with Laudon and Travers (2002).<br />
Course outline: Changed the order <strong>of</strong> material: moved<br />
eCommerce models, technologies, infrastructure,<br />
Customer Relationship Management, Supply Chain<br />
Management, collaborative commerce, eMarkets,<br />
portals and auctions, and virtual communities to the<br />
first part <strong>of</strong> the course (weeks 1-9). Security, Electronic<br />
Payment Systems, Ethical Social and Political issues to<br />
the second part (weeks 10-15).<br />
-263-<br />
Sajda<br />
Qureshi<br />
Sajda<br />
Qureshi<br />
Sajda<br />
Qureshi<br />
6/25/03 ABET cleanup Wolcott<br />
January Pedagogy: Added hands on class exercises and incompany<br />
Qureshi<br />
2004<br />
projects<br />
August Content: Developed additional hands on class exercises Qureshi<br />
2004 and web assessment activities<br />
January<br />
2005<br />
Qureshi<br />
January<br />
2006<br />
Evaluation: Separated assignments for graduate and<br />
undergraduate component to reflect separate<br />
assessment<br />
Course Outline: Updated course content with class<br />
exercises involving eCommerce companies such as Ali<br />
Baba.<br />
Qureshi<br />
market analysis<br />
These weights more<br />
accurately reflect<br />
effort.<br />
Material from Saloner<br />
and Spence (2002) is<br />
used for assignments,<br />
exams and class<br />
discussion.<br />
Students need to<br />
understand and apply<br />
the specific material<br />
first.<br />
The groups remain<br />
comprised <strong>of</strong> graduate<br />
and undergraduate<br />
students to enhance<br />
learning.<br />
Students appear to<br />
learn better when they<br />
can see the
January<br />
2007<br />
January<br />
2008<br />
January<br />
2009<br />
Course content: Replaced SAP case with the Google<br />
case.<br />
Pedagogy: Conducted Teaching Assessment By<br />
Students. Changed format and delivery to reflect need<br />
for more hands on templates and assistance with<br />
students’ disposition.<br />
Course content: Created and used rubrics for all<br />
assignments. Made only one case compulsory for the<br />
undergraduate students. The second case and website<br />
assessment are <strong>of</strong>fered as extra credit.<br />
Qureshi<br />
Qureshi<br />
Qureshi<br />
components <strong>of</strong> the<br />
business online.<br />
The Google case also<br />
enables the legal and<br />
ethical concerns in<br />
eCommerce to be<br />
addressed.<br />
The templates<br />
increased the use <strong>of</strong><br />
class time to enhance<br />
learning.<br />
These changes were<br />
made to address the<br />
high workload that the<br />
students were facing.<br />
-264-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4180<br />
Course Title<br />
Electronic Commerce<br />
Course Coordinator<br />
Sajda Qureshi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
To learn about Electronic Commerce<br />
concepts and business models;<br />
To familiarize individuals with current and<br />
emerging Electronic Commerce<br />
technologies;<br />
To be able to apply electronic commerce<br />
practices by producing and presenting an<br />
e-business plan, and create a web site for<br />
a client organization.<br />
X<br />
X<br />
S X X S X<br />
S<br />
-265-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-266-
ISQA 4190 Process Reengineering with Information Technology<br />
Department and Course Number ISQA 8196<br />
Course Title<br />
Process Reengineering with Information Technology<br />
Course Coordinator<br />
Lotfollah Najjar<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 03/31/09<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
Business process reengineering issues are examined. Reengineering concepts and methods<br />
are introduced. Additional special project(s) are required. SAP will be introduced.<br />
1.2 For whom course is intended.<br />
This course is intended for students in management information systems, business or<br />
computer science who are interested in the use <strong>of</strong> technology to improve organizational<br />
efficiency and effectiveness.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 CIST 2500 Introduction to Applied Statistics for IS&T<br />
1.3.2 ISQA 4110 Information Systems Analysis or equivalent.<br />
1.4 Prerequisites <strong>of</strong> the course (Topics):<br />
1.4.1 Introductory statistics<br />
1.4.2 principles <strong>of</strong> information systems analysis<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None.<br />
2.0 Objectives:<br />
2.1 Understand the concept <strong>of</strong> cultural requirements for an organization to begin a process<br />
improvements<br />
2.2 Understand the concept <strong>of</strong> Total Quality Management<br />
2.3 Understand the concept <strong>of</strong> Benchmarking<br />
2.4 Understand the concept <strong>of</strong> Statistical Process Control<br />
2.5 Understand reengineering design<br />
2.6 Understand Process reengineering practices for IT enabled change<br />
2.7 Understand the process whereby process reengineering is accepted and supported throughout<br />
the organization<br />
2.8 Get familiar with SAP to integrate with the process improvements<br />
-267-
3.0 Content and Organization:<br />
List <strong>of</strong> topics to be covered in chronological sequence<br />
Contact Hours<br />
3.1 Quick Reference Guide to Process Redesign 1<br />
3.2 Process Management 1<br />
3.3 Leadership 1<br />
3.4 Organizational Assessment 1<br />
3.5 Define and Classify Process 1<br />
3.6 Identify Core Process 1<br />
3.7 Measure Performance 2<br />
3.8 Statistical Process Control 2<br />
3.9 Measure Efficiency 2<br />
3.10 Understanding the Customer 1<br />
3.11 Document Process 1<br />
3.12 Assesses the Process 2<br />
3.13 Planning the Improvement 1<br />
3.14 Continuous Improvement 1<br />
3.15 Understanding BPR for e-Business 1<br />
3.16 How To Redesign Enterprise Process with BPR s<strong>of</strong>tware 1<br />
3.17 Business process Modeling with BPR s<strong>of</strong>tware 1<br />
3.18 Analysis and Redesign <strong>of</strong> an Enterprise Process 1<br />
3.19 Designing Collaborative Supply Chain Processes for e-Business 1<br />
3.20 IT Integration Options for e-Business Processes 1<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used<br />
The primary teaching method will be discussion, case studies, lecture, guest speakers,<br />
using SAP, and demonstration.<br />
4.2 Student role in the course<br />
The student will attend lectures and demonstrations, participate in discussion on assigned<br />
readings, complete assigned projects and papers, and complete required examinations.<br />
4.3 Contact hours<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
-268-
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Participation in class discussion:<br />
The students are required to prepare a discussion outline for the readings that has been assigned<br />
each week. The discussions outlines will be counted toward the class participation part <strong>of</strong> your<br />
grade. Please use a word processor to create your outlines.<br />
Exams:<br />
Three one-hour exams will be given covering the assigned readings, lectures, and in class<br />
discussion. The exams will not be cumulative.<br />
Presentations:<br />
Students are required to select a current journal article from the referred literature such as CAIS<br />
(online), JAIS (online), Communications <strong>of</strong> the ACM (digital library), IEEE (digital library), etc. The<br />
article must address some aspect <strong>of</strong> IT Process Reengineering. Students have to prepare a<br />
PowerPoint presentation <strong>of</strong> their articles for the class.<br />
Projects:<br />
Students are expected to select a process for reengineering. Using the tools and techniques<br />
taught in class they will describe the original process using process drawings and redesign the old<br />
processes for greater efficiency. Students will be looking for the elimination <strong>of</strong> paper, steps,<br />
useless processes, etc. They will create a reengineered process and a list <strong>of</strong> the costs savings and<br />
the productivity gains (quantified in dollars and hours) obtained from your process reengineering<br />
work.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Exam 1 100<br />
Exam 2 100<br />
Exam 3 100<br />
Assignments 100<br />
Journal Article Presentation 50<br />
Process Reengineering Project 100<br />
Class Participation 50<br />
-269-
Total 600<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
97-100% A+<br />
92-96% A<br />
90-91% A-<br />
86-89% B+<br />
82-85% B<br />
80-81% B-<br />
76-79% C+<br />
72-75% C<br />
70-71% C-<br />
66-69% D+<br />
62-65% D<br />
60-61% D-<br />
journals that are relevant to topics in systems analysis and design. The process<br />
is particularly important in keeping current with technology and new<br />
methodologies.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language<br />
Analysis and Design 10<br />
Data management<br />
Role <strong>of</strong> IS in Organizations 10<br />
8.0 Oral and Written Communication<br />
Every student is required to submit at least __3__ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically ___5__ pages and to make __1___ oral presentations <strong>of</strong> typically<br />
___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as<br />
well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues<br />
9.1 Emphasis on open and honest communication.<br />
9.2 Emphasis on understanding and honestly communicating and managing the impact and disruption<br />
to the organization<br />
9.3 Emphasis on the customers needs both explicit and requirements and implicit.<br />
9.4 Emphasis on accurate and consistent project tracking and reporting to management.<br />
10.0 Theoretical Content Hours<br />
10.1 Salience determination 3<br />
11.0 Problem Analysis<br />
11.1 Work flow analysis<br />
11.2 Analysis for redundancy, and unproductive and wasteful processes<br />
12.0 Solution Design<br />
Redesign organizational processes<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
11/11/02 Initial ABET version Dufner<br />
6/25/03 ABET cleanup Wolcott<br />
-271-
7/10/03 Change prerequisites – Course Change<br />
Form – 5-15-03<br />
11/22/05 Change prerequisites – Course Change<br />
Form – 7/10/03<br />
03/31/09 Change prerequisites – Course Change<br />
Form – 11/22/05<br />
Wild<br />
Najjar<br />
Najjar<br />
Update course prerequisites<br />
Update course prerequisites,<br />
Changing the text, and integration <strong>of</strong><br />
the course with SAP.<br />
Update course prerequisites and<br />
added Bibliography.<br />
-272-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4190<br />
Course Title<br />
Process Reengineering with Information Technology<br />
Course Coordinator<br />
Lotfollah Najjar<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand the concept <strong>of</strong> cultural<br />
requirements for an organization to begin<br />
a process improvements<br />
Understand the concept <strong>of</strong> Total Quality<br />
Management<br />
Understand the concept <strong>of</strong> Benchmarking<br />
Understand the concept <strong>of</strong> Statistical<br />
Process Control<br />
Understand reengineering design<br />
Understand Process reengineering<br />
practices for IT enabled change<br />
Understand the process whereby process<br />
reengineering is accepted and supported<br />
through out the organization<br />
Get familiar with SAP to integrate with<br />
the process improvements<br />
X<br />
X<br />
S<br />
X<br />
S<br />
S<br />
S<br />
S<br />
X X S S<br />
X S X<br />
-273-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-274-
ISQA 4200 Information and Data Quality Management<br />
Department and Course Number ISQA 4200<br />
Course Title<br />
Information and Data Quality Management<br />
Course Coordinator<br />
Lotfollah Najjar<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 03/10/06<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course introduces the role and importance <strong>of</strong> data quality and information quality in<br />
databases and data warehouses. The intent <strong>of</strong> the course is to provide students with the concepts<br />
and tools necessary to effectively manage information and data quality .In particular, the course<br />
examines the various roles, responsibilities, and skills essential to manage databases and data<br />
warehouses.<br />
1.2 For whom course is intended.<br />
The course is intended for undergraduate students in Information Systems, Computer Science and<br />
related areas who are interested in managing information and data quality for better decision<br />
making.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 CIST 2500<br />
1.3.2 ISQA 3310<br />
1.4 Prerequisites <strong>of</strong> the course (Topics):<br />
1.4.1 Introductory statistics<br />
1.4.2 Managing the Data Base Environment<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None.<br />
2.0 Objectives:<br />
2.1 Develop in-depth understanding <strong>of</strong> Data and Information Quality (DQ and IQ)<br />
2.2 Understand and use DQ and IQ Concepts in Information Systems projects<br />
2.3 Be able to recognize various patterns <strong>of</strong> Data and Design Deficiencies in Systems<br />
2.4 Be able to suggest appropriate DQ and IQ improvement plans in light <strong>of</strong> known deficiencies in<br />
systems<br />
-275-
2.5 Develop an understanding <strong>of</strong> the role and importance <strong>of</strong> DQ and IQ in databases and Data<br />
warehouses<br />
2.6 Be able to discuss the role and importance <strong>of</strong> DQ in DSS<br />
3.0 Content and Organization:<br />
List <strong>of</strong> topics to be covered in chronological sequence<br />
3.1 Principles <strong>of</strong> information quality improvement<br />
Contact Hours<br />
3.1.1 Supplement (TQM) 1<br />
3.1.2 The high costs <strong>of</strong> low quality data 1<br />
3.1.3 Defining information quality 2<br />
3.1.4 Applying quality management principles to information 3<br />
3.2 Processes for improving information quality<br />
3.2.1 An overview <strong>of</strong> total quality data management 4<br />
3.2.2 Assigning data definition and information architecture quality 5<br />
3.2.3 Supplement (SPC) 4<br />
3.2.4 Information quality assessment 5<br />
3.2.5 Measuring nonquality information costs 5<br />
3.2.6 Information product improvement: data reeingineering<br />
and cleansing 4<br />
3.2.7 Improving information process quality: data defect prevention 6<br />
3.2.8 Information quality tools and techniques 5<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used<br />
The primary teaching methods will include class discussion, case study, lecture, and guest<br />
speakers.<br />
4.2 Student role in the course.<br />
The student will attend lectures and demonstrations, participate in discussion on assigned<br />
readings, complete assigned projects and papers, and complete required examinations.<br />
4.3 Contact hours<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
-276-
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
5.1.1 Assignments<br />
5.1.2 Team Presentations: In teams <strong>of</strong> 2-3 members students are required to research a<br />
contemporary issue facing the information quality systems<br />
5.1.3 Mid-Term Examination<br />
5.1.4 Final Examination<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable<br />
5.2.1 Assignments (20%)<br />
5.2.2 Team Presentations: In teams <strong>of</strong> 2-3 members students are required to research a<br />
contemporary issue facing the information quality systems (20%)<br />
5.2.3 Mid-Term Examination (25%)<br />
5.2.4 Final Examination (25%)<br />
5.2.5 Participation (10%)<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
97-100% A+<br />
92-96% A<br />
90-91% A-<br />
86-89% B+<br />
82-85% B<br />
80-81% B-<br />
76-79% C+<br />
72-75% C<br />
70-71% C-<br />
66-69% D+<br />
62-65% D<br />
60-61% D-<br />
Additional articles that have been collected for various topics are available at the UNO Library.<br />
These articles are used to supplement topics presented in various chapters.<br />
6.3 Other sources for gathering information or equivalent<br />
Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />
relevant to DQ/IQ topics.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language<br />
Analysis and Design<br />
Data management 17<br />
Role <strong>of</strong> IS in Organizations<br />
8.0 Oral and Written Communication<br />
Every student is required to submit at least __3__ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically ___5__ pages and to make __1___ oral presentations <strong>of</strong> typically<br />
___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />
as well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues<br />
9.1 Emphasis on open and honest communication.<br />
9.2 Emphasis on understanding and honestly communicating and managing the impact and disruption<br />
to the organization<br />
9.3 Emphasis on the customer’s needs both explicit and requirements and implicit.<br />
9.4 Emphasis on accurate and consistent project tracking and reporting to management.<br />
10.0 Theoretical Content Hours<br />
10.1 Salience determination 3<br />
11.0 Problem Analysis<br />
11.1 Work flow analysis<br />
11.2 Analysis for redundancy, and unproductive and wasteful processes<br />
12.0 Solution Design<br />
12.1 Redesign organizational processes<br />
-278-
CHANGE HISTORY<br />
Date Change By whom Comments<br />
03/10/06 Initial ABET version Najjar<br />
ABET cleanup<br />
Wolcott<br />
-279-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4200<br />
Course Title<br />
Information and Data Quality Management<br />
Course Coordinator<br />
Lotfollah Najjar<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Develop in-depth understanding <strong>of</strong> Data<br />
and Information Quality (DQ and IQ)<br />
Understand and use DQ and IQ Concepts<br />
in Information Systems projects<br />
Be able to recognize various patterns <strong>of</strong><br />
Data and Design Deficiencies in Systems<br />
Be able to suggest appropriate DQ and IQ<br />
improvement plans in light <strong>of</strong> known<br />
deficiencies in systems<br />
Develop an understanding <strong>of</strong> the role and<br />
importance <strong>of</strong> DQ and IQ in databases<br />
and Data warehouses<br />
Be able to discuss the role and<br />
importance <strong>of</strong> DQ in DSS<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
S<br />
X X S<br />
S S S X<br />
X<br />
S<br />
X<br />
X<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
-280-
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-281-
-282-
ISQA 4300 Database Administration<br />
Department and Course Number ISQA 4300<br />
Course Title<br />
Database Administration<br />
Course Coordinator<br />
Peter Wolcott<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/3/07<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course is designed to give students an applied, practical introduction to database<br />
administration. Students will gain an understanding <strong>of</strong> the functioning <strong>of</strong> a database management<br />
system and its relationship to the computing environment in which it runs. They will learn the<br />
concepts, principles, and techniques necessary to carry out such functions as database object<br />
creation, storage management, capacity planning, performance tuning, backup and recovery, and<br />
security management. Each semester the course will focus on one commercial DBMS, such as<br />
Oracle.<br />
1.2 For whom course is intended.<br />
The course is intended for upper division undergraduate MIS or CS majors who wish to pursue the<br />
topic <strong>of</strong> database and data administration beyond the level <strong>of</strong> an introductory database course.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses)<br />
1.3.1 ISQA 3300<br />
1.3.2 ISQA 3310 or CSCI 4850<br />
1.4 Prerequisites <strong>of</strong> the course (Topics)<br />
1.4.1 Relational Model<br />
1.4.2 Structured Query Language (SQL)<br />
1.4.3 Secondary storage & I/O<br />
1.4.4 Indexing<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
2.1 Understand the roles, issues, and tasks associated with the database administration function.<br />
2.2 Understand computer system and DBMS architecture and how the DBMS stores and maintains<br />
data, executes queries, and performs other data management tasks.<br />
-283-
2.3 Create a variety <strong>of</strong> database objects, such as tablespaces, indexes, and user objects.<br />
2.4 Plan and implement the physical organization <strong>of</strong> a database.<br />
2.5 Understand and use the system catalog in a variety <strong>of</strong> database administration tasks.<br />
2.6 Gather, interpret, and act on database statistics to monitor database activity and tune for<br />
performance.<br />
2.7 Plan and execute backup and recovery activities.<br />
2.8 Secure the database and manage users.<br />
2.9 Develop good database management discipline<br />
3.0 Content and Organization:<br />
Contact hours<br />
3.1 Overview <strong>of</strong> Database Administration 1.5<br />
3.2 System architecture 4.5<br />
3.3 DBMS architecture 3.0<br />
3.4 Data Dictionary 1.0<br />
3.5 Control Files 1.0<br />
3.6 Redo log files 1.0<br />
3.7 Basic Storage Concepts 4.5<br />
3.8 Database object creation 4.5<br />
3.9 Concurrency Control and Lock management 6.0<br />
3.10 Query processing 1.5<br />
3.11 User administration and security 3.0<br />
3.12 Managing Data with exports, imports, and loading 1.5<br />
3.13 Network services 1.5<br />
3.14 Performance monitoring and tuning 3.0<br />
3.15 Backup & recovery 3.0<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will be lecture, in-class demonstrations, and in-class<br />
exercises<br />
4.2 Student role in the course.<br />
The student will attend lectures and demonstration, participate in discussion on assigned<br />
readings, complete assigned projects, and complete required examinations<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
-284-
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Students will complete a sequence <strong>of</strong> assignments desired to provide hands-on exposure to<br />
the topics discussed in class, and take two examinations.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Component Grading<br />
Exams 35%<br />
Assignments 60%<br />
Participation 5%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
97-100% A+<br />
93-96% A<br />
90-92% A-<br />
87-89% B+<br />
83-86% B<br />
80-82% B-<br />
77-79% C+<br />
73-76% C<br />
70-72% C-<br />
67-69% D+<br />
63-66% D<br />
60-62% D-<br />
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
6.1.1 Watson, J. 2008. OCA Oracle Database 11g: Administration I Exam Guide. McGraw-Hill.<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 Greenwald, R., Stackowiak, R., and Stern, J. 2008. Oracle Essentials: Oracle Database 11g.<br />
Sebastopol, CA: O'Reilly Media, Inc.<br />
6.2.2 Powell, G., and McCullough-Dieter, C. 2007. Oracle 10g Database Administrator:<br />
Implementation & Administration. Boston, MA: Thomson Course Technology.<br />
6.2.3 Loney, K. and Bryla, B. Oracle Database 10g DBA Handbook, Oracle Press, 2005.<br />
6.2.4 Whalen, E. Oracle Database 10g Linux Administration, Oracle Press, 2005.<br />
-285-
6.3 Other sources <strong>of</strong> information.<br />
6.3.1 Oracle Technet: http://technet.oracle.com<br />
6.3.2 http://pipetalk.revealnet.com/~dba<br />
6.3.3 http://www.lazydba.com/<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
6.4.1 Bryla, Bob, and Kevin Loney. Oracle Database 11g Dba Handbook: The McGraw-Hill<br />
Companies, Inc., 2008.<br />
6.4.2 Fernandez, Iggy. Beginning Oracle Database 11g Administration: From Novice to<br />
Pr<strong>of</strong>essional: Apress, 2008.<br />
6.4.3 Afyouni, H.A. Database Security and Auditing: Protecting Data Integrity and Accessibility,<br />
Thomson Course Technology, Boston, MA, 2006.<br />
6.4.4 Morris-Murphy, L.L. Oracle9i Database Administrator II: Backup/Recovery & Network<br />
Administration, Thomson Course Technology, Boston, 2004.<br />
6.4.5 Oracle Security Handbook, by Marlene Theriault & Aaron Newman, Osborne/McGraw-<br />
Hill, 2001.<br />
6.4.6 Sharma, V. Bitmap Index vs. B-tree Index: Which and When?, Oracle Corp., 2005.<br />
http://www.oracle.com/technology/pub/articles/sharma_indexes.html, Current<br />
September 27, 2005.<br />
6.4.7 Morrison, J., Morrison, M. and Conrad, R. Guide to Oracle10g, Thomson Course<br />
Technology, Boston, 2006.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission Category Content (class time in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 27<br />
Networking and telecommunications<br />
Modern programming language<br />
Analysis and Design<br />
Data management 15<br />
Role <strong>of</strong> IS in Organizations<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least __0___ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically _____ pages and to make ___0__ oral presentations <strong>of</strong> typically _____<br />
minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as<br />
for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues:<br />
No coverage.<br />
-286-
10.0 Theoretical content:<br />
This course deals mostly with physical, not logical design, and includes a number <strong>of</strong> topics included in<br />
IS’97 Information Systems Theory and Practice:<br />
10.1 Implementation and evaluation <strong>of</strong> system performance 3<br />
10.2 Theory <strong>of</strong> concurrency control 4.5<br />
11.0 Problem analysis:<br />
Students learn to analyze the state <strong>of</strong> the database in three areas in particular: storage management,<br />
user administration, and performance management. In storage management, students learn to<br />
determine the placement <strong>of</strong> database objects within data files in order to be able to detect fragmentation<br />
<strong>of</strong> files and <strong>of</strong> database objects. In user administration, students learn to identify the privileges given to<br />
users to detect potential security issues. In performance management, students learn about key<br />
performance indicators and a process for isolating and resolving performance problems.<br />
12.0 Solution design:<br />
Students learn to make and implement a variety <strong>of</strong> physical design decisions, including: creation <strong>of</strong><br />
tablespaces and files <strong>of</strong> appropriate size with appropriate storage allocation patterns, determination <strong>of</strong><br />
block structure for tables and indexes, and creation <strong>of</strong> indexes. Students also learn to determine an<br />
appropriate basket <strong>of</strong> privileges for various types <strong>of</strong> users.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
5/21/02 Initial ABET version Wolcott<br />
6/25/03 ABET cleanup Wolcott<br />
10/3/07 Updated resource material<br />
Wolcott<br />
Minor updates to content & organization<br />
9/30/08 Update <strong>of</strong> the reading list & reference list Wolcott<br />
-287-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4300<br />
Course Title<br />
Database Administration<br />
Course Coordinator<br />
Peter Wolcott<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand the roles, issues, and tasks<br />
associated with the database<br />
administration function.<br />
Understand computer system and DBMS<br />
architecture and how the DBMS stores<br />
and maintains data, executes queries,<br />
and performs other data management<br />
tasks.<br />
Create a variety <strong>of</strong> database objects, such<br />
as tablespaces, indexes, and user objects.<br />
Plan and implement the physical<br />
organization <strong>of</strong> a database.<br />
Understand and use the system catalog in<br />
a variety <strong>of</strong> database administration<br />
tasks.<br />
Gather, interpret, and act on database<br />
statistics to monitor database activity and<br />
tune for performance.<br />
Plan and execute backup and recovery<br />
X<br />
X<br />
S<br />
S S S<br />
X<br />
S<br />
X<br />
-288-
activities.<br />
Secure the database and manage users.<br />
X<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-289-
-290-
ISQA 4380 Distributed Technologies and Systems<br />
Department and Course Number ISQA 4380<br />
Course Title<br />
Distributed Technologies and Systems<br />
Course Coordinator<br />
Peter Wolcott<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/09/2008<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
The course introduces students to concepts, issues and tools needed to develop distributed<br />
computing systems. Topics include distributed systems architecture, middleware, Internet-based<br />
systems development, security and performance. Hands-on systems development using current<br />
technologies is provided.<br />
1.2 For whom course is intended.<br />
This course is intended for upper division undergraduate MIS majors who wish to study topics<br />
pertaining to the client/server environment. It is the capstone course course for the I-Business<br />
Application Development & Management concentration.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 ISQA 3400 - Business Data Communications<br />
1.3.2 ISQA 3310 - Managing the Data Base Environment<br />
1.3.3 ISQA 3210 - Advanced Technology for Personal Productivity<br />
1.3.4 CSCI 2850 - Programming on the Internet or equivalent<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 OSI reference model<br />
1.4.2 TCP/IP<br />
1.4.3 HTTP<br />
1.4.4 HTML<br />
1.4.5 Database design<br />
1.4.6 SQL<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
1.1 Define the terms Distributed Computing System and Internet Technology;<br />
-291-
1.2 Understand the concept <strong>of</strong> Middleware and types <strong>of</strong> middleware s<strong>of</strong>tware;<br />
1.3 Identify distributed computing objects and how they work;<br />
1.4 Develop a modest size web application with access to a database;<br />
1.5 Integrate a web application to available open web services;<br />
1.6 Develop a web service and consume it in a web application;<br />
1.7 Understand the architecture <strong>of</strong> web based systems;<br />
1.8 Describe transaction processing and how it works on the Internet;<br />
1.9 Decribe how businesses integrate with other businesses using modern forms <strong>of</strong> B2B integration<br />
1.10 Describe how to implement a modest size web application.<br />
3.0 Content and Organization:<br />
Contact hours<br />
3.1 Overview <strong>of</strong> Client Server and the Internet 1.5<br />
3.2 Distributed System Fundamentals 1.5<br />
3.3 Introduction to Middleware 3.0<br />
3.4 Communications Middleware 3.0<br />
3.5 Database Middleware 3.0<br />
3.6 Web technologies and XML 6.0<br />
3.7 Distributed integration technologies and models 7.0<br />
3.7.1 COM/DCOM/.NET integration models<br />
3.7.2 Java Object and integration models<br />
3.7.3 Web Services<br />
3.7.4 REST/POX and Mashup Integration<br />
3.8 Service Oriented Architecture 5<br />
3.9 PHP 9.0<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will be in-class lectures sample integration problems done in<br />
groups and demonstrations.<br />
4.2 Student role in the course.<br />
Students will attend the class, participate in the in-class discussion, solve integration problems in<br />
class as a group and present results, complete exams, assignments, and projects<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
-292-
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Students will complete exams, assignments, and projects.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Components<br />
Grading<br />
Exams 40%<br />
Assignments 35%<br />
Project 22%<br />
Participation 3%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
97-100% A+<br />
93-96% A<br />
90-92% A-<br />
87-89% B+<br />
83-86% B<br />
80-82% B-<br />
77-79% C+<br />
73-76% C<br />
70-72% C-<br />
67-69% D+<br />
63-66% D<br />
60-62% D-<br />
6.3 Other sources <strong>of</strong> information.<br />
None<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
6.4.1 R. Gleghorn, Enterprise Application Integration: A Manager’s Perspective, IT Pr<strong>of</strong>essional.<br />
November, 2005, pp 17-23.<br />
6.4.2 F. Leyman, D. Roller and M.Schmidt, Web Services and Business Process Management.<br />
IBM Systems Journal. Vol 41, No 2, 2002. pp 198-211.<br />
6.4.3 D. Margulius, Banking on SOA. Infoworld, July 17th, 2006. Pages 27-31<br />
6.4.4 J. Kobielus, Enterprise Service Bus: Web Services Meet Message-Oriented Middleware.<br />
Business Communications Review. April, 2006. pp 30-36.<br />
6.4.5 K. Braskasan, Websphere Business Integration: An Architectural Overview. Vol 43, No 2,<br />
2005. pp 238-254.<br />
6.4.6 T. Prushman, R. Alt. Process Portals – Architecture and Integration. Proceeding <strong>of</strong> the 37th<br />
Hawaii International Conference onSystems Sciences – 2004. pp 1-10.<br />
6.4.7 Anton Fricko, SOAs Require Culture Change and Service Reuse. Business Communications<br />
Review. May 2006. pp 58-64.<br />
6.4.8 Newcomer, Eric and Lomow, Greg, “Understanding SOA and Web Services” 2007. ISBN: 0-<br />
321-18086-0.<br />
6.4.9 Margolis, Ben, “SOA for the Business Developer” 2007. ISBN: 1-58347-065-4.<br />
6.4.10 Juneja, Girish, et al, “Service Oriented Architecture Demystified” 2007. ISBN: 1-934053-<br />
02-3.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />
hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 12<br />
Networking and telecommunications 6<br />
Modern programming language 9<br />
Analysis and Design 3<br />
Data management 9<br />
Role <strong>of</strong> IS in Organizations<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least __1__ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically __4-5___ pages and to make ___1__ oral presentations (podcast) <strong>of</strong><br />
typically _10-12____ minutes duration. Include only material that is graded for grammar, spelling, style,<br />
and so forth, as well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues:<br />
-294-
No coverage.<br />
10.0 Theoretical content:<br />
10.1 Distributed Systems Fundamentals 3.0<br />
11.0 Problem analysis:<br />
Hours<br />
The course involves learning to use various middleware and web-development tools. The students are<br />
challenged to apply the tools and techniques to solve specified problems rather than analyze the problem<br />
itself.<br />
12.0 Solution design:<br />
The course will allow students the opportunity to learn some <strong>of</strong> the development tools available for<br />
distributed systems application development. Students will have the opportunity to gain hands-on<br />
experience with some <strong>of</strong> these tools.<br />
-295-
CHANGE HISTORY<br />
Date Change By whom Comments<br />
4/30/02 Updated course content section to<br />
deemphasize scripting and indicate switch<br />
to PHP as an implementation platform<br />
Wolcott<br />
ISQA 3210 covers the scripting<br />
portions well.<br />
10/28/02 ISQA 3210 added as a prerequisite Wolcott Students need to have had exposure<br />
to HTML and some scripting.<br />
10/28/02 Title changed from “Managing the<br />
Client/Server Environment” to “Distributed<br />
Technologies and Systems”<br />
Wolcott “Client/Server” is a somewhat<br />
outdated term. The new title is<br />
general enough to include both<br />
Internet and non-Internet<br />
5/15/03 CSCI 2850 added as a prerequisite. Course<br />
Catalog Management System change for<br />
5/15/03<br />
Wolcott<br />
6/25/03 ABET cleanup Wolcott<br />
7/10/03 ABET cleanup - Prerequisite course titles Wild<br />
added<br />
10/14/07 Updating to include objectives on web Royce<br />
services and service oriented concepts.<br />
Also updated content and organization and<br />
bibliography<br />
10/9/2008 Updated text and references Royce<br />
technologies<br />
CSCI 2850 gives students a start with<br />
PHP, which can be built upon in<br />
ISQA 4380<br />
-296-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4380<br />
Course Title<br />
Distributed Technologies and Systems<br />
Course Coordinator<br />
Peter Wolcott<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Define the terms Distributed Computing<br />
System and Internet Technology<br />
Understand the concept <strong>of</strong> Middleware<br />
and types <strong>of</strong> middleware s<strong>of</strong>tware<br />
Identify distributed computing objects<br />
and how they work<br />
Develop a modest size web application<br />
with access to a database<br />
Integrate a web application to available<br />
open web services<br />
Develop a web service and consume it in<br />
a web application<br />
Understand the architecture <strong>of</strong> web<br />
based systems<br />
Describe transaction processing and how<br />
it works on the Internet<br />
Decribe how businesses integrate with<br />
other businesses using modern forms <strong>of</strong><br />
B2B integration<br />
X<br />
S S X<br />
X X X<br />
S S S S<br />
S S S S<br />
S S S S<br />
X X X X<br />
X X<br />
X X X X<br />
-297-
Describe how to implement a modest size<br />
web application<br />
X<br />
X<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-298-
ISQA 4590 IT Audit and Control<br />
Department and Course Number ISQA 4590/ISQA 8596<br />
Course Title<br />
IT Audit and Control<br />
Course Coordinator<br />
Deepak Khazanchi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/1/2008<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course explores organizational and managerial issues relevant to planning and conducting IT<br />
audit and control activities. The course covers the following conceptual areas: business risks and<br />
the management <strong>of</strong> business risk, IT risk as a component <strong>of</strong> business risk, the need to manage IT<br />
risks, and the basic type <strong>of</strong> controls required in a business system in order to control IT risks.<br />
Issues associated with new risks created by the use <strong>of</strong> the internet for business applications and<br />
electronic business are also covered.<br />
1.2 For whom course is intended.<br />
The course is intended for graduate and undergraduate students (juniors and seniors) in<br />
Information Systems or Business Administration or related areas who have an interest in IT audit<br />
and control issues.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
A solid understanding <strong>of</strong> business foundations such as accounting and introductory auditing and<br />
exposure to the IS discipline is essential for success in this course. Permission <strong>of</strong> instructor is<br />
required to enroll.<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Basic Accounting<br />
1.4.2 Introduction to Auditing<br />
1.4.3 Information Security and Policy<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />
2.1 Understand the concept <strong>of</strong> business risks and the management <strong>of</strong> business risk<br />
-299-
2.2 Understand IT risk as a component <strong>of</strong> business risk<br />
2.3 Gain an appreciation <strong>of</strong> the need to manage IT risks<br />
2.4 Gain an understanding <strong>of</strong> the basic type <strong>of</strong> controls required in a business system in order to<br />
control IT risks<br />
2.5 Learn concepts and applications <strong>of</strong> the following types <strong>of</strong> IT controls: top management, system<br />
development, programming, data resource management, database, security, operations<br />
management, quality assurance, boundary controls, and communications.<br />
2.6 Gain an appreciation for the difficulties in assessing systems effectiveness and efficiency.<br />
2.7 Understand the new system control risks created by the use <strong>of</strong> the internet for business<br />
applications and electronic business.<br />
3.0 Content and Organization:<br />
List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> Contact Hours on each).<br />
Contact Hours<br />
3.1 Introduction 3<br />
3.2 Top Management Controls 3<br />
3.3 Systems Development Management Controls 3<br />
3.4 Programming Management Controls 3<br />
3.5 Data Resource Management Controls 3<br />
3.6 Security Management Controls 3<br />
3.7 Operations Management Controls 3<br />
3.8 Quality Assurance Management Controls 3<br />
3.9 Boundary Controls 3<br />
3.10 Communication Controls 3<br />
3.11 Database & ERP Controls 3<br />
3.12 Evaluating System Effectiveness & Efficiency 3<br />
3.13 Trust Services (AICPA/CICA/IIA Reports) 3<br />
3.14 B2B Assurance Framework (Khazanchi and Sutton) 3<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will include class discussion, case studies, lecture, guest speakers,<br />
and demonstration.<br />
4.2 Student role in the course.<br />
The student will attend lectures and demonstrations, participate in discussion on assigned<br />
readings, complete assigned projects and papers, and complete required examinations.<br />
4.3 Contact hours.<br />
3 hours<br />
-300-
5.0 Evaluation:<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Students will be evaluated on the following basis.<br />
Class participation: Students are expected to attend each and every class and be prepared to<br />
actively participate in the discussion. Much <strong>of</strong> the class will be conducted using an open<br />
discussion approach, and the success <strong>of</strong> the class will be dependent on students’ ability to identify<br />
and discuss relevant issues. Each student will choose a chapter from the text and lead the<br />
instruction <strong>of</strong> the rest <strong>of</strong> the class on that chapter. This includes a summary <strong>of</strong> key components <strong>of</strong><br />
the chapter, and facilitation <strong>of</strong> discussion <strong>of</strong> the chapter.<br />
Individual Case <strong>Study</strong>: Each student will complete three case studies which will involve reading a<br />
case study and preparing a 5-7 page evaluation <strong>of</strong> the case from the viewpoint <strong>of</strong> an IT Auditor. All<br />
cases will be graded for depth <strong>of</strong> analysis, originality, quality <strong>of</strong> writing, and pr<strong>of</strong>essional<br />
impression. Most questions will involve subjective issues for which multiple views can be<br />
defended. As in a pr<strong>of</strong>essional career, it is important to be both complete and concise.<br />
Group Case Presentation: Each person will be assigned to a learning group to complete a case<br />
study related to each topic. Students will choose one <strong>of</strong> the three required case studies and work<br />
in their team to provide a presentation to the class on that case. This 20-30 minute presentation<br />
should include a summary <strong>of</strong> the case, the challenge(s) facing the organization, and their<br />
interpretation and/or resolution <strong>of</strong> the challenges from an IT Audit perspective.<br />
Computer-aided Auditing Project (ACL Assignment): This project will provide students a chance<br />
to gain hands-on experience with computer assisted audit tools and techniques (CAATTS). The<br />
s<strong>of</strong>tware to be used in this assignment, ACL, comes with the textbook. Specifications for the<br />
project will be provided in class.<br />
Exams: There will be one comprehensive final examination.<br />
Current News Articles: Each class member will be responsible for summarizing and presenting<br />
two news articles during the course <strong>of</strong> the semester. These articles should relate in some fashion<br />
to risk and controls and should represent a current news event related to the subject to be<br />
covered in a given week. All students are required to participate on a regular basis in the<br />
discussion.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
The grade base for the course for undergraduate students will consist <strong>of</strong> the following:<br />
-301-
Available points<br />
Individual Case Studies (3) 45%<br />
Group Case <strong>Study</strong> 5%<br />
Comprehensive final exam 20%<br />
ACL project 15%<br />
Current news articles 5%<br />
Individual class participation 10%<br />
5.3 Grading scale and criteria.<br />
The grading scale is as follows:<br />
GRADE POINT VALUE<br />
A 92%
6.2.1 “To Caatch a Thief”. Paul R Brazina, Bruce A Leauby. Pennsylvania CPA Journal.<br />
Philadelphia: Spring 2004.Vol.75, Iss. 1; pg. 30, 4 pgs. To be referred to as ACL1 in<br />
syllabus.<br />
6.2.2 “Computer-assisted audit tools and techniques: analysis and perspectives.” Robert L<br />
Braun, Harold E Davis. Managerial Auditing Journal. Bradford: 2003.Vol.18, Iss. 9; pg.<br />
725, 7 pgs. Referred to as ACL2 in syllabus.<br />
6.2.3 “Trust Services Principles, Criteria and Illustrations for Security, Availability, Processing<br />
Integrity, Confidentiality, and Privacy (Including WebTrust® and SysTrust®)”. American<br />
Institute <strong>of</strong> Certified Public Accountants, Inc. and Canadian Institute <strong>of</strong> Chartered<br />
Accountants. Referred to as WebTrust in syllabus.<br />
6.2.4 “E-Commerce’s Impact on Audit Practices.” Michael D Harkness; Brian Patrick Green.<br />
Internal Auditing; Mar/Apr 2004; 19, 2; ABI/INFORM Global pg. 28. To be referred to as<br />
Harkness in syllabus.<br />
6.2.5 “The keys to effective IT auditing”. Mark Petterson. Journal <strong>of</strong> Corporate Accounting &<br />
Finance; Volume 16, Issue 5 , Pages 41 – 46. To be referred to as Petterson in syllabus.<br />
6.2.6 CobIT Generic Audit Guidelines & Process. To be provided by instructor on Blackboard. To<br />
be referred to as CobIT Guidelines & Process in syllabus.<br />
6.2.7 “Auditing in the E-Commerce Era.” Ning Zhao; David C Yen; I-Chiu Chang. Information<br />
Management & Computer Security; 2004; 12, 5; ABI/INFORM Global. pg. 389. To be<br />
referred to as Zhao in syllabus.<br />
6.2.8 “Risks, Benefits, and Challenges in Global IT Outsourcing: Perspectives and Practices.”<br />
Subhankar Dhar & Bindu Balakrishnan. Journal <strong>of</strong> Global Information Management, vol.<br />
14, issue 3. To be referred to as Dhar in syllabus.<br />
6.2.9 “Critical Risks in Outsourced IT Projects: The Intractable and the Unseen.” Hazel Taylor.<br />
Communications <strong>of</strong> the ACM; November 2006/Vol. 49, No. 11. To be referred to as Taylor<br />
in syllabus.<br />
6.2.10 “A Continuous View <strong>of</strong> Accounts” David Coderre. The Internal Auditor; Apr 2006; 63, 2;<br />
ABI/INFORM Global pg. 25. To be referred to as Coderre in syllabus.<br />
6.2.11 “Continuous Auditing: An Effective Tool For Internal Auditors.” J Donald Warren Jr; L<br />
Murphy Smith. Internal Auditing; Mar/Apr 2006; 21, 2; ABI/INFORM Global pg. 27. To be<br />
referred to as Warren in syllabus.<br />
Other references will be provided as needed. Students are also encouraged to bring related press articles<br />
to class for discussion.<br />
6.3 Other suggested reading materials, if any.<br />
6.3.1 Hollander, Denna, and Cherrington (1996). Accounting, IT and Business Solutions. Irwin.<br />
6.4 Other sources <strong>of</strong> information.<br />
6.4.1 AICPA/CICA/IIA web sites<br />
6.5 Current bibliography <strong>of</strong> resources for student’s information.<br />
6.5.1 Stoll, C. (1990). “The Cuckoo's Egg: Tracking a Spy through the Maze <strong>of</strong> Computer<br />
Espionage," New York, NY: Pocket Books.<br />
6.5.2 “Auditing Information Systems,” Jack Champlain, John Wiley & Sons, Inc., One Wiley<br />
Drive, Somerset, NJ 08875<br />
-303-
6.5.3 “An e-Risk Primer,” Xenia Ley Parker, CISA, CFSA, The Institute <strong>of</strong> Internal Auditors<br />
Research Foundation<br />
6.5.4 “Electronic Commerce, Control Issues for Securing Virtual Enterprises,” Albert J. Marcella,<br />
Jr., Ph.D., COAP, CSP, CQA, CFSA, CDP, CISA, Larry Stone, CISA, CCP; and William J.<br />
Sampias, CISA.<br />
6.5.5 “www.StopThief.net – Protecting Your Identity on the Web,” Albert J. Marcella Jr., Ph.D.,<br />
COAP, CSP, CQA, CDP, CFSA, CISA.<br />
7.0 (Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category<br />
Content (class time in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 5<br />
Networking and telecommunications 5<br />
Modern programming language<br />
Analysis and Design 5<br />
Data management<br />
Role <strong>of</strong> IS in Organizations 15 15<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least __5___ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically __5___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />
__30___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />
as well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues:<br />
Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />
sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />
on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />
We will cover the standards for IT audit and control established by pr<strong>of</strong>essional associations such as ISACA<br />
and AICPA. (Time: 6 hours).<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />
11.0 Problem analysis:<br />
Please describe the analysis experiences common to all course sections.<br />
12.0 Solution design:<br />
Please describe the design experiences common to all course sections.<br />
-304-
CHANGE HISTORY<br />
Date Change By whom Comments<br />
10/1/2008 Minor changes to description <strong>of</strong><br />
assignments, adjustments to readings<br />
list and required texts based on an<br />
implemented version <strong>of</strong> the original<br />
formal syllabus.<br />
Deepak<br />
Khazanchi<br />
-305-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4590<br />
Course Title<br />
IT Audit and Control<br />
Course Coordinator<br />
Deepak Khazanchi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand the concept <strong>of</strong> business risks<br />
and the management <strong>of</strong> business risk<br />
Understand IT risk as a component <strong>of</strong><br />
business risk<br />
Gain an appreciation <strong>of</strong> the need to<br />
manage IT risks<br />
Gain an understanding <strong>of</strong> the basic type<br />
<strong>of</strong> controls required in a business system<br />
in order to control IT risks<br />
Learn concepts and applications <strong>of</strong> the<br />
following types <strong>of</strong> IT controls: top<br />
management, system development,<br />
programming, data resource<br />
management, database, security,<br />
operations management, quality<br />
assurance, boundary controls, and<br />
communications.<br />
Gain an appreciation for the difficulties in<br />
assessing systems effectiveness and<br />
X<br />
S<br />
X X S<br />
X X X S<br />
X S S S<br />
X X X<br />
X X X X<br />
-306-
efficiency.<br />
Understand the new system control risks<br />
created by the use <strong>of</strong> the internet for<br />
business applications and electronic<br />
business.<br />
S<br />
X<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-307-
-308-
ISQA 4730 Decision Support Systems<br />
Department and Course Number ISQA 4730<br />
Course Title<br />
Decision Support Systems<br />
Course Coordinator<br />
Paul J.A. van Vliet<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/12/2008<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course examines a set <strong>of</strong> information systems which specifically support managerial<br />
decision makers: Decision Support Systems, Group Decision Support Systems, Executive<br />
Information Systems, Data Warehouses, Expert Systems, and Neural Networks. This<br />
course explores the development, implementation, and application <strong>of</strong> these systems,<br />
how these systems can be applied to current business problems, as well as how<br />
organizational issues impact the implementation and usage <strong>of</strong> these systems.<br />
1.2 For whom course is intended.<br />
This course is intended for upper division undergraduate MIS majors and graduate MIS<br />
majors who wish to understand a set <strong>of</strong> information systems which specifically support<br />
managerial decision.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 CIST 3100 or equivalent<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Working knowledge <strong>of</strong> business foundations.<br />
1.4.2 Working knowledge <strong>of</strong> computer information systems.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
2.1 Understand the nature <strong>of</strong> decision making and <strong>of</strong> decision makers, as well as the need for decision<br />
support.<br />
-309-
2.2 Investigate the application Decision Support Systems, Business Intelligence, Group Decision<br />
Support Systems, Executive Information Systems, Data Warehouses, Expert Systems, and Neural<br />
Networks to both common and unique organizational decision problems.<br />
2.3 Understand how organizational issues impact the implementation and usage <strong>of</strong> these systems.<br />
2.4 Apply course concepts in hands-on assignments with a strong real-world orientation.<br />
3.0 Content and Organization:<br />
Contact Hours<br />
3.1 Decision Support Systems and Business Intelligence 3.0<br />
3.2 Decision Making Systems, Modeling, and Support 3.0<br />
3.3 Modeling and Analysis 3.0<br />
3.4 Decision Support Systems Concepts, Methodologies and<br />
Technologies: An Overview 3.0<br />
3.5 System Development and Acquisition 3.0<br />
3.6 The Essentials <strong>of</strong> Business Intelligence 3.0<br />
3.7 Business Analytics and Data Visualization 3.0<br />
3.8 Data Warehousing 3.0<br />
3.9 Data, Text, and Web Mining 3.0<br />
3.10 Collaborative Computer-Supported Technologies and 3.0<br />
3.11 Group Support Systems<br />
3.12 Knowledge Management 3.0<br />
3.13 Business Performance Management 3.0<br />
3.14 Enterprise Systems 3.0<br />
3.15 Artificial Intelligence and Expert Systems 3.0<br />
3.16 Knowledge Acquisition, Representation and Reasoning 3.0<br />
3.17 Advanced Intelligent Systems 3.0<br />
3.18 Neural Networks for Data Mining 3.0<br />
3.19 Intelligent Systems over the Internet 3.0<br />
3.20 Integration, Impacts, and the Future <strong>of</strong> Management<br />
Support Systems 3.0<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The primary teaching methods will be lectures and the in-class discussion.<br />
4.2 Student role in the course.<br />
The student will attend lectures, participate in the discussion on assigned readings,<br />
complete the individual assignments and exams, and participate in a group project.<br />
4.3 Contact hours.<br />
Three (3) hours per week.<br />
-310-
5.0 Evaluation:<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
The student will participate in the discussion on assigned readings. The student will<br />
complete a set <strong>of</strong> individual assignments as well as two individual exams. Students – in<br />
groups <strong>of</strong> 2 or 3 - will participate in the completion <strong>of</strong> a group project. Undergraduate<br />
students will construct a small decision support system to solve an actual decision<br />
problem. Graduate students will research a decision support implementation project and<br />
write a formal research paper on this topic.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Component Grading<br />
Exams 33.3%<br />
Assignments 33.3%<br />
Team Project 33.3%<br />
5.3 Grading scale and criteria.<br />
Points<br />
Grade<br />
96% - 100% A+<br />
92% - 95% A<br />
89% - 91% A-<br />
86% - 88% B+<br />
82% - 85% B<br />
79% - 81% B-<br />
76% - 78% C+<br />
72% - 75% C<br />
69% - 71% C-<br />
66% - 68% D+<br />
62% - 65% D<br />
59% - 61% D-<br />
00% - 58% F<br />
6.0 Resource Material<br />
6.1 Textbooks and/or other required readings used in course.<br />
-311-
6.1.1 Turban, E., Aronson, J.E., Liang, T.P., & Sharda, R. (2007) Decision Support and<br />
Business Intelligence Systems, 8 th Edition, Upper Saddle River, NJ, Pearson-<br />
Prentice Hall.<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 On-line: Different Drummers by David Keirsey<br />
(http://keirsey.com/Drummers.html)<br />
6.2.2 On-line: Keirsey Temperament Sorter<br />
(http://www.advisorteam.com/user/ktsintro1.asp)<br />
6.2.3 On-line: Decision Making overview (http://cognet.mit.edu/MITECS/Entry/shafir3)<br />
6.2.4 On-line: Problem Solving and Decision Making: Consideration <strong>of</strong> Individual<br />
Differences Using the Myers-Briggs Type Indicator<br />
(http://teach.valdosta.edu/whuitt/files/prbsmbti.html)<br />
6.2.5 On-line: Decision Making and Problem Solving, by Herbert A. Simon and Associates<br />
(http://www.die<strong>of</strong>f.org/page163.htm)<br />
6.2.6 On-line: Data Warehousing Technology, a White Paper by Ken Orr<br />
6.2.7 On-line: Linear Programming thwarts the Soviet Blockage <strong>of</strong> Berlin<br />
(http://members.fortunecity.com/jonhays/linear.htm)<br />
6.2.8 On-line: A primer on Linear Programming<br />
6.2.9 On-line: "As We May Think", a pivotal article by Vannevar Bush. The basic ideas<br />
which underly Hypertext and the World Wide Web as foretold in 1945.<br />
(http://www.theatlantic.com/unbound/flashbks/computer/bushf.htm)<br />
6.2.10 On-line: An Atlas <strong>of</strong> Cyberspaces - fine examples <strong>of</strong> data visualization.<br />
(http://www.cybergeography.org/atlas/atlas.html)<br />
6.2.11 On-line: Computer-Supported Cooperative Work<br />
(http://pespmc1.vub.ac.be/CSCW.html)<br />
6.2.12 On-line: Group Think, an article on groupware by Anne Field<br />
(http://www.inc.com/incmagazine/article/0,,ART1995,00.html)<br />
6.2.13 On-line: CSCW & Groupware index<br />
(http://www.usabilityfirst.com/groupware/cscw.txl)<br />
6.2.14 On-line: CIO Magazine(http://64.28.79.79/resources/)<br />
6.2.15 On-line: Knowledge Roles: The CKO and Beyond<br />
(http://www.cio.com/archive/040196_davenport_content.html)<br />
6.2.16 On-line: The Value Chain (http://www.informationweek.com/700/00iuer4.htm)<br />
6.2.17 On-line: Feds ponder CKO role<br />
(http://www.fcw.com/fcw/articles/1999/FCW_062899_694.asp)<br />
6.2.18 On-line: The CKO -- vision, strategy, ambassadorial skills, and a certain je ne sais<br />
quoi ( http://www.ktic.com/topic6/13_CKO.HTM)<br />
6.2.19 On-line: PC AI - Expert Systems<br />
(http://www.pcai.com/web/ai_info/expert_systems.html)<br />
6.2.20 On-line: Legal Liability for Expert System S<strong>of</strong>tware<br />
(http://www.daiglehancock.com/Strict.liability.htm)<br />
-312-
6.2.21 On-line: AI Timeline<br />
(http://www2.kenyon.edu/depts/biology/slonc/bio3/AI/timeline/timeline.html)<br />
6.2.22 On-line: JESS - a Java-based Expert System Shell<br />
(http://herzberg.ca.sandia.gov/jess/)<br />
6.2.23 On-line: WebGrid: Knowledge Modeling and Inference through the World Wide<br />
Web (http://ksi.cpsc.ucalgary.ca/KAW/KAW96/gaines/KMD.html)<br />
6.2.24 On-line: A list <strong>of</strong> Knowledge Representation resources<br />
(http://www.cs.man.ac.uk/~franconi/kr.html)<br />
6.2.25 On-line: A Manager's Guide to Neural Networks<br />
(http://www.zsolutions.com/amanager.htm)<br />
6.2.26 On-line: A short Introduction to Neural Networks<br />
6.2.27 On-line: Travelling Salesman Problem Using Genetic Algorithms<br />
(http://www.lalena.com/ai/tsp/)<br />
6.2.28 On-line: Genetic Algorithm: Maze Solver - Java-based<br />
(http://home.online.no/~bergar/mazega.htm)<br />
6.2.29 On-line: "Intelligent Agents" Make a Comeback<br />
(http://abcnews.go.com/sections/tech/CNET/cnet_intagents991028.html)<br />
6.2.30 On-line: Agents at your service (http://www.infoworld.com/cgibin/displayStory.pl?/features/980216agents.htm)<br />
6.2.31 On-line: Organizational Learning and Memory<br />
(http://trochim.human.cornell.edu/gallery/cho/cho.htm)<br />
6.2.32 On-line: Electronic Privacy Information Center (http://www.epic.org/)<br />
6.2.33 On-line: What Company Spies Really Want<br />
(http://www.wired.com/news/infostructure/0,1377,32672,00.html)<br />
6.2.34 On-line: Why the future doesn't need us, by Bill Joy<br />
(http://www.wired.com/wired/archive/8.04/joy_pr.html)<br />
6.3 Other sources <strong>of</strong> information.<br />
Additional handouts may be used when deemed necessary by the instructor.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
None<br />
1.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />
in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 12<br />
Networking and telecommunications<br />
Modern programming language 3<br />
Analysis and Design 9<br />
Data management 9<br />
-313-
Role <strong>of</strong> IS in Organizations 9<br />
7.0 Oral and Written Communications:<br />
Every student is required to submit at least 3 written reports (not including exams, tests, quizzes,<br />
or commented programs) to typically 4-20 pages. Due to time-constraints students do not make<br />
presentations in class. Students’ oral and other pr<strong>of</strong>essional communication skills are an<br />
important aspect <strong>of</strong> the group projects in which the students participate.<br />
8.0 Social and Ethical Issues:<br />
The course explores the impact <strong>of</strong> Decision Support Systems and Management Support Systems<br />
on the decisions in the organization. Among other issues, this course explores the ethical issue<br />
<strong>of</strong> the use <strong>of</strong> artificial intelligence and computer-based reasoning in decisions which affect<br />
individuals.<br />
9.0 Theoretical content:<br />
Hours<br />
9.1 Decision Theory 3<br />
9.2 Quantitative Analysis, basic statistics, linear programming. 3<br />
9.3 Principles <strong>of</strong> artificial intelligence 3<br />
10.0 Problem analysis:<br />
Please describe the analysis experiences common to all course sections.<br />
Students will examine case problems for the application <strong>of</strong> decision support methods. Students<br />
will investigate a specific decision problem in a real-world organization for the purpose <strong>of</strong><br />
designing a computer-based solution.<br />
11.0 Solution design:<br />
Student will gain practical experience with several s<strong>of</strong>tware packages for decision support system<br />
and expert system development. Students will develop a small decision support system for<br />
application to a specific decision problem in a real-world organization.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
10/10/02 Initial ABET version Van Vliet<br />
6/25/03 ABET cleanup Wolcott<br />
9/13/2007 Updated syllabus contents; changed Van Vliet<br />
-314-
prerequisite from CIST 2110 to CIST<br />
3100 as this course was renumbered.<br />
10/12/2008 Instructor reorganized course content<br />
for improved presentation to students;<br />
this reorganization is reflected in<br />
section 3.0<br />
10/12/2008 Updated section 8.0 to reflect current<br />
course more accurately<br />
Van Vliet<br />
Van Vliet<br />
-315-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4730<br />
Course Title<br />
Decision Support Systems<br />
Course Coordinator<br />
Paul J.A. van Vliet<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/12/08<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand the nature <strong>of</strong> decision<br />
making and <strong>of</strong> decision makers, as well as<br />
the need for decision support.<br />
Investigate the application Decision<br />
Support Systems, Business Intelligence,<br />
Group Decision Support Systems,<br />
Executive Information Systems, Data<br />
Warehouses, Expert Systems, and Neural<br />
Networks to both common and unique<br />
organizational decision problems.<br />
Understand how organizational issues<br />
impact the implementation and usage <strong>of</strong><br />
these systems<br />
Apply course concepts in hands-on<br />
assignments with a strong real-world<br />
orientation.<br />
S X S<br />
S<br />
X<br />
S<br />
X<br />
X S S X X<br />
<strong>BIS</strong> Program Outcomes (2009)<br />
-316-
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-317-
-318-
ISQA 4880 Systems Simulation and Modeling<br />
Department and Course Number ISQA 4880<br />
Course Title<br />
System Simulation and Modeling<br />
Course Coordinator<br />
Yong Shi and Lotfollah Najjar<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/09/07<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
Simulation modeling <strong>of</strong> manufacturing and service operations through the use <strong>of</strong> computer<br />
s<strong>of</strong>tware for operational analysis and decision making. This course is designed to provide the<br />
future engineers with an understanding <strong>of</strong> the analytical models <strong>of</strong> simulation. The underlying<br />
assumptions <strong>of</strong> these models are emphasized in order to critically ascertain their limitations and<br />
applicability. How models behave in practice under variety <strong>of</strong> manufacturing and service<br />
environments will also be examined.<br />
1.2 For whom course is intended.<br />
This course is intended for upper division undergraduate MIS majors who wish to understand the<br />
analytical models <strong>of</strong> simulation. It is one <strong>of</strong> elective courses for undergraduates who wish to<br />
pursue Knowledge Engineering and Decision Support Track<br />
1.3 Prerequisites <strong>of</strong> the course (Courses)<br />
1.3.1 CIST 1400<br />
1.3.2 ISQA 3400<br />
1.3.3 CIST 2500 or equivalent<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 Basic computer programming<br />
1.4.2 Basic applied statistics for IS&T<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
2.1 Recognize situations where simulation can be used as a an analysis tool<br />
2.2 Answer questions by simulation analysis<br />
2.3 Analyze, design and develop appropriate and effective simulation models<br />
2.4 Design, develop and run efficient simulation experiments<br />
-319-
2.5 Evaluate and draw conclusions from a simulation output<br />
2.6 Formulate constructive opinions, and present the results in a practical manner<br />
2.7 Present the results clearly.<br />
3.0 Content and Organization:<br />
-320-<br />
Contact Hours<br />
3.1 Introduction to Locations, Entities, Arrivals, Processing,<br />
Output Editor, and Menus 3<br />
3.2 What is Simulation? 3<br />
3.3 Why Simulation? 6<br />
3.4 How Does Simulation Work? 6<br />
3.5 An Introduction to Promodel 3<br />
3.6 The Simulation Project 3<br />
3.7 Understanding Probability Distributions 3<br />
3.8 Finding the Right Distribution 3<br />
3.9 Extracting Values From Probability Distributions 3<br />
3.10 Output Analysis 3<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The teaching methods include lectures, discussions, and actual cases.<br />
4.2 Student role in the course.<br />
Students will attend the lectures, participate in in-class discussions, complete exams and projects.<br />
4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />
distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />
the number <strong>of</strong> weeks spent on each project).<br />
Students will complete two regular take-home exams, class projects and reports.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />
distinction between undergraduate and graduate, if applicable.<br />
Component<br />
Grading<br />
Exams 25.0%<br />
Class Projects 37.5%
Class Participation 12.5%<br />
Class Project Report 25.0%<br />
5.3 Grading scale and criteria<br />
Points Grade<br />
98 – 100% A+<br />
90 – 97% A<br />
87 – 89% A-<br />
84 – 86% B+<br />
80 – 83% B<br />
77 – 79% B-<br />
74 – 76% C+<br />
70 – 73% C<br />
67 – 69% C-<br />
64 – 66% D+<br />
60 – 63% D<br />
57 – 59% D-<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language<br />
Analysis and Design 36<br />
Data management<br />
Role <strong>of</strong> IS in Organizations<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least ___1_ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically __10___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />
__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />
as well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues:<br />
No coverage<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />
Hours<br />
10.1 Simulation principles 15<br />
10.2 Probability Distributions 3<br />
11.0 Problem analysis:<br />
Students learn and understand simulation modeling <strong>of</strong> manufacturing and service operations through the<br />
use <strong>of</strong> computer s<strong>of</strong>tware for operational analysis and decision making. Student also examine the<br />
assumptions underlying these analytical models and how models behave in practice under a variety <strong>of</strong><br />
manufacturing and service environments.<br />
12.0 Solution design:<br />
Please describe the design experiences common to all course sections.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
Spring 2002 Initial ABET version Ghahramani<br />
6/25/03 ABET cleanup Wolcott<br />
10/9/07 Update <strong>of</strong> resource material and course<br />
coordinator<br />
Shi<br />
-322-
-323-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4880<br />
Course Title<br />
System Simulation and Modeling<br />
Course Coordinator<br />
Yong Shi and Lotfollah Najjar<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Recognize situations where simulation<br />
S X<br />
can be used as a an analysis tool<br />
Answer questions by simulation analysis S X<br />
Analyze, design and develop appropriate<br />
S<br />
S<br />
and effective simulation models<br />
Design, develop and run efficient<br />
S X S<br />
simulation experiments<br />
Evaluate and draw conclusions from a<br />
X<br />
X<br />
simulation output<br />
Formulate constructive opinions, and<br />
S<br />
present the results in a practical manner<br />
Present the results clearly.<br />
S<br />
-324-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-325-
-326-
ISQA 4890 Data Warehousing and Data Mining<br />
Department and Course Number ISQA/CSCI 4890<br />
Course Title<br />
Data Warehousing and Data Mining<br />
Course Coordinator<br />
Yong Shi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/02/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course provides students theoretical issues as well as practical methods for designing<br />
and constructing data warehouse and implementing data mining. After covering the<br />
essential concepts, issues, techniques to build an effective data warehouse, this course<br />
emphasizes the various techniques <strong>of</strong> data mining, such as association, classification,<br />
clustering and prediction for on-line analyses within the framework <strong>of</strong> data warehouse<br />
architectures. This course also promotes students to conduct a real-life data analyzing<br />
project.<br />
1.2 For whom course is intended.<br />
This course is intended for undergraduate management information systems (MIS) and<br />
computer science (CS) majors who choose Data Mining and Business Intelligence<br />
concentration. It is also recommended to a senior undergraduate level in MIS or CS.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses)<br />
1.3.1 ISQA 3310 or CSCI 4850<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 The conceptual and practical foundation to database management systems<br />
1.4.2 Relational Database Systems<br />
1.4.3 The hierarchical models<br />
1.4.4 The network models<br />
1.4.5 Basic SQL<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
-327-
2.0 Objectives:<br />
2.1 Understand the fundamental principles <strong>of</strong> data warehousing and data mining<br />
2.2 Describe the difference between transactional databases and data warehouses<br />
2.3 Describe the relationship between OLAP and Data Warehousing<br />
2.4 Use SQL to manage data in data warehousing and data mining<br />
2.5 Build a data mart<br />
2.6 Design and implement a data warehouse<br />
2.7 Carry out data integration and transformation<br />
2.8 Use and create simple data mining algorithms<br />
2.9 Apply some commercial tools to conduct data mining<br />
2.10 Interpret <strong>of</strong> data mining results<br />
3.0 Content and Organization:<br />
3.1 Introduction to Data Warehousing and Data Mining 3<br />
3.2 Data Warehouse and OLAP 3<br />
3.3 Data Preprocessing 3<br />
3.4 Data Mining Basis 3<br />
3.5 Data Characterization and Comparison 4<br />
3.6 Mining Association Rules 4<br />
3.7 Classification and Prediction 6<br />
3.8 Cluster Analysis 4<br />
3.9 Integrated Methods <strong>of</strong> Data Mining 3<br />
3.10 Advances <strong>of</strong> Data Warehousing and Data Mining 3<br />
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
Hours<br />
The basic teaching method will be lectures, discussion, real-life cases, guest speakers. The<br />
existing s<strong>of</strong>tware from the literature or produced by the instructor and commercial products<br />
will be used in the class.<br />
4.2 Student role in the course<br />
The students will attend lectures, participate in discussion in the class, complete<br />
assignments and projects, and complete all exams. The projects can be either individual<br />
or group work depending on the situation <strong>of</strong> each class.<br />
4.3 Contact hours.<br />
Three (3) hours per week.<br />
-328-
5.0 Evaluation:<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
The student products will be the assignments, group discussion, projects, examinations,<br />
and project presentations.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Components Grading<br />
Participation 5%<br />
Homework 10%<br />
Projects 35%<br />
Exams 50%<br />
5.3 Grading scale and criteria.<br />
Points Grade<br />
98-100 A+<br />
95-97 A<br />
90-94 A-<br />
88-89 B+<br />
85-87 B<br />
80-84 B-<br />
78-79 C+<br />
75-77 C<br />
70-74 C-<br />
68-69 D+<br />
65-67 D<br />
60-64 D-<br />
6.1.1 David Olson and Yong Shi, Introduction to Business Data Mining, McGraw-Hill,<br />
2007.<br />
6.1.2 J. Han and M. Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann,<br />
2001.<br />
6.2 Other suggested reading materials, if any.<br />
6.2.1 Agrawal, R., Imielinski, T. and Swami, A. (1993) ‘Data mining: A performance<br />
perspective’, IEEE Transactions on Knowledge and Data Engineering, Vol. 5, 914-<br />
925.<br />
6.2.2 Bajgier, S. M. and Hill, A. V. (1982) ‘An experimental comparison <strong>of</strong> statistical and<br />
linear programming approaches to the discriminant problems’, Decision Sciences,<br />
Vol.13, 604-618.<br />
6.2.3 Breiman, L., Friedman, J., Olshen, R. and Stone, C. (1984), Classification and<br />
Regression Trees, Wadswroth, Belmont.<br />
6.2.4 Carpenter, G.A., Grossberg, S., Reynolds, J.H., Markuzon, N., and Rosen, D.B.<br />
(1992) ‘Fuzzy ARTMAP: A Neural Network Architecture for Incremental<br />
Supervised Learning <strong>of</strong> Analog Multidimensional Maps’, IEEE Transactions on<br />
Neural Networks, 3, 698-713.<br />
6.2.5 Carpenter, G.A., Grossberg, S., and Rosen, D.B. (1991) ‘Fuzzy ART: Fast stable<br />
learning and categorization <strong>of</strong> analog patterns by an adaptive resonance system’,<br />
Neural Networks, 4, 759-771.<br />
6.2.6 Chen, M., Han, J. and Yu, P. (1996) ‘Data mining: An overview from a database<br />
perspective’, IEEE Transactions on Knowledge and Data Engineering, Vol. 8, 866-<br />
883.<br />
6.2.7 Freed, N. and Glover, F. (1981) ‘Simple but powerful goal programming models for<br />
discriminant problems’, European Journal <strong>of</strong> Operational Research, Vol. 7, 44-60.<br />
6.2.8 Freed, N. and Glover, F. (1986) ‘Evaluating alternative linear programming models<br />
to solve the two-group discriminant problem’, Decision Science, Vol. 17, 151-162.<br />
6.2.9 Glover, F. (1990) ‘Improve linear programming models for discriminant analysis’,<br />
Decision Sciences, Vol. 21, 771-785.<br />
6.2.10 Guo, H. and Gelfand, S.B. (1992) ‘Classification trees with neural network feature<br />
extraction’, IEEE Transactions on Neural Netwroks, Vol. 3, 923-933.<br />
6.2.11 Jang, J.-S. R., Sun, C.-T. and Mizutani, E. (1997), Neuro-Fuzzy and S<strong>of</strong>t Computing,<br />
Prentice Hall, Upper Saddle River, New Jersey.<br />
6.2.12 Joachimsthaler, E.A. and Stam, A. (1988) ‘Four approaches to the classification<br />
problem in discriminant analysis: An experimental study’, Decision Sciences,<br />
Vol.19, 322-333.<br />
6.2.13 Koehler, G. J. and Erenguc, S. S. (1990) ‘Minimizing misclassifications in linear<br />
discriminant analysis’, Decision Science, Vol. 21, 63-85.<br />
6.2.14 Kosko, B. (1992), Neural Networks And Fuzzy Systems: A Dynamical Systems<br />
Approach To Machine Intelligence, Prentice Hall, Englewood Cliffs, New Jersey.<br />
-330-
6.2.15 Markowski, E. P. and Markowski, C. A. (1985) ‘Some difficulties and improvements<br />
in applying linear programming formulations to the discriminant problem’,<br />
Decision Science, Vol. 16, 237-247.<br />
6.2.16 Pass, S. (1997) ‘Discovering in a value mountain <strong>of</strong> data’, ORMS Today, October,<br />
24-28.<br />
6.2.17 Quinlan, J. (1986) ‘Induction <strong>of</strong> decision trees’, Machine Learning, Vol. 1, 81-106.<br />
6.2.18 Rymon, R. (1993), Search through systematic set enumeration, Proceedings <strong>of</strong> the<br />
third international conference on principle <strong>of</strong> knowledge representation and<br />
reasoning. Cambridge, MA, 539-550.<br />
6.2.19 Shi, Y, Peng, Y., Xu, X and Tang, X. (2002) ‘Data mining via multiple criteria linear<br />
programming: Applications in credit card portfolio management’, International<br />
Journal <strong>of</strong> Information Technology and Decision Making, Vol. 1, 145-166.<br />
6.2.20 Shi, Y., Wise, M., Luo, M. and Lin, Y. (2001) ‘Data mining in credit card portfolio<br />
management: a multiple criteria decision making approach’, in M. Koksalan and S.<br />
Zionts, eds., Multiple Criteria Decision Making in the New Millennium, Springer,<br />
Berlin, 427-436.<br />
6.2.21 Shi, Y. (1999) ‘Data Mining’, in IEBM Handbook <strong>of</strong> Information Technology in<br />
Business, Edited by M. Zeleny, International Thomson Publishing Europe.<br />
6.3 Other sources <strong>of</strong> information.<br />
6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />
in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language 3<br />
Analysis and Design<br />
Data management 36<br />
Role <strong>of</strong> IS in Organizations 3<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least ___9__ written reports (not including exams, tests,<br />
quizzes, or commented programs) to typically ___5__ pages and to make __1___ oral<br />
presentations <strong>of</strong> typically __10___ minutes duration. Include only material that is graded for<br />
grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />
accuracy.<br />
9.0 Social and Ethical Issues:<br />
-331-
No coverage<br />
10.0 Theoretical content:<br />
Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />
coverage.<br />
This course provides students theoretical issues for designing and constructing data warehouse<br />
and implementing data mining.<br />
Hours<br />
10.1 The fundamental principles <strong>of</strong> Data Warehousing and Data Mining 5<br />
11.0 Problem analysis:<br />
Students learn theoretical and practical methods to design and construct data warehouse and<br />
implementing data mining. After covering the essential concepts, issues, techniques to build an<br />
effective data warehouse, this course emphasizes the various techniques <strong>of</strong> data mining, such as<br />
association, classification, clustering and prediction for on-line analyses within the framework <strong>of</strong><br />
a data warehouse architectures. This course also promotes students to conduct a real-life data<br />
analyzing project.<br />
12.0 Solution design:<br />
Please describe the design experiences common to all course sections.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
10/7/03 Initial ABET version Shi<br />
6/25/03 ABET cleanup Wolcott<br />
10/09/07 Update <strong>of</strong> resource material Shi<br />
10/2/08 Review completed Shi<br />
-332-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4890/ CSCI 4890<br />
Course Title<br />
Data Warehousing and Data Mining<br />
Course Coordinator<br />
Yong Shi<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand the fundamental principles <strong>of</strong> X<br />
data warehousing and data mining<br />
Describe the difference between<br />
X<br />
transactional databases and data<br />
warehouses<br />
Describe the relationship between OLAP<br />
and Data Warehousing<br />
Use SQL to manage data in data<br />
X<br />
X<br />
warehousing and data mining<br />
Build a data mart<br />
S<br />
Design and implement a data warehouse X S<br />
Carry out data integration and<br />
X<br />
transformation<br />
Use and create simple data mining<br />
X<br />
algorithms<br />
Apply some commercial tools to conduct<br />
X<br />
data mining<br />
Interpret <strong>of</strong> data mining results X X<br />
-333-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-334-
ISQA 4900 Internet Systems Development<br />
Department and Course Number ISQA-4900/CSCI-4900<br />
Course Title<br />
Internet Systems Development<br />
Course Coordinator<br />
Matt Payne<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/13/08<br />
1.0 Course Description:<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />
This course focuses on contemporary techniques and technologies in the design,<br />
development, and integration <strong>of</strong> web-enabled information systems. Topics include:<br />
Multi-tiered systems architecture; rapid application development; object-oriented<br />
analysis and design; prototyping; testing, verification, and validation; lifecycle models;<br />
and component-based development. This is a rapidly moving, hands-on course that<br />
mirrors real-world development.<br />
1.2 For whom course is intended.<br />
Students pursing either a <strong>BIS</strong> or BCS degree with the Internet Technologies (iT)<br />
concentration who have achieved junior or senior standing.<br />
1.3 Prerequisites <strong>of</strong> the course (Courses).<br />
1.3.1 CSCI 2850 Programming on the Internet<br />
1.3.2 CSCI 2830 Java I<br />
1.3.3 Completion <strong>of</strong> two additional courses within the iT concentration<br />
1.4 Prerequisites <strong>of</strong> the course (Topics).<br />
1.4.1 The equivalent <strong>of</strong> one semester’s exposure to Java programming<br />
1.4.2 Introductory experience creating simple web-based applications using server-side<br />
technologies such as PHP, CGI, ASP, or Cold Fusion<br />
1.4.3 General understanding <strong>of</strong> networking concepts such as OSI reference model and<br />
TCP/IP.<br />
1.5 Unusual circumstances <strong>of</strong> the course.<br />
None<br />
2.0 Objectives:<br />
-335-
2.1 Manage change in the context <strong>of</strong> distributed systems development & maintenance;<br />
2.2 Define appropriate architectures for distributed applications systems and the<br />
infrastructure supporting them;<br />
2.3 Apply appropriate methodologies for distributed systems development;<br />
2.4 Conduct analysis, design, and implementation using an object-oriented paradigm; and<br />
2.5 Create Internet-based, distributed systems.<br />
3.0 Content and Organization:<br />
Contact hours<br />
3.1 Introduction 6<br />
3.1.1 Introduction : Speed, change, and integration:<br />
the impact <strong>of</strong> current trends on systems development.<br />
3.1.2 Technical Architectures<br />
3.1.3 Multi-tiered Architecture<br />
3.1.4 Client-server systems<br />
3.1.5 Internet-based architecture<br />
3.1.6 Object-based architecture<br />
3.2 Middleware 9<br />
3.2.1 Distributed Services<br />
3.2.2 Integration<br />
3.2.3 Web services<br />
3.3 Methodology 9<br />
3.3.1 Extreme Programming<br />
3.3.2 Other agile methodologies<br />
3.4 Object-oriented technologies 6<br />
3.4.1 Analysis<br />
3.4.2 Design<br />
3.4.3 Unified Modeling Language<br />
3.4.4 Use cases<br />
3.5 Modern Enabling Technologies 14<br />
3.5.1 Java<br />
3.5.2 J2EE<br />
3.5.3 Web Services & Service Oriented Architectures<br />
3.5.4 Wireless<br />
3.5.5 Component Models & Components<br />
3.5.6 Application Servers<br />
-336-
4.0 Teaching Methodology:<br />
4.1 Methods to be used.<br />
The course will employ a variety <strong>of</strong> teaching methods including lectures and hands-on<br />
guided projects. Assignments will include a combination <strong>of</strong> individual and group<br />
components. The course may be team taught by two or more pr<strong>of</strong>essors.<br />
4.2 Student role in the course.<br />
The student will attend lectures, participate in discussions, complete programming<br />
assignments, evaluate a web programming framework (e.g. struts, spring, etc) and<br />
complete both individual and group elements <strong>of</strong> a semester project.<br />
4.3 4.3 Contact hours.<br />
5.0 Evaluation:<br />
Three (3) hours per week.<br />
5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />
specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />
projects, specify the number <strong>of</strong> weeks spent on each project).<br />
Students will work on a capstone systems development project throughout the semester.<br />
The project will be broken down into a number <strong>of</strong> modules that reflect the topics covered<br />
in the course, but will also draw on material learned in the prerequisite courses.<br />
5.2 Basis for determining the final grade (Course requirements and grading standards)<br />
specifying distinction between undergraduate and graduate, if applicable.<br />
Component Grading<br />
Exams 20%<br />
Homework 30%<br />
Final Exam 20%<br />
Project 30%<br />
5.3 Grading scale and criteria.<br />
-337-
Points Grade<br />
97-100% A+<br />
92-96% A<br />
89-91% A-<br />
86-88% B+<br />
82-85% B<br />
79-81% B-<br />
76-78% C+<br />
72-75% C<br />
69-71% C-<br />
66-68% D+<br />
62-65% D<br />
59-61% D-<br />
Affect Engineering Practice?” Internet Computing, IEEE, Piscataway: NJ. Vol. 1, No.<br />
1; January-February, pp. 30-38.<br />
6.4.4 Britton, C. (2001) “IT Architectures and Middleware: Strategies for Building Large,<br />
Integrated Systems,” Addison-Wesley, Upper Saddle River: NJ<br />
6.4.5 Christensen, M.J. and Thayer, R.H. (2002) The Project Manager's Guide to<br />
S<strong>of</strong>tware Engineering's Best Practices, IEEE, Piscataway: NJ.<br />
6.4.6 Cusumano, M. and Y<strong>of</strong>fie. D. (1998) Competing on Internet Time: Lessons from<br />
Netscape and Its Battle with Micros<strong>of</strong>t. Free Press/Simon & Schuster, New York.<br />
6.4.7 Cusumano, M. and Y<strong>of</strong>fie. D. (1999) “S<strong>of</strong>tware Development on Internet Time,”<br />
Internet Computing, IEEE, Piscataway: NJ. Vol. 32, No. 10; OCTOBER 1999, pp. 60-<br />
69<br />
6.4.8 Goldmann S. & Kötting, B. (July-August 1999) “Collaborative Work S<strong>of</strong>tware<br />
Engineering over the Internet” Internet Computing, IEEE, Piscataway: NJ. Vol. 3,<br />
No. 4; pp. 93-94.<br />
6.4.9 Guide to the S<strong>of</strong>tware Engineering Body <strong>of</strong> Knowledge SWEBOK (December 2001),<br />
Executive Editors: Alain Abran and James W. Moore, Editors: Pierre Bourque and<br />
Robert Dupuis. IEEE, Piscataway: NJ.<br />
6.4.10 Harmon, P, Rosen M, & Guttman, M. (2001) “Developing E-Business Systems and<br />
Architectures,” Morgan Kaufmann, San Francisco: CA.<br />
6.4.11 Ince, D. (2002), “Developing Distributed and E-Commerce Applications,” Addison-<br />
Wesley, Upper Saddle River: NJ.<br />
6.4.12 “Internet Watch: The Network Maturity Model for Internet Development<br />
Network Maturity Model Development Team,” (October 1999) Ed. Ron Vetter,<br />
Computer , IEEE, Piscataway: NJ Vol. 32, No. 10; pp. 117-118.<br />
6.4.13 Knoernschild, K. (2002). Java Design: Objects, UML, & Process. Addison Wesley.<br />
6.4.14 Linthicum, D. (2000), “Enterprise Application Integration,” Addison Wesley, Upper<br />
Saddle River: NJ.<br />
6.4.15 Matena, V & Stearns, B (2001) “Applying Enterprise JavaBeans(TM): Component-<br />
Based Development for the J2EE(TM) Platform,” Sun Microsystems.<br />
6.4.16 Szyperski, C (1999) “Component S<strong>of</strong>tware: Beyond Object-Oriented<br />
Programming,” Addison-Wesley, Harlow: England.<br />
6.4.17 Wampler, B.E. (2002). The essence <strong>of</strong> object-oriented programming with Java and<br />
UML. Addison-Wesley.<br />
6.4.18 Läufer, Konstantin“A Hike through Post-EJB J2EE Web Application Architecture”<br />
Computing in Science & Engineering Sept/Oct 2005. On 10/13/08 online at<br />
http://tinyurl.com/5xyo6y (which redirects to computer.org)<br />
7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />
in hours):<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware 14<br />
Networking and telecommunications<br />
Modern programming language 6<br />
-339-
Analysis and Design 6<br />
Data management<br />
Role <strong>of</strong> IS in Organizations<br />
8.0 Oral and Written Communications:<br />
Every student is required to submit at least __1___ written reports (not including exams, tests,<br />
quizzes, or commented programs) to typically _____ pages and to make __1___ oral<br />
presentations <strong>of</strong> typically __15___ minutes duration. Include only material that is graded for<br />
grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />
accuracy.<br />
9.0 Social and Ethical Issues:<br />
No coverage.<br />
10.0 Theoretical content:<br />
Concepts <strong>of</strong> applications and infrastructure architecture, including physical and logical<br />
architecture, and component-based construction <strong>of</strong> s<strong>of</strong>tware systems (6 hours)<br />
11.0 Problem analysis:<br />
Students will learn to conduct analysis using an object-oriented paradigm.<br />
12.0 Solution design:<br />
Students will learn contemporary techniques and technologies in the design, development, and<br />
integration <strong>of</strong> web-enabled information systems. Specifically, students will learn to define<br />
appropriate architectures for distributed applications systems and the infrastructure supporting<br />
them, conduct design, and implementation using an object-oriented paradigm; and they will<br />
create Internet-based, distributed systems.<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
4/30/2003 In the methodologies unit, replace<br />
JAD, RAD, prototyping, and system<br />
life-cycle with agile methodologies,<br />
particularly extreme programming.<br />
Wolcott JAD, RAD, prototyping, and<br />
system life-cycle are covered<br />
adequately in ISQA 4110 and<br />
ISQA 4120.<br />
6/25/03 ABET clean-up Wolcott<br />
10/13/08 Added homework, presentation, and Matt<br />
textbook. Replaced ORBs with SOA. Payne<br />
-340-<br />
Currently, web services and<br />
SOA are more common than<br />
ORBs in the field.
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA-4900/CSCI-4900<br />
Course Title<br />
Internet Systems Development<br />
Course Coordinator<br />
Matt Payne<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Manage change in the context <strong>of</strong><br />
distributed systems development &<br />
maintenance;<br />
Define appropriate architectures for<br />
distributed applications systems and the<br />
infrastructure supporting them;<br />
Apply appropriate methodologies for<br />
distributed systems development;<br />
Conduct analysis, design, and<br />
implementation using an object-oriented<br />
paradigm; and<br />
Create Internet-based, distributed<br />
systems.<br />
X<br />
X<br />
S<br />
S<br />
S<br />
S<br />
S<br />
S<br />
-341-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-342-
ISQA 4910 Introduction to Project Management<br />
Department and Course Number ISQA 4910<br />
Course Title<br />
Introduction to Project Management<br />
Course Coordinator<br />
Donna Dufner<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 10/13/08<br />
1.0 Course Description<br />
1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course<br />
This course will cover the basics <strong>of</strong> project planning, scheduling and control. Earned value<br />
management techniques and project quality will be covered. Risk management will also be<br />
covered. The student will be introduced to the IEEE Standards for Project Management. The<br />
purpose <strong>of</strong> the course is to provide students with an introduction to the tools and techniques<br />
used to manage projects to achieve successful completion. The project management methods<br />
taught are suitable for a wide variety <strong>of</strong> project types such as s<strong>of</strong>tware development or<br />
engineering projects (e.g. construction).<br />
1.2 For whom course is intended<br />
The course is intended for undergraduate students in the schools <strong>of</strong> IS&T, Business Administration<br />
and Engineering who need to learn the fundamentals <strong>of</strong> project management.<br />
1.3 Prerequisites <strong>of</strong> the course<br />
1.3.1 CIST 2500 Introduction to Applied Statistics for IS&T<br />
1.3.2 CIST 2110 Organizations, Applications, and Technology<br />
1.3.3 Or equivalent<br />
1.4 Unusual circumstances <strong>of</strong> the course<br />
2.0 Objectives<br />
None<br />
2.1 Understand the fundamentals <strong>of</strong> project planning, project scheduling, and project control,<br />
2.2 Understand earned value project management,<br />
2.3 Understand quality issues for project management,<br />
2.4 Understand the fundamentals <strong>of</strong> the management <strong>of</strong> risk<br />
2.5 Apply the fundamentals earned value project management tools and techniques,<br />
-343-
2.6 Create Work break down structures,<br />
2.7 Manage projects using the Critical Path Methodology,<br />
2.8 Manage projects using the Cost performance index (CPI) as a performance and forecasting metric,<br />
2.9 Manage projects using the Schedule performance index (SPI) as a performance and forecasting<br />
metric, and<br />
2.10 Calculate and evaluate the actual performance against baseline metrics for project management<br />
and control.<br />
3.0 Content and Organization<br />
List <strong>of</strong> topics to be covered in chronological sequence<br />
Contact Hours<br />
3.1 Fundamentals <strong>of</strong> project planning, scheduling and control<br />
3.1.1 Introduction to Project Management 2<br />
3.1.2 The role <strong>of</strong> the project manager 2<br />
3.1.3 Project Definition 1.5<br />
3.1.4 Project Planning 3<br />
3.1.5 Developing the Implementation Plan 2<br />
3.1.6 Managing Project Risk 3<br />
3.1.7 Project Scheduling 5<br />
3.1.8 Project Control 3<br />
3.1.9 Managing people and teams 3<br />
3.2 Introduction and overview <strong>of</strong> earned value project management 3<br />
3.3 The genesis and evolution <strong>of</strong> earned value and the earned value<br />
body <strong>of</strong> knowledge 3<br />
3.4 Project management as performed in a major <strong>Omaha</strong> corporation<br />
(guest Speaker) 2<br />
3.5 Establishing the earned value baseline 2<br />
3.6 Earned value baseline preparation and evaluation 2<br />
3.7 Performance Monitoring using the project baseline 2<br />
3.8 Forecasting final cost and schedule results 2<br />
3.9 Customer requirements and planning for quality 1<br />
3.10 Achieving project quality. 1<br />
4.0 Teaching Methodology<br />
4.1 Methods to be used<br />
The primary teaching method will be discussion, case studies, lecture, guest speakers, and<br />
demonstration.<br />
4.2 Student role in the course<br />
The student will attend lectures and demonstrations, participate in discussion on assigned<br />
readings, complete assigned projects and papers, and complete required examinations<br />
4.3 Contact hours<br />
Three (3) hours per week.<br />
-344-
5.0 Evaluation<br />
5.1 Types <strong>of</strong> student products<br />
The student products will be: two examinations (a midterm and final), a ten-page research paper,<br />
and an oral presentation.<br />
5.2 Basis for determining the final grade<br />
Grades will be determined on the basis <strong>of</strong> the student’s participation in class (10%) development<br />
<strong>of</strong> a ten page research paper based on readings from the trade and the empirical, peer reviewed<br />
literature (30%), and achievement on examinations (60 % <strong>of</strong> final grade). The specific weights<br />
shall be specified in the outline for the particular class.<br />
Component Grading<br />
Examinations 50%<br />
Research Report 30%<br />
Participation 10%<br />
Presentation 10%<br />
5.3 Grading Scale and Criteria<br />
Points Grade<br />
97-100% A+<br />
93-96% A<br />
90-92% A-<br />
87-89% B+<br />
83-86% B<br />
80-82% B-<br />
77-79% C+<br />
73-76% C<br />
70-72% C-<br />
67-69% D+<br />
63-66% D<br />
60-62% D-<br />
6.1.3 Guide to the Project Management Body <strong>of</strong> Knowledge (PMBOK Guide) by the Project<br />
Management Institute Standards Committee, Newton Square, PA. 2004.<br />
6.2 Other suggested reading materials or equivalent<br />
Additional articles that have been collected for various topics are available at the UNO Library.<br />
These articles are used to supplement topics presented in various chapters.<br />
6.3 Other sources for gathering information or equivalent<br />
Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />
relevant to topics in systems analysis and design. The process is particularly important in keeping<br />
current with technology and new methodologies.<br />
6.4 Current bibliography or equivalent.<br />
6.4.1 Adams, John, R., Principles <strong>of</strong> Project Management. Newtown Square, PA: Project<br />
Management Institute, 1997.<br />
6.4.2 Bicknill, D. The Politics <strong>of</strong> Failure. Computer Weekly. (July 6, 1995): 28-30.<br />
6.4.3 Garner, R. “Captain <strong>of</strong> Crunch.” Computerworld. 31, 40 (Oct. 6, 1997): 81-83.<br />
6.4.4 Gautschi, T. Three keys to successful design products. Design News. Aug. 11, 1997 v52<br />
n15 p188 (1).<br />
6.4.5 Hebert B., “Tracking progress: More companies are recognizing the value <strong>of</strong> project<br />
management as part <strong>of</strong> their overall strategy – particularly in times <strong>of</strong> changes”, CMA<br />
management, Feb. 2002, v75, i10, p. 24-27.<br />
6.4.6 Hillier F., Hillier M., Lieberman G., Introduction to management science, Chapter 7,<br />
McGraw Hill, Primis Online, 2000.<br />
6.4.7 Meyer A., Loch C., Pich M., “Managing project uncertainty: from variation to chaos;<br />
project managers can’t predict the future, but accurately gauging the degree <strong>of</strong><br />
uncertainty inherent in their projects can help them quickly adapt to it”, MIT Sloan<br />
Management Review, Winter 2002, v43, i2, p. 60-67.<br />
6.4.8 Mourier P., Smith M., “Restarting a stalled project”, Security Management, Oct. 2001,<br />
v45, i10, p. 32-35.<br />
6.4.9 O’Connell, E., & Saiedian, H. “Can You Trust S<strong>of</strong>tware Capability Evaluations.”<br />
Perspectives. Feb. 2000.<br />
6.4.10 Organizing projects for success. Project Management Institute, Inc., Newton Square, PA.<br />
2000.<br />
6.4.11 Pinto, J. and Kharbanda, O. “How to fail in project management.” Business Horizons. 39,<br />
4 (July-Aug. 1996): 45-54.<br />
6.4.12 PMI Standards Committee, Guide to the PMBOK. Newtown Square, PA: Project<br />
Management Institute, 2004.<br />
6.4.13 Robert, R.W. “Creating an Environment for Project Success.” Project Management. 1997.<br />
6.4.14 Verma, V., Organizing Projects for Success. Newtown Square, PA: Project Management<br />
Institute, 1995.<br />
6.4.15 Verma, V. Human Resource Skills for the Project Manager. Newtown Square, PA: Project<br />
Management Institute, 1996.<br />
6.4.16 Wideman, R. (ed.) Project & Program Risk Management. Newtown Square, PA: Project<br />
Management Institute, 1992.<br />
-346-
7.0 (IS Program) Estimate Computing Accreditation (CAC) Category<br />
CAC Category Core Advanced<br />
Hardware and s<strong>of</strong>tware<br />
Networking and telecommunications<br />
Modern programming language<br />
Analysis and Design 15<br />
Data Management<br />
Role <strong>of</strong> IS in Organizations 3<br />
8.0 Oral and Written Communication<br />
Every student is required to submit at least __1___ written reports (not including exams, tests, quizzes, or<br />
commented programs) to typically __10+___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />
___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />
as well as for technical content, completeness, and accuracy.<br />
9.0 Social and Ethical Issues<br />
9.1 Emphasis on open and honest communication with all project stakeholders.<br />
9.2 Emphasis on the customer’s needs both explicit and requirements and implicit.<br />
9.3 Emphasis on accurate and consistent project tracking and reporting to management.<br />
10.0 Theoretical Content<br />
Hours<br />
10.1 Earned Value Analysis 2<br />
11.0 Problem Analysis<br />
11.1 Critical Path<br />
11.2 Earned Value Analysis<br />
12.0 Solution Design<br />
12.1 Project Plan<br />
12.2 Risk Assessment and control<br />
12.3 Project schedule control through earned value analysis<br />
12.4 Lifecycle development<br />
CHANGE HISTORY<br />
Date Change By whom Comments<br />
5/1/2003 Textbook added Dufner<br />
6/10/2003 Added CIST 2500 and CIST 2110 as<br />
prerequisites<br />
Wolcott These two courses were listed as<br />
prerequisites in the catalog, but not<br />
on the formal syllabus.<br />
-347-
7/10/03 Change course description – Course Change<br />
form 10-15-02<br />
10/16/08 Changed description, objectives. Updated<br />
reference list<br />
Wild<br />
Dufner<br />
-348-
1. Local and global role <strong>of</strong> iS<br />
2. Knowledge <strong>of</strong> computing<br />
3. Analysis and design<br />
4. Communication<br />
5. Computer-based tools<br />
6. Work on a team<br />
7. Pr<strong>of</strong>essional, legal, ethical standards<br />
8. Model processes and data<br />
9. Design, implement, evaluation IS<br />
10. Manage projects<br />
11. Manage IS within application env.<br />
12. Manage change<br />
13. Recognize need for pr<strong>of</strong>. develop.<br />
Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />
Department and Course Number ISQA 4910<br />
Course Title<br />
Introduction to Project Management<br />
Course Coordinator<br />
Donna Dufner<br />
Total Credits 3<br />
Date <strong>of</strong> Last Revision 5/26/09<br />
S – Strong relationship<br />
X – Contributing relationship<br />
<strong>BIS</strong> Program Outcomes<br />
Course objective<br />
Understand the fundamentals <strong>of</strong> project<br />
X X S S<br />
planning, project scheduling, and project<br />
control<br />
Understand earned value project<br />
S S S<br />
management<br />
Understand quality issues for project<br />
X S S<br />
management<br />
Understand the fundamentals <strong>of</strong> the<br />
X X S S<br />
management <strong>of</strong> risk<br />
Apply the fundamentals earned value<br />
S S X<br />
project management tools and<br />
techniques<br />
Create Work break down structures X S S X<br />
Manage projects using the Critical Path<br />
S S S X S<br />
Methodology<br />
Manage projects using the Cost S S X S<br />
-349-
performance index (CPI) as a<br />
performance and forecasting metric<br />
Manage projects using the Schedule<br />
performance index (SPI) as a<br />
performance and forecasting metric<br />
Calculate and evaluate the actual<br />
performance against baseline metrics for<br />
project management and control<br />
S S X S<br />
S S X S<br />
-350-
<strong>BIS</strong> Program Outcomes (2009)<br />
1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />
3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />
problems or opportunities, formulate appropriate strategies and solutions using information<br />
technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />
4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />
presentation.<br />
5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />
6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />
7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
8. understand and model organizational processes and data.<br />
9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />
meet desired needs.<br />
10. manage projects.<br />
11. manage information systems within a specific application environment.<br />
12. manage change.<br />
13. recognize the need for continuing pr<strong>of</strong>essional development<br />
-351-
-352-
APPENDIX 3 – FACULTY VITAE<br />
On separate pages, please furnish the following information for all faculty members who teach courses allowed<br />
for the major, including those who have administrative positions in the department (chair, associate chair, etc.).<br />
Use the form given below as guidance. This form need not be followed exactly, but all requested information<br />
should be supplied. Use a common format for all faculty members. Limit information to no more than three<br />
pages per person, providing only the most recent information if needed to limit space. Place the form(s) for<br />
administrators first, followed by the others in alphabetical order.<br />
If you are having more than one program evaluated, particularly if the programs are on separate campuses,<br />
indicate clearly the program(s) and/or campus(es) to which an individual is assigned, and the percentage <strong>of</strong> time<br />
to each, if more than one.<br />
-353-
-354-
Hesham Ali, Dean<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Hesham H. Ali<br />
Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Associate Dean for<br />
Academic Affairs,<br />
College <strong>of</strong> Information<br />
Science and Technology<br />
Pr<strong>of</strong>essor, Department<br />
<strong>of</strong> Computer Science<br />
Associate Pr<strong>of</strong>essor,<br />
Department <strong>of</strong><br />
Computer Science<br />
Assistant Pr<strong>of</strong>essor,<br />
Department <strong>of</strong><br />
Computer Science<br />
Dates Held<br />
January 2000 – July 2006<br />
August 2000 – Present.<br />
August 1994 – August 2000.<br />
August 1988 – August 1994<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph. D Computer Science <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-Lincoln 1988<br />
M. Sc Computer Science Alexandria <strong>University</strong>, Egypt 1985<br />
B. Sc Computer Science Alexandria <strong>University</strong>, Egypt 1982<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
-355-
Dates Where Duties<br />
June 2000 –<br />
Present<br />
October 2001 –<br />
Present<br />
Department <strong>of</strong> Pathology and<br />
Microbiology, <strong>University</strong> <strong>of</strong><br />
<strong>Nebraska</strong> Medical Center<br />
<strong>Nebraska</strong> Informatics Center<br />
for Life Sciences (NICLS)<br />
2002 – Present <strong>Nebraska</strong> Center for Biosecurity<br />
(NCB), <strong>University</strong> <strong>of</strong><br />
<strong>Nebraska</strong><br />
August 1996 -<br />
August 1997<br />
Department <strong>of</strong> Computer<br />
Science, SQU, Muscat, Oman<br />
Associate Pr<strong>of</strong>essor (courtesy)<br />
Deputy Director for Computational sciences<br />
Member<br />
Visiting Associate Pr<strong>of</strong>essor (Acting Department<br />
Head January 1997 – August 1997).<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Lee D. and Willa Seemann Distinguished Dean, College <strong>of</strong> Information Science and Technology,<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong><br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
-356-
P. Ciborowski and H. Ali, Bioinformatics In: Proteomics for Undergraduates. Book Chapter in A. Kraj and<br />
J. Silberring (eds.), Wiley Inc., 2008.<br />
H. Ali and N. Sherwani, Introduction to Graph Algorithms, to be published by Wiley & Sons, 2008.<br />
X. Deng , H. Geng and H. Ali, “A Hidden Markov Model Approach to Predicting Yeast Gene Function from<br />
Sequential Gene Expression Data,” The International Journal <strong>of</strong> Bioinformatics Research and<br />
Applications, 2008.<br />
X. Deng , H. Geng and H. Ali, “Cross-platform Analysis <strong>of</strong> Cancer Biomarkers: A Bayesian Network<br />
Approach to Incorporating Mass Spectrometry and Microarray Data,” Journal <strong>of</strong> Cancer Informatics,<br />
2007.<br />
A. Sadanandam, M. Varney, L. Kinarsky, H. Ali, R. Lee Mosley, R. Singh, “Identification <strong>of</strong> Functional Cell<br />
Adhesion Molecules with a Potential Role in Metastasis by a Combination <strong>of</strong> in vivo Phage Display and in<br />
silico Analysis,” OMICS: A Journal <strong>of</strong> Integrative Biology, Mar 2007, Vol. 11, No. 1: 41-57.<br />
X. Huang and H. Ali, “High Sensitivity RNA Pseudoknot Prediction,” Nucleic Acid Research, 2007.<br />
H. Geng, X. Deng and H. Ali, “MPC: a Knowledge-based Framework for Clustering under Biological<br />
Constraints,” Int. J. Data Mining and Bioinformatics, Volume 2, Number 2, 2007.<br />
A. Abdelaal, H. Ali and H. Sharif, A Coarse-Grain Analysis for the Performance <strong>of</strong> Measurement-based<br />
Admission Control Algorithms. Journal <strong>of</strong> Computational Methods in Science and Engineerning, Volume<br />
6, Number 5-6, pp. S349-S358, 2006.<br />
X. Deng, H. Geng, D. Bastola and H. Ali, “Link Test — A Statistical Method for Finding Prostate Cancer<br />
Biomarkers," Journal <strong>of</strong> Computational Biology and Chemistry, 2006.<br />
A. Churbanov, I. Rogozine, J. Deogun, and H. Ali, “Method <strong>of</strong> Predicting Splice Sites Based on Signal<br />
Interactions,” Biology Direct, 2006.<br />
X. Deng, H. Geng, and H. Ali, “Joint Learning <strong>of</strong> Gene Functions--A Bayesian Network Model Approach".<br />
Journal <strong>of</strong> Bioinformatics and Computational Biology, Vol. 4, No. 2, pp. 217-239, 2006.<br />
X. Deng and H. Ali, EXAMINE, “A Computational Approach to Reconstructing Gene Regulatory<br />
Networks,” Journal <strong>of</strong> BioSystems, 81:125-136, 2005.<br />
A. Churbanov, M. Pauley, D. Quest and H. Ali, “A method <strong>of</strong> precise mRNA/DNA homology-based gene<br />
structure prediction,” BMC Bioinformatics, 6:261, 2005.<br />
A. Mohamed, D. Kuyper, P. Iwen, H. Ali, D. Bastola and S. Hinrichs, “Computational approach for the<br />
identification <strong>of</strong> Mycobacterium species using the internal transcribed spacer-1 region,” Journal <strong>of</strong><br />
Clinical Microbiology, Vol. 43, No. 8: 3811-3817, 2005.<br />
-357-
A. Churbanov, I. Rogozin, V. Babenko, H. Ali and E. Koonin, Evolutionary conservation suggests a<br />
regulatory function <strong>of</strong> AUG triplets in 5'UTRs <strong>of</strong> eukaryotic genes, Nucleic Acid Research, 33(17), pp.<br />
5512-20, Sep 2005.<br />
D. Plum and H. Ali, An Evolutionary Approach to Vehicle Routing Problem with dynamic time and<br />
Precedence Relationships. Journal <strong>of</strong> Computational Methods in Science and Engineerning, Volume 5,<br />
Number1, pp. S57-S66, 2005.<br />
N. Sharma, J. Youn, N. Shrestha and H. Ali, “Direction Finding Signage System using RFID for Healthcare<br />
Applications,” Proceedings <strong>of</strong> The International Conference on BioMedical Engineering and Informatics<br />
(BMEI2008), Sanya, Hainan, China, May 27-30, 2008.<br />
J. Uher, D. Sad<strong>of</strong>sky, J. Youn, H. Ali, H. Sharif, J. Deogun, and S. Hinrichs, “I2MeDS: Intelligent Integrated<br />
Medical Data System,” Proceedings <strong>of</strong> The International Conference on BioMedical Engineering and<br />
Informatics (BMEI2008), Sanya, Hainan, China, May 27-30, 2008.<br />
H. Geng, H. Ali and J. Chan, “A Hidden Markov Model Approach for Prediction <strong>of</strong> Genomic Alterations from<br />
Gene Expression Pr<strong>of</strong>iling,” Proceedings <strong>of</strong> the fourth International Symposium on Bioinformatics Research<br />
and Applications (ISBRA), Atlanta, Georgia, May 6-9, 2008.<br />
D. Qwest, K. Dempsey, D. Bastola and H. Ali, “A Parallel Architecture for Regulatory Motif Algorithm<br />
Assessment,” Proceedings <strong>of</strong> the Seventh IEEE International Workshop on High Performance Computational<br />
Biology (HiCOMP 2008), in conjunction with IPDPS 2008. Miami, Florida, April 24-30, 2008.<br />
S. Pawaskar and H. Ali, “Dynamic Energy Aware Task Scheduling for Periodic Tasks using Expected<br />
Execution Time Feedback,” Proceedings <strong>of</strong> the International Conference on Parallel Computing and<br />
Networks (PDCN 2008), Innsbruck, Austria, Feb 12-14, 2008.<br />
Y. Mohsenin and H. Ali, “A New Genetic Algorithm for Resource Constrained Project Scheduling,”<br />
Proceedings <strong>of</strong> the International Conference on Artificial Intelligence and Applications (AIA 2008),<br />
Innsbruck, Austria, Feb 11-13, 2008.<br />
D. Bastola, S. Chandio, P. Iwen, S. Hinrichs and H. Ali, “RFLP-WAVE Analysis for Rapid Identification <strong>of</strong><br />
Medically Important Fungi,” Proceedings <strong>of</strong> the 2008 Hawaii International Conference on System Sciences<br />
(HICSS-41), Kona, January 7-10, 2008.<br />
S. Kanapuram and H. Ali, “On the Impact <strong>of</strong> configuration <strong>of</strong> Access Points on the Performance <strong>of</strong> Wireless<br />
Networks,” Proceedings <strong>of</strong> the International Conference on Parallel and Distributed Computing and Systems<br />
(PDCS 2007), Cambridge, November 19-21, 2007.<br />
X. Huang and H. Ali, “Reducing Folding Scenario Candidates in Pseudoknots Detection Using Highly<br />
Sensitive PLMM_DPSS Algorithm Integrated With Energy Filters,” Proceedings <strong>of</strong> the 7th IEEE<br />
International Conf on Bio-Informatics and Bio-Engineering (BIBE 2007), pp. 1299 -1303, Boston, October<br />
14-17, 2007.<br />
J. Youn, H. Ali, H. Sharif, J. Deogun, J. Uher and S. Hinrichs, “WLAN-based Real-time Tracking System in<br />
Healthcare,” Proceedings <strong>of</strong> IEEE Wireless and Mobile Computing, Networking and Communications<br />
(WiMob 2007), White Plain, New York, October 8-10, 2007.<br />
S. Mudundi and H. Ali, “A Robust Scalable Cluster-Based Multihop Routing Protocol for Wireless Sensor<br />
Networks,” Proceedings <strong>of</strong> the Fifth International Symposium on Parallel and Distributed Processing and<br />
Applications (ISPA07), Niagara Falls, Canada, August 29-31, 2007.<br />
D. Quest, W. Tapprich and H. Ali, “A Grammar Based Methodology for Structural Motif Finding in ncRNA<br />
Database Search, Proceedings <strong>of</strong> the 2007,” IEEE Computer Society Bioinformatics Conference (CSB 2007),<br />
-358-
<strong>University</strong> <strong>of</strong> California, San Diego, USA, August 13-17, 2007.<br />
A. Abdelaal and H. Ali, “A Typology for Community Wireless Networks Business Models,” Proceedings <strong>of</strong><br />
2007 Americas Conference on Information Systems (AMCIS-13 2007), Keystone, Colorado, August 9-12,<br />
2007.<br />
S. Mudundi and H. Ali, “A New Robust Genetic Algorithm for Dynamic Cluster Formation in Wireless<br />
Sensor Networks,” Proceedings <strong>of</strong> the International Conference on Wireless and Optical Communication<br />
(WOC 2007), Montréal, Canada, May 30- June 01, 2007.<br />
S. Pawaskar and H. Ali, “Dynamic Energy Aware Task Scheduling using Run-Queue Peek,” Proceedings <strong>of</strong><br />
the International Conference on Parallel Computing and Networks (PDCN 2007), Innsbruck, Austria, Feb 13-<br />
15, 2007.<br />
H. Geng, J. Iqbal, X. Deng, W. Chan and H. Ali, “Virtual CGH: Prediction <strong>of</strong> Novel Regions <strong>of</strong><br />
Chromosomal Alterations in Natural Killer Cell Lymphoma from Gene Expression Pr<strong>of</strong>iling,” Proceedings <strong>of</strong><br />
the 2007 Hawaii International Conference on System Sciences (HICSS-40), Kona, January 3-6, 2007.<br />
S. Kanapuram, H. Ali and G. de Vreede, “On Effective Utilization <strong>of</strong> Wireless Networks in Collaborative<br />
Applications,” Proceedings <strong>of</strong> the Second International Conference on Collaborative Computing<br />
(CollaborateCom 2006), Atlanta, Georgia, November 17-20, 2006.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
“CCLI: Integrating Bioinformatics into the Life Sciences,” Co-PI, National Science Foundation (NSF), total<br />
Award at UNO: $149,807, January 15, 2008 – December 31, 2009.<br />
“Design and Development <strong>of</strong> Secure and Robust Network Infrastructure for Critical Medical<br />
Applications,” PI, <strong>Nebraska</strong> Research Initiative (NRI), total Award at UNO: $367,671, July 1, 2006 – June<br />
30, 2008.<br />
“Center for Mobile Computing,” PI, NSF EPSCoR, total Award at UNO: $500,000, February 1, 2004 –<br />
January 31, 2007.<br />
“<strong>Nebraska</strong> High Performance Wireless Research and Education Network,” PI, <strong>Nebraska</strong> Research<br />
Initiative (NRI), total Award at UNO: $681,232, July 1, 2004 – June 30, 2006.<br />
“IDeA Networks for Biomedical Research Excellence,” Co-I: (PI <strong>of</strong> UNO component), NIH INBRE, total<br />
Award at UNO: $1,382,586, June 1, 2004 – May 31, 2009.<br />
“Center for Mobile Computing,” PI, Supplement Grant, NSF EPSCoR, total Award at UNO: $35,000,<br />
February 1, 2005 – January 31, 2006.<br />
“The Development <strong>of</strong> Med-IT Cancer Data Management System,” MaCallie & Associates, PI, $44,000,<br />
March 1, 2005 – May 5, 2006.<br />
“<strong>Study</strong> <strong>of</strong> Innovative Approaches for Efficient Satellite Communications,” Co-PI, A Joint IST and CET (PKI)<br />
-359-
Project, L-3 Compcept, $300,000, March 25, 2005 – March 25, 2006.<br />
“<strong>Nebraska</strong> Research Network in Functional Genomics,” Co-I (PI <strong>of</strong> UNO Component), Supplement Grant,<br />
NIH, total Award at UNO: $195,190, June 1, 2005 – April 30, 2006.<br />
“High-Technology Workforce Support for Baccalaureate Degree Seeking Students,” Co-PI, NSF STEP,<br />
total Award at UNO: $1,999,416, June 1, 2004 – May 31, 2009.<br />
“Construction <strong>of</strong> a Targeted Rhesus Macaque Microarray,” Co-PI (PI <strong>of</strong> UNO Component), NIH, total<br />
Award at UNO: $239,282, June 18, 2003 – April 30, 2006.<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number<br />
Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009<br />
Fall 2008<br />
CSCI<br />
4150/8156<br />
MATH<br />
4150/8156<br />
BIO<br />
4860/8866<br />
Graph Theory and Applications 3 17<br />
Graph Theory and Applications 3 4<br />
Bioinformatics Algorithms 3 11<br />
Summer 2008 CSCI 8325 Data Structures 3 1<br />
Spring 2008<br />
CSCI<br />
4150/8156<br />
MATH<br />
4150/8156<br />
Graph Theory and Applications 3 23<br />
Graph Theory and Applications 3 13<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
-360-
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-361-
-362-
Deepak Khazanchi, Associate Dean<br />
Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Deepak Khazanchi<br />
Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Associate Pr<strong>of</strong>essor <strong>of</strong> Information Systems and Quantitative Analysis 7/2000 - 7/2001<br />
Full Pr<strong>of</strong>essor <strong>of</strong> Information Systems and Quantitative Analysis<br />
8/2001 - till date<br />
Associate Pr<strong>of</strong>essor <strong>of</strong> Information Systems and Quantitative Analysis 7/2000 – 7/ 2001<br />
Interim Department Chair, Information Systems and Quantitative Analysis 6/2001 - 4/2002<br />
Peter Kiewit Distinguished Pr<strong>of</strong>essor (Discontinued due to the move to an<br />
8/2005 - 11/ 2006<br />
administrative position)<br />
Department Chair, Information Systems and Quantitative Analysis 4/2002 -11/2006<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D. Management Information Systems Texas Tech <strong>University</strong>, Lubbock 1991<br />
M.B.A Southern Illinois <strong>University</strong>- Carbondale, Carbondale 1988<br />
B. Tech<br />
(Honors)<br />
Civil Engineering Indian Institute <strong>of</strong> Technology, Kharagpur, India 1981<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
N/A<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Abdelaal, A., Ali, H. and Khazanchi, D. (2009, Jan 5-8). “The Role <strong>of</strong> Social Capital in the Creation <strong>of</strong><br />
Community Wireless Networks.” Proceedings <strong>of</strong> the forty-second Annual Hawaii International<br />
Conference on Systems Sciences (HICSS-42). [PDF]<br />
Davis, A. and Khazanchi, D. (2008, June 9-11). An exploratory investigation <strong>of</strong> the development <strong>of</strong><br />
mutual knowledge in global virtual project teams. Proceedings <strong>of</strong> the 16th European Conference on<br />
Information Systems (ECIS-16), Galway, Ireland.<br />
Khazanchi, D., Murphy, John and Petter, S. (2008, May 23-24). "Guidelines for Evaluating Patterns in<br />
-363-
the IS Domain", Proceedings <strong>of</strong> the 2nd Midwest United States Association for Information Systems<br />
Conference (MWAIS08), Eau Claire, Wisconsin.<br />
Petter, S., Khazanchi, D. and Murphy, J. (2008, May 7-9). "A Design Science Based Evaluation<br />
Framework for Patterns", In: V. Vaishnavi & R. Baskerville (Eds). Proceedings <strong>of</strong> the Third<br />
International Conference on Design Science Research in Information Systems and Technology<br />
(DESRIT 2008), May 7- 9, 2008, Atlanta, Georgia: Georgia State <strong>University</strong>.<br />
Davis, A. and Khazanchi, D. (2007, August 9-12). The influence <strong>of</strong> online word <strong>of</strong> mouth on product<br />
sales in retail e-commerce: An empirical investigation . Proceedings <strong>of</strong> the 13th Annual Americas<br />
Conference on Information Systems (AMCIS-13), Keystone, Colorado.<br />
Murphy, J. D. and Khazanchi, D. (2007, May 18-19th). "The Effects <strong>of</strong> Pairing Participants in<br />
Facilitated Group Support Systems Sessions." Proceedings <strong>of</strong> the 2nd Midwest United States<br />
Association for Information Systems Conference (MWAIS07), Springfield, Illinois. Awarded 2nd Best<br />
Paper.<br />
Davis, A. and Khazanchi, D. (2007, May 18-19th). "The Influence <strong>of</strong> Transactive Memory on Mutual<br />
Knowledge in Virtual Teams: A Theoretical Proposal." Proceedings <strong>of</strong> the 2nd Midwest United States<br />
Association for Information Systems Conference (MWAIS07), Springfield, Illinois.<br />
Zigurs, I. and Khazanchi, D. (2007, May 18-19, 2007). Panel on “Transforming education in<br />
information systems and technology,” the 2nd Midwest United States Association for Information<br />
Systems Conference (MWAIS 2007), Springfield, Illinois. Also participated as a panelist.<br />
Peng, Y., Kou, G., Sabatka, A., Matza, J., Chen, Z., Khazanchi, D. and Shi, Y. (2007, May 27-30).<br />
"Application <strong>of</strong> Classification Methods to Individual Disability Income Insurance Fraud Detection".<br />
International Conference on Computational Science (ICCS 2007), Beijing, China.<br />
Yan, Nian and Khazanchi, D. (2007, May 27-30). "Concept Level Web Search via Semantic<br />
Clustering". International Conference on Computational Science (ICCS 2007), Beijing, China.<br />
Khazanchi, D. and Zigurs, I. (2007, January 3-7). "An Assessment Framework for Developing and<br />
Using Patterns for the Effective Management <strong>of</strong> Virtual Projects." Proceedings <strong>of</strong> the Hawaii<br />
International Conference on System Sciences (HICSS-40).<br />
Arnold, V., Hampton, C., Khazanchi, D. and Sutton, S. (2006; September 7-8th). "Risk Analysis in<br />
Extended Enterprise Environments: Identification <strong>of</strong> Critical Risk Factors in B2b E-Commerce<br />
Relationships". Proceedings <strong>of</strong> the Fourth Annual CABIT (Center for Advancing Business through<br />
Information Technology) Symposium, Phoenix, AZ, http://symposium.cabit.wpcarey.asu.edu.<br />
Ni, Jinlan and Khazanchi, D. (2006; November 18-21). "Asymmetric Information and New IT<br />
Investment", Proceedings <strong>of</strong> the Decision Sciences Institute's 37th Annual Meeting, San Antonio, TX.<br />
Peng, Y., Kou, G., Sabatka, A., Chen, Z., Khazanchi, D. and Shi, Y. (2006, October 25-27th).<br />
"Application <strong>of</strong> Clustering Methods to Health Insurance Fraud Detection", Proceedings <strong>of</strong> the IEEE<br />
International Conference on Services Systems and Services Management (ICSSSM06), Université de<br />
Technologie de Troyes, France (http://www.utt.fr/icsssm06/).<br />
Martin, A. and Khazanchi, D. (2006, August 4-6th). "Information Availability and Security Policy".<br />
Proceedings <strong>of</strong> the Americas Conference on Information Systems (AMCIS 2006), Acapulco, Mexico.<br />
Tarmizi, H., Khazanchi, D. and Noteboom, C. (2006, May 5-6th). "Electronic Medical Records:<br />
Barriers to Adoption and Diffusion." Proceedings <strong>of</strong> the 1st Midwest United States Association for<br />
Information Systems Conference (MWAIS06), Grand Rapids, Michigan.<br />
Davis, A. and Khazanchi, D. (2006, May 5-6th). "Mutual Knowledge and its Impact on Virtual Team<br />
Performance." Proceedings <strong>of</strong> the 1st Midwest United States Association for Information Systems<br />
Conference (MWAIS06), Grand Rapids, Michigan.<br />
Attended AMCIS 2004 NYC as a delegate and AMCIS 2005 conference co-chair<br />
-364-
Khazanchi, D. and Zigurs, I. (2005, May 21st, 2005). "Patterns <strong>of</strong> Virtual Projects", PMI Project<br />
Management Research Programme Working Session", Edinburgh, Scotland, UK (part <strong>of</strong> the PMI<br />
Global Congress-EMEA).<br />
V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton (2005, August 7-10th). "B2B E-Commerce<br />
Assurance: The Influence <strong>of</strong> Partner Risk on Assurance Desirability & Relationship Satisfaction."<br />
American Accounting Association (AAA) Annual Meeting, San Francisco, California.<br />
V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton. (2004, August 8-11th). "Risk Analysis in an<br />
Extended Enterprise Environment: Identification <strong>of</strong> Key Risk Factors in B2B E-Commerce<br />
Relationships." Proceedings <strong>of</strong> the American Accounting Association (AAA) Annual Meeting,<br />
Orlando, Florida.<br />
V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton (2004, November 5-6th). "B2B E-Commerce<br />
Assurance: The Influence <strong>of</strong> Partner Risks On Continuous Assurance Desirability & Relationship<br />
Satisfaction." The Eighth Rutgers Continuous Auditing & Reporting Symposium<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
N/A<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
N/A<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Committee membership – 5 hours/week<br />
Advising – 3 hours/week<br />
Associate Dean for Academic Affairs – 20 hours/week (carries an additional stipend)<br />
Grant Administration, Writing and Development – 5 hours/week<br />
Supervision <strong>of</strong> Graduate students (including MS and PhD)– 3 hours/week<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
UNMC Interoperability Standards Task Force (2009-).<br />
Chair, IS&T Scholarship Committee (2009-).<br />
Chair, IA Faculty Search Committee (2009-)<br />
Peter Kiewit Institute (PKI) Executive Director Search Committee (2008-09).<br />
UNMC Clinical Data Standards (CDR) Committee (2007-08)<br />
Chancellor Search Committee (2006-07)<br />
-365-
IS&T ABET Steering Committee (2003-till date)<br />
General Education Think Tank (2006-till date)<br />
College <strong>of</strong> IST Grant Writer Search Committee, 2006<br />
General Education Review Task Force (2006-till date)<br />
Scott Scholarship Selection Committee (2003-until date)<br />
Academy <strong>of</strong> Excellence Selection Committee (2004-till date)<br />
Walter Scott Entrepreneurship Award Committee (2005-2007; Committee Chair, 2006)<br />
Peter Kiewit Institute Student Entrepreneurship Award Committee (2005-2007; Committee Chair, 2006)<br />
PKI Chairs Committee (2001-2005)<br />
IS&T Academic Prioritization Report Task Force, (2005)<br />
IS&T IT Steering Committee (2005-2006)<br />
IS&T Dean's Expanded Executive Committee (2001-till date)<br />
Academy <strong>of</strong> Excellence (AOE) Committee (2005-till date)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Owens, D., Davis, A., Murphy, J., Khazanchi, D. and Zigurs, I. (2009, March-April). "Moving First Life into<br />
Second Life: Real World Opportunities for Virtual Teams and Virtual World Project Management." IT<br />
Pr<strong>of</strong>essional (a IEEE Publication), Volume 11, Issue 2, pp. 34-41.<br />
Davis, A., Owens, D., Murphy, J., Khazanchi, D. and Zigurs, I. (2009, February). "Avatars, People, and Virtual<br />
Worlds: Foundations for Research in Metaverses." Journal <strong>of</strong> the Association for Information Systems, Volume<br />
10, Issue 2 , Article 2, pp. 90-117.<br />
Ni, J. and Khazanchi, D. (2009, March, Forthcoming). "Information Technology (IT) Investment Decisions<br />
Under Asymmetric Information: A Modified Rational Expectation Model." International Journal <strong>of</strong> Information<br />
Technology and Decision Making (IT&DM), Volume 8, Issue 1. [Pre-Print Draft PDF].<br />
Murphy, J. and Khazanchi, D. (2008, Fall). "Synergistic Ideation through Pairing Participants in Facilitated<br />
Group Support Systems Sessions." American Journal <strong>of</strong> Business, Volume 23, No. 2, pp. 27-35. [PDF].<br />
Davis, A. and Khazanchi, D. (2008, May). "An Empirical <strong>Study</strong> <strong>of</strong> Online Word <strong>of</strong> Mouth as a Predictor for<br />
Multi-product Category E-commerce Sales", Electronic Markets, Volume18, Issue 2, pp. 130-141. [PDF]<br />
Zigurs, I. and Khazanchi, D. (2008, Spring). "From Pr<strong>of</strong>iles to Patterns: A New View <strong>of</strong> Task-Technology Fit."<br />
Information Systems Management, Volume 25 Issue 1, pp. 8 –13. [PDF].<br />
Sutton, S., Khazanchi, D., Hampton, C. and Arnold, V. (2008, Special Issue). "Risk Analysis in Extended<br />
Enterprise Environments: Identification <strong>of</strong> Critical Risk Factors in B2B E-Commerce Relationships." Journal <strong>of</strong><br />
the Association <strong>of</strong> Information Systems (JAIS), Volume 9, Issue 3/4, Article 4, pp. 151-174. [PDF].<br />
Davis, A. and Khazanchi, D. (2007, Fall). "Does Mutual Knowledge Affect Virtual Team Performance?<br />
Theoretical Analysis and Anecdotal Evidence." American Journal <strong>of</strong> Business (AJB), Volume 22, No. 2, pp. 57-<br />
65. [PDF].<br />
Khazanchi, D. and Zigurs, I. (2006, July-September). "Patterns for Effective Management <strong>of</strong> Virtual Projects:<br />
Theory and Evidence." International Journal <strong>of</strong> electronic Collaboration (IJeC) -- Special Issue on Collaborative<br />
Project Management, Volume 2, No. 3, pp. 25-49. [PDF].<br />
Dasgupta, P. and Khazanchi, D. (2005). "An Adaptive Decision Support System for Academic Course<br />
Scheduling Using S<strong>of</strong>tware Agents." International Journal <strong>of</strong> Technology in Teaching and Learning (IJTTL),<br />
Volume 1, Issue 2, 63-78. [PDF].<br />
Khazanchi, D. (2005, Spring). "Information Technology (IT) Appropriateness: The Contingency Theory <strong>of</strong> “Fit”<br />
-366-
and IT Implementation in Small and Medium Enterprises". Journal <strong>of</strong> Computer Information Systems, Volume<br />
XLV, No. 3, pp. 88-95.<br />
Owens, D. and Khazanchi, D. (2009; Forthcoming). "S<strong>of</strong>tware Quality Assurance." In: Kidd, T.T. (2009),<br />
Handbook <strong>of</strong> Research on Technology Project Management, Planning and Operations, Hershey, PA:<br />
Information Science Reference (an imprint <strong>of</strong> IGI Global).<br />
Khazanchi, D. and Martin, A. (2009). "Information Availability." In: Gupta, J.D. and Sharma, S. Editors (2009),<br />
Handbook <strong>of</strong> Research on Information Security and Assurance, Hershey, PA: IGI Global, Chapter XIX, pp. 230-<br />
239.<br />
Zigurs, I. and Khazanchi, D. (2008). "Applying Pattern Theory in the Effective Management <strong>of</strong> Virtual Projects."<br />
In: Kock, N., Editor (2008), E-Collaboration in Modern Organizations: Initiating and Managing Distributed<br />
Projects, Advances in e-Collaboration Series, Volume 2, Hershey, PA: IGI Global, Chapter VII, pp. 93-112.<br />
Zigurs, I., Khazanchi, D. and Mametjanov, A. (2007). "The Practice and Promise <strong>of</strong> Virtual Project<br />
Management." In: Kock, N., Editor (2007, December), Encyclopedia <strong>of</strong> E-Collaboration, Hershey, PA:<br />
Information Science Reference (an imprint <strong>of</strong> IGI Global), ISBN: 978-1-59904-000-4, Chapter 116, pp. 1-7.<br />
[PDF]. Also published in Kisielnicki, J., Editor (2008, June), Virtual Technologies: Concepts, Methodologies,<br />
Tools, and Applications, Hershey, PA: Information Science Reference (an imprint <strong>of</strong> IGI Global), ISBN: 978-1-<br />
59904-955-7, Chapter 1.13, pp. 177-184.<br />
Khazanchi, D. and Zigurs, I. (2008). "Patterns for Effective Management <strong>of</strong> Virtual Projects: Theory and<br />
Evidence." Also published in Kisielnicki, J., Editor (2008, June), Virtual Technologies: Concepts, Methodologies,<br />
Tools, and Applications, Hershey, PA: Information Science Reference (an imprint <strong>of</strong> IGI Global), ISBN: 978-1-<br />
59904-955-7, Chapter 7.2, pp. 1368-1389.<br />
Khazanchi, D. & Zigurs, I. (2005). Patterns <strong>of</strong> effective management <strong>of</strong> virtual projects: An exploratory study.<br />
Newtown Square, PA: Project Management Institute. ISBN: 1930699832.<br />
V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton. (2004). Enterprise Risk Management: Identifying Risk in<br />
B2B E-Commerce Relationships. Altamonte Springs, Fl: The Institute <strong>of</strong> Internal Auditors (IIA) Research<br />
Foundation. ISBN: 0-89413-554-6. [To purchase this book, please visit the IIA book store]. 102 pages.<br />
Khazanchi, D. and Reich, B.H. (2008, October). "Achieving IT project success through control, measurement,<br />
managing expectations, and top management support," (Guest Editorial), International Journal <strong>of</strong> Project<br />
Management (IJPM). Volume 26, Issue 7 , pp. 699.<br />
Davis, A. , Khazanchi, D., Murphy, J., Owens, D., & Zigurs, I. (2008). "Challenges and lessons learned from<br />
virtual world research," Midwest Association for Information System (MWAIS) Newsletter, 2 (2), pp. 3.<br />
Khazanchi, D. and Petter, S. (2006; Fall). "The Need for Improved IT Project Manegemnet in e-Service Projects<br />
and Beyond" (Guest Editors' Column), e-Service Journal (e-SJ), 5:1, pp. 1-3.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
Gouttierre, T. (PI) and Khazanchi, D. (IT-coordinator) (1/1/2009-12/31/2010; In progress). "US-Russia Partnership<br />
for Technology, Language, and Cultural Exchange", $398,103 grant from the US Department <strong>of</strong> Education.<br />
Khazanchi, D. and Zigurs, I. (2008). "Metaverse Research Lab", funded by the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Foundation<br />
for $20,000.<br />
Khazanchi, D., Najjar, L. and Wolcott, P. (1/1/2008-3/2009). "Business Database Competitive Audit Project".<br />
Awarded a grant <strong>of</strong> $17,603 for conducting a comparative business database audit for InfoUSA.<br />
Munkvold, B.E., Moe, C.E, Khazanchi, D. and Zigurs, I. (2008-2011; In progress). " Partnerships in Higher Education<br />
Norway - North America 2008-2011". <strong>University</strong> <strong>of</strong> Agder (UiA), Kristiansand, Norway and UNO's IS&T<br />
-367-
collaborated to obtain a grant <strong>of</strong> nearly $100,000 per year for 3.5 years from the Norwegian Centre for<br />
International Cooperation in Higher Education (an agency under the Ministry <strong>of</strong> Education and Research) to<br />
continue and extend the partnership between UiA and UNO. Khazanchi will serve as the Project Director for<br />
administering the grant on the UNO campus. The grant will fund large student exchanges between the two<br />
universities (35 students each way) and allow faculty and researchers to visit each campus for workshops and to<br />
establish and expand research collaborations.<br />
Davis, A., Zigurs, I., Khazanchi, D. and Munkvold, B. (June – August 2007). "Teaching and learning virtual<br />
collaboration across cultures and technologies,” funded by <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> Institute for<br />
Collaboration Science (ICS) Summer Seed Grant, $1000.<br />
Khazanchi, D. (3/2007). "infoUSA: Spring Break in India " Awarded $45,000 by infoUSA for UNO/UNL students visit<br />
to India to learn about Indian businesses, culture and educational workshops at UNO's sibling university, IIT<br />
Kharagpur.<br />
Buchanan, L. (PI; 2007) and Khazanchi, D. (Consultant). "Follow-up Relationships Intended to END Smoking<br />
(Portable Electronic Device <strong>Study</strong>)". $40,000 award from <strong>Nebraska</strong> Dept <strong>of</strong> Health and Human Services Cancer and<br />
Smoking Grants (LB 506).<br />
Khazanchi, D. (2006). UNMC (<strong>University</strong> Medical Center - College <strong>of</strong> Nursing) sub-grant for $3000 to develop a<br />
"Portable Electronic Device Application" for Buchanan, L. (2006) for her "Follow-up Relationships Intended to END<br />
Smoking (Portable Electronic Device <strong>Study</strong>)" research initiative.<br />
Khazanchi, D., Chen, Z. and Shi, Y. (6/26/2006 to 7/26/2006; Completed). "Mutual <strong>of</strong> <strong>Omaha</strong> Special Investigation<br />
Department (SID) Data Mining Project – Individual Disability Income Product". Awarded $23,900 by Mutual <strong>of</strong><br />
<strong>Omaha</strong>.<br />
de Vreede, Gert-Jan, Jones, E., Khazanchi, D., Rilett, L. and Zigurs, I. (2005; Completed). "Applying Patterns <strong>of</strong><br />
Technology-Enabled Distributed Collaboration: Improving Multi-Actor Decision-Making in Traffic Systems."<br />
Awarded $10,000 by the PKI Coordinating Council, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>.<br />
Khazanchi, D. and Shi, Y. (7/1/2005 to 8/31/2005; Completed). "SID-Data Classification for Disability Income<br />
Product". Awarded $22,500 by Mutual <strong>of</strong> <strong>Omaha</strong>.<br />
Khazanchi, D. (7/1/2005-7/12006). "infoUSA: PKI-IIT-VGSOM Student/Faculty Exchange Grant." Awarded $35,000<br />
by infoUSA.<br />
Najjar, L., Khazanchi, D., and Wolcott, P. (1/1/2005 to 3/1/2005; Completed). "Business Database Competitive<br />
Audit Project". Awarded a grant <strong>of</strong> $14,575 for conducting a business database audit for InfoUSA. This project is<br />
being conducted under the auspices <strong>of</strong> the PKI Technology Development Corp (PKITDC).<br />
Harvey, D. and Khazanchi, D. (11/2004 to 7/2005; Completed). “Union Pacific -- Engineering Management Group<br />
Systems Project.” Awarded a grant <strong>of</strong> $94,655 for the systems analysis for EMG's information systems needs. This<br />
project was conducted with the assistance <strong>of</strong> a Scott incubator partner, DOCenter Inc. under the auspices <strong>of</strong> the<br />
PKI Technology Development Corp (PKITDC).<br />
Khazanchi, D. and Zigurs I. (October 1st-April 15th, 2005; Completed). "Mutual <strong>of</strong> <strong>Omaha</strong> Simulation Project --<br />
Phase II." Awarded $16,100 by Mutual <strong>of</strong> <strong>Omaha</strong>.<br />
Khazanchi, D. (9/1/2004-8/2007). "Web-based Reentry Case Management System." Award for $70,910 as a as a<br />
part (sub-grant) <strong>of</strong> the <strong>Nebraska</strong> Department <strong>of</strong> Corrections grant to Sample, L and Spohn, C. (2004), "<strong>Nebraska</strong>'s<br />
Serious and Violent Offender Reentry Program".<br />
Khazanchi, D. (7/1/2004; Completed). "infoUSA: PKI-IIT-VGOSM Student/Faculty Exchange Grant." Awarded<br />
$30,000 by infoUSA.<br />
Khazanchi, D. and Zigurs, I. (1/2004-12/2004; Completed). “Patterns <strong>of</strong> Virtual Projects: Identifying Effective<br />
Blueprints for Virtual Project Management”. Report submitted in fulfillment <strong>of</strong> a grant sponsored by the Project<br />
Management Institute’s (PMI) Project Management Research Program. The total grant was for $63,000 ($30,000<br />
from PMI and the remainder in matching funds in the form <strong>of</strong> computing resources and faculty time from the<br />
-368-
College <strong>of</strong> IS&T, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>).<br />
Harvey, D. and Khazanchi, D. (3/2004 to 7/2004; Completed). “Union Pacific -- Medical Systems Project.” Awarded<br />
a grant <strong>of</strong> $75,240 for the systems analysis <strong>of</strong> medical systems integration with HR at Union Pacific. This project<br />
was conducted with the assistance <strong>of</strong> a Scott incubator partner, DOCenter Inc. under the auspices <strong>of</strong> the PKI<br />
Technology Development Corp (PKITDC).<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number<br />
Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Fall/2007 ISQA 9900 Advanced Research in Virtual Project Management 3 4<br />
(Doctoral Seminar)<br />
Spring/2008 ISQA 9010 Foundations <strong>of</strong> IS Research (Doctoral Seminar) 3 5<br />
Fall/2008 ISQA 9020 Technical and Process Issues in IS Research (Doctoral 3 5<br />
Seminar)<br />
Spring/2009 ISQA 9010 Foundations <strong>of</strong> IS Research (Doctoral Seminar) 3 1<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __33___%. Please give<br />
a brief description <strong>of</strong> your major research and scholarly activities:<br />
Business to Business (B2B) Electronic Commerce & Risk Management<br />
o EDI Impacts on Small and Medium Sized Enterprises (SMEs)<br />
o B2B Risk Management<br />
o B2B Assurance<br />
o Risk Management in the Extended Enterprise Environment<br />
IT Project Management<br />
o Virtual Project Management/Virtual World Project Management<br />
o Best Practices in Project Management<br />
o Project Management Training<br />
o Project Management Assurance<br />
Application <strong>of</strong> Philosophy Science to IS/T Research<br />
o Relevance <strong>of</strong> IS Research<br />
o Scientific Realism in IS Research<br />
o Truth in IS Research<br />
o Patterns Theory and Design Science<br />
o Validation <strong>of</strong> Concepts<br />
Mutual Knowledge in Virtual Teams<br />
Metaverses, Virtual Worlds and Other Reality Environments<br />
-369-
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-370-
Ilze Zigurs, ISQA Department Chair<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Ilze Zigurs<br />
Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Pr<strong>of</strong>essor<br />
Dates Held<br />
August 2001 - Present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D. Business<br />
<strong>University</strong> <strong>of</strong> Minnesota 1987<br />
Administration/ MIS<br />
M.B.A. <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> 1981<br />
B.A. English Literature <strong>University</strong> <strong>of</strong> Washington, Seattle 1971<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Teaching Circles, "Chairs & Directors Teaching Circle", UNO, <strong>Omaha</strong>, NE, USA. (October 2008 - May<br />
2009). Served as coordinator <strong>of</strong> teaching circle.<br />
Teaching Circles Participant, "Web Collaboration", UNO, <strong>Omaha</strong>, NE, USA. (October 2008 - May 2009).<br />
Workshop Attended, "The Pedagogical Potential <strong>of</strong> Second Life for Higher Education", UNO Faculty<br />
Development, <strong>Omaha</strong>, NE, USA. (September 25, 2008).<br />
Conference Attendance, "International Conference on Information Systems". (December 2008).<br />
Conference Attendance, "<strong>Nebraska</strong> Research and Innovation Conference", EPSCoR, Lincoln, NE, USA.<br />
(October 28, 2008).<br />
Conference Attendance, "CRIWG 2008", <strong>Omaha</strong>, NE, USA. (September 14, 2008 - September 18, 2008).<br />
-371-
Seminar, "XBRL: Opportunities and Challenges", Creighton <strong>University</strong>, <strong>Omaha</strong>, NE, USA. (September 8,<br />
2008).<br />
Conference Attendance, "Americas Conference on Information Systems". (August 2008).<br />
Conference Attendance, "MWAIS Third Annual Conference", Eau-Claire, Wisconsin, USA. (May 2008).<br />
Attended ICAN Women's Leadership Conference, Qwest Center, April 2006<br />
Attended Americas Conference on Information Systems (AMCIS), August 2006<br />
Attended International Conference on Information Systems (ICIS), December 2006<br />
Attended Special Interest Group in Project Management, all-day workshop prior to ICIS Conference,<br />
December 2006<br />
Attended sessions at 11 th Annual Americas Conference on Information Systems, <strong>Omaha</strong>, <strong>Nebraska</strong>,<br />
August 11-14, 2005<br />
Attended sessions at International Conference on Information Systems, Las Vegas, Nevada, December 9-<br />
13, 2006<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
PKI Executive Director Search Committee, Committee Member, 1 hour<br />
College Representatives Committee, Center for Collaboration Science, Committee Chair, 1 hour<br />
Statewide EPSCoR Committee, Committee Member, 1 hour<br />
Adobe Connect Pilot Project, Program Coordinator, 1 hour<br />
Selection Committee for IDEA award, Committee Chair, 0.5 hours<br />
Twelve-Month Operational Plan Task Force Committee, Committee Member, 0.5 hours<br />
ABET Steering Committee, Committee Member, 2 hours<br />
Distance Education Steering Committee, Ex-<strong>of</strong>ficio member, 1. hour<br />
Women in IT, Faculty Mentor, 1 hour<br />
CIST Roundtable, Co-coordinator <strong>of</strong> CIST Roundtable series, 1 hour<br />
Workshop on Partnership Opportunities, UiA/UNO, Co-Coordinator <strong>of</strong> workshop, 1 hour<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Chair, ISQA Pr<strong>of</strong>essional Development and Concerns Committee, Spring 2006<br />
-372-
<strong>Nebraska</strong> EPSCoR Committee, appointed by Governor <strong>of</strong> State <strong>of</strong> <strong>Nebraska</strong>, through November 2007<br />
College Representatives Committee, Institute for Collaboration Science, 2006 - present<br />
Search Committee for Dean <strong>of</strong> College <strong>of</strong> IS&T, 2006<br />
Selection Committee for Award for Distinguished Research or Creative Activity, 2006 - 2007<br />
<strong>University</strong> Pr<strong>of</strong>essorship Committee, 2005-2006<br />
College Personnel Committee, 2005-2006<br />
ISQA Graduate Program Committee through December 2005<br />
ISQA Recruiting Committee, Summer and Fall 2005<br />
Department personnel committee, 2005-2006<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Davis, A., & Zigurs, I. (forthcoming). Trust in virtual teams: Solved or still a mystery? Database for<br />
Advances in Information Systems.<br />
Owens, D., Davis, A., Murphy, J., Khazanchi, D., & Zigurs, I. (2009). Moving first life into Second Life: Real<br />
world opportunities for virtual teams and virtual world project management, IT Pr<strong>of</strong>essional, May/June,<br />
27-34.<br />
Davis, A., Murphy, J., Owens, D., Khazanchi, D., & Zigurs, I. (February 2009). Avatars, people, and<br />
metaverses: Foundations for research in virtual worlds, Journal <strong>of</strong> the Association for Information<br />
Systems, 10(2), Article 2, 90-117.<br />
Germonprez, M., & Zigurs, I. (January 2009). Task, technology, and tailoring in communicative action: An<br />
in-depth analysis <strong>of</strong> group communication, Information and Organization, 19(1), 22-46.<br />
DeSanctis, G., Poole, M.S., Zigurs, I., DeSharnais, G., D’On<strong>of</strong>rio, M., Gallupe, B., Holmes, M., Jackson, B.,<br />
Jackson, M., Lewis, H., Limayem, M., Lee-Partridge, J., Niederman, F., Sambamurthy, V., Vician, C.,<br />
Watson, R., Billingsley, J., Kirsch, L., Lind, R., and Shannon, D., (Special Issue 2008). The Minnesota GDSS<br />
research project: Group support systems, group processes, and outcomes, Journal <strong>of</strong> the Association for<br />
Information Systems, 9(10/11), 551-608.<br />
Zigurs, I., and Khazanchi, D. (2008). From pr<strong>of</strong>iles to patterns: A new view <strong>of</strong> task-technology fit.<br />
Information Systems Management, 25(1), 8-13.<br />
Cousins, K., Robey, D., & Zigurs, I. (2007). Managing strategic contradictions in hybrid teams, European<br />
Journal <strong>of</strong> Information Systems, 16(4), 460-478.<br />
Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., de Vreede, G.-J., & Zigurs, I. (2007).<br />
Collaboration engineering in distributed environments, e-Service Journal, 6(1), 76-97.<br />
Munkvold, B.E., & Zigurs, I. (2007). Process and technology challenges in swift-starting virtual teams,<br />
Information & Management, 44, 287-299.<br />
Tarmizi, H., de Vreede, G-J., & Zigurs, I. (January-March, 2007). Leadership challenges in communities <strong>of</strong><br />
practice: Supporting facilitators via design and technology, International Journal <strong>of</strong> e-Collaboration, 3(1),<br />
18-39.<br />
Khazanchi, D. & Zigurs, I. (July-Sept 2006). Patterns for effective management <strong>of</strong> virtual projects: Theory<br />
and evidence, International Journal <strong>of</strong> e-Collaboration, 2(3), 25-48.<br />
Munkvold, B. E. & Zigurs, I. (April-June 2005). Integration <strong>of</strong> e-collaboration technologies: Research<br />
opportunities and challenges, International Journal <strong>of</strong> e-Collaboration, 1(2), 1-24 (invited paper,<br />
-373-
editorially reviewed).<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
“Applying Patterns <strong>of</strong> Technology-Enabled Distributed Collaboration: Improving Multi-Actor Decision-<br />
Making in Traffic Systems,” funded by <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, Research Collaboration Seed Grant,<br />
$10,000, April – December, 2005.<br />
“Mutual <strong>of</strong> <strong>Omaha</strong> Simulation Project – Phase Two,” funded by Mutual <strong>of</strong> <strong>Omaha</strong> Corporation through<br />
The Peter Kiewit Institute Technology Development Corporation, $16,160, September 27 – December<br />
20, 2004 (with D. Khazanchi).<br />
“Patterns <strong>of</strong> Virtual Projects: Identifying Effective Blueprints for Virtual Project Management,” funded by<br />
Project Management Institute, $30,000, January – December, 2004 (with D. Khazanchi).<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Course<br />
Term/year number<br />
Fall 2008 CIST 1010-<br />
001<br />
Fall 2008 CIST 1010-<br />
002<br />
Spring ISQA<br />
2008 9030-001<br />
Fall 2007 ISQA<br />
9900-001<br />
Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Foundations <strong>of</strong> Information Science and<br />
1 35<br />
Technology<br />
Foundations <strong>of</strong> Information Science and<br />
1 29<br />
Technology<br />
Behavioral/Organizational Issues 3 2<br />
Advanced Research in Information Systems 3 3<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
-374-
40%<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _n/a___%.<br />
-375-
-376-
John Clark<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
John W. Clark<br />
Instructor<br />
n/a<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Instructor<br />
Dates Held<br />
January 1999-Present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
B.S.<br />
Computer<br />
Science<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> September 1994 -<br />
May 1998<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
-377-
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
December<br />
1994-present<br />
Clark S<strong>of</strong>tware Solutions <strong>Self</strong> employed as a s<strong>of</strong>tware consultant / programmer<br />
Designing and writing s<strong>of</strong>tware mostly for the<br />
Department <strong>of</strong> Defense, and the Department <strong>of</strong> the<br />
Army, as well as NASA. This has ranged from large scale<br />
Java database applications to embedded C and C++ for<br />
handheld devices. This work has included several<br />
applications <strong>of</strong> graph theory as well as image and video<br />
processing in real-time. This business grew from doing<br />
desktop support, networking and troubleshooting for<br />
individuals and small business.<br />
August 1997 -<br />
December<br />
1998<br />
July 1995-<br />
August 1997<br />
Technical Support Inc.<br />
HKS Medical Information<br />
Systems<br />
S<strong>of</strong>tware Engineer<br />
Duties included consultant programming to customer<br />
specifications, design and recommendation on custom<br />
s<strong>of</strong>tware, project management, and customer relations.<br />
Part-time programmer<br />
Duties include writing data-feed parsers, web pages used<br />
for remote patient tracking, dynamically generated<br />
patient reports, Unix system administration, database<br />
management, on site and remote technical support for<br />
several hospitals, and Intel based hardware repair and<br />
construction.<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
See Item #6 above.<br />
-378-
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Course<br />
Semester Class<br />
Term/year number<br />
Course title<br />
hrs size<br />
Spring 2009 CSCI 1620- Introduction to Computer Science II 3 11<br />
001<br />
CSCI 1620- Introduction to Computer Science II 3 18<br />
002<br />
CSCI 2840 C++ & Object Oriented Programming 3 6<br />
CSCI 3320 Data Structures 3 20<br />
Fall 2008 CSCI 1620- Introduction to Computer Science II 3 26<br />
001<br />
CSCI 1620- Introduction to Computer Science II 3 29<br />
002<br />
CSCI 1840 Advanced Topics in C 3 32<br />
-379-
CSCI 3320 Data Structures 3 29<br />
Summer 2008 CSCI 1620 Introduction to Computer Science II 3 15<br />
CSCI 3320 Data Structures 3 22<br />
Spring 2008 CSCI 1620- Introduction to Computer Science II 3 23<br />
001<br />
CSCI 1620- Introduction to Computer Science II 3 28<br />
002<br />
CSCI 1620- Introduction to Computer Science II 3 14<br />
003<br />
CSCI 2840 C++ & Object Oriented Programming 3 13<br />
Fall 2007 CSCI 1620- Introduction to Computer Science II 3 22<br />
001<br />
CSCI 1620- Introduction to Computer Science II 3 30<br />
002<br />
CSCI 1840 Advanced Topics in C 3 25<br />
CSCI 3320 Data Structures 3 24<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __0___%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: 50% CIST core; 50% CS.<br />
-380-
Sidney Davis<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Sidney Davis<br />
Associate Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Assistant Pr<strong>of</strong>essor August 2000 – March 2003<br />
Associate Pr<strong>of</strong>essor March 2003 -- present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
B.M. Music Indiana <strong>University</strong> 1974<br />
MBA Business Southern Illinois <strong>University</strong> -- Carbondale 1983<br />
Ph.D. MIS Indiana <strong>University</strong> 1989<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
December 2005, HCI Research in MIS Workshop, Las Vegas Nevada<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
-381-
7. Consulting—list agencies and dates, and briefly describe each project:<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Committee member Undergraduate Program Committee 1.5 hours every 2 weeks<br />
Thesis committee for Thomas Bronieki, Master’s student, 3-4 hours prior to defense (Spring 2009)<br />
Senior editor, eService Journal, 3-4 hours for each paper that I receive for review<br />
Editorial Review Board member, Journal <strong>of</strong> Database Mgt., 2-3 hours for each review<br />
Ad hoc reviewer for Behaviour and Information Technology, 2-3 hours for each review<br />
Associate Editor for HCI track <strong>of</strong> ICIS 2009 (10-12 hours total)<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Graduate Council 2003-2004 (Committee B, Courses, Programs, and Evaluations)<br />
Writing Across the Curriculum Committee (WAC, Fall 2007 – Fall 2008)<br />
College <strong>of</strong> IS&T RP&T Committee, 2005-2008<br />
College <strong>of</strong> IS&T Technology Committee, 2006 - 2007<br />
ISQA Dept. PD&C Committee, 2005-2008<br />
Undergraduate Program Committee, 2005-2008<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
-382-
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Fall 2007 ISQA 3520 User Interface Design 3 11<br />
Fall 2007 ISQA 8525 User Interface Design 3 5<br />
Fall 2007 CIST 2910 Multimedia Systems 3 6<br />
Spring 2008 ISQA 3400 Data Communications 3 11<br />
Spring 2008 ISQA 3520 User Interface Design 3 11<br />
Spring 2008 ISQA 8525 User Interface Design 3 5<br />
Fall 2008 ISQA 3520 User Interface Design 3 16<br />
Fall 2008 ISQA 8525 User Interface Design 3 2<br />
Fall 2008 CIST 3100 Organizations, Applications, and Technology 3 24<br />
Spring 2009 ISQA 3400 Data Communications 3 23<br />
Spring 2009 ISQA 3520 User Interface Design 3 10<br />
Spring 2009 ISQA 8525 User Interface Design 3 3<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __15___%. Please give<br />
a brief description <strong>of</strong> your major research and scholarly activities:<br />
Editor and reviewer for 3 journals. Ad hoc reviewer for some journals. Served as committee chair for<br />
Master’s student.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-383-
-384-
G J de Vreede<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Gert-Jan de Vreede<br />
Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Pr<strong>of</strong>essor<br />
Dates Held<br />
2002-Present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
PhD Delft <strong>University</strong> <strong>of</strong> Technology 1991-1995<br />
MSc Information Delft <strong>University</strong> <strong>of</strong> Technology 1986-1991<br />
Systems<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Program chair <strong>of</strong> GDN2010 (2008-2009)<br />
Co-chair <strong>of</strong> ECIS2010, Research in Progress track (2008-2009)<br />
Co-chair <strong>of</strong> Center for Collaboration Science’s 3rd Research Seminar, <strong>Omaha</strong>, NE. (2008-2009)<br />
Co-chair <strong>of</strong> HICSS09 & HICSS10 minitrack on Designing Collaboration Processes and Systems.<br />
Co-chair <strong>of</strong> GDN09 sessions on Collaborative Requirements Engineering in Group Decision Making &<br />
Negotiation (2008-2009)<br />
Co-chair <strong>of</strong> EuroPLOP’s 2008 Thematic track on Patterns<br />
Program committee member <strong>of</strong> ISD2008, CRIWG08-09, GDN2009<br />
Organization committee chair for CRIWG 2008, <strong>Omaha</strong>, NE<br />
Co-chair <strong>of</strong> ICS 2nd Research Seminar, <strong>Omaha</strong>, NE. (2007-2008)<br />
Co-chair <strong>of</strong> HICSS08 & HICSS09 minitrack on Designing Collaboration Processes and Systems.<br />
-385-
Co-chair <strong>of</strong> GDN08 sessions on Facilitation in Group Decision Making & Negotiation<br />
Co-chair <strong>of</strong> EuroPLOP’s Thematic track on Patterns (2007-2008)<br />
Program committee member <strong>of</strong> ISD2007-2008, CRIWG07-08, Group Decision & Negotiation (GDN2007-<br />
2008), ICGSE 2007 workshop on “Tools for Globally Distributed S<strong>of</strong>tware Development”<br />
Organization committee chair for CRIWG 2008, <strong>Omaha</strong>, NE.<br />
Co-chair <strong>of</strong> HICSS06 & HICSS07 minitrack on Designing Collaboration Processes and Systems.<br />
Co-chair <strong>of</strong> AMCIS06 & AMCIS07 minitrack on Collaboration Engineering.<br />
Co-chair <strong>of</strong> GDN06 sessions on Facilitation and Collaboration Engineering <strong>of</strong> Group Decision Making &<br />
Negotiation<br />
Co-chair <strong>of</strong> GDN07 sessions on Facilitation in Group Decision Making & Negotiation<br />
Program committee member <strong>of</strong> ISD2006-2007, CRIWG06-07, Group Decision & Negotiation (GDN2006-<br />
2007),<br />
Member <strong>of</strong> International Association <strong>of</strong> Science and Technology for Development (IASTED) Technical<br />
Committee on Information Systems (2006-2007)<br />
Co-chair <strong>of</strong> HICSS05 & HICSS06 minitrack on Designing Collaboration Processes and Systems.<br />
Co-chair <strong>of</strong> AMCIS05 & AMCIS06 minitrack on Collaboration Engineering.<br />
Co-chair <strong>of</strong> GDN05 sessions on Facilitation Support in GSS<br />
Co-chair <strong>of</strong> GDN06 sessions on Facilitation and Collaboration Engineering <strong>of</strong> Group Decision Making &<br />
Negotiation<br />
Program committee member <strong>of</strong> ISD2006, CRIWG05-06, Context2005, International Conference on<br />
Knowledge Sharing and Collaborative Engineering (KSCE 2004), Group Decision & Negotiation<br />
(GDN2005-2006), ISCRAM2006, 1st International Conference on “Future Challenges And Current Issues<br />
In Business Information, Organisation And Process Management”.<br />
Member <strong>of</strong> International Association <strong>of</strong> Science and Technology for Development (IASTED) Technical<br />
Committee on Information Systems (2005-2006)<br />
Program co-chair <strong>of</strong> CRIWG2004 conference, Costa Rica, September 2004.<br />
Co-chair <strong>of</strong> HICSS05 minitrack on Research Methods and Approaches in Organizational Systems<br />
Research.<br />
Co-chair <strong>of</strong> HICSS05 & HICSS06 minitrack on Designing Collaboration Processes and Systems.<br />
Co-chair <strong>of</strong> AMCIS05 minitrack on Collaboration Engineering.<br />
Co-chair <strong>of</strong> GDN05 sessions on Facilitation Support in GSS<br />
Program committee member <strong>of</strong> International Conference on Electronic Commerce (ICEC2004), ISD2005,<br />
CRIWG05, Context2005, International Conference on Knowledge Sharing and Collaborative Engineering<br />
(KSCE 2004), Group Decision & Negotiation (GDN2005).<br />
Member <strong>of</strong> International Association <strong>of</strong> Science and Technology for Development (IASTED) Technical<br />
Committee on Information Systems (2004-2005)<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
2006- Director, Center for<br />
Collaboration Science<br />
2006 <strong>University</strong> <strong>of</strong> Pretoria Visiting Pr<strong>of</strong>essor<br />
-386-
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
1997-1999 Multimedia Skills Part time senior consultant<br />
1991 Hoogovens Simulation study to evaluate the maintenance process in<br />
the Oxy-2 factory <strong>of</strong> the Hoogovens steel mill factory<br />
1991 Sint Franciscus Gasthuis Analysis <strong>of</strong> the design, development, and<br />
implementation <strong>of</strong> a maintenance information system at<br />
a Rotterdam hospital<br />
1991 Heineken Bierbrouwerijen Analysis <strong>of</strong> the design, development, and<br />
implementation <strong>of</strong> a maintenance information system at<br />
Heineken Breweries in Zoeterwoude<br />
1991 Hoogovens Analysis <strong>of</strong> the design, development, and<br />
implementation <strong>of</strong> a maintenance information system at<br />
the Hoogovens steel mill factory<br />
1989 Rijnconsult Design, development, and implementation <strong>of</strong> an<br />
information system for analyzing the organization <strong>of</strong><br />
maintenance departments<br />
1989 Van Nelle Evaluation <strong>of</strong> the maintenance processes at Van Nelle<br />
Rotterdam, a c<strong>of</strong>fee, tea, and tabacco factory<br />
1987 Dr. Neher Laboratories <strong>of</strong><br />
the PTT<br />
Design and implementation <strong>of</strong> an information system for<br />
managing book orders in a library<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Director <strong>of</strong> UNO’s Center for Collaboration Science, a multi-college, multi-disciplinary effort involving<br />
about 40 researchers across all UNO’s colleges.<br />
Member <strong>of</strong> the CBA Recruiting Committee for Marketing & Management.<br />
Facilitator for Vice Chancellor Hynes’ Budget Task Force<br />
Member <strong>of</strong> the IS&T Executive Committee<br />
Coordinated the re-design <strong>of</strong> PKI279 (ongoing)<br />
Facilitator for IS&T Advisory Board Strategic Planning<br />
Member <strong>of</strong> the ISQA Graduate Program Committee<br />
Member <strong>of</strong> the ISQA Pr<strong>of</strong>essional Development Committee<br />
-387-
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Director <strong>of</strong> UNO’s Institute for Collaboration Science, a multi-college, multi-disciplinary efforts involving<br />
faculty across all UNO’s colleges. (2006-)<br />
Member <strong>of</strong> the ISQA Pr<strong>of</strong>essional Development Committee (2006-)<br />
Coordinated the re-design <strong>of</strong> PKI279 (2006-)<br />
Member and secretary <strong>of</strong> the IS&T Doctoral Program Committee (2003-)<br />
Member <strong>of</strong> the ISQA Graduate Program Committee (2003-)<br />
Member <strong>of</strong> the IS&T Executive Committee (2002-)<br />
Director <strong>of</strong> the Peter Kiewit Institute’s Program on Collaboration Engineering (2002-)<br />
Designed collaborative grant writing workshop for the College <strong>of</strong> Public Health (2007-2008)<br />
General Education Task Force: Designed and executed various workshops for the General Education<br />
task force. Point <strong>of</strong> contact: Associate Vice Chancellor Smith-Howell. (2006-2008)<br />
Facilitator for strategic discussions <strong>of</strong> Grad Council A. (2007-2008)<br />
Member <strong>of</strong> the ISQA Recruiting Committee (2006-2007)<br />
Designed and facilitated workshop for the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Federal Team to identify and discuss<br />
ways to achieve their priority goals concerning federal funding, 1 September 2005<br />
Designed and facilitated workshop for the School <strong>of</strong> Communication to prepare their self-study report,<br />
6 October 2005<br />
Honors Program contact for the ISQA Department (2005-2006)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Agres, A., Vreede, G.J. de, Briggs, R.O. (2005), A Tale <strong>of</strong> Two Cities – Case Studies on GSS Transition in<br />
Two Organizations, Group Decision & Negotiation, 14(4), 267-284.<br />
Briggs, R.O., Reinig, B., Vreede, G.J. de (2006), Meeting Satisfaction for Technology Supported Groups:<br />
An Empirical Validation <strong>of</strong> a Goal-Attainment Model, Small Group Research, 37(6), 1-26.<br />
Briggs, R.O., Reinig, B., Vreede, G.J. de (2008), The Yield Shift Theory <strong>of</strong> Satisfaction and its Application to<br />
IS/IT Domain, Journal <strong>of</strong> the Association for Information Systems, 9(5), 267-293.<br />
Davison, R., Vreede, G.J. de, Briggs, R.O. (2005), On Peer Review Standards for the Information Systems<br />
Literature, Communications <strong>of</strong> the AIS, 16(49), 967-980.<br />
Deokar, A., Kolfschoten, G.L., Vreede, G.J. de (2008), Prescriptive Workflow Design for Collaborationintensive<br />
Processes using the Collaboration Engineering Approach, Global Journal <strong>of</strong> Flexible Systems<br />
Management, 9(4), 13-24.<br />
Fruhling, A.L., Vreede, G.J. de (2006), Field Experiences with eXtreme Programming: Developing an<br />
Emergency Response System, Journal <strong>of</strong> Management Information Systems, 22(4), 39-68.<br />
Giaglis, G.M., Hlupic, V., Vreede, G.J. de, Verbraeck, A. (2005), Synchronous Design <strong>of</strong> Business Processes<br />
and Information Systems Using Dynamic Process Modelling, Business Process Management Journal,<br />
11(5), 488-500.<br />
Hengst, M. den, Vreede, G.J. de (2004), Collaborative Business Engineering: A Decade <strong>of</strong> Lessons from<br />
the Field, Journal <strong>of</strong> Management Information Systems, 20, 4, 87-115.<br />
Hengst, M. den, Vreede, G.J. de, Maghnouji (2007), R., Using S<strong>of</strong>t OR Principles for Collaborative<br />
-388-
Simulation: A Case <strong>Study</strong> in the Dutch Airline Industry, Journal <strong>of</strong> the OR Society advance online<br />
publication, 7 February 2007, (DOI 10.1057/palgrave.jors.2602353).<br />
Hlupic, V., Vreede, G.J. de (2005), Business Process Modelling using Discrete-Event Simulation: Current<br />
Opportunities and Future Trends, International Journal <strong>of</strong> Simulation and Process Modelling, 1(1/2), 72-<br />
81.<br />
Hlupic, V., Vreede, G.J. de, Orsoni, A. (2006), Modelling and Simulation Techniques for Business Process<br />
Analysis and Re-Engineering, International Journal <strong>of</strong> Simulation Systems, Science & Technology, 7(4-5),<br />
1-8.<br />
Kolfschoten, G.L., Briggs, R.O., Vreede, G.J., de, Jacobs, P.H.M., and Appelman, J.H. (2006). Conceptual<br />
Foundation <strong>of</strong> the ThinkLet Concept for Collaboration Engineering, International Journal <strong>of</strong> Human<br />
Computer Science 64, 611-621.<br />
Kolfschoten, G.L., Hengst, M. den, Vreede, G.J. de (2007), Issues in the Design <strong>of</strong> Facilitated<br />
Collaboration Processes, Group Decision & Negotiation, 16, 347-361.<br />
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), A social simulation game to explore future network<br />
coordination at the Amsterdam Police Force, Journal <strong>of</strong> Production, Planning, and Control, 17(6), 558-<br />
568.<br />
Niederman, F., Briggs, R.O., Vreede, G.J. de, Kolfschoten, G.L. (2008), Purposive Adaptive Structuration:<br />
The role <strong>of</strong> conscious agents in creating and utilizing new structures in collaboration, Journal <strong>of</strong> the<br />
Association for Information Systems, 9(10).<br />
Reinig, B., Briggs, R.O., Vreede, G.J. de (2009), A Cross-cultural study <strong>of</strong> the Relationship between<br />
Perceived Changes in Likelihood <strong>of</strong> Goal Attainment and Satisfaction with Technology Supported<br />
Collaboration, International Journal for e-Collaboration, 5(2), 61-74.<br />
Santanen, E., Briggs, R.O., Vreede, G.J. de (2004), Causal Relationships in Creative Problem Solving: The<br />
role <strong>of</strong> active facilitation in EBS, Journal <strong>of</strong> Management Information Systems, 20, 4 169-200.<br />
Smith, P.W., Anderson, A.O., Christopher, G.W., Cieslak, T.J., De Vreede, G.J., Fosdick, G.A., Greiner, C.B.,<br />
Hauser, J.M., Hinrichs, S.H., Huebner, K.D., Iwen, P.C., Jourdan, D.R., Kortepeter, M.G., Landon, V.P.,<br />
Lenaghan, P.A., Leopold, R.E., Marklund, A., Martin, J.W., Medcalf, S.J., Mussack, R.J., Neal, R.H., Ribner,<br />
B.S., Richmond, J.Y., Rogge, C., Roselle, G.A., Rupp, M.E., Sambol, A.R., Schaefer, J.E., Sibley, J., Streifel,<br />
A.J., Von Essen, S.G., Warfield, K.L. (2006), Designing a Biocontainment Unit to Care for Patients with<br />
Serious Communicable Diseases: A Consensus Statement, Biosecurity and Bioterrorism: Biodefense<br />
Strategy, Practice and Science, 4(4), 351-365.<br />
Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2007), Leadership Challenges In Communities Of Practice:<br />
Supporting Facilitators Via Design And Technology, International Journal <strong>of</strong> e-Collaboration, 3(1), 18-39.<br />
Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.J. de, Zigurs, I. (2007),<br />
Collaboration Engineering in Virtual Teams, e-Services Journal, 76-97.<br />
Topi, H., Valacich, J.S., Kaiser, K., Nunamaker, J.F. Jr., Sipior, J.C., Vreede, G.J. de, Wright, R.T. (2007),<br />
Revising the IS Model Curriculum: Rethinking the Approach and the Process, Communications <strong>of</strong> the AIS,<br />
(20), 728-740.<br />
Topi, H., Valacich, J.S., Wright, R.T., Kaiser, K., Nunamaker, J.F. Jr., Sipior, J.C., Vreede, G.J. de (2008),<br />
Revising Undergraduate IS Model Curriculum: New Outcome Expectations, Communications <strong>of</strong> the<br />
Association for Information Systems, 23, 591- 602.<br />
Vreede, G.J. de, Kolfschoten, G.L., Briggs, R.O. (2006), ThinkLets: A Collaboration Engineering Pattern<br />
Language, International Journal <strong>of</strong> Computer Applications in Technology, 25(2/3), 140-154.<br />
Vreede, G.J. de, Koneri, P.G., Dean, D.L., Fruhling, A.L., Wolcott, P. (2006), Collaborative S<strong>of</strong>tware Code<br />
Inspection: The Design and Evaluation <strong>of</strong> a Repeatable Collaborative Process in the Field, International<br />
Journal <strong>of</strong> Cooperative Information Systems, 15(2), 205-228.<br />
-389-
Vreede, G.J. de, Mgaya, R.J.S. (2006), Technology Supported Collaborative Learning for Higher<br />
Education: Comparative Case Studies in Tanzania, Information Technology for Development, 12(2), 113-<br />
130.<br />
Vreede, G.J. de, Mgaya, R.J.S., Qureshi, S. (2004), Field Experiences with Collaboration Technology: A<br />
Comparative <strong>Study</strong> in Tanzania and South Africa, Information Technology for Development, 10(3), 201-<br />
219.<br />
Agres, A., Vreede, G.J. de, Briggs, R.O. (2004), A Tale <strong>of</strong> Two Cities –Case Studies on GSS Transition in<br />
Two Organizations, Proceedings <strong>of</strong> the 37th Hawaiian International Conference on System Sciences, Los<br />
Alamitos: IEEE Computer Society Press. (Best paper finalist)<br />
Ali, H., Vreede, G.J. de, Ramachandra, K., Sidahmed, E., Sreenivas, H. (2004), Evaluating Wireless<br />
Architectures for GDS Applications, Proceedings <strong>of</strong> the 37th Hawaiian International Conference on<br />
System Sciences, Los Alamitos: IEEE Computer Society Press.<br />
Briggs, R.O., Kolfschoten, G.L, Vreede, G.J. de (2005), Toward a Theoretical Model <strong>of</strong> Consensus Building,<br />
Proceedings <strong>of</strong> AMCIS 2005, <strong>Omaha</strong>, NE.<br />
Briggs, R.O., Kolfschoten, G.L., Vreede, G.J. de, Dean, D.L. (2006), Defining Key Concepts for<br />
Collaboration Engineering, in: Irma Garcia, Raúl Trejo (eds.), Proceedings <strong>of</strong> the 12th Americas<br />
Conference on Information Systems, Acapulco, Mexico, August 4th-6th 2006, 121-128.<br />
Briggs, R.O., Reinig, B.R., Vreede, G.J. de (2006), Satisfaction with groupware-supported work practices,<br />
in: Bongsik Shin (ed.), Proceedings <strong>of</strong> the San Diego International Systems Conference, San Diego, July<br />
14-16, 2006.<br />
Dao, V., Chidambaram, L., Vreede, G.J. de (2006), The Invisible Pilot in Virtual Teams: An Investigation <strong>of</strong><br />
the Impact <strong>of</strong> Facilitation on Virtual Teams, Proceedings <strong>of</strong> AMCIS2006, Acapulco, Mexico, August 2006.<br />
Davis, A., Kamal, M., Schoonover, T., Nabukenya, J., Pietron, L.R., Vreede, G.J. de, Incident Response<br />
Planning Using Collaboration Engineering Process Development and Validation, WISA: SIGSEC Workshop<br />
2006, Milwaukee, WI, 10 December 2006.<br />
Davis, A., Badura, V., Vreede, G.J. de (2008), Understanding Methodological Differences to <strong>Study</strong><br />
Convergence in Group Support System Sessions, CRIWG 2008, September 14-18, <strong>Omaha</strong>, <strong>Nebraska</strong>.<br />
Fruhling, A.L., Sambol, A., Hinrichs, S., Vreede, G.J. de (2006), Designing An Emergency Response System<br />
for Electronic Laboratory Diagnostics Consultation, Proceedings <strong>of</strong> the 39th Hawaiian International<br />
Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />
Fruhling, A., Tyser, K., Vreede, G.J. de (2005), Experiences with Extreme Programming in Telehealth:<br />
Developing and Implementing a Biosecurity Health Care Application, Proceedings <strong>of</strong> the 38th Hawaiian<br />
International Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />
Hlupic, V., Vreede, G.J. de, Orsoni, A. (2006), The Role <strong>of</strong> Discrete Event Simulation in Business Process<br />
Analysis and Re-Engineering, Proceedings <strong>of</strong> the 9th International Conference on Computer Modelling<br />
and Simulation (UKSim06), Oxford, April 2006.<br />
Kamal, M., Davis, A.J., Nabukenya, J., Schoonover, T.V., Pietron, L.R., Vreede, G.J. de, (2007),<br />
Collaboration Engineering for Incident Response Planning: Process Development and Validation,<br />
Proceedings <strong>of</strong> the 40th Hawaiian International Conference on System Sciences, Los Alamitos: IEEE<br />
Computer Society Press.<br />
Kanapuram, S., Ali, H.H., Vreede, G.J. de (2006), On Effective Utilization <strong>of</strong> Wireless Networks in<br />
Collaborative Applications, Proceedings <strong>of</strong> the 2nd International Conference on Collaborative<br />
Computing: Networking, Applications and Worksharing, Atlanta, November 2006.<br />
Kolfschoten, G.L., Appelman, J.H., Briggs, R.O., Vreede, G.J. de (2004), Recurring Patterns <strong>of</strong> Facilitation<br />
Interventions in GSS Sessions, Proceedings <strong>of</strong> the 37th Hawaiian International Conference on System<br />
Sciences, Los Alamitos: IEEE Computer Society Press.<br />
-390-
Kolfschoten, G.L, Briggs, R.O., Appelman, J.H., Vreede, G.J. de (2004), ThinkLets as Building Blocks for<br />
Collaboration Processes: A Further Conceptualization, Lecture Notes in Computer Science, Berlin,<br />
Springer Verlag, 2004.<br />
Kolfschoten, G.L., Duivenvoorde, G., Briggs, R.O., Vreede, G.J. de (2009), Towards an instrument to<br />
measure Successfulness <strong>of</strong> collaborative effort from a participant perspective, Proceedings <strong>of</strong> the 42nd<br />
Hawaiian International Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />
Kolfschoten, G.L., Duivenvoorde, G., Briggs, R.O., Vreede, G.J. de (2009), Practitioners vs Facilitators a<br />
comparison <strong>of</strong> participant perceptions on success, Proceedings <strong>of</strong> the 42nd Hawaiian International<br />
Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />
Kolfschoten, G.L., Niederman, F., Briggs, R.O., Vreede, G.J. de (2006), Understanding the Job<br />
Requirements for Collaboration Technology Support through a Hybrid IT-End User Job Classification<br />
Model: The Case <strong>of</strong> Collaboration Engineering and Facilitation, SIGCPR Conference.<br />
Kolfschoten, G.L., Niederman, F., Briggs, R.O., Vreede, G.J. de (2008), Role Separation in Strategies for<br />
Collaboration Support, Proceedings <strong>of</strong> the 41st Hawaiian International Conference on System Sciences,<br />
Los Alamitos: IEEE Computer Society Press.<br />
Kolfschoten, G.L., Valentin, E., Verbraeck, A., Vreede, G.J. de (2006), Cognitive load reduction through<br />
the use <strong>of</strong> building blocks in the design <strong>of</strong> decision support systems, Proceedings <strong>of</strong> AMCIS2006,<br />
Acapulco, Mexico, August 2006.<br />
Kolfschoten, G.L., Hengst, M. den, Vreede, G.J. de (2005), Issues in the Design <strong>of</strong> Facilitated<br />
Collaboration Processes, Proceedings <strong>of</strong> Group Decision & Negotiation 2005, Vienna, Austria, July 10-13,<br />
1-17.<br />
Kolfschoten, G.L., Vreede, G.J. de, Pietron, L.R. (2006), A training approach for the transition <strong>of</strong><br />
repeatable collaboration processes to practitioners, Proceedings <strong>of</strong> Group Decision & Negotiation 2006,<br />
Karlsruhe, June 2006.<br />
Kolfschoten, G.L., Vreede, G.J. de, The Collaboration Engineering Approach for Designing Collaboration<br />
Processes, Proceedings <strong>of</strong> CRIWG 2007, Bariloche, Argentina, September 16-20.<br />
Kolfschoten, G.L., Vreede, G.J. de, Briggs, R.O., Computer Aided Pattern-Based Collaboration Process<br />
Design: A Computer Aided Collaboration Engineering Tool, Proceedings <strong>of</strong> CRIWG 2007, Bariloche,<br />
Argentina, September 16-20.<br />
Koneri, P.G., Vreede, G.J. de, Dean, D.L., Fruhling, A.L., Wolcott, P. (2005), The Design and Field<br />
Evaluation <strong>of</strong> a Repeatable Collaborative S<strong>of</strong>tware Code Inspection Process, in: Fuks, H., Lukosch, S.,<br />
Salgado, A.C. (eds.), Proceedings <strong>of</strong> CRIWG 2005, LNCS3706, pp. 325-340, Springer Verlag Berlin<br />
Heidelberg.<br />
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2004), Exploring new coordination scenarios for workflows in the<br />
Amsterdam Police Force: Simulation-games as organizational change instruments, Proceedings <strong>of</strong> IFIP<br />
WG 5.7 8th workshop on Experiential learning in chains and networks', Wageningen, the Netherlands,<br />
24-27 May 2004.<br />
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2005), A Coordination Framework for Analysis and Improvement<br />
<strong>of</strong> ICT Supported Distributed Work, Proceedings <strong>of</strong> the IRIS28, Kristiansand, Norway, August 6-9.<br />
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), Designing simulation-games for organizational<br />
prototyping, in: A.G. Nilsson et al (eds), Advances in information systems development – Bridging the<br />
gap between academia and practice, Proceedings <strong>of</strong> ISD 2005 (the fourteenth international conference<br />
on Information Systems Development), August 15-17, Karlstad, Sweden, 373-385.<br />
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2005). Dealing with Paradox in business engineering, simulationgames<br />
as learning environments. In Backlund, P., Carlsson S. and Söderstrom S. (eds.), Proceedings <strong>of</strong><br />
the forum poster session in conjunction with Business Informatics Research (BIR) 2005, Skövde, 3-4<br />
-391-
October, 2005, pp. 59-68.<br />
Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), Developing paradoxical guidelines for communities <strong>of</strong><br />
practice in organizations, Proceedings <strong>of</strong> the European Conference on Information Systems, Göteborg,<br />
Sweden, 2006.<br />
Noteboom, C., Zhang, C., Tarmizi, H., Steinhauser, L., Payne, M., Vreede, G.J. de, Zigurs, I. (2006),<br />
Research as Teaching and Teaching as Research: Reflections on a Virtual Team Project, Mid-West<br />
Association <strong>of</strong> Information Systems Conference.<br />
Read, A.S., Renger, D.R.M., Briggs, R.O., Vreede, G.J. de (2009), Fundamental Topics <strong>of</strong> Organizing: A<br />
Research Agenda, Proceedings <strong>of</strong> the 42nd Hawaiian International Conference on System Sciences, Los<br />
Alamitos: IEEE Computer Society Press.<br />
Reinig, B., Briggs, R.O., Vreede, G.J. de (2008), A cross-cultural investigation <strong>of</strong> the goal-attainmentlikelihood<br />
construct and its effect on satisfaction with technology supported collaboration, Proceedings<br />
<strong>of</strong> the 41st Hawaiian International Conference on System Sciences, Los Alamitos: IEEE Computer Society<br />
Press.<br />
Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Patterns in Collaborative Modeling: A Literature<br />
Review, in: Costa, J. (ed.), Proceedings <strong>of</strong> Group Decision & Negotiation 2008, Coimbra, Portugal.<br />
Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Challenges with Collaborative Modeling: A<br />
Literature Review, in: Jan L.G. Dietz, Antonia Albani, Joseph Barjis, Peter Rittgen (eds), Advanced<br />
Enterprise Engineering, Lecture Notes in Business Information Processing, Berlin: Springer-Verlag (AIS<br />
SIGMAS Best Paper Award).<br />
Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Using Interactive Whiteboard Technology to<br />
Support Collaborative Modeling, CRIWG 2008, September 14-18, <strong>Omaha</strong>, <strong>Nebraska</strong>.<br />
Santanen, E., Vreede, G.J. de, (2004) Creative Approaches to Measuring Creativity: Comparing the<br />
Effectiveness <strong>of</strong> Four Divergence thinkLets, Proceedings <strong>of</strong> the 37th Hawaiian International Conference<br />
on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />
Steinhauser, L., Read, A., Vreede, G.J. de (2008), <strong>Study</strong>ing the Adoption <strong>of</strong> Collaborative Work Practices<br />
Using the Value Frequency Model, in: Germonprez, M., Iversen, J. (eds), Proceedings <strong>of</strong> the Midwest<br />
United States Association for Information Systems 3rd Annual Conference, Eau Claire, Wisconsin, May<br />
2008.<br />
Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.J. de, Zigurs, I. (2006),<br />
Technical and Environmental Challenges <strong>of</strong> Collaboration Engineering in Distributed Environments,<br />
Proceedings <strong>of</strong> CRIWG 2006, Medina del Campo, Spain, September 2006, 38-53.<br />
Tarmizi, H., Vreede, G.J. de (2005), A Facilitation Task Taxonomy for Communities <strong>of</strong> Practice,<br />
Proceedings <strong>of</strong> AMCIS 2005, <strong>Omaha</strong>, NE.<br />
Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2006), Identifying Challenges in communities <strong>of</strong> practice<br />
facilitation, Proceedings <strong>of</strong> the 39th Hawaiian International Conference on System Sciences, Los<br />
Alamitos: IEEE Computer Society Press.<br />
Tarmizi, H., Zigurs, I., Vreede, G.J. de (2006), Understanding E-Leadership In Distributed Crisis Response<br />
Teams, Gallup Leadership Institute Summit, Washington DC, October.<br />
Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2007). A Facilitators’ Perspective on Successful Virtual<br />
Communities <strong>of</strong> Practice. The thirteenth Americas Conference on Information Systems, August 9-12,<br />
Keystone, Colorado.<br />
Vreede, G.J. de, Briggs, R.O. (2005), Collaboration Engineering: Designing Repeatable Processes for High-<br />
Value Collaborative Tasks, Proceedings <strong>of</strong> the 38th Hawaiian International Conference on System<br />
Sciences, Los Alamitos: IEEE Computer Society Press.<br />
Vreede, G.J. de, Briggs, R.O. Reinig, B. (2008), e-Collaboration Satisfaction: Empirical Field Studies <strong>of</strong><br />
-392-
Disconfirmation Theory Across Two Countries, Proceedings <strong>of</strong> AMCIS.<br />
Vreede, G.J. de, Fruhling, A., Chakrapani, A. (2005), A Repeatable Collaboration Process for Usability<br />
Testing, Proceedings <strong>of</strong> the 38th Hawaiian International Conference on System Sciences, Los Alamitos:<br />
IEEE Computer Society Press.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009 ISQA 8950 Capstone MIS 3 12<br />
ISQA 9900 Advanced Research in Collaboration Science 3 3<br />
Fall 2008 ISQA8080 Facilitation <strong>of</strong> Collaborative Problem Solving 3 6<br />
with Groupware<br />
ISQA9900 Facilitation <strong>of</strong> Collaborative Problem Solving 3 3<br />
with Groupware<br />
Spring 2008 ISQA 8220 Advanced System Analysis & Design 3 18<br />
ISQA 8950 Capstone MIS 3 10<br />
Fall 2007 ISQA 8080 Seminar: Facilitation <strong>of</strong> Collaboration 3 7<br />
ISQA 8220 Advanced System Analysis & Design 3 25<br />
ISQA 9900 Facilitation <strong>of</strong> Collaborative Problem Solving<br />
with Groupware<br />
3 4<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-393-
-394-
Ken Dick<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Kenneth L. Dick<br />
Senior Research Fellow<br />
Not tenure track<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Bachelor <strong>of</strong><br />
Science<br />
Master <strong>of</strong><br />
Science<br />
Doctor <strong>of</strong><br />
Philosophy<br />
Mathematics <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Lincoln 1972<br />
Guidance and<br />
Counseling<br />
Administration,<br />
Curriculum and<br />
Instruction<br />
Creighton <strong>University</strong> 1975<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Lincoln 1983<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
-395-
Dates Where Duties<br />
1998-Present <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Senior Research Fellow in Telecommunications<br />
<strong>Omaha</strong><br />
1994-1998 PKS / MFS / WorldCom, <strong>Omaha</strong>,<br />
NE<br />
Director,-Strategic Enterprise Direction /<br />
Architecture & Standards<br />
1989-1994 First Data Corp, <strong>Omaha</strong>, NE Director-Management Information Systems<br />
1979-1984 Creighton <strong>University</strong> Adjunct Pr<strong>of</strong>essor<br />
1979-1989 USWest, <strong>Omaha</strong>, NE Systems Manager<br />
1975-1979 Papillion Public Schools Director-Alternative School<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
David City Hospital<br />
communications<br />
City Stream<br />
CLEC / DLEC IP networking<br />
Odin Capital<br />
MCIWorldcom<br />
IT Architecture for local deployment<br />
Orillion<br />
IT Architecture for next generation OSS<br />
Alvine & Associates<br />
telecommunications practice<br />
Engineering<br />
Union Pacific Railroad<br />
Communications<br />
Odin Financial<br />
Due Diligence<br />
Telesuite<br />
Technical Architecture<br />
Quantum Dynamics<br />
IT Architectural Review<br />
<strong>Omaha</strong> Police Department System & Communications Review<br />
<strong>Omaha</strong> Public Schools<br />
Network Infrastructure<br />
Relapoint<br />
System Standards<br />
DiscoverWhy<br />
Operational Standards<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
IS & T, Executive Committee<br />
IST & E, New Building Committee<br />
IST & E, Joint Chair Committee<br />
IS&T / Metropolitan Community College Collaboration<br />
-396-
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
IS & T, Executive Committee (1998-Present)<br />
IST & E, New Building Committee, (1998-Present)<br />
IST & E, Joint Chair Committee, (1999-Present)<br />
IS&T / Metropolitan Community College Collaboration, (2000-Present)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
UNMC Smoking Cessation PDA program. (2006-2007)<br />
Teaching American History, DOE grant for Web site development. $50,000 over three years. (2004-2007)<br />
National Park Service, Lewis and Clark Bicentennial Web site, $1,000,000 over four years plus an<br />
additional $3-5M in hardware & services donations. (2002-2007)<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009 CSCI 3550 Communication Networks 3 23<br />
CSCI 8220 Telecommunications Management 3 9<br />
CSCI 8555 Communication Networks 3 8<br />
ISQA 8310 Data Communications 3 17<br />
Fall 2008 CSCI 8210 Advanced Communication Networks 3 9<br />
ISQA 8310 Data Communications 3 28<br />
Summer 2008 CSCI 3550 Communication Networks 3 11<br />
CSCI 8555 Communication Networks 3 1<br />
ISQA 3400 Business Data Communications 3 3<br />
-397-
Spring 2008 CSCI 8220 Telecommunications Management 3 6<br />
CSCI 8410 Distributed Systems and Network Security 1.5 8<br />
ISQA 8230 Telecommunications Management 3 7<br />
Fall 2007 CSCI 8210 Advanced Communication Networks 3 16<br />
ISQA 8310 Data Communications 3 25<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-398-
Donna Dufner<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Donna Dufner<br />
Associate Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Assistant Pr<strong>of</strong>essor Jan. 2000 – Aug. 2003<br />
Associate Pr<strong>of</strong>essor Aug 2003 - present<br />
Distinguished Teacher<br />
Ad Perpetuum<br />
Pr<strong>of</strong>essional Project<br />
Manager (PMP® )<br />
Senior Member IEEE Advanced 2007<br />
Title is given in perpetuity to recipients <strong>of</strong><br />
the <strong>University</strong>-wide Outstanding Teaching<br />
and Instructional Creativity Award (OTICA)<br />
2008<br />
2004 – current<br />
2007 – Completed recertification<br />
successfully1<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D. Computer and Information Science Rutgers <strong>University</strong>,<br />
1995<br />
Management<br />
M.S. Computer and Information Science The New Jersey Institute <strong>of</strong> 1995<br />
Technology<br />
M.B.A. Market Research The <strong>University</strong> <strong>of</strong> Chicago, 1977<br />
Graduate School <strong>of</strong> Business<br />
B.A. Sociology DePaul <strong>University</strong> 1975<br />
1 To maintain PMP certification each certified PMP must go through a recertification process. The objective is maintain and<br />
improve skills through learning about new and changing best practices in the field <strong>of</strong> project management.<br />
-399-
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Pr<strong>of</strong>essional Development in Chronoligical Order:<br />
2005 - present: Volunteer Training at the Douglas County Department <strong>of</strong> Corrections<br />
Attend Volunteer Training at the Douglas County Department <strong>of</strong> Corrections each semester with my<br />
students in preparation for the Service-Learning Course I teach at the Douglas County Department <strong>of</strong><br />
Correction, Teaching Computer Basics to Inmates. I attend the training each semester to refresh and<br />
reinforce my preparation to work with inmates and my UNO students in the jail environment. I also<br />
want to begin the course by demonstrating that I will be available to my UNO students at all times<br />
during this very intensive, demanding, and extremely rewarding growth experience. The training is<br />
conducted once per semester on the Saturday morning before the semester begins.<br />
2009 - Conference: American Jail Association JA's 28th Annual Training Conference & Jail Expo, April 26 -<br />
29, Louisville, Kentucky.<br />
2008 - Teaching Circle: to evaluate and adopt advanced educational techniques.<br />
2007 - Conference: CUMU Conference, Florida International <strong>University</strong>, Miami FL, October 21-24.<br />
2007 - Project Management Pr<strong>of</strong>essional (PMP®) Re-certification: successfully completed as required by<br />
the Project Management Institute.<br />
2004 - Project Management Pr<strong>of</strong>essional (PMP®) Certification: “The PMP Certification is the project<br />
management pr<strong>of</strong>ession’s most recognized and respected global credential. To obtain PMP certification,<br />
an individual must satisfy education and experience requirements, agree to adhere to a Pr<strong>of</strong>essional<br />
Code <strong>of</strong> Conduct and pass the PMP Certification Examination. The Project Management Institute (PMI)<br />
Certification Department is the first pr<strong>of</strong>essional certification program <strong>of</strong> its kind in the world to receive<br />
the ISO 9001 certification, a globally recognized mark <strong>of</strong> a quality management system (Project<br />
Management Institute).”<br />
2004-2005 - Leadership <strong>Omaha</strong>: One person from the <strong>University</strong> is nominated by the chancellor and a<br />
team <strong>of</strong> community leaders selects those who will constitute that year’s class. Leadership <strong>Omaha</strong>, then<br />
in its 27th year, is one <strong>of</strong> the oldest and most respected community leadership programs in the nation.<br />
The program consisted <strong>of</strong> once per month meetings from 7:30 AM to 7:30 PM during which,<br />
economic, social, educational, health, etc. issues were covered. We learned about <strong>Omaha</strong> and <strong>Nebraska</strong><br />
and the cultural and community service opportunities available. The program also exposed the class to<br />
the services made available such as homeless shelters, dental clinics, nursing home facilities for those<br />
with disabilities; and, to the need for additional services for those in need in <strong>Omaha</strong> and <strong>Nebraska</strong>. In<br />
addition we were taught about the political promise, the inequities and political issues, and the<br />
economic and political challenges in <strong>Nebraska</strong>.<br />
As a part <strong>of</strong> the program I also served on a team with other members <strong>of</strong> the Leadership <strong>Omaha</strong><br />
Class. We were charged with performing a project that would contribute to the health <strong>of</strong> <strong>Omaha</strong>. The<br />
team elected to perform a sustainable project and develop a Web based service to enable citizens,<br />
visitors and individuals who might relocate to <strong>Omaha</strong> to easily find entertainment and cultural<br />
opportunities at a glance. The objective <strong>of</strong> our project is demonstrate that <strong>Nebraska</strong> can be fun and<br />
<strong>of</strong>fers wonderful cultural opportunities. KETV sponsored the project and IN-The-O continues to benefit<br />
<strong>Nebraska</strong>. The project was launched at the Peter Kiewit Institute in the Atrium in the spring <strong>of</strong> 2005 (I<br />
served as the hostess). Several hundred people attended. You can view KETV.com –In-the-O located at<br />
the following URL: http://www.ketv.com/intheo/index.html<br />
Summer 2005 - Leadership <strong>Omaha</strong> –Gazing and Grazing Program<br />
-400-
Participated in the Gazing and Grazing Program with my class from Leadership <strong>Omaha</strong>. We traveled all<br />
over <strong>Nebraska</strong> by bus. The program is designed to teach about the economic drivers, educational,<br />
political, cultural, etc. issues confronting <strong>Nebraska</strong>ns. We also we shown and given the opportunity to<br />
enjoy the immense beauty and amazing natural resources <strong>of</strong> <strong>Nebraska</strong>. As the bus traveled throughout<br />
the state over a period <strong>of</strong> several days, speakers would board and give lectures and answer questions.<br />
We visited ranches, natural resources, and schools to mention a few.<br />
2004-2005 - Women’s Leadership Institute: Selected by the chancellor to participate in the Women’s<br />
Leadership Institute at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> (UNO). Candidates from various educational<br />
institutions are nominated for participation by the Deans <strong>of</strong> their schools and selected by the Chancellor<br />
from the pool <strong>of</strong> nominees. The Institute gave me the opportunity to learn about the <strong>University</strong>. Since I<br />
spent approximately 15 years <strong>of</strong> my career in the business world at major corporations such as AT&T,<br />
Chemical Bank Corp., ARDIS (a joint venture <strong>of</strong> IBM and Motorola), Bell Atlantic Nynex, before coming to<br />
academia; learning about inner workings <strong>of</strong> the <strong>University</strong> was especially important for me.<br />
2005 - Research Triangle: “UNO Government Information Systems Management,” <strong>University</strong> <strong>of</strong><br />
<strong>Nebraska</strong> at <strong>Omaha</strong>, <strong>Omaha</strong>, NE.<br />
2005 - Conference: XVII Asian Pacific Conference on International Accounting Issues, Wellington, New<br />
Zealand, November 20-23.<br />
2005-Conference: 38th Annual Hawaii International Conference on System Sciences.<br />
2004-Conference: Human Factors in Computing Systems, Special Interest Groups (SIGs), SIGCHI ACM,<br />
April 24-29, Vienna, Austria.<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
2009-on-going Project<br />
Management for the Douglas<br />
County Department <strong>of</strong><br />
Corrections<br />
community outreach<br />
Serve as the Project Manager<br />
<strong>of</strong> a multi-million dollar<br />
project for the Douglas<br />
County Department <strong>of</strong><br />
Corrections with the support<br />
<strong>of</strong> student interns.<br />
2008 – present<br />
Prospect Hills Cemetery<br />
Board<br />
Board Member<br />
community outreach<br />
The project is an Enterprise-wide Information<br />
Technology development and implementation for<br />
the Douglas County Department <strong>of</strong> Corrections.<br />
My work is Pro Bono2. Field work provides an<br />
opportunity for me to keep my practical skills up to<br />
date and for students to work in the field with a<br />
seasoned project manager on a system <strong>of</strong><br />
substantial impact and importance.<br />
Prospect Hills Cemetery is one <strong>of</strong> the oldest and<br />
most historic cemeteries in the nation.<br />
Provide technical support and advice as a board<br />
member.<br />
The project is<br />
providing<br />
funding <strong>of</strong><br />
approximately<br />
$59,364 for<br />
student<br />
internships. One<br />
summer intern<br />
and two fall and<br />
spring 2009-<br />
2010.<br />
2007 South Korea<br />
Invited Expert in Project<br />
Title <strong>of</strong> my talk: “Practical Applications in Project<br />
Management: Knowing What Questions to Ask.”,<br />
Only nine<br />
individuals were<br />
-401-
Management<br />
Conference all Korean Universities Hosted by the<br />
Government <strong>of</strong> South Korea, Nov. 2. (All travel<br />
expenses paid by the host).<br />
invited from all<br />
over the world<br />
to present at<br />
this event. I was<br />
the only woman<br />
and the only<br />
American.<br />
2005 Mutual <strong>of</strong> <strong>Omaha</strong><br />
community outreach<br />
2007 Booz, Allen and<br />
Hamilton<br />
community outreach<br />
Teaching at Mutual <strong>of</strong> <strong>Omaha</strong><br />
Taught a session for the PMP <strong>Study</strong> Group at<br />
Mutual <strong>of</strong> <strong>Omaha</strong>, <strong>Omaha</strong>, NE. Project<br />
Communications Management and Human<br />
Resource Management<br />
Intensive Project Management Course)<br />
Developed and taught a four day (8 hours per day)<br />
intensive project management course for<br />
managers working on contracts at USSTRATCOM.<br />
Contractors will be expected to use the Project<br />
Management Institute best practices and be<br />
certified. The Department <strong>of</strong> Defense uses the IEEE<br />
Standards coupled with the PMI best practices<br />
embodied in the Project Management Body <strong>of</strong><br />
Knowledge (PMBOK) for s<strong>of</strong>tware engineering. In<br />
all <strong>of</strong> my courses I teach Best Practices using the<br />
PMBOK, the IEEE Standards, and the mathematical<br />
foundation <strong>of</strong> project management based on<br />
Management Science using Hillier, Hillier and<br />
Lieberman, Introduction to OR/MS.<br />
-402-<br />
Taught PMP<br />
study group<br />
hosted by<br />
Mutual but<br />
open to the<br />
community <strong>of</strong><br />
<strong>Omaha</strong> Pro<br />
Bono<br />
The course was<br />
provided Pro<br />
Bono as out<br />
reach to the<br />
business<br />
community.<br />
"Rave Reviews”<br />
were received<br />
from the<br />
students.<br />
Assistant Pr<strong>of</strong>essor, MIS <strong>University</strong> <strong>of</strong> Illinois at Springfield 07/96-01/00<br />
Taught twenty-four Management Information Systems, Systems Analysis and Design, CASE,<br />
Telecommunications and COBOL at the graduate and undergraduate level.<br />
Supervised approximately 10 graduate projects, served on the project committees <strong>of</strong> 6 students,<br />
served as the sole academic advisor for approximately 40 students.<br />
Assistant Pr<strong>of</strong>essor, MIS Polytechnic <strong>University</strong> 01/95-07/96<br />
Taught Information Technology (IT), IT Strategy, Telecommunications, MIS, DSS, at the graduate and<br />
Executive Program level.<br />
Project Manager<br />
ARDIS, (a joint venture <strong>of</strong> IBM and Motorola 07/91-11/93<br />
specializing in wireless data transmission)<br />
Project manager responsible for determining economic, technical, and organizational feasibility <strong>of</strong><br />
wireless access to production systems data in a diversity <strong>of</strong> hardware, s<strong>of</strong>tware, and<br />
telecommunications environments. Managed all stages <strong>of</strong> systems design, development, and<br />
implementation for customers such as UNISYS and Bell Atlantic Business Systems.<br />
Assistant Vice President,<br />
Information and Technology<br />
Chemical New York Corporation 03/85-12/88
Management Division<br />
Responsible for: providing financial systems support for the controller <strong>of</strong> the Information and<br />
Technology Management Division; and providing on-site <strong>of</strong>fice systems support to all senior<br />
executives, their staffs, and executive support groups (training, programming, hardware and<br />
operations support, etc.).<br />
Project Manager/Systems AT&T 01/79-11/83<br />
Analyst<br />
Responsible for: applications s<strong>of</strong>tware development, selection <strong>of</strong> s<strong>of</strong>tware packages and computer<br />
hardware, and installation <strong>of</strong> hardware and s<strong>of</strong>tware. Held both line and staff positions in various<br />
subsidiaries within the company.<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Honors Coordinator including, Honors advising and honors colloquia planning for the college: 10 hrs<br />
Thesis advising: 10 hrs per week<br />
Independent studies: 10 hrs per week<br />
Committee work: Graduate Committee, Graduate Committee A, Honors Committee work: 4 hours per<br />
week.<br />
Course Coordination for ISQA 4910, ISQA 8820 and ISQA 8810: 3 hour per week<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
2004-2005: Chair <strong>of</strong> the Faculty Search Committee<br />
2004-2007: Serve on the Undergraduate Program Committee for ISQA:<br />
2004- present: Honors Committee –<br />
2003-2007: Faculty Senate Pr<strong>of</strong>essional Conduct Committee<br />
2006-2009: Graduate Council<br />
2006-2009: Graduate Council Committee B<br />
2007: Chancellor’s Commission on Multi-cultural Affairs<br />
2004 – present: Honor’s Coordinator for the College<br />
2007- present: AAUP Executive Board<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
-403-
Book Chapters<br />
Dufner, D. Alavi, M. and Caroline Howard (2009) “Evolving Technologies Supportive <strong>of</strong> Collaborative<br />
Learning”, (Eds) Caroline Howard, Judith V. Boettecher, Lorraine Justice, Karen D. Schenk, Gary A. Berg,<br />
Patricia L. Rogers, Encyclopedia <strong>of</strong> Distance Learning, Hershey, PA: Idea Group Publishing.<br />
Reed, B.J., Holley, L. and Dufner, D. (2007) “The Performance Challenge: Integrating Uncoupled<br />
Government Information Technology”, In Government Performance Project Findings, Jessica M.<br />
Crawford, Ed, Baltimore, MD: Johns Hopkins <strong>University</strong> Press.<br />
Alavi, M., D. Dufner, and C. Howard, (2005) "Collaborative Learning Technologies". (Eds) Caroline<br />
Howard, Judith V. Boettecher, Lorraine Justice, Karen D. Schenk, Gary A. Berg, Patricia L. Rogers,<br />
Encyclopedia <strong>of</strong> Distance Learning, Hershey, PA: Idea Group Publishing.<br />
Alavi, M. and Dufner, D. (2004) “Technology-Mediated Collaborative Learning: A Research Perspective”,<br />
S. R. Hiltz and R. Goldman, Eds. In Learning Together Online: Research on Asynchronous Learning<br />
Networks. Mahwah, NJ: Lawrence Erlbaum Associates, Inc., 191-213.<br />
Refereed Journal Articles:<br />
Holley, L., Dufner, D., and Reed, B.J. (2004) “Strategic Information Systems Planning (SISP) in US County<br />
Governments”, Public Performance and Management Review. March, 27 (3): 102-126.<br />
Presentations:<br />
Foxall, Mark and Dufner, Donna (2009) “Building Strategic Opportunities through <strong>University</strong> Service-<br />
Learning Programs and Volunteerism”, American Jail Association JA's 28th Annual Training Conference &<br />
Jail Expo, April 26 - 29, Louisville, Kentucky. Presentation and panel discussion.<br />
Dufner, D. (2008) “Play Ball! - Hitting Home Runs Using Project Management Techniques”, ProDev, A<br />
Conference for Project Pr<strong>of</strong>essionals, September 22, Scott Conference Center, <strong>Omaha</strong>, NE.<br />
Dufner, D. (2007) “Practical Applications in Project Management: Knowing What Questions to Ask.”,<br />
Conference Hosted by the Government <strong>of</strong> South Korea, Nov. 2. (All expenses paid by the host).<br />
Dufner, D. (2007) “Service-Learning: Catching the Attention <strong>of</strong> the IPod Generation”, Midwest<br />
Consortium for Service-Learning in Higher Education, Fourth Annual Conference, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong><br />
at Kearney, Sept. 27-29.<br />
Dufner, D. (2007) “Service-Learning in Jail: Bridging the Digital Divide”, Institute for Metropolitan Affairs,<br />
Roosevelt <strong>University</strong>, 430 S. Michigan Avenue, Chicago, IL. (Oct. 18).<br />
Dufner, D. and Kelsey, J. (2006) Service Learning: IT Projects for Micro Businesses in South <strong>Omaha</strong>, South<br />
<strong>Omaha</strong> Seminar, <strong>Omaha</strong>, NE , May 8-12.<br />
Dufner, D. (2005) “Risk Management: Looking Back at the Challenger Disaster, Enron’s Collapse, and the<br />
Anthrax Clean-up at the State Department”, Graduate School <strong>of</strong> Business, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> –<br />
<strong>Omaha</strong>, <strong>Omaha</strong>, NE. October.<br />
Schwer, A., Dufner, D., Morcous G., (2005) Project Management Informatics, Conference proceedings <strong>of</strong><br />
the Midwest Section <strong>of</strong> the American Society for Engineering Education, Fayetteville, AR. Sept.<br />
Dufner, D. Holley, L., and Reed, B.J. (2005) “Using Strategic Information Systems Planning (SISP) to<br />
Bridge the Gap between State Resources and the Needs <strong>of</strong> Aging Americans”, In Proceedings <strong>of</strong> the 38th<br />
Annual Hawaii International Conference on System Sciences, IEEE Computer Society Press: Los Alamitos,<br />
California.<br />
Shah, P., Peters, J. and Dufner, D. (2005): “The Mayor’s Hotline”, Poster Session, The Spring Strategic<br />
Planning Advance, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> – <strong>Omaha</strong>, April. (Attendees included Lt. Gov. Sheehy,<br />
President Milliken, Mayor Fahey, and other dignitaries).<br />
Dufner, D. (2005) “Risk Management: Looking Back at the Challenger Disaster, Enron’s Collapse, and the<br />
Anthrax Clean-up at the State Department”, Graduate School <strong>of</strong> Business, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> –<br />
<strong>Omaha</strong>, <strong>Omaha</strong>, NE. October.<br />
-404-
Hiltz, S.R., Alavi, M. and Dufner, D. (2004) Asynchronous Learning Networks (“ALN’s”) for E-Learning:<br />
Priorities for Future S<strong>of</strong>tware Development, Panel Discussion, Conference on Human Factors in<br />
Computing Systems, Special Interest Groups (SIGs), SIGCHI ACM, April 24-29, Vienna, Austria.<br />
Dufner, D. (2004) “Information Systems Tips for Social Workers”, School <strong>of</strong> Social Work, <strong>University</strong> <strong>of</strong><br />
<strong>Nebraska</strong> at <strong>Omaha</strong>, Nov. 2.<br />
Other<br />
Dufner, D. (2007) “Teaching Computer Basics at the Jail: Outcomes”, Presentation to the Douglas<br />
County Board <strong>of</strong> Corrections, City-County Building, <strong>Omaha</strong>, NE,. (Invited, January 9).<br />
http://www.co.douglas.ne.us/boardmeetings.php<br />
Dufner, D. (2006) “Teaching Computer Basics at the Jail”, Presentation to the Douglas County Board <strong>of</strong><br />
Corrections, City-County Building <strong>Omaha</strong>, NE,. (Invited, October 17).<br />
http://www.co.douglas.ne.us/boardmeetings.php<br />
KFAB Radio Interview Spring 2007<br />
Dufner, D. with M. Foxall. Interviewed on KFAB, Husker Radio, (Invited to speak about “Community<br />
Outreach – UNO Students Teaching Computer Basics at the Douglas County Jail”. KFAB Radio reaches all<br />
<strong>of</strong> <strong>Nebraska</strong> and on Husker game day most people in <strong>Nebraska</strong> are listening. Also, invited to the NU<br />
President Milliken’s Tailgate Party and given Husker Tickets for the community out reach performed for<br />
the Douglas Couny Department <strong>of</strong> Corrections.<br />
Interviewed on KETV 5 PM News, Students, Inmates Are Improving Futures 1 Keystroke At A Time : A<br />
program helping to rehabilitate inmates at the Douglas County Correctional Facility puts students inside<br />
the jail to do some teaching <strong>of</strong> their own.<br />
http://www.ketv.com/news/10121088/detail.html, Oct. 20, 2006.<br />
Dufner, D. (January 2007) “PKI Students Debunk Myth that Technical People are not People, People”, PKI<br />
Newsletter, Peter Kiewit Institute, <strong>Omaha</strong>, NE.<br />
Dufner, D. (January 2007) “UNO Students Teach Computer Basics at the Douglas County Department <strong>of</strong><br />
Corrections”, Honors Program Newsletter, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, <strong>Omaha</strong>, NE.<br />
2007 Developed an external research lab at the Douglas County Department <strong>of</strong> Corrections<br />
Editorial Work<br />
Served on the Editorial Board <strong>of</strong> Communications <strong>of</strong> the Association <strong>of</strong> Information Systems (CAIS) and<br />
as an Associate Editor (Ranked 18th <strong>of</strong> the top 50 IS Journals by CACM) Sept. 2001 to 2005<br />
Pr<strong>of</strong>essional Memberships<br />
IEEE, PMI<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
2009 Information Technology Development and Implementation Douglas County Department <strong>of</strong><br />
Corrections Enterprise-wide Information Technology Development and Implementation, Graduate<br />
Student Internships for 2009-2010 $ $59,364<br />
2009 Information Technology Development and Implementation Douglas County Department <strong>of</strong><br />
Corrections Enterprise-wide Information Technology Development and Implementation, Graduate<br />
Student Summer Internship $9,000<br />
Dufner, D., Morcous, M., and Schwer, A. (2005) “Project Management Informatics for Engineering,” PKI-<br />
UNL-UNO Collaborative Research Grants, $5,000.<br />
Dufner, D. (2005) “Cross-cultural Collaboration: Extending the Reach and Scope <strong>of</strong> Immigrant Owned<br />
-405-
Businesses in South <strong>Omaha</strong> through Web and Computer Based Technologies,” Faculty Course<br />
Development Sub-grant, Midwest Consortium for Service-Learning in Higher Education, A Learn & Serve<br />
America Grant from the Corporation for National Service, $2,000.<br />
Holley, L.M., Reed, B.J., and Dufner, D., (2005) “UNO Government Information Systems Management<br />
Research Triangle,” <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, <strong>Omaha</strong>, NE. $300.<br />
2004-2005 Obtained funding from the Mayor’s <strong>of</strong>fice for a graduate internship to develop and<br />
implement the Mayor’s Hotline System Hotline system. The Hotline System enables citizens <strong>of</strong> <strong>Omaha</strong> to<br />
have fast and easy Web based access to the Mayor and city departments for problem resolution. At the<br />
invitation <strong>of</strong> the Mayor attended with graduate intern, Piyush Shah, a press conference where the new<br />
Hotline was presented by the Mayor and Piyush. $16,442<br />
2005 Learn & Serve America Grant entitled Cross-cultural Collaboration: Extending the Reach and Scope<br />
<strong>of</strong> Immigrant Owned Businesses through Web and Computer Based Technologies, to the Midwest<br />
Consortium for Service-Learning in Higher Education for funds to assist in developing a service learning<br />
course over the summer. $2,000<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Spring<br />
2007<br />
Spring<br />
2007<br />
Course<br />
Semester Class<br />
number Course title<br />
hrs size<br />
ISQA 8820 Project Risk Management 3 8<br />
ISQA 4000-<br />
001<br />
002<br />
098<br />
099<br />
Teaching Computer Basics at the Douglas<br />
County Department <strong>of</strong> Corrections3<br />
3 12<br />
Fall 2007 ISQA 8810 Introduction to Project Management 3 11<br />
Fall<br />
3 10<br />
2007<br />
ISQA 4000-<br />
001<br />
002<br />
098<br />
099<br />
Teaching Computer Basics at the Douglas<br />
County Department <strong>of</strong> Corrections (see<br />
footnote 3)<br />
Spring ISQA 8810 Introduction to Project Management 3 15<br />
3 Teach two sections at the Douglas County Department <strong>of</strong> Corrections (DCDC), one for the males and the other for the<br />
females. Each semester the classes are taught from 8:00 AM- 9:30 Monday and Wednesday and from 10:00 – 11:30.<br />
Students are assigned to the early class or the later class. I teach at the DCDC from 8 -11:30 Monday and 8 -11:30 Wednesday<br />
approximately 6 hours every week in order to be in class with my students and to be able to <strong>of</strong>fer the class to both male and<br />
female inmates.<br />
-406-
2008<br />
Spring<br />
2008<br />
Fall 2008<br />
ISQA<br />
4000-001<br />
and 099<br />
Service<br />
Learning<br />
ISQA 4000-<br />
99<br />
Honors<br />
Colloquium<br />
Teaching Computer Basics at the Douglas<br />
County Department <strong>of</strong> Corrections (see<br />
footnote 3)<br />
Teaching Computer Basics at the Douglas<br />
County Department <strong>of</strong> Corrections (see<br />
footnote 3)<br />
3<br />
3<br />
3<br />
3<br />
5<br />
4<br />
Service-<br />
Learning<br />
Fall 2008 ISQA 8820 Project Risk Management 3 6<br />
Spring ISQA 8810 Introduction to Project Management 3 18<br />
2009<br />
Spring<br />
3<br />
8<br />
ISQA<br />
2009<br />
3<br />
4000-001<br />
and 099<br />
Service<br />
Learning<br />
Teaching Computer Basics at the Douglas<br />
County Department <strong>of</strong> Corrections (see<br />
footnote 3)<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __25%___%. Please<br />
give a brief description <strong>of</strong> your major research and scholarly activities:<br />
Project Management (domain <strong>of</strong> expertise ― S<strong>of</strong>tware Engineering and Telecommunications), Service-<br />
Learning; and Private and Public Sector Information Technology.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: __IS 100_%.<br />
-407-
-408-
Robert Fulkerson<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Robert A. Fulkerson<br />
Assistant Instructor<br />
Not Applicable<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Assistant Instructor 8/1995<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
BS CompSci Creighton <strong>University</strong> 5/1993<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
Additional work toward MS in Computer Science at Creighton <strong>University</strong>, 1993 - 1995. All coursework<br />
completed except for 6 hours.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Learn Perl for CGI Programming / O’Reilly School <strong>of</strong> Technology / July 2006<br />
Learn SQL for Database Programming / O’Reilly School <strong>of</strong> Technology / July 2006<br />
Learn PHP / O’Reilly School <strong>of</strong> Technology / July 2006<br />
Linux/Unix 1 : The Unix File System / O’Reilly School <strong>of</strong> Technology / July 2006<br />
-409-
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Course Coordinator : CIST 1400, Introduction to Computer Programming (5 hours/week)<br />
Course Coordinator : CIST 1300, Introduction to Web Programming (2 hours/week)<br />
Course Coordinator : CIST 1404, Introduction to Computer Programming Lab (1 hour/week)<br />
Course Coordination for CIST 1400 and CIST 1404 carries additional compensation<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Computer Science Undergraduate Programming Committee, Fall 2004 – Spring 2008<br />
Computer Science Merit Raise Committee, Spring 2008<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
Maintenance and development <strong>of</strong> websites at http://morpo.com/ and http://morpo.com/movies/.<br />
Research and development <strong>of</strong> distance learning course, CIST 1400, for delivery in Spring 2009.<br />
-410-
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Fall 2007 CIST 1300 Intro to Web Development 3 25<br />
Fall 2007 CIST 1400 Intro to Computer Programming 3 56<br />
Fall 2007 CSCI 2850 Programming on the Internet 3 19<br />
Spring 2008 CIST 1300 Intro to Web Development 3 27<br />
Spring 2008 CIST 1400 Intro to Computer Programming 3 47<br />
Spring 2008 CSCI 2850 Programming on the Internet 3 21<br />
Fall 2008 CIST 1300 Intro to Web Development 3 27<br />
Fall 2008 CIST 1400 Intro to Computer Programming 3 56<br />
Fall 2008 CSCI 2850 Programming on the Internet 3 32<br />
Spring 2009 CIST 1300 Intro to Web Development 3 14<br />
Spring 2009 CIST 1400 Intro to Computer Programming 3 24<br />
Spring 2009 CSCI 2850 Programming on the Internet 3 37<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _10__%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
I am working with Drs. Wolcott, Haworth and Pietron researching the use <strong>of</strong> rubrics in grading CIST 1400<br />
programs.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-411-
-412-
Ann Fruhling<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Ann L. Fruhling<br />
Associate Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Instuctor Fall, 1998<br />
Assistant Pr<strong>of</strong>essor Fall, 2003<br />
Associate Pr<strong>of</strong>essor Fall, 2008<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph. D., Major: MIS Minors: <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> – Lincoln, 2003<br />
Computer Science,<br />
Marketing, Strategy<br />
M.B.A. Thesis: “Comprehensive <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<strong>Omaha</strong> 1991<br />
Business <strong>Study</strong> and<br />
Strategic Plan for a Rural<br />
Dentist Practice”<br />
B.S. BUS. ADMIN Colorado State <strong>University</strong> 1983<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Hawaiian International Conference for System Sciences – 2003-2009<br />
-413-
America Conferences for Information Systems – 2002 – 2009<br />
International Conference for Information Systems 2006, 2008<br />
American Medical Informatics Association conference 2005<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
1983-1986 Texas Instruments Programmer Analyst<br />
1986-1987 Mutual <strong>of</strong> <strong>Omaha</strong> Programmer Analyst<br />
1987-1988 Commercial Federal Bank Sr. Programmer Analyst<br />
1988-1990 AT&T Member Technical Staff<br />
1990-1998 College <strong>of</strong> Saint Mary Director, Computer Information Management and<br />
Telecommunications Systems Management programs,<br />
Associate Pr<strong>of</strong>essor<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
2004-2008 Northrup Grumman USSTRATCom C2SES – Innovation Team – Research<br />
Scholar<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Undergraduate Program Committee<br />
Doctoral Program Committee<br />
Chair, First IS&T Graduation Honors Ceremony<br />
Academic Committee<br />
Technology Committee<br />
RPT Committee<br />
ADROCA, ORTICA<br />
-414-
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Undergraduate Program Committee<br />
Doctoral Program Committee<br />
Academic Committee<br />
UCAT<br />
<strong>University</strong> – wide Gender Equity committee<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Fruhling, A, Siau, K. (2007) Assessing Organizational Innovation Capability and Its Effect on E-Commerce<br />
Initiatives, Journal <strong>of</strong> Computer Information Systems, 47(4), pp. 91-104.<br />
Fruhling, A. (2006). Examining the Critical Requirements, Design Approaches and Evaluation Methods for<br />
a Public Health Emergency Response System, Communications <strong>of</strong> the Association for Information<br />
Systems, 18, pp. 431-450.<br />
Fruhling, A., Vreede, G. J., de. (2006). Field Experiences with eXtreme Programming: Developing an<br />
Emergency Response System, Journal <strong>of</strong> Management Information Systems, 22(4).<br />
Fruhling, A., Lee, S. (2006).The Influence <strong>of</strong> User Interface Usability on Rural Consumers’ Trust <strong>of</strong> e-<br />
Health Services, International Journal <strong>of</strong> Electronic Health Care, 2(4), pp.305-321, ISSN Print: 1741-8453,<br />
ISSN: 1741-8461.<br />
Vreede, G.J. de, Koneri, P.G., Dean, D.L., Fruhling, A.L., Wolcott, P. (2006). A Collaborative S<strong>of</strong>tware Code<br />
Inspection: The Design and Evaluation <strong>of</strong> a Repeatable Collaboration Process in the Field, International<br />
Journal <strong>of</strong> Cooperative information Systems, 15(2), pp. 205-228.<br />
http://www.worldscinet.com/ijcis/ijcis.shtml.<br />
Fruhling, A., McDonald, P., Dunbar, C. (2008). A Case <strong>Study</strong>: Introducing eXtreme Programming in a<br />
Command and Control System for the US Military, Fortieth-first Hawaii International Conference System<br />
Sciences (85% contribution).<br />
Fruhling, A., Zhang, D. (2007). An Empirical <strong>Study</strong> Examining the Usage and Perceived Importance <strong>of</strong> XP<br />
Practices, Proceedings <strong>of</strong> the Twelfth Americas Conference on Information Systems, AMCIS (85%<br />
contribution).<br />
Fruhling, A., Steinhauser, L., H<strong>of</strong>f, G. (2007). Designing and Evaluating Collaborative Processes for<br />
Requirements Elicitation and Validation, Fortieth Hawaii International Conference System Sciences.<br />
(85% contribution).<br />
Johnson, N., Fruhling, A., Sambol, A., Hinrichs, S. (2006). Towards an Evaluation <strong>of</strong> a Microbiology<br />
Laboratory Electronic Diagnostic System for Public Health, Proceedings <strong>of</strong> the Twelfth Americas<br />
Conference on Information Systems. (40% contribution).<br />
Johnson, N., Fruhling, A. (2006). Development and Assessment <strong>of</strong> the STATPack Emergency Response<br />
System, International Conference Information Systems for Crisis Response and Management (ISCRAM),<br />
-415-
Newark, New Jersey, NJIT (50% contribution).<br />
Fruhling, A., Sambol, A., Hinrichs, S., Vreede, G.J. de. (2006). Designing an Emergency Response System<br />
for Electronic Laboratory Diagnostics Consultation, Thirty-ninth Hawaii International Conference System<br />
Sciences (95% contribution).<br />
Koneri, P.G., Vreede, G.J. de, Dean, D.L., Fruhling, A.L., Wolcott, P. (2005). “The Design and Field<br />
Evaluation <strong>of</strong> a Repeatable Collaborative S<strong>of</strong>tware Code Inspection Process” in Fuks, H., Lukosch, S.,<br />
Salgado, A.C. (eds.), Proceedings <strong>of</strong> CRIWG 2005, LNCS3706, pp. 325-340, Springer Verlag Berlin<br />
Heidelberg, (20% contribution).<br />
Press, L., Qureshi, S., Wolcott, P., Fruhling, A. (2005). A Grand Challenge: Connecting the World’s Rural<br />
Villages (panel), Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems, AMCIS (25%<br />
contribution).<br />
Fruhling, A., Lee, S. (2005). Assessing the Reliability, Validity, and Adaptability <strong>of</strong> PSSUQ, Proceedings <strong>of</strong><br />
the Eleventh Americas Conference on Information Systems, AMCIS (95% contribution).<br />
Fruhling, A, Tyser, K, Vreede, G.J. de. (2005). Experiences with Extreme Programming in Telehealth:<br />
Developing and Implementing a Biosecurity Health Care Application, Thirty-eighth Hawaii International<br />
Conference System Sciences (88% contribution).<br />
deVreede, G.J., Fruhling, A., Chakrapani, A. (2005). A Repeatable Collaboration Process for Usability<br />
Testing, Thirty-eighth Hawaii International Conference System Sciences (40% contribution).<br />
Fruhling, A., and Lee, S. M. (2004). Designing Trustworthy e-Health Services for Rural Consumers,<br />
American Medical Informatics Association Proceedings (95% contribution).<br />
Fruhling, A., deVreede, G.J., Chakrapani, A. (2004). A Repeatable Collaboration Process for Usability<br />
Testing, CORS/INFORMS International Joint Meeting Proceedings (40% contribution).<br />
Fruhling, A., and Lee, S. M. (2004). Examining HCI Usability Factors Affecting Consumers’ Trust in E-<br />
health Services, Hawaii International Conferences on Computer Sciences Proceedings (95%<br />
contribution).<br />
Fruhling, A., Vreede, G.J. de. (2005). Collaborative Usability Testing to Facilitate Stakeholder<br />
Involvement in S. Biffle, A. Aurum, B. Boehm, H. Erdogmus, P. Gruenbacher (eds), Value Based S<strong>of</strong>tware<br />
Engineering, Berlin: Springer-Verlag (in press) (50% contribution).<br />
Fruhling, A. (2007). “Best Practices in Implementing and Managing Agile Information System<br />
Development Processes for Command and Control Operations”, IBM Center for the Business <strong>of</strong><br />
Government (proposal accepted), paper in-progress.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
3.5.1 Internal to UNO<br />
PI Co-PIs Title <strong>of</strong> Grant Amount <strong>of</strong><br />
Grant<br />
X<br />
Improving System<br />
Requirement<br />
Elicitation and<br />
Traceability <strong>of</strong><br />
System Test Plan<br />
Development –<br />
-416-<br />
Funding Entity<br />
Your<br />
Contribution<br />
(%)<br />
Outcomes from the<br />
Award<br />
$9,800 NASA Research 100% 1 Graduate Student,<br />
Research Paper
2006<br />
3.5.2 External to UNO<br />
PI<br />
X<br />
Co-<br />
PIs<br />
Title <strong>of</strong> Grant<br />
Amount <strong>of</strong><br />
Grant<br />
Funding Entity<br />
Oklahoma, STATPack, Laboratory $23,000 Oklahoma<br />
Response<br />
Health and<br />
Project continuation -2007<br />
Human Services<br />
Your<br />
Contribution<br />
(%)<br />
100%<br />
Outcomes from the<br />
Award<br />
X<br />
X<br />
KSU STATPack,<br />
Laboratory Response<br />
project – 2006<br />
Kansas STATPack,<br />
Laboratory Response<br />
project - 2006<br />
$25,700 KSU Veterinary 100%<br />
$211,907 Kansas Health<br />
and Human<br />
Services<br />
100%<br />
X<br />
X<br />
Oklahoma STATPack, Laboratory $185,000 Oklahoma<br />
Response<br />
Health and<br />
project - 2006<br />
Human Services<br />
<strong>Nebraska</strong> STATPack, Laboratory $37,500 <strong>Nebraska</strong> Health<br />
Response<br />
and Human<br />
project -2006<br />
Services<br />
100% 5 students and two FTE I<br />
IT pr<strong>of</strong>essionals,<br />
100% STATPack, Laboratory<br />
Response project<br />
X<br />
Northrup Gruman C2SES<br />
DoD Research – 4 years<br />
(Fruhling & Zhu) – 2005<br />
$555,466 Northrup<br />
Gruman<br />
50% 2 graduate/PhD<br />
students for 4 years,<br />
stipend and tuition<br />
2 Research Papers<br />
completed<br />
X<br />
X<br />
STATPack Laboratory<br />
Response project – 2005<br />
continuation<br />
STATPack Laboratory<br />
Response project –<br />
Expansion. - 2005<br />
$82,500 <strong>Nebraska</strong> Health<br />
and Human<br />
Services<br />
$3,700 <strong>Nebraska</strong> Health<br />
and Human<br />
Services<br />
2 Research Studies<br />
presented to<br />
STRATCOM Colonels<br />
100% STATPack Laboratory<br />
Response project – 2006<br />
continuation<br />
100% STATPack Laboratory<br />
-417-
X<br />
X<br />
X<br />
X Research Proposal –<br />
(Fruhling, deVreede,<br />
Henninger) “Collaborative<br />
Test Plan Creation to<br />
Accomodate Stakeholders’<br />
Value Propositions in Value-<br />
Based S<strong>of</strong>tware Engineering”<br />
– Spring, 2005<br />
STATPack Laboratory<br />
Response project – Aug 2004<br />
STATPack Laboratory<br />
Response project – Sept<br />
2004<br />
Information Technology in<br />
Sustaining Rural Health<br />
Delivery Systems - 2002<br />
$25,000 UNO/UNL<br />
Research<br />
Collaboration<br />
Proposal<br />
Request from<br />
UNL Vice<br />
Chancellor Prem<br />
Paul<br />
$132,250 <strong>Nebraska</strong> Health<br />
and Human<br />
Services<br />
$36,200 Association<br />
Public Health<br />
Labs grant<br />
$412,538 <strong>Nebraska</strong><br />
Research<br />
Initiative<br />
50% Supported research<br />
funding for two<br />
graduate students<br />
100%<br />
100%<br />
100% 39 proposals were<br />
submitted, 12 proposals<br />
were selected.<br />
2 years funding – year 1<br />
funding for 8<br />
undergraduate and<br />
graduate students each<br />
year.<br />
Provided a prototype to<br />
continue to get grant<br />
funding.<br />
See portfolio<br />
Funded dissertation<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009 ISQA 8080 Seminar: Public Health Informatics 3 6<br />
ISQA 8950 Capstone Management Information Systems 12<br />
Fall 2008 ISQA 8950 Capstone Management Information Systems 7<br />
Spring 2008 ISQA 8040 An Overview <strong>of</strong> System Development 3 8<br />
ISQA 8950 Capstone Management Information Systems 10<br />
-418-
Fall 2007 CIST 3100 Organizations, Applications, and Technology 3 22<br />
ISQA 8040 An Overview <strong>of</strong> System Development 3 16<br />
Supervise – 6 to 8 research students every year<br />
through my grants.<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __50___%. Please give<br />
a brief description <strong>of</strong> your major research and scholarly activities:<br />
Grant, NPHL STATPack - Ongoing Research and System Support, UNMC, Fruhling, A., $98,837, Funded,<br />
(October 1, 2008 - September 30, 2009).<br />
Contract, Kansas STATPack - Research, Development and Support, Kansas Department <strong>of</strong> Health and<br />
Environment, Fruhling, A., $25,000, Funded, (August 8, 2008 - August 8, 2009).<br />
Grant, Empirical Research on the Transition to an Agile System Development Environment, NASA,<br />
Fruhling, A., $7,500, Funded, (October 2008 - July 31, 2009).<br />
Financial support is requested to support a half-time graduate student to work on a research study to<br />
explore and examine the best practices the transition to agile system development methods namely,<br />
eXtreme Programming (XP) and SCRUM. This research is important because it will help practitioners<br />
successfully introduce and implement the principles and practices <strong>of</strong> Agile methods into traditional<br />
s<strong>of</strong>tware development environments.<br />
Grant, Public/Private Laboratory Integration Oklahoma STATPack, Oklahoma, State <strong>of</strong>, Fruhling, A.,<br />
$24,150, Funded, (April 1, 2008 - May 31, 2009).<br />
Grant, Center for Public Health Informatics, NU Foundation, Fruhling, A., $136,000, Funded, (July 2008 -<br />
July 2009).<br />
The Center will create a <strong>Nebraska</strong>-focused information portal designed to provide real time, interactive<br />
access to public health data. This publicly available web site and database will be designed in accordance<br />
with the needs <strong>of</strong> a wide array <strong>of</strong> potential users including public health policy makers, public health<br />
workers, academics, and the general public. Members <strong>of</strong> the UNMC CoPH have developed a number <strong>of</strong><br />
important relationships with public health data holders, both in state government and private industry.<br />
Those relationships will allow UNMC to negotiate the appropriate access to information in forms that<br />
would meet the needs <strong>of</strong> the user community while continuing to satisfy the security and confidentiality<br />
requirements <strong>of</strong> the original data stewards.<br />
CPHI will conduct a formalized information analysis and data availability assessment to support<br />
current/emerging public health issues. This will include a needs analysis, cataloging existing data<br />
sources, identifying gaps therein, and developing proposals to address those gaps. Focus groups<br />
comprised <strong>of</strong> stakeholders and potential users will be conducted to determine the level <strong>of</strong> interest,<br />
-419-
technical ability, and desired scope <strong>of</strong> content. This will be a critical step to the design <strong>of</strong> a useful<br />
system. In addition, the CPHI will research appropriate tools, including data formats, and visualization<br />
and reporting tools, to maximize the flexibility and utility <strong>of</strong> the information portal. The Center will then<br />
pursue national grants (e.g. NIH, NSF, etc.) to gain assistance in addressing both data and technology<br />
voids.<br />
The Center will provide access to a think tank <strong>of</strong> UNO/UNMC IT, GIS and Public Health researchers and<br />
experts. This human infrastructure will provide assistance on how IT and GIS capabilities can be used to<br />
integrate, visualize, analyze, and disseminate public health information and further research. Both, UNO<br />
and UNMC strategic plans have major outreach components that can be easily incorporated into these<br />
activities.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%. Not applicable<br />
-420-
Martina Greiner<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Martina E. Greiner<br />
Assistant Pr<strong>of</strong>essor<br />
Non-tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Assistant Pr<strong>of</strong>essor<br />
Dates Held<br />
8/18/2008 - Present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
PhD<br />
Dipl.<br />
Oec<br />
Business<br />
Administration<br />
Business<br />
Administration<br />
and Economics<br />
The <strong>University</strong> <strong>of</strong> Georgia 2008<br />
The <strong>University</strong> <strong>of</strong> Hohenheim, Germany 2000<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Joined Clicker-Circle, UNO Academic Year 2008-2009<br />
Evaluating and Learning Adobe Connect for use in the Classroom/ Virtual Office Hours<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
-421-
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
ISQA Pr<strong>of</strong>essional Development Committee (2009)<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
“The Business <strong>of</strong> Open Source”, Richard T. Watson, Marie-Claude Boudreau, Donald Wynn, Martina<br />
Greiner, Paul York; Communications <strong>of</strong> the ACM, 51 (4), 2008, 41-46<br />
“Opening the Classroom”, Richard T. Watson, Marie-Claude Boudreau, Paul York, Martina Greiner,<br />
Donald Wynn; Journal <strong>of</strong> IS Education, 19 (1), 2008, 75-85<br />
“A Strategy for Knowledge Management”, Martina Greiner, Thilo Böhmann, Helmut Krcmar; Journal <strong>of</strong><br />
Knowledge Management, 11 (6), 2007, 3-15<br />
“A Research Agenda for <strong>Study</strong>ing Open Source I: A Multi-Level Framework”, Fred Niederman, Ashley<br />
Davis, Martina E. Greiner, Donald Wynn, Paul T. York; Communications <strong>of</strong> the AIS, 18, 2006, 129-149<br />
“A Research Agenda for <strong>Study</strong>ing Open Source II: View Through the Lens <strong>of</strong> Referent Discipline<br />
Theories”, Fred Niederman, Ashley Davis, Martina E. Greiner, Donald Wynn, Paul T. York;<br />
Communications <strong>of</strong> the AIS, 18, 2006, 150-175<br />
“Governance and Global Communities”, Richard T. Watson, Marie-Claude Boudreau, Martina Greiner,<br />
Donald Wynn, Paul York, Rusen Gul; Journal <strong>of</strong> International Management, 11, 2005, 125-142<br />
“Understanding Music Sharing Behavior in China: Development <strong>of</strong> an Instrument”, Donald Amoroso;<br />
Pamila Dembla; Hui Wang; Martina Greiner; Pengpeng Liu; Americas Conference on Information<br />
Systems (AMCIS) 2008<br />
“Building Consumer-to-Consumer Trust in e-Finance Marketplaces”, Martina Greiner, Hui Wang;<br />
Americas Conference on Information Systems (AMCIS) 2007<br />
“The Benefits <strong>of</strong> Transaction Cost Economics: The Beginning <strong>of</strong> a New Direction”, Marie-Claude<br />
Boudreau, Richard T. Watson, Adela J.W. Chen, Martina Greiner, and Peter Sclavos; European<br />
Conference on Information Systems (ECIS) June 07-09, 2007<br />
“Make-or-Buy in the Age <strong>of</strong> Open Source: A Transaction Cost Analysis”, Martina Greiner, Dale Goodhue;<br />
International Conference on Information Systems (ICIS) Dec 11-14, 2005<br />
“Governance and Global Communities”, Richard T. Watson, Marie-Claude Boudreau, Martina Greiner,<br />
Donald Wynn, Paul York, Rusen Gul; The fifth Annual International Business Research Forum, March 27,<br />
2004<br />
“Governance, Leadership, And Management In Adaptive And Inventive Digital Communities: A Research<br />
Agenda To Reduce Waste In Graduate Education”, Richard T. Watson, Marie-Claude Boudreau, Martina<br />
Greiner, Donald Wynn, Paul York, Rusen Gul; Seventh Bled Conference, June 21-23, 2004<br />
“Leadership Behavior in Virtual Communities”, Martina Greiner; Seventh Annual Conference <strong>of</strong> the<br />
-422-
Southern Association for Information Systems (SAIS) Feb 27-28, 2004<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009 ISQA 8220 Advanced Systems Analysis and Design 3 27<br />
Fall 2008 ISQA 3310 Managing the Database Environment 3 18<br />
ISQA 8220 Advanced Systems Analysis and Design 3 28<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __60___%. Please give<br />
a brief description <strong>of</strong> your major research and scholarly activities:<br />
I am currently working on two research streams. The first research stream includes applying<br />
organizational theories to IS issues. In particularly, I am refining Transaction Cost Theory to gain insights<br />
into s<strong>of</strong>tware procurement decisions. The second research stream is concerned about people-to-people<br />
lending marketplaces and the unique IS and management challenges <strong>of</strong> these marketplaces.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-423-
-424-
Dwight Haworth<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Dwight A. Haworth<br />
Associate Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Associate Pr<strong>of</strong>essor<br />
Dates Held<br />
1990-Present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D. MIS Texas Tech <strong>University</strong> 1990<br />
B.S. General United States Air Force Academy, Colorado 1963<br />
Science<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Eighth Annual IBER & TLC Conference, 2008<br />
Distance-Education Workshop, Fall 2007<br />
Teaching and Learning Conference, Oahu, Hawaii, January 2-6<br />
Teaching and Learning Conference, Cancun, Mexico, March 20-25, 2006<br />
Teaching and Learning Conference, Puerto Vallarta, Mexico, March 12-19, 2005<br />
-425-
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
1986-1990 College <strong>of</strong> Business<br />
Administration, Texas Tech<br />
<strong>University</strong><br />
1984-1986 College <strong>of</strong> Business<br />
Administration, Texas Tech<br />
<strong>University</strong><br />
1982-1984 Central Texas College<br />
Overseas, Yongsan Garrison,<br />
Korea<br />
1982-1984 Far East District, Corps <strong>of</strong><br />
Engineers, Seoul, Korea<br />
Teaching assistant. Taught business communication,<br />
introductory management science, and file structures<br />
courses.<br />
Teaching assistant. Assisted faculty with grading,<br />
proctoring, and preparation for audio-visual materials<br />
for undergraduate business communication.<br />
Instructor. Instructed in computer programming,<br />
systems analysis and design, and computer operating<br />
systems.<br />
Programmer-analyst. Automated the preparation and<br />
update <strong>of</strong> Current Working Estimates for major and<br />
minor military construction projects throughout Korea.<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
1981-1982 Gyeong-Gi, Seoul, Korea<br />
Technical Education<br />
Research Center<br />
Curriculum Consultant. Designed and assisted with<br />
implementation <strong>of</strong> undergraduate computer information<br />
systems curriculum.<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Member <strong>of</strong> Faculty Senate<br />
Member <strong>of</strong> Faculty Senate Pr<strong>of</strong>essional Development Committee<br />
Member <strong>of</strong> Faculty Academic Policy Committee <strong>of</strong> the division <strong>of</strong> Continuing Studies<br />
Working Member <strong>of</strong> NUCIA<br />
Member <strong>of</strong> Distance Education Steering Committee<br />
Member <strong>of</strong> the Academic Committee<br />
Member <strong>of</strong> the ABET Steering Committee<br />
Chairman <strong>of</strong> UPC for Bachelors in MIS<br />
-426-
Library Representative for Department<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Library Representative for Department (2004- )<br />
Member <strong>of</strong> Distance Education Steering Committee (2007- )<br />
Member <strong>of</strong> the ABET Steering Committee (2007- )<br />
IA Undergraduate Program Committee (2007-2008)<br />
NDU MOU (2007-2008)<br />
Faculty Academic Policy Committee (2004-2008)<br />
ISQA Undergraduate Program Committee (2004-2008)<br />
Library and Learning Resources Committee (2005-2007)<br />
<strong>University</strong> Committee on Research (2004-2007)<br />
Recruiting Committee Member (2004-2005)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Haworth, D.A. and Pietron, L.R. Sarbanes-Oxley: Achieving compliance by starting with ISO 17799.<br />
Information Systems Management, 23 (2006), 1, 73-87<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009 ISQA 3300 File Structures for Information Systems 3 25<br />
ISQA 8546 Computer Security Management 3 8<br />
-427-
ISQA 8560 Information Warfare & Security 3 3<br />
CIST 4540 Computer Security Management 3 6<br />
Fall 2008 ISQA 3300 File Structures for Information Systems 3 13<br />
ISQA 8546 Computer Security Management 3 13<br />
ISQA 8560 Information Warfare & Security 3 12<br />
CIST 4540 Computer Security Management 3 5<br />
Summer CIST 2500 Intro to Appliet Stats for IS & T 3 11<br />
2008<br />
Spring 2008 ISQA 3300 File Structures for Information Systems 3 4<br />
ISQA 8546 Computer Security Management 3 4<br />
ISQA 8560 Information Warfare & Security 3 10<br />
CIST 4540 Computer Security Management 3 10<br />
Fall 2007 ISQA 3300 File Structures for Information Systems 3 7<br />
ISQA 8546 Computer Security Management 3 7<br />
ISQA 8560 Information Warfare & Security 3 12<br />
CIST 4540 Computer Security Management 3 9<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-428-
Mary Levesque<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Mary L. Levesque<br />
Assistant Instructor<br />
NA<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Temporary Assistant<br />
Instructor<br />
Assistant Instructor<br />
Dates Held<br />
01/01/2000 – 08/31/2002<br />
09/01/2002 – present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
BA Music Duchesne College <strong>of</strong> the Sacred Heart, <strong>Omaha</strong> Aug. 1968<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
15 years <strong>of</strong> programming and instruction at Mutual <strong>of</strong> <strong>Omaha</strong><br />
Completed CIST 1100 (C++ version) at UNO<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
None<br />
-429-
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
1972-1973 Mutual <strong>of</strong> <strong>Omaha</strong> S<strong>of</strong>tware Development<br />
1974-1978 Mutual <strong>of</strong> <strong>Omaha</strong> Teaching; developing custom courses related to<br />
mainframe programming – use <strong>of</strong> utilities, JCL,<br />
debugging<br />
1983-1985 Various for-pr<strong>of</strong>it schools Taught COBOL<br />
1985-1994 Mutual <strong>of</strong> <strong>Omaha</strong> Developed and taught PC courses<br />
1994-1996 Mutual <strong>of</strong> <strong>Omaha</strong> Production support<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
Act as informal consultant for colleagues regarding Excel<br />
and Word formatting problems, as well as for an<br />
occasional outside person who calls UNO for help.<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Course Coordinator for CIST 1100<br />
Course Coordinator for CSCI 1000<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
-430-
None<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
None, although I authored one article for a genealogy magazine and assisted with another.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
None<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year Course number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Fall 2007 CIST 1100 001 Introduction to Computing 3 22<br />
Fall 2007 CIST 1100 002 Introduction to Computing 3 39<br />
Fall 2007 CIST 1100 003 Introduction to Computing 3 16<br />
Fall 2007 CSCI 1000 004 Computer Literacy with Applications 3 14<br />
Spring 08 CIST 1100 001 Introduction to Computing 3 18<br />
Spring 08 CIST 1100 850 Introduction to Computing 3 14<br />
Spring 08 CSCI 1000 004 Computer Literacy with Applications 3 15<br />
Spring 08 CSCI 1000 005 Computer Literacy with Applications 3 19<br />
Fall 2008 CIST 1100 001 Introduction to Computing 3 24<br />
Fall 2008 CIST 1100 002 Introduction to Computing 3 21<br />
Fall 2008 CIST 1100 850 Introduction to Computing 3 13<br />
Fall 2008 CSCI 1000 006 Computer Literacy with Applications 3 30<br />
Spring 09 CIST 1100 001 Introduction to Computing 3 14<br />
Spring 09 CIST 1100 850 Introduction to Computing 3 9<br />
Spring 09 CSCI 1000 004 Computer Literacy with Applications 3 7<br />
Spring 09 CSCI 1000 005 Computer Literacy with Applications 3 10<br />
Spring 09 CSCI 1000 850 Computer Literacy with Applications 3 15<br />
-431-
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 10%. Please give a brief<br />
description <strong>of</strong> your major research and scholarly activities:<br />
I use my computer skills to help others research their genealogy. Most <strong>of</strong> this is done after hours,<br />
however.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-432-
Lotfollah Najjar<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Lotfollah Najjar<br />
Associate Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Instructor 8/89-8/99<br />
Lecturer 8/99-8/01<br />
Assistant Pr<strong>of</strong>essor 08/01 – 08/07<br />
Associate Pr<strong>of</strong>essor 08/07- Present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D.<br />
Major: Industrial Engineering and<br />
Management Systems<br />
Minor: MIS and Operation<br />
Management<br />
Statistics and Mathematics<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />
Lincoln<br />
Ph.D.<br />
Student<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />
Lincoln<br />
MS Statistics and Mathematics <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />
Lincoln<br />
BS Industrial Engineering and Management <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />
Systems<br />
Lincoln<br />
08/2002<br />
01/1988-<br />
5/1992<br />
05/1987<br />
05/1984<br />
-433-
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
PhD. with major in Industrial Engineering and Management Systems and minor in MIS (took 7 courses in<br />
MIS field) Have taken 21 hours MIS courses: System Analysis and Design, Database, Decision Support<br />
Systems, Data Communications, Management Information Systems, Seminar in MIS, and Artificial<br />
Intelligence.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Kamal, M., Qureshi, S. , and Najjar, L. (2008).“ a Global Analysis <strong>of</strong> the Effect <strong>of</strong> IT Capacity on<br />
Development-Undrestanding Sourcing <strong>of</strong> Skills.” International Conference on Information Resources<br />
Management (Conf-IRM) May 18-20, 2008 .Niagara Falls, Ontario, Canada.<br />
Tarmizi H. and Najjar, L. (2007). “Rethinking E-Comerce Research by Connecting IT to Activities on Line<br />
Community”. MWAIS, May 18-19, Springfield, IL.<br />
Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. (2007). “Human Development through Information &<br />
Communication Technologies: Theoretical & Empirical Support.” Second Annual Midwest United States<br />
Association for Information Systems Conference (MWAIS-02), May 18-19, Springfield, Illinois.<br />
Kamal M., Zhang C., Najjar, L. and Qureshi S. (2007). “Human Development through Information &<br />
Communication Technologies: Theoretical & Empirical Support”. MWAIS, May 18-19, Springfield, IL.<br />
Tarmizi H. and Najjar, L. (2006). “Empirical study on Communities <strong>of</strong> Practice and E-commerce: influence<br />
<strong>of</strong> community <strong>of</strong> practice on pricing on eBay”. (AMCIS 2006), August 10-13, Acapulco, Mexico.<br />
Uttamchandani, R, Najjar, L, and Bishu, R.R. (2005) “Alternate Training Methods for an Optically<br />
Measuring Inspection Device: A Comparative <strong>Study</strong>.” In the Proceedings <strong>of</strong> the 10th Annual International<br />
Conference on Industrial Engineering – Theory, Applications and Practice Clearwater, Florida, USA.<br />
December 7-9. pp. 474-478.<br />
Najjar, L.and Bishu, R. (2005).” Information Quality in the Banking Industries”. Proceedings <strong>of</strong> the<br />
Eleventh American Conference on Information Systems (AMCIS), August 10-13. <strong>Omaha</strong>, <strong>Nebraska</strong>, pp.<br />
3190-3198.<br />
Najjar, L. Eftekari, H. (2005). “Consumers’ Perception <strong>of</strong> the Quality Internet Banking”. Midwest<br />
Economics Association Meetings, 69th Annual Meetings, Milwaukee, WI. March 14-17.<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
-434-
08/96-08/02 Department <strong>of</strong> Industrial Engineering<br />
and Management Systems, <strong>University</strong><br />
<strong>of</strong> <strong>Nebraska</strong>-Lincoln<br />
2/95-6/95 Department <strong>of</strong> Biometry, <strong>University</strong><br />
<strong>of</strong> <strong>Nebraska</strong>-Lincoln<br />
2/89-8/89 Veterinary Diagnostic Center,<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>- Lincoln<br />
Guest Lecturer:<br />
Courses taught have included Quality Control<br />
(821), and Applied Statistics (822).<br />
SAS Programmer:<br />
Performed SAS programs for statistical<br />
analysis for faculty and client research.<br />
Involved in many projects for the College <strong>of</strong><br />
Dentistry and College <strong>of</strong> Agriculture.<br />
Consulted on and performed projects<br />
(statistical analysis and SAS programming)<br />
for private industry in conjunction with<br />
faculty <strong>of</strong> Biometry Department.<br />
Analyst III:<br />
Performed statistical analysis in<br />
toxicology lab using Experimental<br />
design, regression analysis (linear and<br />
nonlinear) and non-parametric analysis<br />
to test and validate the specific effects<br />
<strong>of</strong> different substances on cattle.<br />
Involved in many projects in<br />
conjunction with Pharmaceutical<br />
College at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong><br />
Medical Center.<br />
January 2005 Baton Rouge, LA Attending 6-day class (SAP s<strong>of</strong>tware on<br />
Business Process Reengineering). LSU<br />
June 2004<br />
Scott Center Hall, PKI<br />
Project Management Institute (PMI).<br />
Project Management Institute (PMI).<br />
Work Shop on :<br />
“Business Process Reengineering with IT”<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
1996 and<br />
2000<br />
<strong>Nebraska</strong> Printing and<br />
Lithography. Fremont <strong>Nebraska</strong><br />
Quality improvement and data analysis.<br />
-435-
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Course Coordinator for :<br />
CIST 2500 and ISQA 4150/8206<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Committee Position Date<br />
Library Dean Search Committee Member 2004-2007<br />
Technology Committee Member 2003-2007<br />
UNO Judicial Committee Member 2002-2006<br />
IS&T Academic Committee Member 2002-2005<br />
ISQA Undergraduate Program Committee Member 2002-2006<br />
UNO Pr<strong>of</strong>essional Development & Concerns Committee Member Chair 2002-2005<br />
2006-2008<br />
ISQA Undergraduate Program Committee Member 2009-present<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
10.1 Refereed Journals<br />
Aghazadeh M., Najjar L., and Huq, Z. “Environment and Resolutions to Avoid Discontinuity in Supply<br />
Chain Management” International Journal <strong>of</strong> Risk Assessment and Management. Forthcoming, 2008.<br />
Azadmanesh A., A. Farahani, L. Najjar, “Fault Tolerant Weighted Voting Algorithms”, Int’l Journal <strong>of</strong><br />
Network Security, Forthcoming, 2008.<br />
Luo, Mingchu , Najjar, L and Huang, Wenmin. “The Impact <strong>of</strong> Chinese Student School Performanceon<br />
their Perceptions <strong>of</strong> School Ethical Climate”. Journal <strong>of</strong> Moral Education. Accepted with minor revision.<br />
(August 2006).<br />
Najjar, L., Schniederjans, Marc. J. (2006). “Information Quality Benchmarking: A Banking Industry Case<br />
<strong>Study</strong> in the Product and Service Performance.” Quality and Quantity, International Journal <strong>of</strong><br />
Methodology. Vol. 40, No. 3, pp. 419-434.<br />
-436-
Luo, Mingchu , Najjar, L (2006). “The Chinese Principal Leadership Capacities as Perceived by Master<br />
Teachers.” The Academic Leadership Journal, 4(3). Summer 2006.<br />
Najjar, L.and Bishu, R. (2005). “Service Quality in Banking Industries”. Quality Management Journal.<br />
Volume 12(3), pp 35-44.<br />
Liu, L., Bishu, R., and Najjar, L. (2005). “Using the Analytical Hierarchy Process as a Tool for Assessing<br />
Service Quality.” International Journal <strong>of</strong> Industrial Engineering and Management Systems. Vol. 4(2),<br />
pp.129-135.<br />
10.2 Refereed Proceedings:<br />
Kamal, M., Qureshi, S. , and Najjar, L. (2008).“ a Global Analysis <strong>of</strong> the Effect <strong>of</strong> IT Capacity on<br />
Development-Undrestanding Sourcing <strong>of</strong> Skills.” International Conference on Information Resources<br />
Management (Conf-IRM) May 18-20, 2008 .Niagara Falls, Ontario, Canada.<br />
Tarmizi H. and Najjar, L. (2007). “Rethinking E-Comerce Research by Connecting IT to Activities on Line<br />
Community”. MWAIS, May 18-19, Springfield, IL.<br />
Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. (2007). “Human Development through Information &<br />
Communication Technologies: Theoretical & Empirical Support.” Second Annual Midwest United States<br />
Association for Information Systems Conference (MWAIS-02), May 18-19, Springfield, Illinois.<br />
Kamal M., Zhang C., Najjar, L. and Qureshi S. (2007). “Human Development through Information &<br />
Communication Technologies: Theoretical & Empirical Support”. MWAIS, May 18-19, Springfield, IL.<br />
Tarmizi H. and Najjar, L. (2006). “Empirical study on Communities <strong>of</strong> Practice and E-commerce: influence<br />
<strong>of</strong> community <strong>of</strong> practice on pricing on eBay”. (AMCIS 2006), August 10-13, Acapulco, Mexico.<br />
Uttamchandani, R, Najjar, L, and Bishu, R.R. (2005) “Alternate Training Methods for an Optically<br />
Measuring Inspection Device: A Comparative <strong>Study</strong>.” In the Proceedings <strong>of</strong> the 10th Annual International<br />
Conference on Industrial Engineering – Theory, Applications and Practice Clearwater, Florida, USA.<br />
December 7-9. pp. 474-478.<br />
Najjar, L.and Bishu, R. (2005).” Information Quality in the Banking Industries”. Proceedings <strong>of</strong> the<br />
Eleventh American Conference on Information Systems (AMCIS), August 10-13. <strong>Omaha</strong>, <strong>Nebraska</strong>, pp.<br />
3190-3198.<br />
Najjar, L. Eftekari, H. (2005). “Consumers’ Perception <strong>of</strong> the Quality Internet Banking”. Midwest<br />
Economics Association Meetings, 69th Annual Meetings, Milwaukee, WI. March 14-17.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
11.1 Sabbatical:<br />
Fall 2008-Present: <strong>University</strong> <strong>of</strong> Jibail, Saudi Arabia. Department <strong>of</strong> Business Administration. Teaching<br />
courses in MIS.<br />
-437-
11.2 Manuscript Reviewer<br />
Year Journal’s (or Conference) Name Topic <strong>of</strong> the articles<br />
March 2009<br />
March 2009<br />
March 2009<br />
July 2007<br />
May 2007<br />
May 2007<br />
May 2007<br />
March 2006<br />
March 2006<br />
June 2005<br />
July 2004<br />
June 2004<br />
2009 International Conference on<br />
Information Resources Management (Conf-<br />
IRM)<br />
2009 International Conference on<br />
Information Resources Management (Conf-<br />
IRM)<br />
2009 International Conference on<br />
Information Resources Management (Conf-<br />
IRM)<br />
Journal <strong>of</strong> Management Information<br />
Systems (JMIS)<br />
International Conferences On Information<br />
Systems (ICIS 2007)<br />
American Conferences On Information<br />
Systems (AMCIS 2007)<br />
American Conferences On Information<br />
Systems (AMCIS 2007)<br />
American Conferences On Information<br />
Systems (AMCIS 2006)<br />
American Conferences On Information<br />
Systems (AMCIS 2006)<br />
IEEE Transactions on Engineering<br />
Management<br />
International Journal <strong>of</strong> Information<br />
Technology and Decision Making<br />
IEEE Transactions on Engineering<br />
Management<br />
Affect and Aesthetics in ICT Design and Use.<br />
Inter Process Communication & Prioritization to Enable Deskt<br />
Advertisement Mechanism.<br />
The Challenges in Establishing a Government Interoperability<br />
Framework: The e-PING Brazilian Case<br />
A Principal Component Analysis Approach to Web Page<br />
Categorization.<br />
Participants’ Repeat-Visiting Behavior in an Online Community<br />
<strong>of</strong> Practice.<br />
Reliability Generalization <strong>of</strong> Perceived Ease <strong>of</strong> use, Usefulness<br />
and Behavioral Intentions.<br />
Context, Process and Outcomes <strong>of</strong> ISD: An Allegorical Tale.<br />
The News: Examining perceptions <strong>of</strong> information product<br />
quality (IPQ).<br />
Paradox <strong>of</strong> Information Quality: Do Consumers Pay More for<br />
Premium Information on Products on E-commerce Sites?<br />
Information-Centric Assessment <strong>of</strong> S<strong>of</strong>tware Metrics Practices<br />
(second revision).<br />
SFTIS: A Decision Support System for Tourism Demand Analys<br />
and Forecasting.<br />
Information-Centric Assessment <strong>of</strong> S<strong>of</strong>tware Metrics Practices<br />
May 2004 2004 DSI Annual Meeting 1. An Implication <strong>of</strong> using Open S<strong>of</strong>tware (OSS): an<br />
overview <strong>of</strong> OSS, and users’ and developers’<br />
benefits and challenges.<br />
2. Effect <strong>of</strong> Interface Style on User Perception and<br />
Behavioral Intention.<br />
3. Electronic Payment Systems: Foundations,<br />
Taxonomies and Implementation Issues.<br />
4. Personal Web Usage at the workplace: Can<br />
it improve job satisfaction?<br />
5. Two approaches to extract related information<br />
from Web pages.<br />
11.3 Research and Development Grants funded and/or completed:<br />
-438-
Najjar, L., Khazanchi, D., and Wolcott, P. (3/1/2008 to 3/20/2009; Completed) ."Business Database<br />
Competitive Audit Project". Awarded a grant <strong>of</strong> $20,000 for conducting a business database audit for<br />
InfoUSA. This project is being conducted under the auspices <strong>of</strong> the PKI Technology Development Corp<br />
(PKITDC).<br />
Najjar, L., Khazanchi, D., and Wolcott, P. (1/1/2005 to 3/1/2005; Completed) "Business Database<br />
Competitive Audit Project". Awarded a grant <strong>of</strong> $14,575 for conducting a business database audit for<br />
InfoUSA. This project is being conducted under the auspices <strong>of</strong> the PKI Technology Development Corp<br />
(PKITDC).<br />
11.4 Research Grants submitted and under review:<br />
Azad Azadmanesh, Computer Science, College <strong>of</strong> IST, UNO, Lotfollah Najjar, Information Systems &<br />
Quantitative Analysis (ISQA), College <strong>of</strong> IST, UNO. “Electronic Student Companion.” (<strong>University</strong> <strong>of</strong><br />
<strong>Nebraska</strong> Foundation and Student Technol;ogy Fees). February, 2007.<br />
Azad Azadmanesh, Computer Science, College <strong>of</strong> IST, UNO, Lotfollah Najjar, Information Systems &<br />
Quantitative Analysis (ISQA), College <strong>of</strong> IST, UNO , and Krings , director <strong>of</strong> the Survivability Laboratory<br />
Testing at <strong>University</strong> <strong>of</strong> Idaho . “Consensus in Wireless Networks.” (NSF). March, 2006.<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Year/term Course number Course title<br />
Credit<br />
s<br />
2006/Fall ISQA 9130 Multivariate Data Analysis 3 9<br />
2007/ Spring ISQA 8196 Process Reengineering with IT 3 7<br />
2007/Spring ISQA 4190 // 3 4<br />
2007/Spring ISQA 8340 Advanced Regression Analysis 3 3<br />
2007/Spring ISQA 8206 Information Quality and data 3 2<br />
management<br />
2007/Spring ISQA 4200 // 3 5<br />
2007/Spring ISQA 9080 Research Directions in<br />
3 8<br />
Information Technology<br />
2007/Summer ISQA 9120 Application Of Design <strong>of</strong><br />
Experiment<br />
3 3<br />
No. <strong>of</strong><br />
students<br />
-439-
2007/Fall ISQA 9130 Multivariate Data Analysis 3 4<br />
2007/Fall Cist 2500 Introduction to Applies Statistics 3 21<br />
for IS&T<br />
2008/Spring CIST 2500 // (Distancd Education) 3 6<br />
2008/Spring ISQA 9080 Research Directions in<br />
3 15<br />
Information Technology<br />
2008/Spring ISQA 8196 Process Reengineering with IT 3 10<br />
2008/Spring ISQA 4190 // 3 3<br />
2008/Summer ISQA 9120 Application Of Design <strong>of</strong><br />
Experiment<br />
3 3<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: ____50_%. Please give<br />
a brief description <strong>of</strong> your major research and scholarly activities:<br />
Information Quality, Quality Management, Data Mining, and Process Reengineering.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-440-
Stacie Petter<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Stacie Petter<br />
Assistant Pr<strong>of</strong>essor<br />
Untenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Assistant Pr<strong>of</strong>essor<br />
Dates Held<br />
2006 – Current<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D.<br />
M.B.A.<br />
B.S.<br />
Computer<br />
Information<br />
Systems<br />
Computer<br />
Information<br />
Systems<br />
Computer<br />
Science<br />
Georgia State <strong>University</strong> 5/2006<br />
Georgia State <strong>University</strong> 8/2002<br />
Berry College 12/1999<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Americas Conference on Information Systems (8/2004)<br />
Americas Conference on Information Systems (8/2005)<br />
Seattle Innovation Symposium (10/2005)<br />
-441-
International Conference on Information Systems (12/2005)<br />
International Conference on Information Systems (12/2006)<br />
International Research Workshop on IT Project Management (12/2006)<br />
Clicker Teaching Circle (AY 2007-2008)<br />
Americas Conference on Information Systems (8/2007)<br />
Project Management Institute Heartland Chapter ProDev (9/2007)<br />
International Research Workshop on IT Project Management (12/2007)<br />
International Conference on Information Systems (12/2007)<br />
Clicker Teaching Circle (AY 2008-2009)<br />
International Conference on Design Science and Information Systems & Technology (5/2008)<br />
Midwest Conference for the Association <strong>of</strong> Information Systems (5/2008)<br />
International Research Workshop on IT Project Management (12/2008)<br />
International Conference on Information Systems (12/2008)<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
6/2003 – Georgia State <strong>University</strong> Graduate Teaching Assistant – responsible for teaching<br />
3/2006<br />
undergraduate and graduate courses; teaching assistant<br />
8/2002 –<br />
5/2006<br />
6/2000 –<br />
4/2002<br />
11/1999 –<br />
5/2000<br />
1/1999 –<br />
10/1999<br />
Georgia State <strong>University</strong><br />
Vista IT<br />
Network One<br />
Berry College<br />
for graduate and executive MBA course<br />
Graduate Research Assistant – responsible for<br />
conducting research, performing literature reviews, and<br />
writing papers with various pr<strong>of</strong>essors in the area <strong>of</strong><br />
computer information systems<br />
Senior Consultant – developed applications for clients,<br />
performed requirements analysis and system design<br />
Application Developer – developed and maintained<br />
applications for internal use, performed requirements<br />
analysis and system design<br />
Help Desk Coordinator – managed a help desk for<br />
centralized IT department, developed applications and<br />
processes to support help desk<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
-442-
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
ISQA Graduate Program Committee (0.5 hours/week)<br />
Graduate Council (0.5 hours/week)<br />
Graduate Council Committee B (0.5 hours/week)<br />
Graduate Council Scholarship Committee (0.5 hours/week)<br />
ISQA Reappointment, Promotion, and Tenure Committee (0.1 hours/week)<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
ISQA Graduate Program Committee (2008 – Current)<br />
ISQA Reappointment, Promotion, and Tenure Committee (2006 – 2008)<br />
ISQA Faculty Recruitment Committee (2007-2008)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Petter, S. (2008) Managing User Expectations on S<strong>of</strong>tware Projects: Lessons from the Trenches,<br />
International Journal <strong>of</strong> Project Management, 26(7).<br />
Petter, S., DeLone, W. and McLean, E. (2008) Measuring Information Systems Success: Models,<br />
Dimensions, Measures, and Interrelationships, European Journal <strong>of</strong> Information Systems, 17(3).<br />
Petter, S. and Vaishnavi, V. (2008) Facilitating Experience Reuse among S<strong>of</strong>tware Project Managers,<br />
Information Sciences. 178(7).<br />
Khazanchi, D., Murphy, J.D., and Petter,S. (2008) Guidelines for Evaluating Patterns in the IS Domain,<br />
Midwest Association for Information Systems Conference, Eau Claire, WI.<br />
Murphy, J.D., Petter, S., Cheng, K., and Briggs, R.O. (2008) Hitting the Collaboration Target: Computer-<br />
Guided thinkLet Selection, International Conference on Design Science Research in Information Systems<br />
and Technology, Atlanta, GA.<br />
Petter, S. Khazanchi, D., and Murphy, J.D. (2008) A Design Science Based Evaluation Framework for<br />
Patterns, International Conference on Design Science Research in Information Systems and Technology,<br />
Atlanta, GA.<br />
Randolph, A. and Petter, S. (2008) Is it Who You Know or What You Know: Social Capital Theory in IT<br />
Project Management, International Research Workshop on IT Project Management, Paris, France.<br />
Petter, S., Straub, D., and Rai, A. (2007) Specifying Formative Constructs in Information Systems<br />
Research, MIS Quarterly, 31(4).<br />
Petter, S., Mathiassen, L, and Vaishnavi, V. (2007) Five Keys to Project Knowledge Sharing, IT<br />
-443-
Pr<strong>of</strong>essional, May/June.<br />
Petter, S. (2007) Managing User Expectations on S<strong>of</strong>tware Projects: Lessons from the Trenches,<br />
International Research Workshop on IT Project Management, Montreal, Quebec, Canada.<br />
Petter, S. (2007). A Process to Reuse Experiences via Written Narratives among S<strong>of</strong>tware Project<br />
Managers, A Design Science Research Proposal Improving and Innovating Information & Communication<br />
Technology: Design Science Research Methods and Patterns, V. Vaishnavi and W. Kuechler (Eds.), Taylor<br />
and Francis.<br />
Petter, S. and Vaishnavi, V. (2007) A Generic Process for Individual Knowledge Reuse: Potential<br />
Problems and Solutions, Americas Conference on Information Systems, Keystone, CO.<br />
Khazanchi, D. and Petter, S. (2006). “The Need for Improved IT Project Management in e-Service<br />
Projects and Beyond,” e-Service Journal, (5:1).<br />
DeLone, W., McLean, E., and Petter, S. (2005). Success <strong>of</strong> Information Systems: Measuring the<br />
Effectiveness <strong>of</strong> Information Systems, Blackwell Encyclopedia <strong>of</strong> Management, 2nd edition, G.B. Davis<br />
(Ed.), Blackwell Publishing.<br />
Kuechler, W., Vaishnavi, V. and Petter, S. (2005). The Aggregate General Design Cycle as a Perspective<br />
on the Evolution <strong>of</strong> Computing Communities <strong>of</strong> Interest, Computing Letters, 1(3).<br />
Petter, S., Sevcik, G. and Straub, D. (2005). Transferring Technology to the Developing World,<br />
Encyclopedia <strong>of</strong> Information Science and Technology, M. Khosrow-Pour (Ed.), Idea Group Publishing.<br />
Petter, S. and Gallivan, M. (2004). Toward a Framework for Classifying and Guiding Mixed Method<br />
Research in Information Systems, Hawai'i International Conference on System Sciences, Waikoloa, HI.<br />
Petter, S. and Vaishnavi, V. (2004) Towards a Model to Support Knowledge Transfer among S<strong>of</strong>tware<br />
Project Managers, Americas Conference on Information Systems, New York, NY.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
Managing in a Digital World STEM Grant for $4500 (2007)<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Fall/2007 ISQA 3420 Managing in a Digital World 3 17<br />
Fall/2007 ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 21<br />
Spring/ ISQA 3420 Managing in a Digital World 3 26<br />
2007<br />
Spring/ ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 24<br />
2007<br />
Fall/2008 ISQA 3420 Managing in a Digital World 3 19<br />
Fall/2008 ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 27<br />
-444-
Spring/<br />
2009<br />
Spring/<br />
2009<br />
ISQA 3420 Managing in a Digital World 3 22<br />
ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 26<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __45___%. Please give<br />
a brief description <strong>of</strong> your major research and scholarly activities:<br />
Conducting research related to sharing experiences related to s<strong>of</strong>tware project management.<br />
Examining measures and predictors <strong>of</strong> information system success.<br />
Developing approaches and guidelines for research methods.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: ___IS - 100__%.<br />
-445-
-446-
Leah Pietron<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Leah R. Pietron<br />
Associate Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Associate Pr<strong>of</strong>essor Fall 1991 to Present<br />
Assistant Pr<strong>of</strong>essor Fall 1985 to Fall 1991<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
PhD<br />
MBA<br />
MS<br />
BS<br />
Business Education/<br />
Information Systems<br />
Business Administration/<br />
Economics<br />
Business Education/<br />
Vocational Education<br />
Comprehensive Business<br />
Education/ Physical<br />
Education<br />
<strong>University</strong> <strong>of</strong> North Dakota<br />
August<br />
1979<br />
Northwest Missouri State <strong>University</strong> August<br />
1985<br />
<strong>University</strong> <strong>of</strong> North Dakota May 1977<br />
Mayville State College May 1972<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
Advanced Information Systems Faculty Development Institute, Indiana <strong>University</strong>, Bloomington, IN. July<br />
7-July 31, 1989. Certificate <strong>of</strong> Attendance. Sponsored by the American Assembly <strong>of</strong> Collegiate Schools<br />
<strong>of</strong> Business (AACSB).<br />
Information Systems Faculty Development Institute, St. Paul, MN. July 6-August 7, 1987. Certificate <strong>of</strong><br />
Attendance. Sponsored by the American Assembly <strong>of</strong> Collegiate Schools <strong>of</strong> Business (AACSB).<br />
Continuous enrollment in courses at UNO, SANs Security Training, Seminars, etc<br />
-447-
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Teaching Circles, "Web Collaboration". (2008 - 2009).<br />
Rubrics Research Triangle (2008 to Current)<br />
Completed the CISSP Certification Examination on November 18, 2006<br />
Attempting the CISA Certification Examination on December 10, 2006<br />
Attended CISSP Certification Session at PKI, Summer 2006<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
Summer<br />
2007<br />
Lockheed Martin<br />
Worked on a Service-Oriented Architecture project. My<br />
focus was on IT Goverance and SOA Policy.<br />
May 2006 StatPak, UNO Conducting a vulnerability assessment with Dwight<br />
Haworth on the application.<br />
Summer/Fall Union Pacific Railroad Sarbanes-Oxley Compliance Review – worked with<br />
2004<br />
Company<br />
Dwight Haworth on evaluation <strong>of</strong> the ISO/IEC<br />
17799 evaluation and identifying deficiencies in their<br />
documentation and controls for Sarbanes-Oxley<br />
compliance.<br />
Summer<br />
2002<br />
City <strong>of</strong> <strong>Omaha</strong><br />
Created the Geographical Information Systems Strategic<br />
Plan for <strong>Omaha</strong> Police Department<br />
Fall 2001 Pamida and ShopKo PeopleS<strong>of</strong>t Security Tree Manager - Faculty Internship<br />
December<br />
2000<br />
MSI Systems Integrators Consultant – worked on the PeopleS<strong>of</strong>t installation –<br />
focused on Human Resources application<br />
Summer<br />
2003<br />
Fall and<br />
Spring 2000<br />
Fall 1999 and<br />
Spring 2000<br />
College <strong>of</strong> IS & T<br />
Faculty Internship with Steve Stock developing Security<br />
Policies and Procedures for the<br />
CASE Training for PMIC – user training for analysts on<br />
the use <strong>of</strong> Excelerator<br />
Created and delivered faculty development workshops<br />
on the use <strong>of</strong> media in classrooms for the College <strong>of</strong><br />
Business Administration<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
Summer-Fall Union Pacific<br />
Completed Sarbanes-Oxley Compliance Asssessment<br />
2005<br />
Spring 2004 Werner Trucking Company Conducted a Physical Security Review<br />
-448-
Spring 2002-<br />
Fall 2002<br />
Fall 2000-<br />
Spring 2001<br />
Fall 2000-<br />
Spring 2001<br />
<strong>Omaha</strong> Police Department Developed Strategic Plan for the Geographical<br />
Information Systems<br />
Developed a Security Model for PeopleS<strong>of</strong>t<br />
Pamida and ShopKo<br />
Worked a faculty internship and created the security<br />
tree<br />
PeoplePlus<br />
PeopleS<strong>of</strong>t Consulting – created documentation for the<br />
Project Management<br />
City <strong>of</strong> <strong>Omaha</strong><br />
Worked with Peter Wolcott, Donna Dufner, and Ilze<br />
Zigurs defining the project for the City <strong>of</strong> <strong>Omaha</strong>’s<br />
Mayor’s Hotline – this project became a service learning<br />
project<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Online Worldwide Instructional Designers and Faculty Steering Committee<br />
<strong>University</strong> Committee on the Advancement <strong>of</strong> Teaching<br />
MIS Graduate Program Committee<br />
Undergraduate Program Committee<br />
Academic Program Committee<br />
Proposed MS in Information Assurance<br />
Distance Education Steering Committee<br />
Information Assurance Undergraduate Program Committee<br />
Information Assurance Undergraduate Program Committee<br />
IS&T ABET Committee<br />
Information Assurance Recruitment Committee<br />
ISQA Assistant Pr<strong>of</strong>essor Recruitment Committee<br />
UNO ISACA Education Advocate<br />
Educational Policy Advisory Committee<br />
Distance Education Advisory Committee<br />
Academic Planning Council<br />
Academic Program Review for the Computer Science Department<br />
Distance Education Director's Forum<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
IS & T Technology Committee (2003-Present)<br />
Dean’s Expanded Executive Committee (2002-Present)<br />
<strong>University</strong> Committee on the Excellence Teaching Award (2005-2007)<br />
-449-
Computer Usage and Technology Committee (2002-2005)<br />
UNO Athletic Committee (2002-2005)<br />
Academic Subcommittee <strong>of</strong> the Computer Usage Committee (2002-2005)<br />
Strategic Planning Committee (2005-2008)<br />
Accreditation and Program Committee (2005-Current)<br />
IS & T Dean’s Search Committee (2005-2008)<br />
ISQA Undergraduate Program Committee (2002-2007)<br />
ISQA Graduate Program Committee (2004-2008)<br />
ISQA Faculty Recruitment Committee (2005-2008)<br />
Member, Colloquium for Integrative Media (2004-2005)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
"Synchronous Collaboration in Systems Development Education – Issues and Recommendations for the<br />
Virtual Classroom.", Van Vliet, P., Pietron, L., Decision Sciences Institute.<br />
Structured Systems Analysis, Information Warfare Journal, March 2006, by Dwight A. Haworth and Leah<br />
R. Pietron.<br />
Sarbanes-Oxley: Achieving Compliance by Starting with ISO 17799 by Dwight A. Haworth and Leah R.<br />
Pietron, Published in Information Systems Management, Vol.23, No. 1, pp. 73-87. Refereed.<br />
Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan<br />
de Vreede, Collaboration Engineering For Incident Response Planning: Process Development and<br />
Validation, HICCS Conference, Refereed publication, January 2007.<br />
Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan<br />
de Vreede, Incident Response Planning Using Collaboration Engineering Process Development and<br />
Validation, ICIS Conference, WISA 2006 Workshop, Refereed publication December 2006.<br />
Gwendolyn Kolfschoten, Gert-Jan de Vreede, and Leah Pietron, "A Training Approach for the Transition<br />
<strong>of</strong> RepeatableCollaboration Processes to Practitioners", Refereed Proceedings for the Conference, GDN<br />
Conference, Karlsruhe, Germany, June 2006.<br />
Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan<br />
de Vreede, Collaboration Engineering For Incident Response Planning: Process Development and<br />
Validation, Journal <strong>of</strong> Information Security, Refereed publication, January 2008.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
Grant, UNO Technology Grant, Development <strong>of</strong> a HDTV Classroom, $50,000, College <strong>of</strong> Information<br />
Technology & Science, Funded ($25,000)<br />
Grant, Distance Education Development Grant, College <strong>of</strong> Information Technology & Science, Pietron, L.,<br />
$1,000.00, Funded, (January 11, 2009 - May 9, 2009).<br />
Grant, Distance Education Development Grant, College <strong>of</strong> Information Technology & Science, Pietron, L.,<br />
$1,000.00, Funded, (January 11, 2009 - May 9, 2009).<br />
-450-
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009 CIST 3600 Information Security and Policy 3 24<br />
ISQA 8570 Info Security, Policy, and Ethics 3 11<br />
ISQA 8580 Security Risk Management and Assessment 3 10<br />
Fall 2008 ISQA 4110- Information System Analysis 3 20<br />
001<br />
ISQA 4110- Information System Analysis 3 26<br />
002<br />
ISQA 8040 An Overview <strong>of</strong> System Development 3 14<br />
Summer 2008 ISQA 4110 Information System Analysis 3 10<br />
Spring 2008 CIST 3600 Information Security and Policy 3 17<br />
ISQA 8570 Info Security, Policy, and Ethics 3 12<br />
ISQA 8580 Security Risk Management and Assessment 3 10<br />
Fall 2007 CIST 3600 Information Security and Policy 3 13<br />
ISQA 4110- Information System Analysis 3 18<br />
001<br />
ISQA 4110-<br />
002<br />
Information System Analysis 3 30<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 25__%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
My research focus is on pedagogical issues in systems development and information security. I have<br />
been working on two distance education articles, one virtual communities for information security, and<br />
use <strong>of</strong> rubrics in programming classes.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%<br />
-451-
-452-
Sajda Qureshi<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Sajda Qureshi<br />
Associate Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Associate Pr<strong>of</strong>essor<br />
Dates Held<br />
2002-Present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D London School <strong>of</strong> Economics and Political Science 1991-95<br />
M.S Analysis, Design London School <strong>of</strong> Economics and Political Science 1989-91<br />
and<br />
Management <strong>of</strong><br />
Information<br />
Systems<br />
Postgrad MIS London School <strong>of</strong> Economics and Political Science 1988-89<br />
uate<br />
Diploma<br />
MBA Business John Cabot <strong>University</strong> 1985-88<br />
Administration<br />
GCE Ordinary<br />
Level (10<br />
Subjects),<br />
GCE Advanced<br />
Level (3<br />
Subjects).<br />
St. Georges English School 1980-85<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
-453-
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Teaching Assessment By Students, Spring 2008<br />
Teaching Circle: Continuous Improvement in Teaching Fall 2007<br />
HICSS 2008<br />
HICSS 2006-2007<br />
HICSS 2005-2006<br />
WSIS 2005<br />
HICSS 2004-2005<br />
AMCIS 2005<br />
ICIS 2005<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
2009 <strong>University</strong> <strong>of</strong> Washington Visiting Scholar, the Information School<br />
2005 Westminster Business<br />
School<br />
Visiting Scholar, Department <strong>of</strong> Business Information<br />
Management and Operations<br />
1997-2004 Erasmus <strong>University</strong>.<br />
Rotterdam School <strong>of</strong><br />
Management<br />
Assistant Pr<strong>of</strong>essor, Department <strong>of</strong> Information and<br />
Decision Sciences. Taught MSc Information Management<br />
and PhD courses, research and thesis supervision.<br />
Visiting Pr<strong>of</strong>essor, Rotterdam School <strong>of</strong> Management.<br />
Taught MIS related courses for the MBA/MBI program.<br />
Fellow, Erasmus Research in Management (ERIM).<br />
1996 <strong>University</strong> <strong>of</strong> Arizona, School<br />
<strong>of</strong> Business and Public<br />
Administration<br />
1996 Erasmus <strong>University</strong>.<br />
Rotterdam School <strong>of</strong><br />
Responsibility for research and publication.<br />
Visiting Pr<strong>of</strong>essor<br />
Research Fellow<br />
Management<br />
1992-1995 Commonwealth Secretariat Supported electronic communication, supervised and<br />
managed projects implementing computer networks,<br />
and the development and application <strong>of</strong> electronic group<br />
support.<br />
1990-1992 London School <strong>of</strong> Economics<br />
and Political Science<br />
1988-1989 F.S. Tyabji Chartered<br />
Accountants<br />
Research Assistant, LSE Research and Consultancy.<br />
Worked on an MRC-EEC project developing an<br />
organisational modelling tool using Coloured Petri-nets.<br />
Information Technology Consultant. Designed<br />
accounting system<br />
-454-
1986-1987 John Cabot <strong>University</strong> Manager, <strong>University</strong> Library. Supervised and trained<br />
library assistants. General administration and<br />
accounting. Developed library computer system.<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
2001-2007 V.O.F. Innovative Group Director. Collaborative work consulting<br />
Support<br />
1988 ITALSTAT Consultant, Finance Department. Implemented Monte<br />
Carlo simulation as a method <strong>of</strong> risk analysis on the<br />
capital budgeting system <strong>of</strong> an investment project.<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Dean's Executive Committee<br />
Doctoral Program Committee<br />
College Personnel Committee<br />
Reappointment and Tenure Committee<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Graduate Council Committee B, 2005-2008<br />
Dean's Executive Committee, 2007-2008<br />
Doctoral Program Committee, 2007-2008<br />
College Personnel Committee, 2006-2008<br />
Reappointment and Tenure Committee, 2005-2008<br />
Member Pr<strong>of</strong>essional Development Committee, 2002-2005<br />
Member Chancellor’s Strategic Planning Committee, 2004-2005<br />
Chair Academic Excellence Sub-Committee, 2004-2005<br />
Facilitator and Presenter Strategic Planning Advance, 2004-2005<br />
Member <strong>University</strong> Committee on Research , 2004-2005<br />
-455-
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Qureshi, S., Kamal, M., and P. Wolcott “Information Technology Therapy for Competitiveness in Micro-<br />
Enterprises.” International Journal <strong>of</strong> E-Business Research. Idea Group International. Vol. 5, Issue 1.<br />
January 2009.<br />
Wolcott, P., Kamal, M. and S. Qureshi ”Meeting the Challenges <strong>of</strong> ICT Adoption by Micro-enterprises“.<br />
Journal <strong>of</strong> Enterprise Information Management. Emerald. Volume 21, Issue 6. 2008.<br />
Qureshi, S., Briggs, B. and V. Hlupic. “Value Creation from Intellectual Capital: Convergence <strong>of</strong><br />
Knowledge Management and Collaboration in the Intellectual Bandwidth Model”. Group Decision and<br />
Negotiation. Vol 15, No 3. Pp:197-220. 2006.<br />
Qureshi, S., Liu, M. and D. Vogel, "The Effects <strong>of</strong> Electronic Collaboration in Distributed Project<br />
Management". Group Decision and Negotiation. Vol 15, No1. Pp55-75 2006.<br />
Qureshi, S. and P. Keen. “Activating Knowledge through Electronic Collaboration: Vanquishing the<br />
Knowledge Paradox”. IEEE Transactions in Pr<strong>of</strong>essional Communication. Vol 48, Issue 1. Pp: 40- 54 2005.<br />
de Vreede, G.J., Mgaya, R. and S. Qureshi. “Field Experiences with Collaboration Technology: A<br />
Comparative <strong>Study</strong> in Tanzania and South Africa” Journal <strong>of</strong> Information Technology for Development.<br />
Vol 10, no 3. 2004.<br />
Qureshi, S. “Social and Economic Perspectives on the role <strong>of</strong> Information and Communication<br />
Technology on Development.” Journal <strong>of</strong> Information Technology for Development. Vol 15, No 1. 2009.<br />
Qureshi, S. “Assessing the Effects <strong>of</strong> Information and Communication Technologies on Development.”<br />
Journal <strong>of</strong> Information Technology for Development. Vol 14, No 4. 2008.<br />
Qureshi, S. " Information technology innovations for development" Journal <strong>of</strong> Information Technology<br />
for Development. Vol 13, No 4. (p 311-313) 2007.<br />
Qureshi, S. "Information Technology Application in Emerging Economies" Journal <strong>of</strong> Information<br />
Technology for Development. Vol 13, No 2. 2007.<br />
Qureshi, S. "Collaboration for knowledge networking in development." Journal <strong>of</strong> Information<br />
Technology for Development. Vol 12, No 2. (p 87-89) 2006.<br />
Qureshi, S. "Why is the information society important to us? The World Summit on the Information<br />
Society in Tunis." Journal <strong>of</strong> Information Technology for Development. Vol 12, No 1. 2006.<br />
Qureshi, S. “Off-Shore Outsourcing Across the Digital Divide”. Journal <strong>of</strong> Information Technology for<br />
Development. Vol 11, No 1. 2005.<br />
Qureshi, S. “E-Government and IT Policy: Choices for government outreach and policy making”. Journal<br />
<strong>of</strong> Information Technology for Development. Vol 11, No 2. 2005.<br />
Qureshi, S. “Movement in the Information Technology for Development Debate: How can it meet the<br />
challenges <strong>of</strong> global competition?”. Journal <strong>of</strong> Information Technology for Development. Vol 10, No 3.<br />
2004.<br />
Qureshi, S., Kamal, S., and P. Keen “Knowledge Networking to overcome the Digital Divide” in King, B.<br />
“Knowledge Management and Organizational Learning” Series on Annals <strong>of</strong> Information System<br />
Springer. Forthcoming.<br />
Qureshi, Sajda, and Vogel, Doug, Information Technology Application in Emerging Economies: A<br />
Monograph <strong>of</strong> a Symposium at HICSS-40, January 2007, 72 pp ISBN TBA.<br />
http://www.hicss.hawaii.edu/reports.htm<br />
Qureshi, S. and P. Keen "Organizational Transformation by Activating Knowledge: The Mediating Role <strong>of</strong><br />
Collaboration Technologies" in Handbook <strong>of</strong> Information Technology in A. Salazar and S. Sawyer (Eds)<br />
Organizations and Electronic Markets. World Scientific Press. Accepted for publication. 2006.<br />
-456-
Qureshi, S. "The Role <strong>of</strong> Information Technology for Development: Global Development Through Local<br />
Empowerment" in Networking the Commonwealth for Development: Moving from Digital Divide to<br />
Digital Opportunity. NDD New Media. November 2005. Pp49-52.<br />
Davison, R.M., Harris, R.H., Qureshi, S., Vogel, D.R. and Vreede, G.J. de (Eds) Information Systems in<br />
Developing Countries: Theory and Practice, City <strong>University</strong> <strong>of</strong> Hong Kong Press. 2005.<br />
Qureshi, S., “Information Technology Infrastructures for Developing Countries: Key Concepts and Cases”<br />
in Davison, R.M., Harris, R.H., Qureshi, S., Vogel, D.R. and Vreede, G.J. de (Eds) Information Systems in<br />
Developing Countries: Theory and Practice, City <strong>University</strong> <strong>of</strong> Hong Kong Press. 2005.<br />
Qureshi, S., Hlupic, V. and B. Briggs, “On the Convergence <strong>of</strong> Knowledge Management and Groupware”.<br />
In: Vreede, de. G.J., Guerrero, L.A. and G.M. Raventos (Eds). Groupware: Design, Implementation, and<br />
Use. Springer. 2004. pp25-34.<br />
Kamal, M., Good, T.G., & Qureshi, S. Development Outcomes from IT adoption in Micro-Enterprises.<br />
Proceedings <strong>of</strong> the 42nd Annual Hawaii International Conference on System Sciences (HICSS-42),<br />
Waikoloa, Hawaii. January 5 – 8. 2009.<br />
Qureshi, S., Kamal, M., and Good, T.G.. Adoption <strong>of</strong> Information Technology by Micro-enterprises:<br />
Insights from a rural community. Proceedings <strong>of</strong> the 14th Annual Americas Conference on Information<br />
Systems (AMCIS-14), Toronto, Canada. August 14-17, 2008.<br />
Kamal, M., Qureshi, S. and L. Najjar “A Global Analysis <strong>of</strong> the Effect <strong>of</strong> IT Capacity on Development –<br />
Understanding Sourcing <strong>of</strong> Skills”. 2008 International Conference on Information Resources<br />
Management (Conf-IRM). May 18-20, 2008. Niagara Falls, Ontario, Canada.<br />
Qureshi, S., Wolcott, P. and M. Kamal “Information Technology Therapy for Micro-enterprise Success:<br />
Directions for Sustainable Development”. 41th Annual Hawaii International Conference on System<br />
Sciences (HICSS'08), 2008.<br />
Qureshi, S. and A. York, “IT Adoption by Small Businesses in Underserved Communities”. 41th Annual<br />
Hawaii International Conference on System Sciences (HICSS'08), 2008.<br />
Qureshi, S. and T. Lamsam-Trumbly, “Transcending the Digital Divide in Native America: A Framing<br />
Analysis <strong>of</strong> the Effects <strong>of</strong> Information and Communication Technologies and Media on Empowerment<br />
and Development”. 41th Annual Hawaii International Conference on System Sciences (HICSS'08), 2008.<br />
Qureshi, S. and A. Laure-Fayard, “Virtual Teams and Development: A Language Games Perspective”.<br />
41th Annual Hawaii International Conference on System Sciences (HICSS'08), 2008.<br />
Qureshi, S., Keen, P. and M. Kamal." Knowledge Networking across the Social Divide: A Model for<br />
Distributed Decision Making " Proceedings <strong>of</strong> the Thirteenth Americas Conference on Information<br />
Systems, Keystone, USA August 9th-12th 2007.<br />
Wolcott, P., Qureshi, S. and M. Kamal " An Information Technology Therapy Approach to Microenterprise<br />
Adoption <strong>of</strong> ICTs". Proceedings <strong>of</strong> the Thirteenth Americas Conference on Information<br />
Systems, Keystone, USA August 9th-12th 2007. Nominated for Best Paper Award.<br />
Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. Human Development through Information &<br />
Communication Technologies: Theoretical & Empirical Support. Paper presented at the Second Annual<br />
Midwest United States Association for Information Systems Conference (MWAIS-02), Springfield, Illinois.<br />
May 18-19. 2007.<br />
Qureshi, S. and A. Davis, "Managing Resistance to Organizational Change: How GSS Can Reveal Role<br />
Related Resistance Behaviors," hicss, p. 248b, 40th Annual Hawaii International Conference on System<br />
Sciences (HICSS'07), 2007. Nominated for Best Paper Award.<br />
Qureshi, S., and A. Davis, " Overcoming the Digital Divide through Electronic Commerce: Harnessing<br />
opportunities in IT for Development" 40th Annual Hawaii International Conference on System Sciences<br />
(HICSS'07), 2007.<br />
-457-
Qureshi, S., Keen, P. and M. Kamal. "Knowledge Networking for Development: Building Bridges across<br />
the Digital Divide" hicss, p. 226c In (eds) R. Sprague and J. Nunamaker The Fortieth Annual Hawaii<br />
International Conference on Systems Sciences. IEEE Computer Society Press.2007.<br />
Qureshi, S. and A. Davis. "The Effect <strong>of</strong> e-Commerce Development". Proceedings <strong>of</strong> the Twelfth<br />
Americas Conference on Information Systems, Acapulco, Mexico, August 4th-6th 2006.<br />
Qureshi, S. and A. Davis. "Assessing Resistance to Change in a Multinational Organization Using a GSS<br />
Game". Proceedings <strong>of</strong> the Twelfth Americas Conference on Information Systems, Acapulco, Mexico,<br />
August 4th-6th 2006.<br />
Qureshi, S. and A. de Leeuwe., "Mobilizing Intellectual Bandwidth in a Distributed Virtual Organization:<br />
The Missing Links." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii International<br />
Conference on Systems Sciences. IEEE Computer Society Press. 2006.<br />
Keen, P. and S. Qureshi, "Organizational Transformation through Business Models: A Framework for<br />
Business Model Design." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii<br />
International Conference on Systems Sciences. IEEE Computer Society Press. Best Paper Award. 2006.<br />
Qureshi, S. and C. "Noteboom. Adaptation in Distributed Projects: Collaborative Processes in Digital<br />
Natives and Digital Immigrants." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii<br />
International Conference on Systems Sciences. IEEE Computer Society Press. 2006.<br />
Qureshi, S. and C. Noteboom. "An Investigation <strong>of</strong> Episodes <strong>of</strong> Global Interactivity: What Collaborative<br />
Processes Effect the Success <strong>of</strong> Distributed Projects?." Proceedings <strong>of</strong> the Eleventh Americas Conference<br />
on Information Systems, <strong>Omaha</strong>, NE, USA August 11th-14th 2005.<br />
Qureshi, S. "How does Information Technology Effect Development? Integrating Theory and Practice<br />
into a Process Model." Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems,<br />
<strong>Omaha</strong>, NE, USA August 11th-14th 2005.<br />
Qureshi, S. and P. Keen, “How to Overcome the Knowledge Paradox: Activate Knowledge Identity, Not<br />
Just Organize Information.” In (eds) R. Sprague and J. Nunamaker The Thirty Eight Annual Hawaii<br />
International Conference on Systems Sciences. IEEE Computer Society Press. 2005.<br />
Qureshi, S., Liu, M. and D. Vogel, “A Grounded Theory Analysis <strong>of</strong> E-Collaboration Effects for Distributed<br />
Project Management ”. In (eds) R. Sprague and J. Nunamaker The Thirty Eight Annual Hawaii<br />
International Conference on Systems Sciences. IEEE Computer Society Press. 2005.<br />
Verhoef, R. and S. Qureshi, “Collaborative Infrastructures for Mobilizing Intellectual Resources:<br />
Assessing Intellectual Bandwidth in a Knowledge Intensive Organization.”In (eds) R. Sprague and J.<br />
Nunamaker The Thirty Eigth Annual Hawaii International Conference on Systems Sciences. IEEE<br />
Computer Society Press. 2005.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year Course Course title Semester Class<br />
-458-
number hrs size<br />
Spring 2009 ISQA Electronic Commerce 3 20<br />
4180/8186<br />
ISQA 8420 Managing the IS Function 3 24<br />
Fall 2008 ISQA 4000 Information Technology for Development 3 5<br />
ISQA 8080 Independent <strong>Study</strong><br />
ISQA 8420 Managing the IS Function 3 8<br />
Spring 2008 ISQA 8060 Research Methods in MIS 3 20<br />
ISQA Electronic Commerce 3 19<br />
4180/8186<br />
Fall 2007 ISQA 8060 Research Methods in MIS 3 22<br />
ISQA 8080 Independent <strong>Study</strong><br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-459-
-460-
Maury Scho<strong>of</strong><br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Maury Scho<strong>of</strong>f<br />
Lecturer<br />
n/a<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Instructor 1996 - 2002<br />
Lecturer<br />
2002 - present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
MS Operations Naval Postgraduate School 1970<br />
Research and<br />
Systems<br />
Analysis<br />
BS Chemistry Utah State <strong>University</strong> 1959<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
Fifteen <strong>of</strong> twenty-five years <strong>of</strong> Army career using and teaching the use <strong>of</strong> computers<br />
Eleven years as a manager in a corporate information systems department<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
-461-
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
1995 - 1996 Bellevue <strong>University</strong> Adjunct Faculty<br />
1993 - 1995 Embry-Riddle Aeronautical Instructor<br />
<strong>University</strong>, Offutt Air Force<br />
Base Campus<br />
1978 - 1982 Kansas City Community Instructor<br />
College, Fort Leavenworth<br />
Campus<br />
1977 - 1978 <strong>University</strong> <strong>of</strong> Maryland, Adjunct Faculty<br />
Korea Campus<br />
1985 – 1996 Fortune 50 company,<br />
<strong>Omaha</strong><br />
Senior operations research analyst / Director <strong>of</strong><br />
Operations Analysis /<br />
Internal consultant /<br />
1960 -1985 Army Command and<br />
General Staff<br />
College<br />
Director <strong>of</strong> Strategic Information and Financial Systems<br />
Career Army Officer<br />
Division Finance Officer<br />
Installation Finance and<br />
Accounting Officer<br />
Deputy Director <strong>of</strong><br />
War Games and Analysis<br />
Chairman, Management Committee<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
11 years <strong>of</strong> consulting in applications <strong>of</strong> information<br />
systems to real world business problems including<br />
s<strong>of</strong>tware design, systems integration, installation <strong>of</strong><br />
systems, selection <strong>of</strong> hardware, selection <strong>of</strong> commercial<br />
s<strong>of</strong>tware. Consulting was done both domestically and<br />
internationally<br />
-462-
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Course<br />
Term/year number<br />
Spring 2009 CIST 3100-<br />
001<br />
CIST 3110-<br />
001<br />
CIST 3110-<br />
002<br />
CIST 3110-<br />
850<br />
Fall 2008 CIST 3110-<br />
001<br />
CIST 3110-<br />
002<br />
CIST 3110-<br />
003<br />
Spring 2008 CIST 3100-<br />
850<br />
CIST 3110-<br />
001<br />
CIST 3110-<br />
002<br />
Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Organizations, Applications, and Technology 3 20<br />
Information Technology Ethics 3 27<br />
Information Technology Ethics 3 28<br />
Information Technology Ethics 3 11<br />
Information Technology Ethics 3 29<br />
Information Technology Ethics 3 22<br />
Information Technology Ethics 3 22<br />
Organizations, Applications, and Technology 3 26<br />
Information Technology Ethics 3 25<br />
Information Technology Ethics 3 31<br />
-463-
ISQA 8420 Managing the I.S. Function 3 26<br />
Fall 2007 CIST 1010- Foundation <strong>of</strong> IS & T 1 24<br />
001<br />
CIST 1010- Foundation <strong>of</strong> IS & T 1 11<br />
002<br />
CIST 3100- Organizations, Applications, and Technology 3 22<br />
002<br />
CIST 3100-<br />
003<br />
Organizations, Applications, and Technology 3 25<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-464-
Yong Shi<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Yong Shi<br />
Charles W. and Margre H. Durham Distinguished<br />
Pr<strong>of</strong>essor <strong>of</strong> Information Technology<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Charles W. and Margre H. Durham Distinguished August 1999<br />
Pr<strong>of</strong>essor <strong>of</strong> Information Technology<br />
Pr<strong>of</strong>essor August 1998<br />
Associate Pr<strong>of</strong>essor August 1996<br />
Assistant Pr<strong>of</strong>essor August 1991<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D. Management Science <strong>University</strong> <strong>of</strong> Kansas 1991<br />
with minor in Computer<br />
and Production System<br />
Design<br />
B.S. Mathematics Southwest Petroleum Institute,<br />
Sichuan, China<br />
1982<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
May 27-30, 2007, organized and co-chaired the 7th International Conference on Computational Science,<br />
-465-
Beijing, where more than 600 scholars have participated from 48 different countries.<br />
Oct. 28-31, 2007, organized and co-chaired the 2007 IEEE International Conference on Data Mining<br />
(ICDM 2007), <strong>Omaha</strong>, NE, USA, where more than 350 scholars have participated from 47 different<br />
countries.<br />
May 24-26, 2009, organized and co-chaired the International Conference on Linear Programming<br />
Algorithms and Extensions, Haikou, Hainan, where more than 25 international leading scholars in the<br />
field will participate.<br />
June 21-26, 2009, organized and co-chaired the 20th International Conference on Multiple Criteria<br />
Decision Making, where more than 250 scholars participants<br />
Chaired Workshop on “Optimization-based Data Mining Techniques and Applications” at IEEE<br />
International Conference on Data Mining, 2005, 2006, 2007.<br />
Chaired Workshop on “Computational Finance and Business Intelligence” at International Conference on<br />
Computational Science, 2004, 2005, 2006, 2007, 2008.<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
September 2003- Consulting Northrop Information Intrusion and detection<br />
Oct. 2005 Grumman Corporation<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Committee <strong>of</strong> Doctoral Program in IT<br />
Organized 14 committee meetings<br />
Admitted 2 new Ph.D. students<br />
Managed the Comps Exams<br />
Organized committee meeting to revise the Plan <strong>of</strong> <strong>Study</strong> for the program. (Spring 2009)<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
-466-
Doctoral Program Committee (2003-present)<br />
Graduate Program Committee (2006-2007)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Zhang, W. R., J. H. Zhang, Y. Shi and S. S. Chen, “Bipolar Linear Algebra and YinYang-N-Element Cellular<br />
Networks for Equilibrium-Based Biosystem Simulation and Regulation”, Journal <strong>of</strong> Biological Systems,<br />
(Forthcoming) 2009. Refereed Journal. 33% contribution.<br />
Yan, N., Z. Chen, Y. Shi and R. Liu “An Optimization-Based Classification Approach with the Non-additive<br />
Measure”, International Journal <strong>of</strong> Operations and Quantitative Management, (Forthcoming) 2009.<br />
Refereed Journal. 33% contribution.<br />
Zhang, Z., P. Zhang and Y. Shi “A Rough Set-based Multiple Criteria Linear Programming Approach for<br />
Improving Classification Performance”, International Journal <strong>of</strong> Operations and Quantitative<br />
Management, (Forthcoming) 2009. Refereed Journal. 33% contribution.<br />
Zhang, P., Y. Tian, Z. Zhang, X. Li and Y. Shi “Supportive instances for Regularized Multiple Criteria Linear<br />
Programming Classification”, International Journal <strong>of</strong> Operations and Quantitative Management,<br />
(Forthcoming) 2009. Refereed Journal. 33% contribution.<br />
Zhang P., Z. Zhang, A. Li, Y. Shi, “Global and Local (Glocal) Bagging Approach for Classifying Noisy<br />
Dataset”, International Journal <strong>of</strong> S<strong>of</strong>tware and Informatics, Vol.2, No.2, 181-197, 2008. Refereed<br />
Journal. 33% contribution.<br />
Zheng, X., L. Zhang, G. Nie and Y. Shi, “A Way to Accelerate Knowledge Management: from the<br />
Perspective <strong>of</strong> Knowledge Potential,” Journal <strong>of</strong> Service Science and Management (Forthcoming) 2008.<br />
Refereed Journal. 33% contribution.<br />
Peng, Y., Kou, G., Shi, Y., and Chen, Z.,A Descriptive Framework for the Field <strong>of</strong> Data Mining and<br />
Knowledge Discovery , International Journal <strong>of</strong> Information Technology and Decision Making, Vol. 7,<br />
No.4, 639-682, 2008. Refereed Journal. 33% contribution.<br />
Kou, G., Y. Peng, Z. Chen and Y. Shi “Multiple Criteria Mathematical Programming for Multi-Class<br />
Classification and Application in Network Intrusion Detection,” Information Sciences, Vol. 179, 371–<br />
381, 2009. Refereed Journal. 33% contribution.<br />
Li., X., L. Zhang, P. Zhang and Y. Shi “Problems and Systematic Solutions in Data Quality,” International<br />
Journal <strong>of</strong> Services Sciences, (Forthcoming) 2008. Refereed Journal. 33% contribution.<br />
Peng, Y., G. Kou, Y. Shi, and Z. Chen “A Multi-Criteria Convex Quadratic Programming Model for Credit<br />
Data Analysis,” Decision Support Systems, Vol. 44, 1016-1030, 2008. Refereed Journal. 33% contribution.<br />
Zhang, Y., L. Chen, Z. Zhou and Y. Shi, “A Geometrical Method on Multidimensional Dynamic Credit<br />
Evaluation”, International Journal <strong>of</strong> Information Technology and Decision Making, Vol. 7, No. 1, 103-<br />
114, 2008. Refereed Journal. 33% contribution.<br />
Liu, G., Z. Zhou and Y. Shi, “A Multi-Dimensional Forward Selection Method for Firms’ Credit Sale,”<br />
Computers & Mathematics with Applications, Vol. 54, 1228-1233, 2007. Refereed Journal. 33%<br />
contribution.<br />
Shi, Y., X. Zhang, J. Wan, G. Kou, Y. Peng, and Y. Guo, “Comparison study <strong>of</strong> two kernel-based learning<br />
algorithms for predicting the distance range between antibody interface residues and antigen surface”,<br />
-467-
International Journal <strong>of</strong> Computer Mathematics, Vol.84, 690-707,2007. Refereed Journal. 33%<br />
contribution.<br />
Shi, Y., X. Zhang, J. Wan, Y. Wang, W. Ying, Z. Cao, Y. Guo, “Predicting the Distance between Antibody’s<br />
Interface Residue And Antigen To Recognize Antigen Types By Support Vector Machine”, Neural<br />
Computing & Applications, Vol.16, 481-490, 2007. Refereed Journal. 33% contribution.<br />
Zhang, L., Y. Shi, and X. Yang, “Association-Rule Knowledge Discovery by Using A Fuzzy Mining<br />
Approach,” International Journal <strong>of</strong> Data Mining and Business Intelligence, (Forthcoming), Refereed<br />
Journal. 33% contribution.<br />
Kwak, W., Y. Shi, S. Eldridge and G Kou, “Bankruptcy Prediction for Japanese Firms: Using Multiple<br />
Criteria Linear Programming Data Mining Approach,” International Journal <strong>of</strong> Data Mining and Business<br />
Intelligence, (Forthcoming), Refereed Journal. 33% contribution.<br />
Shi, Y, Y. Peng, G. Kou and Z. Chen, “Classifying Credit Card Accounts for Business Intelligence and<br />
Decision Making: A Multiple-Criteria Quadratic Programming Approach,” International Journal <strong>of</strong><br />
Information Technology and Decision Making, Vol. 4, 581-600, 2005, Refereed Journal (SCI). 33%<br />
contribution.<br />
Zhou, Z., T. Mou and Y. Shi, “The Mathematical Structure <strong>of</strong> Credit Evaluation,” Far East Journal <strong>of</strong><br />
Applied Mathematics, Vol. 20, 113-119, 2005, Refereed Journal. 33% contribution.<br />
Shi, Y., H. Yang and L. Zhang, “Promoting China’s National Competitiveness by Using Knowledge<br />
Management and Data Mining,” China S<strong>of</strong>t Science, Vol. 176, 46-51, 2005 (in Chinese), Refereed Journal.<br />
33% contribution.<br />
Shi, Y., J. He, L. Wang and W. Fan, “Computer-based Algorithms for Multiple Criteria and Multiple<br />
Constraint Levels Integer Linear Programming,” Computers & Mathematics with Applications, Vol. 49,<br />
903-921, 2005, Major Refereed Journal (SCI). 50% contribution.<br />
Kou, G., Y. Peng, Y. Shi, M. Wise and W. Xu, "Discovering Credit Cardholders’ Behavior by Multiple<br />
Criteria Linear Programming", Annals <strong>of</strong> Operations Research, Vol.135, 261-274, 2005, Major Refereed<br />
Journal (SCI). 30% contribution.<br />
Shi, Y., R. Liu, N. Yan, and Z. Chen, “A Family <strong>of</strong> Optimization Based Data Mining Methods,” Zhang, Y<br />
(eds.), ApWeb 2008, Progress in WWW Research and Development, LNCS 4976, pp. 26-38, 2008.<br />
Shi, Y., R. Liu, N. Yan, and Z. Chen, “Multiple Criteria Mathematical Programming and Data Mining,” ICCS<br />
2008, Part I: 7-17. (EI, ISTP)<br />
Zhang, P., Y. Tian, X. Li, Z. Zhang, and Y. Shi, “Select Representative Samples for Regularized Multiple-<br />
Criteria Linear Programming Classification,” ICCS 2008, Part II: 436-440. (EI, ISTP).<br />
Yan, N., Z. Chen, R. Liu, and Y. Shi, “An Optimization-Based Classification Approach with the Non-additive<br />
Measure,” ICCS 2008, Part II: 450-458. (EI, ISTP).<br />
Zhang, Y., Z. Zhou, and Y. Shi, “A Selection Method <strong>of</strong> ETF’s Credit Risk Evaluation Indicators ,” ICCS 2008,<br />
Part II: 459-465. (EI, ISTP).<br />
Zhang, Z., Y. Shi, P. Zhang, and G. Gao, “A Rough Set-Based Multiple Criteria Linear Programming<br />
Approach for Classification,” ICCS 2008, Part II: 476-485. (EI, ISTP).<br />
Zhang, J. and Y. Shi “A Framework <strong>of</strong> Optimization Method for Classification,” Lecture Notes in OR: The<br />
First International Symposium on Optimization and Systems Biology (OSB’07), Beijing, China, August 8–<br />
10, 2007, 391–396. (ISPT).<br />
Liu, R. and Y. Shi “Succinct Matrix Approximation and Efficient k-NN Classification,” IEEE ICDM 2007<br />
Proceedings, 213-222. (EI).<br />
Zhu, X., P. Zhang, X. Lin and Y. Shi “Active Learning from Data Streams,” IEEE ICDM 2007 Proceedings,<br />
757-762. (EI).<br />
He, J., G. Huang, Y. Zhang and Y. Shi “Cluster Analysis and Optimization in Color-Based Clustering for<br />
-468-
Image,” Workshop on Knowledge Discovery and Data Mining from Multimedia Data and Multimedia<br />
Applications, Workshop at IEEE ICDM 2007, 213-218. (EI).<br />
Gang, K., Y.Peng, Y. Shi, and Z. Chen, “Epsilon-Support Vector and Large-Scale Data Mining Problems”,<br />
ICCS 2007, Part III: 874-881. (EI, ISTP)<br />
Zhou, L., Y. Liu, J. Wang and Y. Shi “Utility-based Web Path Traversal Pattern Mining,” Workshop at IEEE<br />
ICDM 2007, 373-378. (EI).<br />
He, J., Y. Zhang, Y Shi, G. Huang “A Multi-criteria Decision Support System <strong>of</strong> Water Resource Allocation<br />
Scenarios, KSEM2007. (Accepted) (LNAI) (EI, ISTP, DBLP)<br />
He, J., G. Huang, Y. Zhang and Y. Shi “Cluster Analysis and Optimization in Color-Based Clustering for<br />
Image,” Workshop on Knowledge Discovery and Data Mining from Multimedia Data and Multimedia<br />
Applications, ICDM 2007. (IEEE conference)<br />
He, J., Y. Zhang, G. Huang, Y. Shi, “Network Lifetime <strong>of</strong> Application-Specific Randomly Deployed Wireless<br />
Sensor Networks in Arbitrary Sensor Density,” ACIS-ICIS 2007: 352-357. (EI, ISTP, DBLP)<br />
Shi, Y., Y. Tian, X. Chen and P. Zhang “A Regularized Multiple Criteria Linear Program for Classification,”<br />
Workshop at IEEE ICDM 2007, 253-258. (EI).<br />
Shi, Y. and X. Li "Knowledge Management Plantforms and Intelligence Knowledge beyond Data Mining,"<br />
in Y. Shi, D. Olson and A. Stam, eds., Advance in Multiple Criteria Decision Making and Human Systems<br />
Management, IOS Press, Amsterdam, 272-288, 2007.<br />
Peng, Z., Zhang , J., and Y. Shi, “A New Multi-Criteria Quadratic-Programming Linear Classification Model<br />
for VIP E-Mail Analysis”, ICCS 2007, Part II: 499-502. (EI, ISTP)<br />
Meihong ,Z., Y. Shi, A. Li and J. He, “A Dynamic Committee Sheme on Multiple-Criteria Linear<br />
Programming Classification Method”, ICCS 2007, Part II: 401-480. (EI, ISTP)<br />
Yaohui, C., A. Li, Y. Shi, “Kimberlites Identification by Classification Methods”, ICCS 2007, Part II: 409-414.<br />
(EI, ISTP)<br />
Zhiwang, Z., Y. Shi, “The Characteristic Analysis <strong>of</strong> Web User Clusters based on Frequent Browsing<br />
Patterns”, ICCS 2007, Part II: 490-493. (EI, ISTP)<br />
Jing W., Y. Liu, L. Zhou, Y. Shi, “Pushing Frequency Constraint to Utility Mining Model”. ICCS 2007, Part<br />
III: 689-692. (EI, ISTP)<br />
Zhan, Z., Y.Tian and Y. Shi, “Feature Selection for VIP E-Mail Accounts Analysis”, ICCS 2007, Part III: 493-<br />
700. (EI, ISTP)<br />
Peng,Y., G. Kou, J. Matza, Z. Chen, D. Khazanchi and Yong Shi, “Application <strong>of</strong> Classification Methods to<br />
Individual Disability Income Insurance Fraud Detection”, ICCS 2007, Part III: 852-858. (EI, ISTP)<br />
Li., X, L.Zhang, M. Ding, Y. Shi, J. Li, “A Combined Web Mining Model and Its Application in Crisis<br />
Management”, ICCS 2007, Part III: 906-910. (EI, ISTP)<br />
Li., G., Z. Zhou, X. Song, and Y. Shi, “A Fuzzy Comprehensive Evaluation Method on Firms' Credit Sale<br />
Risk”, ICCS 2007, Part III:1062-1068. (EI, ISTP)<br />
Zhang, L., J. Li and Y. Shi “<strong>Study</strong> on Improving Efficiency <strong>of</strong> Knowledge Sharing in Knowledge-Intensive<br />
Organization,” WINE 2005: 816-825. 30% contribution.<br />
Li, A. and Y. Shi “An Integrated Classification Method: Combination <strong>of</strong> LP and LDA,” WINE 2005: 758-767.<br />
50% contribution.<br />
Kou, G., N. Yan, Y. Peng, N. Yan, Y. Shi and Z. Chen "Network Surveillance and Multi-Group Intrusion<br />
Classification," in J. Chen, ed., IEEE Service Systems and Service Management, International Academic<br />
Publishers, Beijing, 841-848, 2005. 20% contribution.<br />
Li, J. , W. Xu and Y. Shi "Credit Scoring via PCALWM" in V. S. Sunderam et al, eds., ICCS 2005, LNCS 3516,<br />
Springer, Berlin, 531-538, 2005. 30% contribution.<br />
Peng, Y. , G. Kou, Y. Shi, and Z. Chen "Improving Clustering Analysis for Credit Card Accounts<br />
-469-
Classification" in V. S. Sunderam et al, eds., ICCS 2005, LNCS 3516, Springer, Berlin, 548-553, 2005. 30%<br />
contribution.<br />
Peng, Y., G. Kou, Y. Shi, Z. Chen and H. Yang, ``A Comparison <strong>Study</strong> <strong>of</strong> Multiclass Classification between<br />
Multiple Criteria Mathematical Programming and Hierarchical Method for Support Vector Machines,"<br />
2005 ICDM Workshop: Optimization-based Data Mining Techniques with Applications, pp. 30-36, U.S.A.,<br />
2005.<br />
He, J., W. Yue and Y. Shi, ``Pattern Recognition for Multimedia Communication Networks Using New<br />
Connection Models," 2005 ICDM Workshop: Optimization-based Data Mining Techniques with<br />
Applications, pp. 37-42, U.S.A., 2005.<br />
He, J., W. Yue and Y. Shi, ``Identification Mining <strong>of</strong> Unusual Patterns for Multimedia Communication<br />
Networks," Abstract Proc. <strong>of</strong> Autumn Conference 2005 <strong>of</strong> Operations Research Society <strong>of</strong> Japan, pp.<br />
262-263, 2005.<br />
He, J., W.Yue and Y. Shi, ``A Double Helix Architecture <strong>of</strong> Knowledge Discovery System Based on Data<br />
Grid and Knowledge Grid for Multimedia Communication Networks," Proc. <strong>of</strong> 1st Intel. Cong. <strong>of</strong> the<br />
Intel. Federation for Systems Research, pp. 123-124, Japan, 2005<br />
He, J., W. Yue and Y. Shi, ``Data Mining Systems <strong>of</strong> QoS Integrated Evaluation for Multimedia<br />
Communication Networks," Proc. <strong>of</strong> IICT Symposium, Konan <strong>University</strong>, pp. 14-pp. 21, 2005.<br />
Wang, M., J. Zheng, Z. Chen, and Y. Shi, “Classification Methods for HIV-1 Medicated Neuronal Damage,”<br />
IEEE CSB 2005 Workshops and Poster Abstracts, Aug. 8-11, 2005, Stanford <strong>University</strong>, California, 31-32.<br />
Pi, J., Y. Shi and Z. Chen, “Similarity and Cluster Analysis Algorithms for Microarrays Using R*-Trees,”<br />
IEEE CSB 2005 Workshops and Poster Abstracts, Aug. 8-11, 2005, Stanford <strong>University</strong>, California, 91-92.<br />
Peng, Y, N. Yan, G. Kou, Z. Chen and Y. Shi “Document Clustering in Antimicrobial Peptides Research,”<br />
Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems, <strong>Omaha</strong>, NE, USA August<br />
11th-14th 2005, 878-887.<br />
Peng, Y, G. Kou, Y. Shi and Z. Chen “Using Optimization-Based Classification Method for Massive<br />
Datasets,” Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems, <strong>Omaha</strong>, NE, USA<br />
August 11th-14th 2005, 1446-1452.<br />
Zhang, L., Y. Shi and X. Yang “A Fuzzy Mining Algorithm for Association-Rule Knowledge Discovery,”<br />
Proceedings <strong>of</strong> the Eleventh America Conference on Information Systems, <strong>Omaha</strong>, NE, USA August 11th-<br />
14th 2005, 1487-1496.<br />
Shi, Y., W. Xu and Z. Chen, Chinese Academy <strong>of</strong> Sciences Symposium on Data Mining and Knowledge<br />
Management (CASDMKM 2004), LNAI 3327, Springer-Verlag, 2004, 263 pages. 33% contribution.<br />
Shi, Y., J. He, L. Wang and W. Fan, “Computer-based Algorithms for Multiple Criteria and Multiple<br />
Constraint Levels Integer Linear Programming,” Computers & Mathematics with Applications<br />
(forthcoming). Major Refereed Journal (SCI). 50% contribution.<br />
Kou, G., Y. Peng, Y. Shi, M. Wise and W. Xu, "Discovering Credit Cardholders’ Behavior by Multiple<br />
Criteria Linear Programming", Annals <strong>of</strong> Operations Research (forthcoming). Major Refereed Journal<br />
(SCI). 40% contribution.<br />
He, J., X. Liu, Y. Shi, W. Xu and N. Yan "Classifications <strong>of</strong> Credit Cardholder Behavior by using Fuzzy Linear<br />
Programming", International Journal <strong>of</strong> Information Technology and Decision Making, Vol. 3, No. 4, 633-<br />
650, 2004. Refereed Journal (SCI). 40% contribution.<br />
Zheng, J., W. Zhuang, N. Yan, G. Kou, D. Erichsen, C. McNally, H. Peng, A. Cheloha, C.Shi, and Y. Shi,<br />
"Classification <strong>of</strong> HIV-1 Mediated Neuronal Dendritic and Synaptic Damage Using Multiple Criteria Linear<br />
Programming," Neuroinformatics, Vol. 2, 303-326, 2004. Major Refereed Journal (SCI). 30%<br />
contribution.<br />
Tang, X., Z. Zhou, C. Zhang and Y. Shi, "Multi-Objective Constrained Nonlinear Optimization: An ODE<br />
-470-
Approach," Information – International Inter-discipline Journal, Vol. 7, 487-495, 2004. Refereed Journal.<br />
30% contribution.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
“Data Mining for Petroleum Exploration-Phase II,” $300,000, by BHP Billiton Co., Australia, 2008-2010.<br />
“The attributes Structure and Measurements in the Process <strong>of</strong> Building Trust-worth S<strong>of</strong>tware” $100,000,<br />
by National Science Foundation <strong>of</strong> China, Key Project,#73662243, 2008-2010.<br />
“Revolving Charge Accounts Receivable Retrospective Analysis,” $64,959, by <strong>Nebraska</strong> Furniture Market<br />
- a unit <strong>of</strong> Berkshire Hathaway Investment Co., <strong>Omaha</strong>, <strong>Nebraska</strong> 2008-2009.<br />
“Data Mining for Petroleum Exploration-Phase II,” $300,000, by BHP Billiton Co., Australia, 2008-2010.<br />
“Data Mining and Intelligent Knowledge Management: Theory and Applications,” $1,423,077, by<br />
National Science Foundation <strong>of</strong> China, Innovative Grant,#70621001, 2007-2015.<br />
“Data Mining and Optimization,” $150,000, by National Science Foundation <strong>of</strong> China, Key Project,<br />
#70531040, 2006-2009.<br />
“Data Mining for Petroleum Exploration-Phase I,” $54,500, by BHP Billiton Co., Australia, 2005-2007.<br />
“Multiple Criteria Non-linear based Data Mining Methods and Applications,” $25,000, by National<br />
Science Foundation <strong>of</strong> China, #70472074, 2005-2007.<br />
“Bio-informatics <strong>Study</strong> in the Process and Changes <strong>of</strong> Antigen and Antibody,” (with Z. Cao et al.)<br />
$316,000, by 973 Project, Chinese Department <strong>of</strong> Science and Technology, #2004CB720103, 2005-2009.<br />
"Proactive and Predictive Information Assurance for Next Generation Systems (P2INGS),"(with J. Huff, Z.<br />
Chen and Q. Zhu) $800,000, US Air Force Research Laboratory, Contract # F30602-03-C-0247, October<br />
2003-April 2005.<br />
“Data Mining and Data Warehousing: Theory and Applications in Financial Fields”, $158,536 (1.3 million<br />
Chinese Yuan) by Chinese Department <strong>of</strong> Science and Technology, #01C26225120981, 2002-2004.<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009 CIST 9990 Dissertation 1 13<br />
ISQA 8700 Data Warehousing: Theory and Practice 3 22<br />
Fall 2008 CIST 9040 Colloquium on IT Pr<strong>of</strong>ession 1 5<br />
CIST 9050 Colloquium on IT Pr<strong>of</strong>ession 1 5<br />
CIST 9060 Colloquium on IT Pr<strong>of</strong>ession 1 5<br />
CIST 9990 Dissertation 1 13<br />
ISQA 4890 Data Warehousing and Data Mining 3 11<br />
-471-
Spring 2008 ISQA 8700 Data Warehousing: Theory and Practice 3 6<br />
Fall 2007 ISQA 4010 Business Intelligence 3 12<br />
ISQA 4890 Data Warehousing and Data Mining 3 6<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __50___%. Please give<br />
a brief description <strong>of</strong> your major research and scholarly activities:<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-472-
Paul van Vliet<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Paul J.A. van Vliet<br />
Associate Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Associate Pr<strong>of</strong>essor (8/01 – present)<br />
Assistant Pr<strong>of</strong>essor (1/95 – 8/01)<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D. MIS Oklahoma State <strong>University</strong> 1994<br />
M.B.A. Business Moorhead State <strong>University</strong>, Moorhead 1990<br />
Administration<br />
B.BI. Business<br />
Informatics<br />
Gelders Instituut voor HEAO, Arnhem, The<br />
Netherlands<br />
June 1987<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Van Vliet, P.J.A. & Pietron, L.R. (2008) Synchronous Collaboration in Systems Development Education –<br />
Issues and Recommendations for the Virtual Classroom. 39th Annual Meeting <strong>of</strong> the Decision Sciences<br />
Institute, Baltimore, November 22-25, 2008.<br />
October 31, 2008: Presented at the CIST Roundtable "Using Adobe Connect for Distance and Hybrid<br />
Courses" with Ilze Zigurs and Leah Pietron.<br />
-473-
August 23, 2008: Taught guest lecture titled “Overview <strong>of</strong> Decision Support Systems” to graduate<br />
students enrolled in the Executive MBA program. Contact: Dr. Birud Sindhav, Assistant Pr<strong>of</strong>essor <strong>of</strong><br />
marketing, Department <strong>of</strong> Marketing & Management, College <strong>of</strong> Business Administration.<br />
October 22, 2008: Taught guest lecture titled “Student Groupwork: Building, Nurturing and Managing<br />
Team Projects” to doctoral students enrolled in CIST 9050 - Colloquium on IT Teaching.<br />
Pietron, L.R. & Van Vliet, P.J.A. (2008) Converting A Project-Based Class to An Online Class: The Dilemma<br />
<strong>of</strong> Systems Analysis and Design. Clute Institute For Academic Research - College Teaching & Learning<br />
Conference, Orlando, Florida, January 2-5, 2008.<br />
Van Vliet, P.J.A. (2007) Zachman in the Classroom - Incorporating the Zachman Framework into<br />
Information Systems Education. 38th Annual Meeting <strong>of</strong> the Decision Sciences Institute, Phoenix,<br />
November 17-20, 2007.<br />
March 16, 2007: Presented "Distance Education in Practice - Teaching CIST 3100" at distance education<br />
workshop sponsored by IS&T Distance Education Steering Committee.<br />
December 7, 2007: Presented "Succeeding (in Distance Education) with Blackboard" with Dwight<br />
Haworth at distance education workshop sponsored by IS&T Distance Education Steering Committee.<br />
June 20, 2007 – Guest lecturer in PSCI 8926 Advanced Topics in Political Science, Pr<strong>of</strong> Steve Bullock.<br />
Presented “The History <strong>of</strong> the Internet.”<br />
Van Vliet, P.J.A. (2006) The Benefits <strong>of</strong> Using Real-World Projects for Systems Development Courses -<br />
Experience & Assessment. 37th Annual Meeting <strong>of</strong> the Decision Sciences Institute, San Antonio,<br />
November 18-21, 2006.<br />
On April 15, 2006, in collaboration with Dr. Leah Pietron, presented a workshop on Student Groupwork<br />
to IS&T and CBA faculty.<br />
Van Vliet, P.J.A. (2005) Information Systems Development Courses as Preparation for the Workplace -<br />
An Assessment. 36th Annual Meeting <strong>of</strong> the Decision Sciences Institute, San Francisco, November 19-22,<br />
2005.<br />
On November 8, 2005, presented “Student Groupwork: Building, Nurturing, and Managing Team<br />
Projects” to IS&T doctoral students.<br />
Paul J.A. van Vliet (2004) Maintaining the Relevance <strong>of</strong> Information Systems Development Education.<br />
35th Annual Meeting <strong>of</strong> the Decision Sciences Institute, Boston, MA, November 20-23, 2004.<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
(8/91-12/94) Oklahoma State <strong>University</strong> Teaching Assistant<br />
(1/91-12/93) Oklahoma State <strong>University</strong> Research Assistant<br />
(8/86-6/87) KLM - Royal Dutch Airlines,<br />
Amsterdam<br />
Data Management Intern<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
-474-
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Laboratory Director, PKI Group Decision Support Laboratory, located in PKI 279<br />
Invited by Lanyce Keel to serve on UNO Distance Education Mini-Grant Evaluation Committee.<br />
Member and Chair, IS&T Academic Committee. Re-elected as Chair, Spring 2009.<br />
Member, IS&T Distance Education Steering Committee.<br />
Participated in the Peter Kiewit Institute open house in February 21, 2009 by representing ISQA faculty<br />
and programs and MIS Student Organization.<br />
Participated in the Peter Kiewit Institute open house in October 26, 2008, by representing ISQA faculty<br />
and programs and MIS Student Organization.<br />
Website Administrator, ISQA Department<br />
Coordinator for the comprehensive exams for the Masters <strong>of</strong> Science in Management Information<br />
Systems program<br />
Faculty advisor for the Management Information Systems Students Organization<br />
Member, ISQA Annual Review Committee.<br />
Member, ISQA Pr<strong>of</strong>essional Development Committee<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Website Administrator, ISQA Department ( 2004- present)<br />
Member, ISQA Pr<strong>of</strong>essional Development Committee (2004-present)<br />
Member and Chair, IS&T Academic Committee. (2005-present)<br />
Member, IS&T Distance Education Steering Committee. (2006-present)<br />
Laboratory Director, PKI Group Decision Support Laboratory, located in PKI 279 (2004-present)<br />
Faculty advisor for the Management Information Systems Students Organization (2004-present)<br />
Coordinator for the comprehensive exams for the Masters <strong>of</strong> Science in Management Information<br />
Systems program (2004-present)<br />
Member, ISQA Annual Review Committee (2004-present)<br />
Member, ISQA Departmental Teaching Award Committee. (2004-2008)<br />
Participated in the Peter Kiewit Institute open house on February 23, 2008, by representing ISQA faculty<br />
and programs in the Group Decision Support Laboratory.<br />
Participated in the Peter Kiewit Institute open house in February 24, 2007 and October 27, 2007, by<br />
demonstrating the Group Decision Support Laboratory to visitors<br />
Interviewed candidates for ISQA position at Decision Sciences Institute annual conference. (Fall 2007)<br />
Participated in the Peter Kiewit Institute open house in October 29, 2006, by staffing the MISSO table in<br />
the PKI atrium.<br />
Participated in the Peter Kiewit Institute open house in February 25, 2006, by demonstrating the Group<br />
-475-
Decision Support Laboratory to visitors.<br />
February 20-23, 2006; participated in IS&T shadow week, meeting with potential IS&T students.<br />
Participated in the Peter Kiewit Institute open house in October 30, 2005, by staffing the MISSO table in<br />
the PKI atrium.<br />
Participated in the Peter Kiewit Institute open house in February 28, 2005, by demonstrating the Group<br />
Decision Support Laboratory to visitors.<br />
February 22-24, 2005; participated in IS&T shadow week, providing a tour <strong>of</strong> the PKI facility for three<br />
potential IS&T students.<br />
Member, ISQA Recruiting Committee. Participated extensively in interviewing 28 candidates at the<br />
AMCIS Conference in <strong>Omaha</strong>, NE (Summer and Fall 2005)<br />
Member, Advisory Committee for the graduate specialty track in the field <strong>of</strong> Bioinformatics <strong>of</strong> the<br />
Pathology and Microbiology department at UNMC (2004-2005 year)<br />
Website administrator, UNMC & UNO Bioinformatics program (2004-2005 year)<br />
Member, ISQA Undergraduate Program Committee (Fall 2004)<br />
Member, ISQA Graduate Program Committee (Fall 2004)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Van Vliet, P.J.A. & Leah R. Pietron (2006). Information Systems Development Education in the Real<br />
World - A project Methodology and Assessment. Journal <strong>of</strong> Information Systems Education. Vol. 17, Nr.<br />
3.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, Information Technology Services, E-learning Course/Project Minigrant,<br />
May 2006. Awarded $2,500 for the 2006-07 fiscal year<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009 ISQA 4120- System Design and Implementation 3 25<br />
001<br />
ISQA 4120- System Design and Implementation 3 18<br />
002<br />
Fall 2008 CIST 3100 Organizations, Application, and Technology 3 25<br />
ISQA<br />
4100/8106<br />
Information Systems Architecture and<br />
Organization<br />
3 11<br />
-476-
ISQA Decision Support Systems 3 19<br />
4730/8736<br />
Summer 2008 ISQA 4120 System Design and Implementation 3 10<br />
Spring 2008 ISQA 4120- System Design and Implementation 3 27<br />
001<br />
ISQA 4120- System Design and Implementation 3 16<br />
002<br />
Fall 2007 CIST 3100 Organizations, Application, and Technology 3 23<br />
ISQA Information Systems Architecture and 3 10<br />
4100/8106 Organization<br />
ISQA<br />
4730/8736<br />
Decision Support Systems 3 14<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 25 %. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
My research activities focus on systems development education, the assessment <strong>of</strong> its quality, its best<br />
practices, the development methodologies, and – lately – the transition into online education.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-477-
-478-
Sandy Vlasnik<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Sandra Vlasnik<br />
Lecturer<br />
n/a<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Adjunct Instructor January 1998 – May 1999<br />
Adjunct Instructor August 2001 – July 2005<br />
Lecturer<br />
August 2005 - Present<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
BS CS <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> Dec. 1988<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
Masters in Computer Science in progress at <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>.<br />
Coursework completed includes:<br />
Advanced Operating Systems<br />
S<strong>of</strong>tware Specification and Design<br />
Design and Analysis <strong>of</strong> Algorithms<br />
Human Computer Interaction<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Workshops Attended: Reflection, Adobe Connect, Distance Learning and Rubrics<br />
Participated in the Adobe Connect/Web Collaboration Teaching Circle (2008-2009)<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
-479-
Dates Where Duties<br />
2/1999 –<br />
11/2001 and<br />
6/2003 –<br />
11/2003 and<br />
1/2004 –<br />
11/2005<br />
Bellevue <strong>University</strong>,<br />
Bellevue <strong>Nebraska</strong><br />
Instructed undergraduate introduction to programming<br />
courses using C, C++, Java and Visual Basic.Net.<br />
Instructed an online introduction to programming course<br />
in Java.<br />
Developed lesson plans, examinations, and student<br />
projects and evaluate course work.<br />
1/2007-<br />
2/2007<br />
STATPack Project, <strong>University</strong><br />
<strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong><br />
Utilized C++, MySQL and GTK to upgrade the STATPack<br />
s<strong>of</strong>tware package for use in the digital image acquisition<br />
<strong>of</strong> lab specimens for transfer from remote sites to<br />
central evaluation laboratories.<br />
1989 - 1996 Harris Corporation, Bellevue<br />
<strong>Nebraska</strong><br />
Employed as a Senior S<strong>of</strong>tware Engineer (promoted from<br />
S<strong>of</strong>tware Engineer)<br />
Analyzes, designed, implemented, tested and<br />
maintained complex systems for the support <strong>of</strong><br />
electronic intelligence gathering, flight planning and<br />
weather forecasting tasks.<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
ISQA – UPC – committee member<br />
Committee meets approximately twice monthly during the academic year<br />
Evaluate issues related to the undergraduate program in MIS as needed<br />
IS & T Technology - committee member<br />
Committee meets once per year at a minimum<br />
IS & T Scholarship Committee – member<br />
Committee meets periodically to evaluate available scholarships and scholarship applicants as<br />
needed by the college<br />
Committee meets as needed – up to four times per month during the Spring semester<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
-480-
ISQA UPC – January, 2008 to present<br />
IS & T Technology Committee – January, 2007 – Present<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
none<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
none<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Fall/ 2007 CSCI 1620 Introduction to Programming II 3 31<br />
Fall 2007 ISQA 3300 File Structures 3 22<br />
Fall 2007 ISQA 3310 Managing the Database Environment 3 22<br />
Fall 2007 ISQA 8050 Data Organization and Storage 3 7<br />
Spring CSCI 1620 Introduction to Programming II 3 18<br />
2008<br />
Spring CSCI 1620 Introduction to Programming II 3 15<br />
2008<br />
Spring ISQA 3310 Managing the Database Environment 3 20<br />
2008<br />
Spring ISQA 8050 Data Organization and Storage 3 11<br />
2008<br />
Summer ISQA 3310 Managing the Database Environment 3 10<br />
2008<br />
Fall 2008 CSCI 1620 Introduction to Programming II 3 30<br />
Fall 2008 CSCI 1620 Introduction to Programming II 3 15<br />
Fall 2008 ISQA 3300 File Structures 3 14<br />
Fall 2008 ISQA 8050 Data Organization and Storage 3 11<br />
Spring CSCI 1620 Introduction to Programming II 3 41<br />
2009<br />
Spring CSCI 1620 Introduction to Programming II 3 32<br />
-481-
2009<br />
Spring<br />
2009<br />
Spring<br />
2009<br />
ISQA 3310 Managing the Database Environment 3 20<br />
ISQA 8050 Data Organization and Storage 3 5<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __0___%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
N/A<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-482-
Gerald Wagner<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
G. R. WAGNER<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Distinguished Research<br />
Fellow<br />
Dates Held<br />
September 2001 to date.<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Bachelor <strong>of</strong><br />
Science<br />
Pre-Veterinary<br />
Medicine<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, Lincoln, <strong>Nebraska</strong> 1958<br />
Master <strong>of</strong><br />
Science<br />
Doctor <strong>of</strong><br />
Philosophy<br />
with Honors<br />
Nutrition and<br />
Biochemistry<br />
Statistics,<br />
Nutrition, and<br />
Physiology<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, Lincoln, <strong>Nebraska</strong> 1960<br />
Iowa State <strong>University</strong>, Ames, Iowa, 1964 1964<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area:<br />
Founded the International Academy for Advanced Decision Support (IAADS), organized IAADS Thought<br />
Leaders Conferences, keynote speaker at, presentations at the Decision Sciences Institute.<br />
Systemics, Cybertics and Informatics conference, Keynote Speaker, 2007 and 2009.<br />
-483-
<strong>Nebraska</strong> Educational Technology Conference, speaker, 2009.<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
July 1964 to July 1966 Swift and Company<br />
(Esmark), Chicago,<br />
Illinois<br />
Head, Experimental Statistics, R&D Laboratories<br />
Experimental design <strong>of</strong> research laboratory<br />
experiments.<br />
Analysis <strong>of</strong> research data.<br />
Documentation and presentation <strong>of</strong> research<br />
results.<br />
Recommended new products based upon<br />
scientific research results.<br />
August 1966 to July<br />
1968<br />
August 1968 to August<br />
1969<br />
August 1969 to June<br />
1978<br />
Swift and Company<br />
(Esmark), Chicago,<br />
Illinois<br />
MRI Systems, Austin, TX<br />
College <strong>of</strong> Engineering,<br />
<strong>University</strong> <strong>of</strong> Texas<br />
Managed staff <strong>of</strong> 5 research statisticians.<br />
Manager, Corporate Operations Research<br />
Department<br />
Started corporate Operations<br />
Research/Management Sciences Department.<br />
One <strong>of</strong> the first corporate OR departments in the<br />
world.<br />
Recruited and managed staff <strong>of</strong> 7 pr<strong>of</strong>essional<br />
staff members.<br />
Initiated and implemented several large-scale<br />
corporate modeling projects.<br />
Vice President Consulting Services<br />
In charge <strong>of</strong> consulting and training services for<br />
s<strong>of</strong>tware start-up.<br />
Education support for enterprise database<br />
management s<strong>of</strong>tware product.<br />
Developed and taught executive workshops on<br />
Computer Based Computer Decision Making.<br />
Head, Operations Research<br />
Managed all departmental activities for staff <strong>of</strong> 6<br />
Pr<strong>of</strong>essors and administrative staff.<br />
Taught graduate level Statistics courses.<br />
Received several teaching honors.<br />
Awarded several research grants.<br />
Pioneer research on:<br />
Computer based education.<br />
Expert Systems.<br />
Artificial Intelligence.<br />
Electronic “War Rooms”.<br />
English-like modeling systems.<br />
-484-
July 1978 to June 1984<br />
Spring Semester, 1987<br />
January 1989 to August<br />
1991<br />
Spring Semester 1990<br />
September 1992 to July<br />
1996<br />
Execucom Systems, Inc.,<br />
Austin, TX<br />
<strong>University</strong> <strong>of</strong> Texas,<br />
Management Science<br />
and Information<br />
Systems, Austin, TX<br />
Collaborative<br />
Technologies, Inc.,<br />
Austin TX<br />
Texas A&M <strong>University</strong>,<br />
College Station, TX<br />
Milagro Systems, Inc.,<br />
Santa Fe, New Mexico<br />
July 1999 to November WebIQ, Inc., Austin, Founder and CEO<br />
Founder and CEO<br />
Designed and developed the Interactive Financial<br />
Planning System (IFPS).<br />
Built and managed company from start up to 275<br />
employees and $22 million in sales.<br />
Worldwide sales channels.<br />
Twelve hundred corporate customers in the<br />
Fortune 1500.<br />
Fifteen hundred academic customers worldwide.<br />
First <strong>University</strong> Support Program for a s<strong>of</strong>tware<br />
company.<br />
Venture capital investments after achieving $10<br />
million in revenue.<br />
Legendary success in innovative products,<br />
recruiting and retaining exceptional people and<br />
customer satisfaction.<br />
Original prototypes <strong>of</strong> “electronic war rooms”<br />
and Group Decision Support Systems.<br />
Company acquired by GTE in 1984.<br />
Distinguished Visiting Pr<strong>of</strong>essor<br />
Developed and taught graduate course on Group<br />
Decision Support Systems.<br />
Founder and CEO<br />
Designed and built one <strong>of</strong> the first<br />
groupware/group collaboration s<strong>of</strong>tware<br />
products (VisionQuest for real time electronic<br />
meetings).<br />
Built corporate infrastructure including direct<br />
sales organization.<br />
Venture capital backed.<br />
Acquired by leading competitor.<br />
Distinguished Visiting Pr<strong>of</strong>essor<br />
Developed and taught graduate course on Group<br />
Decision Support Systems.<br />
Obtained research grant to build Group Decision<br />
Support Facility.<br />
Supervisor and committee member on PhD<br />
dissertation.<br />
Faculty and student seminar series on s<strong>of</strong>tware<br />
entrepreneurship.<br />
Founder and CEO<br />
Designed s<strong>of</strong>tware for novice computer users to<br />
create multi-media books.<br />
Web development tools and the Internet caused<br />
the product to be non competitive.<br />
-485-
2000 Texas Designed and developed Web based group<br />
decision support s<strong>of</strong>tware.<br />
Recruited employees and built infrastructure.<br />
Delivered highly regarded product in 6 months.<br />
Built selling partner channel that produced<br />
$100,000 in revenue 3 months after start up <strong>of</strong><br />
marketing strategy.<br />
Fulfilled all roles <strong>of</strong> President, CEO, VP <strong>of</strong> Sales<br />
and VP <strong>of</strong> Marketing.<br />
Venture capital backed.<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
2005 STRATCOM Advanced Decision Support Systems Workshop<br />
2005 Union Pacific Train Scheduling Simulator<br />
2006 Northrop Grumman Homeland Security Proposal<br />
2007 Gallup Design and Develop Visualization Lab<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
Developed the proposal for the new Bachelor <strong>of</strong> Science degree in IT Innovation.<br />
Developed the Entrepreneurs Track for Infotec ’09.<br />
Developed and <strong>of</strong>fered the Gallup/AIM Institute/CIS&T seminars and workshops on Web 2.0.<br />
Developed and <strong>of</strong>fered the Gallup/AIM Institute/CIS&T seminars and workshops on Data Visualization.<br />
Formed and lead the Heartland Student Entrepreneurs group.<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.:<br />
Developed simulation and visualization s<strong>of</strong>tware that is being used by several Universities in many<br />
countries.<br />
Wrote chapter for book on Decision Support Systems and Business Intelligence to be published by<br />
Prentice Hall in 2010.<br />
Wrote chapter for book on Intelligent Systems published b Springer, 2007.<br />
-486-
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
Course<br />
Term/year number<br />
Spring 2009 ISQA 4000<br />
ISQA 8080<br />
MGMT 4000<br />
ECON 8916<br />
Fall 2008 ISQA 4000<br />
ISQA 8080<br />
MGMT 4000<br />
ECON 8916<br />
Spring 2008 ISQA 4000<br />
ISQA 8080<br />
MGMT 4000<br />
ECON 8916<br />
Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Applied Consulting and Model Visualization 3 20<br />
Applied Simulation and Visualization 3 20<br />
Business Simulation Application 3 20<br />
Fall 2007 ISQA 4000 Adv in Data Visualization 3 17<br />
ISQA 8080 Adv in Data Visualization 3 3<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 65%. Please give a brief<br />
description <strong>of</strong> your major research and scholarly activities:<br />
Mentor the One Innovation Place student intern program; Financial planning s<strong>of</strong>tware targeted at<br />
become the de facto standard for financial literacy training and counseling <strong>of</strong>fered by nonpr<strong>of</strong>its;<br />
Simulation modeling and visualization s<strong>of</strong>tware for use <strong>of</strong> Universities; International Academy for<br />
Advanced Decision Support; Business Strategy Visioning.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the IS program: 90 % for academic year and<br />
none in summer months.<br />
-487-
-488-
Kerry Ward<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Kerry Ward<br />
Assistant Pr<strong>of</strong>essor<br />
Non-tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Associate Pr<strong>of</strong>essor<br />
3. Degrees with fields, institutions, and dates<br />
Dates Held<br />
August 2005 – Present<br />
Degree Field Institution Date<br />
PhD MIS Indiana <strong>University</strong>, Bloomington, IN, Dec. 2005<br />
MBA Finance/MIS <strong>University</strong> <strong>of</strong> Notre Dame, Notre Dame, IN May 1999<br />
BS Business Indiana <strong>University</strong>, Indianapolis, IN May 1992<br />
(Accounting)<br />
BA Psychology Wabash College, Crawfordsville, IN May 1985<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
International Conference on Information Systems (2008)<br />
Academy <strong>of</strong> Management Annual Meeting (2008)<br />
Third Annual Midwest Conference <strong>of</strong> the Association for Information Systems (2008)<br />
International Conference on Information Systems (2007)<br />
Academy <strong>of</strong> Management Annual Meeting (2007)<br />
International Conference on Information Systems (2006)<br />
International Conference on Information Systems (2005)<br />
Teaching Circle on Information Technology for Instruction (2005-2006)<br />
Americas Conference on Information Systems (2005)<br />
International Conference on Information Systems (2004)<br />
-489-
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
2000 – 2005 Kelley School <strong>of</strong> Business Associate Instructor<br />
1997 – 2002 Avarus Network Solutions CFO and part owner<br />
1996 – 1998 Slattery and Holman, P.C.,<br />
Indianapolis, IN<br />
Senior Accountant<br />
Implemented accounting systems for clients,<br />
including establishment <strong>of</strong> chart accounts,<br />
set up <strong>of</strong> prior accounting information and<br />
training <strong>of</strong> client personnel<br />
In charge responsibilities for clients including<br />
budgeting, quarterly compilation, review <strong>of</strong><br />
payroll and other tax and accounting<br />
functions<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
1999 – 2000 Management Solutions<br />
Group, Deloitte & Touché,<br />
LLC, Dallas TX<br />
Senior Consultant<br />
Performed package selection projects<br />
Cleaned up dysfunctional ERP<br />
implementations<br />
Worked with computer forensic group<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Member <strong>of</strong> the <strong>University</strong> Committee on for the Advancement <strong>of</strong> Teaching (UCAT)<br />
Member <strong>of</strong> the pr<strong>of</strong>essional development committee<br />
Member <strong>of</strong> graduate program committee<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Member <strong>of</strong> the <strong>University</strong> Committee on for the Advancement <strong>of</strong> Teaching (UCAT) (2006 – 2009)<br />
Member <strong>of</strong> the pr<strong>of</strong>essional development committee (2007-2010)<br />
-490-
Member <strong>of</strong> graduate program committee (2006-2009)<br />
IA Recruiting Committee (2007-2008)<br />
ISQA Recruiting Committee (2007-2008)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Ward, Kerry W. Brown, Susan A. and Massey, Anne P. (2005) Organizational Influences on Attitudes in<br />
Mandatory Systems Use Environments: A Longitudinal <strong>Study</strong>, International Journal <strong>of</strong> Business<br />
Information Systems. 1(1&2), (33% Contribution)<br />
H<strong>of</strong>f, Greg, Fruhling, Ann and Ward, Kerry W. (2008) Requirement Prioritization Decision Factors for<br />
Agile Development Environments, Proceedings <strong>of</strong> the 2008 Americas Conference on Information<br />
Systems, (Toronto). (10% Contribution)<br />
Ward, Kerry W., Rees, Jackie and Adu, Prince (2008) Research in Progress: Evaluating the Role <strong>of</strong> Risk<br />
Models in Information Assurance, Proceedings <strong>of</strong> the Third Midwest United States Association for<br />
Information Systems, (Eau Claire) (50%)<br />
Street, Christopher T. and Ward, Kerry W. (2007) Threats to Validity and Reliability in Longitudinal Case<br />
<strong>Study</strong> Timelines, Proceedings <strong>of</strong> the Academy <strong>of</strong> Management Annual Meeting, Philadelphia, PA. (50%<br />
Contribution) – Nominated for Best Paper Award and included in Conference Proceedings<br />
Ward, Kerry W. (2004) Generalizing the Theory <strong>of</strong> Alignment as Guided Adaptation and the Role <strong>of</strong><br />
External Change in the Alignment Factor Adaptation Process, International Conference on Information<br />
Systems (ICIS) Doctoral Consortium, (Washington, D.C.)<br />
Ward, Kerry W. (2001) Impact <strong>of</strong> Industry and Industry Position on IT Focus: An Alternative IT Value<br />
Model, Proceedings <strong>of</strong> the 2001 Americas Conference on Information Systems, (Boston).<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
4/05 – 12/05 Doctoral Student Grant in Aid <strong>of</strong> Research $1,000<br />
9/04 – 12/04 Center for International Business Education Research $2,500<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Course<br />
Semester Class<br />
Term/year number Course title<br />
hrs size<br />
Spring 2009 ISQA 3400 Business Data Communications 3 20<br />
-491-
ISQA 8060 Research in MIS 3 26<br />
Fall 2008 ISQA 3400 Business Data Communications 3 16<br />
ISQA 8060 Research in MIS 3 29<br />
Spring 2008 ISQA 3400 Business Data Communications 3 24<br />
ISQA 8060 Research in MIS 3 20<br />
Fall 2007 CIST 3110- Information Technology Ethics 3 28<br />
001<br />
CIST 3110-<br />
002<br />
Information Technology Ethics 3 27<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: ___50__%. Please give<br />
a brief description <strong>of</strong> your major research and scholarly activities:<br />
Research interests include IS strategy, Information Assurance, IT infrastructure, and organizational<br />
impacts <strong>of</strong> information technology. Experience includes seven years consulting and public accounting<br />
with Deloitte and Touché and PriceWaterhouseCoopers.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-492-
Peter Wolcott<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Peter Wolcott<br />
Associate Pr<strong>of</strong>essor<br />
Tenured<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Associate Pr<strong>of</strong>essor August 2001-present<br />
Assistant Pr<strong>of</strong>essor August 1995 – August 2001<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D. MIS <strong>University</strong> <strong>of</strong> Arizona 1993<br />
B.A. Computer Dartmouth College 1984<br />
Science<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
Difficult Dialogue “Begin to Develop Cross-Cultural Relationships”, April 8, 2008.<br />
2008 National CASTL Summer Institute: Developing Scholars <strong>of</strong> Teaching and Learning. June 5-7, 2008<br />
Attended a three-day workshop “GIS for Web Developers” led by Scott Davis and hosted by Raytheon.<br />
August 26-28, 2008.<br />
Attended ½ day workshop entitled “XBRL: Opportunities and Challenges”, Creighton <strong>University</strong>, College<br />
<strong>of</strong> Business, September 8, 2008.<br />
“Best Assessment Practices Symposium IX” at Rose-Hulman Institute <strong>of</strong> Technology, Terre Haute,<br />
Indiana, April 12-13, 2007. Learned a great deal about ABET-accreditation related assessment practices.<br />
Conducted a 20-hour workshop on Database Administration for a group from ITS, April 30-May 3<br />
“The Learning Horizon: Blending Design, Assessment, and Technology” at UNO, May 15-16, 2007.<br />
“CSAB Computing Accreditation Workshop”, October 5, 2007, Tampa, FL. The workshop was designed<br />
to familiarize those involved with accreditation <strong>of</strong> the new accreditation criteria.<br />
“Cultural Competency 101: Starting Points and Definitions”, at the Center for Human Diversity, Feb. 13,<br />
2008, <strong>Omaha</strong>, NE. I attended the workshop to gain new skills and insights that would help me and my<br />
students develop relationships with microenterprise owners and others in North <strong>Omaha</strong> and elsewhere<br />
in the city.<br />
UNO Speech Center workshop “Incorporating Student Presentations Into Your Class”, presented by<br />
-493-
Marlina Howe, January 26, 2007<br />
EDUCAUSE workshop “Assessing the Efficacy <strong>of</strong> Technology in Promoting Student Learning: Principles<br />
That Anchor Effective Inquiry”, presented by Peggy L. Maki (LSU), September 15, 2006<br />
Oracle Technical Exchange Meeting “Oracle 10g Technology Update: Oracle Service Oriented<br />
Architecture and Oracle Times Ten In-Memory Database,” hosted by Northrup Grumman, Sept. 27,<br />
2006.<br />
Developed three-part on-line lectures on “Data Warehousing, OLAP, and Related Topics” using Camtasia<br />
and Flash. These lectures were designed for and delivered to Agder <strong>University</strong> College as a guest lecture<br />
in a course entitled “Advanced Database Systems”. 2006<br />
Defining graduate certificates in Project Management, Information Assurance, and Systems Analysis and<br />
Design. There certificates were approved and went into effect Fall 2006.<br />
Developed a dual-degree MBA/MS MIS in conjunction with the College <strong>of</strong> Business. Proposal approved<br />
& went into effect Fall 2006.<br />
Organized a “GIS Curriculum Workshop” that drew together two dozen GIS practitioners and educators<br />
from the private and public sectors, at the municipal, county, state, and national levels for a 4-hour<br />
workshop to discuss the requirements for a geographic information systems curriculum. Workshop was<br />
held on December 9, 2005<br />
January 18, 2005. Attended the faculty development workshop entitled “Digital Natives”<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
7. Consulting—list agencies and dates, and briefly describe each project<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Member, Distance Education Advisory Council<br />
Member, UNO Assessment Team<br />
Chair, <strong>University</strong>-wide selection committee for the Peter Kiewit Student Entrepreneurial Award and the<br />
Walter Scott Entrepreneurial Business Award<br />
Chair, ABET Accreditation Steering Committee<br />
Member, Distance Education Steering Committee<br />
Member, Recruiting Committee, CS HPC Position<br />
Director <strong>of</strong> the Masters <strong>of</strong> MIS Program<br />
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Faculty Senate (2005-2007)<br />
-494-
Co-Chair, Library and Learning Resources Committee (Spring 2007)<br />
Member, Distance Education Advisory Council (2005-2007)<br />
Faculty Senate liason to the Faculty Task Force to Design a Common Course Evaluation Instrument<br />
(Spring, 2007)<br />
Assessment mentor for Academic and Student Affairs (Spring 2007)<br />
IT for Development poster presented at the UNO Strategic Planning Forum, March 2, 2007<br />
Member, Institutional Research Advisory Council (AY 2007)<br />
Member, <strong>University</strong>-wide selection committee for the Peter Kiewit Student Entrepreneurial Award and<br />
the Walter Scott Entrepreneurial Business Award (CY 2008)<br />
Chair, ABET Accreditation Steering Committee (2004-present)<br />
IS&T Personnel Committee (2007-2008)<br />
Distance Education Steering Committee (2007-2008)<br />
Director <strong>of</strong> the Masters <strong>of</strong> MIS Program (2005-)<br />
Member, AQIP Advisory Committee for the myMAPP ePortfolio Action Project (2005-2007)<br />
IS&T Academic Committee (2004-2006)<br />
IS&T Personnel Committee (2004-2006)<br />
IS&T Technology Committee (2004-2006)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Qureshi, S., Kamal, M., and P. Wolcott “Information Technology Therapy for Competitiveness in Micro-<br />
Enterprises.” International Journal <strong>of</strong> E-Business Research. Idea Group International. 5(1), 117-140<br />
January-March 2009.<br />
Wolcott, P., Kamal, M. and S. Qureshi “Meeting the Challenges <strong>of</strong> ICT Adoption by Micro-enterprises”.<br />
Journal <strong>of</strong> Enterprise Information Management. Emerald. Volume 21, Issue 6. 2008.<br />
Qureshi, S., Kamal, M., & Wolcott, P. (2008). Information Technology Therapy for Micro-enterprise<br />
Success: Directions for Sustainable Development. Hawaii International Conference on System Sciences,<br />
Hawaii. Jan. 7-10.<br />
Wolcott, P., Qureshi, S., & Kamal, M. (2007). An Information Technology Therapy Approach to Microenterprse<br />
Adoption <strong>of</strong> ICTs. Americas Conference on Information Systems (AMCIS), Keystone, CO. Aug.<br />
10-12.<br />
Abdelaal, A, Kalmal, M., and Wolcott, P. “Employing Social Capital by Small & Medium Enterprises to<br />
Bear Fruit from Wireless Communications,” Midwest AIS 2007.<br />
"Local E-Government in Norway: Current Status and Emerging Issues," Scandinavian Journal <strong>of</strong><br />
Information Systems, (17, 2), 2005, pp.41-84.<br />
http://www.cs.aau.dk/SJIS/journal/volumes/volume17/no2/05flaketal.pdf. (with Leif Flak, Dag Olsen)<br />
"The Provision <strong>of</strong> Internet Services in India," In Information Systems in Developing Countries, Davison,<br />
R.M., Harris, R.W., Qureshi, S., Vogel, D.R. and de Vreede, G.J. Eds.), <strong>University</strong> <strong>of</strong> Hong Kong Press, Hong<br />
Kong, 2004.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
-495-
“<strong>Nebraska</strong> eTeams for Microenterprise Economic Development” with Sajda Qureshi, Teresa Lamsam,<br />
John Bartle, Ken Kriz, Scott Tarry, Bob Bernier. <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Foundation. ($114,494).<br />
Najjar, L., Khazanchi, D. and Wolcott, P. (12/15/2008 to 5/13/2009). "Business Database Competitive<br />
Audit Project". Awarded a grant <strong>of</strong> $17,603 for conducting a business database audit for InfoUSA.<br />
UCAT funding (2008) to purchase ABET material on rubric development ($149) with Leah Pietron and<br />
Dwight Haworth.<br />
UCAT funding to attend the 2008 National CASTL Institute, June 4-7th, <strong>Omaha</strong>, NE. ($350)<br />
Najjar, L., Khazanchi, D. and Wolcott, P. (1/1/2005 to 5/31/2005). "Business Database Competitive Audit<br />
Project". Awarded a grant <strong>of</strong> $14,575 for conducting a business database audit for InfoUSA. This project<br />
was conducted under the auspices <strong>of</strong> the PKI Technology Development Corp (PKITDC).<br />
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year Course number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009 ISQA 8410-001 Database Management 3 25<br />
Fall 2008 ISQA 4300/8306 Database Administration 3 20<br />
ISQA 4000/8080 IT for Development 3 10<br />
Summer 2008 ISQA 8410-101 Database Management 3 24<br />
Spring 2008 ISQA 8410-001 Database Management 3 17<br />
ISQA 8410-850 Database Management 3 6<br />
Fall 2007 ISQA 4300/8306 Database Administration 3 15<br />
ISQA 4000/8080 IT for Development 3 5<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __100___%. Please<br />
give a brief description <strong>of</strong> your major research and scholarly activities:<br />
Research: My major stream <strong>of</strong> research at the moment is in the area <strong>of</strong> IT for Development. The focus<br />
<strong>of</strong> the research is on how to facilitate the adoption <strong>of</strong> information technologies by microenterprises to<br />
bring about economic, social, and human development.<br />
Scholarly activities: In addition to teaching responsibilities, primarily in the area <strong>of</strong> database<br />
management and administration, and IT for development, I am the director <strong>of</strong> the MS MIS program and<br />
the chair <strong>of</strong> the ABET accreditation steering committee. In the latter role, I manage assessment and<br />
accreditation activities for the College <strong>of</strong> IS&T.<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-496-
Chi Zhang<br />
1. Name, current academic rank, and tenure status:<br />
Name:<br />
Rank:<br />
Tenure Status:<br />
Chi Zhang<br />
Lecturer<br />
n/a<br />
2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />
Title<br />
Dates Held<br />
Lecturer<br />
August 2007-Present<br />
Instructor August 2001-May 2007<br />
Adjunct Faculty May 2001-June 2001<br />
Graduate Assistant May 1999-May 2001<br />
3. Degrees with fields, institutions, and dates<br />
Degree Field Institution Date<br />
Ph.D.<br />
M.Sc.<br />
M.S.Ed.<br />
B.Sc.<br />
Candidate in<br />
Information<br />
Technology<br />
Computer<br />
Science<br />
Instructional<br />
Technology<br />
Educational<br />
Technologies<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> 2004-<br />
Present<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> 2000<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Kearney 1998<br />
Beijing Normal <strong>University</strong>, China 1990<br />
4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />
other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />
information here that is contained in later sections <strong>of</strong> this document.<br />
5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />
years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />
Spring 2009)<br />
-497-
Presented and Attended research conferences (AMCIS 2005, 2007, 2008; ICIS 2007, PACIS 2008, MWAIS<br />
2006, 2007, 2008; Big XII+ IS doctoral students Symposium 2008)<br />
Attended research development activities (UNL Research Fair 2005)<br />
Attended faculty development workshops (Adobe Connect Workshop 2008, Second Life 2008)<br />
Attended CS workshops and CMIT research round table sessions to get to know colleagues’ research<br />
interests (2005-2006)<br />
Participated in blackboard training programs<br />
6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />
description and scope <strong>of</strong> duties):<br />
Dates Where Duties<br />
August 1996-<br />
May 1998<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at<br />
Kearney<br />
Graduate Assistant<br />
Providing technology assistance in Instructional<br />
Technology Center and providing trainings to faculty,<br />
staff and students. Maintaining department web pages.<br />
7. Consulting—list agencies and dates, and briefly describe each project:<br />
Dates Agency Project<br />
May 1997-<br />
August 1998<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at<br />
Kearney<br />
Computer Consultant<br />
Providing technology assistance, updating <strong>of</strong>fice<br />
computer systems, recommending purchases, providing<br />
new application trainings to staff, working with public<br />
computer labs, and creating web pages for the <strong>Nebraska</strong><br />
Student Union and student organizations.<br />
8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />
(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />
compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />
please indicate here which courses.<br />
(LIST DATA FOR Fall 2008 – Spring 2009)<br />
Undergraduate Program Committee Member, Department <strong>of</strong> Computer Science<br />
-498-
9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />
you are/were a member including year(s) served:<br />
(LIST DATA FOR Fall 2004 – Spring 2008)<br />
Undergraduate Program Committee Member, Department <strong>of</strong> Computer Science (2007 - Present)<br />
Peer Review Committee Member (2007)<br />
IS&T Graduate Affairs (2005)<br />
Merit Raise Committee (2005)<br />
10. Principal publications during the last five years. Give in standard bibliographic format.<br />
(LIST DATA FOR Fall 2004 – Spring 2009)<br />
Zhang, C & Zigurs, I (2009), An Exploratory <strong>Study</strong> <strong>of</strong> the Impact <strong>of</strong> a Virtual Learning World Learning<br />
Environment on Student Interaction and Learning Satisfaction, America’s Conference on Information<br />
Systems, AMCIS 2009, San Francisco, CA. August 6-9, 2008.<br />
Zhang, C (2009), Comparing Sense <strong>of</strong> Classroom Community and Learning Satisfaction in a Virtual World<br />
Learning Environment, Midwest Association for Information Systems Conference, MWAIS 2009,<br />
Madison, SD. May 22-23, 2008.<br />
Zhang, C (2009), An Exploratory <strong>Study</strong> <strong>of</strong> the Impact <strong>of</strong> a Virtual Learning World Learning Environment<br />
on Sense <strong>of</strong> Classroom Community and Learning Satisfaction, China Summer Workshop on Information<br />
Management, CSWIM 2009, Guangzhou, China. June 27-28, 2009.<br />
Zhang, C & Zigurs, I (2008), Learning in Virtual Worlds: Understanding the Impact on Social and Cognitive<br />
Processes in Learning, Midwest Association for Information Systems Conference, MWAIS 2008, Eau<br />
Claire, WI. May 23-24, 2008.<br />
Tarmizi, H, Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.-J. de and Zigurs, I. (2007)<br />
Technical and Environmental Challenge <strong>of</strong> Collaboration Engineering in Distributed Environments. E-<br />
Service Journal, Vol 6, No.1, Fall 2007.<br />
Zhang, C. (2007). Theory and Practice: Review Technology-Mediated Learning Research. Midwest<br />
Association for Information Systems Conference, MWAIS 2007, Springfield, Illinois.<br />
Kamal, M., Zhang, C., Najjar, L., and Qureshi, S. (2007). Human Development through Information &<br />
Communication Technologies: Theoretical & Empirical Support. Midwest Association for Information<br />
Systems Conference, MWAIS 2007, Springfield Illinios.<br />
Tarmizi, H., Payne, M., Noteboom, C., Steinhauser, L., Vreede, G.-J. de and Zigurs, I. (2006). Technical<br />
and Environmental Challenge <strong>of</strong> Collaboration Engineering in Distributed Environments. Proceedings <strong>of</strong><br />
the 12th International Workshop, CRIWG 2006, September 17-21, 2006, Medina del Camp, Spain.<br />
Noteboom, C., Zhang, C., Tarmizi, H., Steinhauser, L., Payne, M., Vreede, G.-J. de and Zigurs, I. (2006).<br />
Research as Teaching and Teaching as Research: Reflections on a Virtual Team Project. Midwest<br />
Association for Information Systems Conference, MWAIS 2006, May 5-6, Grand Rapids, Michigan.<br />
Tarmizi, H., Steinhauser, L., Payne, M., Noteboom, C., Zhang, C., Vreede, G.-J. de and Zigurs, I. (2006). A<br />
Gaming Laboratory to <strong>Study</strong> Distributed Collaboration Processes. Proceedings <strong>of</strong> Collaboration<br />
Engineering Workshop at Hawaii International Conference on System Sciences, HICSS 2006, Kauai, HI.<br />
11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />
FOR Fall 2004 – Spring 2009)<br />
-499-
12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />
<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />
the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />
(LIST DATA FOR Fall 2007 – Spring 2009)<br />
Term/year<br />
Course<br />
number Course title<br />
Semester<br />
hrs<br />
Class<br />
size<br />
Spring 2009 CIST 2500- Intro to Applied Stats for IS&T 3 23<br />
001<br />
CIST 2500- Intro to Applied Stats for IS&T 3 22<br />
002<br />
CSCI 2710 Intro to Digital Design Principles 3 10<br />
Fall 2008 CIST 2500- Intro to Applied Stats for IS&T 3 24<br />
850<br />
CIST 3100- Organizations, Applications and Technology 3 25<br />
850<br />
CSCI 2710- Intro to Digital Design Principles 3 13<br />
001<br />
CSCI 2710- Intro to Digital Design Principles 3 7<br />
002<br />
Summer CSCI 2710 Intro to Digital Design Principles 3 11<br />
2008<br />
Spring 2008 CSCI 2710- Intro to Digital Design Principles 3 19<br />
001<br />
CSCI 2710- Intro to Digital Design Principles 3 16<br />
002<br />
Fall 2007 CIST 2500 Intro to Applied Stats for IS&T 3 25<br />
CSCI 1500 Beginning Programming 3 11<br />
CSCI 2710- Intro to Digital Design Principles 3 13<br />
001<br />
CSCI 2710-<br />
002<br />
Intro to Digital Design Principles 3 11<br />
13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />
brief description <strong>of</strong> your major research and scholarly activities:<br />
14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />
program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />
-500-
APPENDIX 4 – CURRENT LIST OF SERIALS TITLES<br />
Current List <strong>of</strong> Serials Titles for Information Science & Quantitative Analysis (ISQA)<br />
Communications <strong>of</strong> the Association for Information Systems<br />
Computer Security Journal<br />
Data Base for Advances in Information Systems<br />
DECISION SCIENCES - Membership<br />
DECISION SCIENCESDecision support systems.<br />
Electronic Commerce World<br />
E-Service Journal<br />
IEEE transactions on engineering management.<br />
Information & management.<br />
Information economics and policy.<br />
Information resources management journal.<br />
Information systems management.<br />
Information systems research : ISR : a journal <strong>of</strong> the Institute <strong>of</strong><br />
INFORMS journal on computing.<br />
Intelligent enterprise.<br />
International Journal <strong>of</strong> E-collaboration<br />
International Journal <strong>of</strong> Electronic Commerce<br />
International Journal <strong>of</strong> Information Technology and Decision Making<br />
International journal <strong>of</strong> operations and quantitative management : IJOQM.<br />
International Journal <strong>of</strong> Project Management<br />
Journal <strong>of</strong> Computer Information Systems<br />
Journal <strong>of</strong> Information Warfare<br />
Journal <strong>of</strong> management information systems : JMIS.Journal <strong>of</strong> organizational and end user computing.<br />
(ONLINE ONLY).<br />
Journal <strong>of</strong> s<strong>of</strong>tware maintenance and evolution.<br />
Journal <strong>of</strong> the Association for Information Systems<br />
Management science.<br />
MIS quarterly.<br />
Omega.<br />
Telecommunications policy.<br />
Select Engineering Titles<br />
Computer (ONLINE ONLY).<br />
Electronic Design (ONLINE ONLY).IEEE Computer Graphics and Applications (ONLINE ONLY).<br />
IEEE Spectrum (ONLINE ONLY).<br />
-501-
-502-
APPENDIX 5 – STRATEGIC PLAN FOR INFORMATION TECHNOLOGY SERVICE<br />
-503-
INFORMATION TECHNOLOGY SERVICES<br />
Information Technology Services<br />
Strategic Plan<br />
September 2008<br />
through<br />
September 2010<br />
-504-
-505-
AGENCY CONTACT INFORMATION<br />
Primary Agency IT Contact<br />
(List the person responsible for IT in the agency.)<br />
Name John Fiene<br />
Title Associate Vice Chancellor for Technology<br />
Phone 402-554-3670<br />
Email jfiene@unomaha.edu<br />
Information Technology Services (ITS) Contact List<br />
Title Name Email Address<br />
Director <strong>of</strong><br />
Academic<br />
Computing<br />
Director <strong>of</strong><br />
Administrative<br />
Services<br />
Director <strong>of</strong><br />
Information<br />
Technology<br />
Infrastructure<br />
Director <strong>of</strong> IT Project<br />
Management<br />
Assistant Director <strong>of</strong><br />
Academic<br />
Lanyce Keel<br />
Bret Blackman<br />
Steve Lendt<br />
Joyce Crockett<br />
Jay Killion<br />
lkeel@unomaha.edu<br />
bblackma@unomaha.edu<br />
slendt@unomaha.edu<br />
jcrocket@unomaha.edu<br />
jaykillion@unomaha.edu<br />
-506-
Computing<br />
Business Manager Alice Villone avillone@unomaha.edu<br />
Manager <strong>of</strong><br />
Academic<br />
Partnership in<br />
Instruction and<br />
Distance Education<br />
Manager <strong>of</strong><br />
Customer Services<br />
Shelley Schafer<br />
Matt Galardi<br />
sschafer@mail.unomaha.edu<br />
mgalardi@unomaha.edu<br />
-507-
Information Technology Services Mission, Vision and Values<br />
Mission<br />
Information Technology Services (ITS) provides technology leadership by bringing the knowledge<br />
assets <strong>of</strong> the world to the campus via high-speed computer networks. ITS facilitates the innovative<br />
use <strong>of</strong> technology for instruction, research, and outreach via user-centered services and by<br />
stimulating a culture <strong>of</strong> academic discovery that contributes to the world-wide academic community.<br />
Vision<br />
ITS develops effective partnerships with the colleges, administrative units, student organizations, and<br />
central administration to provide needed collaboration for building technology infrastructure, and<br />
providing complementary services. These partnerships address both the principles <strong>of</strong> economies <strong>of</strong><br />
scale and personalized services through the coordination <strong>of</strong> centralized and distributed IT<br />
pr<strong>of</strong>essionals at UNO. Although our goal is innovation, work is done simultaneously at four levels to<br />
build the necessary infrastructure as a foundation. Today’s innovation becomes tomorrow’s<br />
integration.<br />
The application <strong>of</strong> technology is simultaneously performed at four levels:<br />
Automation:<br />
Integration:<br />
creating efficient methods <strong>of</strong> handling routine tasks that allow greater effort to be<br />
focused on the UNO academic mission.<br />
re-engineering to effectively combine shared functions into streamlined<br />
processes that fulfill multiple purposes and reduce redundant efforts.<br />
Communication: enhancing collaboration by diminishing the effect <strong>of</strong> geographical distances for<br />
both synchronous and asynchronous dialog: one to one, in groups, and to the<br />
world.<br />
Innovation:<br />
simply using technology to achieve what was previously not possible.<br />
Values<br />
ITS shares the values <strong>of</strong> the <strong>of</strong>fice <strong>of</strong> Academic and Student Affairs and holds the following values:<br />
Measuring success through the achievements <strong>of</strong> students, faculty, and staff.<br />
-508-
Creating flexible partnerships with campus units to achieve the appropriate balance <strong>of</strong><br />
complimentary centralized and de-centralized functions and services.<br />
Extending the principles <strong>of</strong> shared governance and shared accomplishments.<br />
Enhancing the welfare, talents, and futures <strong>of</strong> ITS employees and expanding pr<strong>of</strong>essional<br />
development.<br />
Encouraging involvement in pr<strong>of</strong>essional IT associations in education and industry consistent<br />
with staff development plans.<br />
Promoting good stewardship through efficient utilization <strong>of</strong> resources.<br />
Exercising good judgment through effective applications <strong>of</strong> technology.<br />
Facilitating meaningful partnerships in our community to enhance learning through the<br />
appropriate use <strong>of</strong> technology.<br />
Leading proactively in the use <strong>of</strong> technology to solve problems.<br />
Encouraging the use <strong>of</strong> technology as a communication tool.<br />
Fostering the use <strong>of</strong> technology in support <strong>of</strong> lifelong learning.<br />
Embracing diversity as an effective model <strong>of</strong> the university’s working environment.<br />
Aligning ITS policies, procedures, and behaviors with the highest pr<strong>of</strong>essional ideals <strong>of</strong> ethics<br />
and legality.<br />
Protecting the privacy and integrity <strong>of</strong> the information resources <strong>of</strong> the academic community<br />
1. Current Assets (Sections 1.1 through 1.4)<br />
Overview <strong>of</strong> the UNO Campus and Technology Services<br />
UNO is a comprehensive public university located on 89 acres in the heart <strong>of</strong> <strong>Nebraska</strong>’s biggest city<br />
with more than 400 faculty <strong>of</strong>fering 95 baccalaureate degrees, 66 advanced degrees including 6 doctoral<br />
programs. UNO is the NU system’s metropolitan university, which means it provides a multitude <strong>of</strong><br />
activities and service learning opportunities in a wide variety <strong>of</strong> settings that are designed to meet the<br />
needs <strong>of</strong> the UNO students and the community.<br />
The value <strong>of</strong> UNO investment in information technology is substantial and must be considered critical to<br />
the daily operations <strong>of</strong> the organization. Technology is thoroughly integrated into every function <strong>of</strong> the<br />
university and it is critically important to accomplish the university mission. The most valuable assets are<br />
the knowledge and social capital that are developed in our information technology pr<strong>of</strong>essionals and<br />
users <strong>of</strong> information technology that allow the university to work together to perform our mission.<br />
UNO Information Technology Services (ITS) is responsible for providing technology leadership by<br />
facilitating the UNO community’s access to network resources that enhance academic excellence and<br />
-509-
administrative effectiveness. ITS strives to achieve effective partnerships with the colleges,<br />
administrative units, and student organizations. These partnerships simultaneously address the principle<br />
<strong>of</strong> economies <strong>of</strong> scale and personalized services to students, faculty, staff, and community.<br />
-510-
Campus Customers/Partners<br />
Statistics in this section copied from the UNO 2007 Fact Book published by UNO Institutional Research<br />
14,156 Undergrad & Grad Students 235 Graduate Assistants<br />
487 Full-time Faculty 393 Part-time Faculty<br />
799 Full-time staff 46 Part-time staff<br />
70,000 Active Pages - Website<br />
Development/ Support<br />
Administrative Information Services<br />
15,000 Students Every Semester Using<br />
E-BRUNO (Electronic Better Registration<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>)<br />
150,000+ Page Views Each Week on Main<br />
UNO Web Page<br />
30,000 Daily Transactions using E-BRUNO<br />
Students<br />
250,000 NU ID’s (adding more each day) 5000+ Courses Annually Graded Using E-<br />
BRUNO/Faculty<br />
30,000 Active Identities 125+ SIS Updates Applied Yearly<br />
30+ Web Template Users 1500+ Ad Hoc WebFocus Reports & 270<br />
Production Reports<br />
1 Datamart 30+ End User WebFocus Support<br />
1,000,000+ Lines <strong>of</strong> COBOL Code<br />
Supported<br />
1 Mainframe Student Information System<br />
(SIS) Supported<br />
-511-
4 Distance Education Synchronous Video<br />
Facilities<br />
Client Services<br />
4,600 PC/Mac Workstations; 100<br />
UNIX/Linux Workstations on Campus<br />
90 Discipline Specific Labs/Computer<br />
Classroom indirect support<br />
42 Kiosk Stations<br />
9 Open Labs w/525 Workstations Support for Over 40 S<strong>of</strong>tware Products<br />
(http://www.unomaha.edu/its/s<strong>of</strong>tware.php)<br />
Hi-Tech Rooms on Campus:<br />
Auditoriums: 16<br />
3 Partnerships for 6 Community Labs<br />
Conference: 21<br />
Labs: 80<br />
Lecture: 183<br />
Total 300<br />
20,000 Helpdesk Calls/Walk-ins (Yearly)<br />
Distance Education<br />
Academic Partnership for Instruction<br />
Training, Instructional Design,<br />
Multimedia and Web Support<br />
10 DE Programs Supported 107 Training courses taught annually<br />
164 DE Courses supported annually 800+ attendees at training sessions<br />
annually<br />
20 New DE Courses supported annually 15 faculty received instructional design<br />
consulting<br />
3,800 DE Student Enrollments annually 15 Multimedia presentations/projects/<br />
documentation<br />
11,700+ DE Student Credit Hours annually 13 Websites created and/or consulted<br />
-512-
McAfee: Anti- Virus and Anti-Spyware for<br />
Campus and Home (Students, Faculty and<br />
Staff)<br />
Micros<strong>of</strong>t: Office, Desktop Operating<br />
system and Servers (Campus Use and<br />
Faculty/Staff Home)<br />
Site Licenses<br />
Statistical and Mathematical Campus<br />
Use:<br />
1. Maple<br />
2. Minitab<br />
3. SAS<br />
4. SPSS<br />
AutoCAD: <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong><br />
Macintosh: OS10<br />
Not Site License - Special prices for<br />
campus use:<br />
Adobe Reseller Campus use<br />
-513-
Significant ITS Custom Applications<br />
Students, faculty and staff use customized technology daily to meet their needs. ITS continuously<br />
collaborates with our clients to provide the optimum technology support that integrates s<strong>of</strong>tware and<br />
support services. The following list are the significant custom applications developed by UNO ITS that<br />
includes “middleware” to integrate commercial systems with existing ones and web based systems to<br />
support critical <strong>University</strong> requirements.<br />
myUNO (Blackboard 8.0)/SIS<br />
The myUNO (Blackboard) course management system was upgraded to version 8.0 the spring <strong>of</strong> 2008. This<br />
version enhanced the level <strong>of</strong> integration with UNO’s SIS system and improved system performance and<br />
stability.<br />
Web<strong>of</strong>fice/myFolder<br />
Platform Development Tools Support<br />
Windows 2003<br />
Windows Active<br />
Directory<br />
In-house IS staff<br />
UNO has created an integrated and enhanced campus-wide file storage system with a unique web<br />
enabled method <strong>of</strong> access. By integrating campus standard products such as Micros<strong>of</strong>t Server, web<br />
browser support and SSL web encryption as well as custom integration s<strong>of</strong>tware, the UNO campus<br />
now has a departmental document storage system called web<strong>of</strong>fice that is available to any UNO<br />
department, and an individual document storage system called myFolder that is available to all UNO<br />
faculty, staff and students. The real value <strong>of</strong> these integrated systems is easy access to documents<br />
from any Internet connected computer.<br />
Identity Management<br />
Campus wide web based systems and forms supported by ITS use a shared account name and<br />
password called the UNO NetID. Custom identity management services include NetID<br />
provisioning/de-provisioning, LDAP population, password resets and creation <strong>of</strong> <strong>University</strong> wide<br />
unique identifiers (NU ID). Identity Management processes are being migrated to Sun<br />
Microsystems’s Identity Management Suite.<br />
Sungard SCT - Student Information System (SISPLUS)<br />
UNO’s Student Information System (SIS) supports the core academic business needs <strong>of</strong> UNO<br />
students. SIS includes Admissions, Records and Registration, Billing and Financial Aid modules.<br />
UNO has created custom enhancements to the base SIS system to meet campus specific policies.<br />
E-BRUNO for Students<br />
Platform<br />
Development Tools Support<br />
-514-
Red Hat Linux PHP, C, Hllapi In-house IS staff<br />
E-BRUNO for Students is UNO's web-based enrollment services system. With E-BRUNO for<br />
Students, students can use their NU ID and PIN to log in and obtain grades, current class schedules,<br />
register for classes, pay tuition via credit card, accept financial aid and much more. E-BRUNO for<br />
Students provides students with web access to UNO’s Student Information System.<br />
(https://ebruno.unomaha.edu/login.html)<br />
E-BRUNO for Faculty<br />
Platform<br />
Development Tools Support<br />
Red Hat Linux PHP, C, Hllapi In-house IS staff<br />
With E-BRUNO for Faculty, a UNO web-based system, faculty can use their NU ID number and PIN<br />
to log in and obtain class rosters, submit course grades and give permits and authorizations, along<br />
with a host <strong>of</strong> special Blackboard functions. (https://ebruno.unomaha.edu/php/facstaff/)<br />
Datamart<br />
Platform<br />
Development Tools Support<br />
Red Hat Linux Web Focus, mySQL In-house IS staff<br />
UNO developed a campus Datamart, built with data from the Student Information System, to meet<br />
census-reporting requirements.<br />
Short Term Loan System (STLS)<br />
Platform<br />
Development Tools Support<br />
Red Hat Linux Postgres, PHP In-house IS staff<br />
UNO developed a STLS to meet the needs <strong>of</strong> short-term student loans from the Student Accounts<br />
<strong>of</strong>fice.<br />
-515-
Data Exchange<br />
Below are the major entities outside <strong>of</strong> the NU System that ITS exchanges data with.<br />
Entity<br />
JSA Technologies<br />
National Student Loan Program<br />
(NSLP)<br />
U.S. Department <strong>of</strong> Education<br />
National Student Clearinghouse<br />
U.S. Immigration and Customs<br />
Enforcement (ICE)<br />
Dragonfly Athletics<br />
General Revenue Corporation<br />
Credit World Services<br />
CashNet<br />
Internal Revenue Service<br />
Various Banks<br />
Description<br />
Web based deposits for Cbord ID card system<br />
Financial Aid loan services<br />
Financial Aid processing<br />
Degree and enrollment verification<br />
Student and Exchange Visitor Program (SEVP)<br />
Athletic Management System<br />
Collection <strong>of</strong> past due student tuition and fees<br />
Collection <strong>of</strong> past due student tuition and fees<br />
Student Accounts system<br />
1098 tax reporting<br />
Student refunding<br />
-516-
Technical Architecture<br />
Our goal is information availability whenever and wherever (24x7 access, ubiquitous/pervasive, and in<br />
real-time where appropriate). Our choice will be via industry standards, higher education best practices<br />
and using products and solutions providing lower Total Cost <strong>of</strong> Ownership (TCO) and best services to<br />
the whole campus.<br />
This table is technical in nature and explains the technical architecture ITS will be following over the next<br />
two years. The following web site will assist in defining terms listed in this table. http://webopedia.com/<br />
Legacy Current Future<br />
Currently in<br />
Research<br />
Hardware/Servers<br />
Gigabit & multi-Gigabit network<br />
backbone X X<br />
Dynamic Disk Storage (SAN)<br />
Dell/Intel servers X X<br />
IBM RS 6000 Limited Limited<br />
IBM S/390 Mainframe – Based X Limited<br />
Intel Based (PC) X X<br />
Wireless networking access X X<br />
Data Bases<br />
IBM DB2/UDB (Database<br />
2/Universal Database) X X Limited<br />
IBM VSAM (Virtual Storage<br />
Access Method) X Limited Limited<br />
Sun Enterprise LDAP Directory<br />
(Lightweight Directory Access<br />
Protocol) X X<br />
-517-
Legacy Current Future<br />
Currently in<br />
Research<br />
Lotus Notes document and<br />
tracking database<br />
Limited<br />
Micros<strong>of</strong>t Active Directory X X<br />
Micros<strong>of</strong>t SQL (Structured Query<br />
Language) server X X<br />
Open source DB (Postgres,<br />
MYSQL) X X<br />
Oracle<br />
X<br />
-518-
Legacy Current Future<br />
Currently in<br />
Research<br />
Server S<strong>of</strong>tware<br />
Apache web server X X<br />
iWay ETL Manager X X<br />
Oracle Application Server<br />
X<br />
Micros<strong>of</strong>t IIS server for web<br />
enabled applications X X<br />
PHP (Php: Hypertext<br />
Preprocessor) for web enabled<br />
applications X X<br />
Tomcat X X<br />
Hibernate X X<br />
Web DAV (Distributed Authoring<br />
And Versioning) X X<br />
WebFOCUS Reporting Server X X<br />
Lotus Notes X X<br />
Blackboard X X<br />
Server Operating Systems<br />
Cisco router language IOS X X<br />
VMware X X<br />
IBM zOS X Limited<br />
Redhat Linux on Intel X X<br />
Micros<strong>of</strong>t 200x Server X X<br />
Languages<br />
C/CGI (Computer Graphics<br />
Interface) X Limited<br />
-519-
Legacy Current Future<br />
Currently in<br />
Research<br />
COBOL (Common Business-<br />
Oriented Language) X X Limited<br />
CSS X X<br />
HLLAPI (High Level Language<br />
Application Program Interface)<br />
screen scraping X X Limited<br />
JAVA /J2EE X X<br />
JavaScript X X<br />
PHP (Php: Hypertext<br />
Preprocessor) Web-scripting<br />
language X X<br />
Structured Query Language<br />
(SQL) X X<br />
WebFOCUS X X X<br />
XHTML<br />
(HyperTextMarkupLanguage) X X<br />
XML<br />
(EXtensibleMarkupLanguage) X X<br />
Oracle PL/SQL<br />
X<br />
-520-
Legacy Current Future<br />
Currently in<br />
Research<br />
Application Development Methodologies and Toolsets<br />
ANT Build Tool for Java X X<br />
Configuration Mgmt Tools (UNIT<br />
testing, etc) X X<br />
Eclipse IDE X X<br />
NetBeans IDE X X<br />
Spring X X<br />
Struts X X<br />
UML X X<br />
Web based Content Mgmt<br />
Systems X X<br />
Web Services X X<br />
Application Delivery Methodologies/Protocols<br />
IBM DB2 (DataBase 2) Connect X X<br />
JDBC (Java DataBase<br />
Connectivity) X X<br />
LDAP (Lightweight Directory<br />
Access Protocol) X X<br />
iWay Data Adapters X X<br />
ODBC (Open<br />
DataBaseConnectivity) X X<br />
SOAP (Simple Object Access<br />
Protocol) X X<br />
UDDI (Universal Description,<br />
Discovery and Integration) X X<br />
-521-
Legacy Current Future<br />
Currently in<br />
Research<br />
WAP (Wireless Application<br />
Protocol) /WML (Wireless Markup<br />
Language) X X<br />
WSDL (Web Services Description<br />
Language) X X<br />
XML (EXtensible Markup<br />
Language) X X<br />
Rich Content Protocols (Video/Audio)<br />
Direct Analog and Digital Video<br />
over fiber X X<br />
H.323 X X<br />
MPEG4 over IP X X<br />
NEB*SAT H.261 Limited Limited<br />
Windows Media Player<br />
Quicktime<br />
Flash X X X<br />
Project Management tools<br />
c.support X X<br />
Micros<strong>of</strong>t Excel X X<br />
Daptiv X X<br />
Subversion X X<br />
Jira Issue Tracking X Limited<br />
Lotus Notes Team Room<br />
Limited<br />
-522-
Legacy Current Future<br />
Currently in<br />
Research<br />
Authentication and Security<br />
TippingPoint IPS X X<br />
FTP X Limited<br />
LDAP with Unique Username X X<br />
PGP X X<br />
Photo ID card with Database X X<br />
PIN (Personal Identification<br />
Number) X X<br />
SAP Personnel Number X Limited<br />
SFTP/SCP X X<br />
SSH Secure Shell X X<br />
SSL/TLS Secure Socket Layer X X<br />
Student ID (SSN) Limited Limited<br />
Foundstone Vulnerability Mgt X X<br />
UNO NetID X X<br />
NU ID X X<br />
VPN Virtual Private Network Limited X<br />
Sun IdM Suite X X<br />
Wireless VPN Limited X X<br />
McAfee Anti-virus and Spyware X X<br />
McAfee Enterprise Policy<br />
Orchestrator (EPO)<br />
X<br />
Cisco Firewalls X X<br />
VLANS X X<br />
-523-
Legacy Current Future<br />
Currently in<br />
Research<br />
Security Event Management<br />
X<br />
Network Environment<br />
General Description<br />
Information Technology Services pr<strong>of</strong>essionally manages many <strong>of</strong> the 'mission critical' computer systems<br />
on campus. These include centralized email servers, centralized file servers, campus inter- and intranetworks,<br />
including local and wide area networks, Internet and World-Wide-Web communications,<br />
application delivery systems, academic and research systems, instructional delivery systems including<br />
web-based mediums, and streaming media systems in support <strong>of</strong> the campus-wide academic mission.<br />
The desktop management s<strong>of</strong>tware being used is Altiris - http://www.altiris.com/ .<br />
The LAN monitoring tools used are:<br />
What’s Up Gold http://www.whatsupgold.com/<br />
Tipping Point http://www.tippingpoint.com/<br />
Pakateer http://www.netequalizer.com/appe.htm<br />
Foundstone http://www.foundstone.com/us/index.asp<br />
Netmri http://www.netcordia.com/<br />
-524-
Network Devices<br />
Current<br />
Planned – See<br />
narrative below<br />
Firewalls (Hardware) 3<br />
Wireless Access Points 116<br />
Video Cameras (USB)*<br />
IP Phones** 35<br />
POP Servers 0<br />
Web Servers<br />
Windows 2003<br />
Red Hat Linus<br />
34***<br />
35****<br />
Application Delivery (e.g. Citrix,<br />
Terminal Services servers)<br />
(Specify)<br />
Remote Desktop Connection<br />
80<br />
* UNO has many video cameras across the campus to enhance security and will continue to add in<br />
the appropriate places.<br />
** ITS is currently testing the use <strong>of</strong> VOIP. The UNO Telecommunications department has set up<br />
VOIP for the Chili Greens location.<br />
*** This only includes ITS-owned & operated systems and 18 <strong>of</strong> the 34 are running on VMWare<br />
**** This only includes ITS-owned & operated systems and 29 <strong>of</strong> the 35 are running on VMWare<br />
With the physical expansion <strong>of</strong> the UNO campus to the south (Pacific and Center streets) the expansion<br />
<strong>of</strong> all IT services will be impacted and we are involved in the planning <strong>of</strong> this growth. On average there<br />
has been a 10% expansion <strong>of</strong> web servers, but with our use <strong>of</strong> VMware this growth may change.<br />
-525-
Future Direction & Intent<br />
Campus IT in the next biennium is likely to be heavily influenced by the implementation <strong>of</strong> a new student<br />
information system across the university system. Such systems represent the core academic business<br />
processes <strong>of</strong> a campus and tend to affect the overall direction and technical architecture <strong>of</strong> the institution.<br />
Both vendors under current consideration use Oracle, as the underlying technology and therefore it<br />
becomes core to the IT operations <strong>of</strong> the campus for development <strong>of</strong> interfaces to other campus systems<br />
as well as for future application development.<br />
In addition, the unprecedented campus physical expansion and renovations planned in the next two<br />
years similarly mandate re-thinking overall campus infrastructure on a new scale. This may include<br />
campus network re-design with consideration <strong>of</strong> a fiber ring from the Dodge Campus to the Center<br />
Campus to assure appropriate business continuity. Another factor contributing to network infrastructure<br />
design is ongoing convergence <strong>of</strong> voice, video and data applications on the IP-based network as well as<br />
ubiquitous wireless access that includes a variety <strong>of</strong> mobile devices.<br />
In response to environmental sustainability, limited capital resources and staffing limitations, UNO ITS is<br />
in the process <strong>of</strong> re-inventing the campus data center. Server virtualization is achieving significant<br />
savings in electrical costs, server hardware expenses, and system administration costs. Elimination <strong>of</strong><br />
major system printing through an output management system and electronic system distribution <strong>of</strong> output<br />
allows the elimination <strong>of</strong> larger system printers, their associated electrical and maintenance costs as well<br />
as paper and other supplies. These steps allow the data center to be managed exclusively by the<br />
systems administration staff with no computer operators. Further work in the “greening” <strong>of</strong> the data<br />
center will continue to produce similar benefits in the next two years.<br />
Regulatory mandates as well as best practice diligence triggers continued attention to data security and<br />
privacy concerns. While much has been done to address these issues, it is ongoing and dynamic in<br />
ways that will continue to make it a priority into the foreseeable future. One <strong>of</strong> the attendant issues is<br />
identity management. The university has purchased the Sun Identity Management system, which will<br />
continue to be implemented and refined over the next two years. Continuity Planning will be further<br />
enhanced by the virtualization <strong>of</strong> alternative site operations.<br />
The Academic Partnership for Instruction (API), a division <strong>of</strong> ITS continues to provide strategic and<br />
operational support to distance education and to dedicate efforts in integrating emerging technologies<br />
with innovative pedagogy, assessment and instructional design for individual faculty and campus<br />
organizations including the Center for Faculty Development, Teaching Circles, the <strong>University</strong> Committee<br />
-526-
for the Advancement <strong>of</strong> Teaching, the Faculty Senate Educational and Resources and Services<br />
Committee, and the Distance Education Advisory Committee.<br />
The increasing viability <strong>of</strong> S<strong>of</strong>tware as a Service and the potential for aspects <strong>of</strong> infrastructure as a<br />
service will play a role in future IT acquisitions. Project management and elements <strong>of</strong> business continuity<br />
are currently done in this way and the ongoing evaluation <strong>of</strong> the success <strong>of</strong> this approach will continue.<br />
2. Staff and Training<br />
Personnel<br />
Information Technology Services has 45 full time employees with 19 part time student workers.<br />
Depending on the project outside contractors can be involved.<br />
IT Related Training<br />
Summarize the agency’s efforts to address training needs relating to information technology, including<br />
training for IT staff and users.<br />
Yearly performance reviews require ITS employees in conjunction with their manager work on personal<br />
development plans that includes training requirements. Employees receive $250 a year to supplement<br />
their personnel development plans. This money is used to contribute toward attending conferences, join<br />
national technical organizations, and subscribe to technology journals, or purchase books or tools that<br />
support new skill development. Training activities include:<br />
All staff has attended local and national conferences and belongs to national technology<br />
associations.<br />
ITS API staff utilizes a course development model that includes presenting new technology<br />
training courses to ITS staff prior to <strong>of</strong>fering them to the campus. This process provides the ITS<br />
instructor with the opportunity to practice and ITS staff with the opportunity to learn about new<br />
technology.<br />
ITS ADIS staff attended 10 days <strong>of</strong> Sun Identity Management training.<br />
Each year ITS participates in NU tech day, a system-wide one day workshop for technology<br />
pr<strong>of</strong>essionals.<br />
-527-
In the last year, the focus <strong>of</strong> training has been on project management. The newly developed ITS<br />
<strong>of</strong>fice <strong>of</strong> project management has developed and implemented extensive training for senior staff,<br />
project management champions and the staff at large.<br />
Technology training for the campus community consists <strong>of</strong> formal presentations about upgrades <strong>of</strong><br />
campus supported s<strong>of</strong>tware such as Micros<strong>of</strong>t 2007, new applications such as the UNO ePortfolio<br />
system used for faculty and staff annual performance appraisals or the campus webpage template, and<br />
new instructional technologies such as clickers. Additionally, ITS staff provides small group and<br />
individual training upon request.<br />
-528-
APPENDIX 6 – COLLEGE OF IS&T SYSTEM OVERVIEW<br />
COLLEGE OF INFORMATION SCIENCE AND TECHNOLOGY<br />
College <strong>of</strong> Information Science &<br />
Technology<br />
Systems Overview<br />
January 2009<br />
-529-
TABLE OF CONTENTS<br />
CONTACT INFORMATION .................................................................................... 3<br />
COMPUTING SUPPORT MODEL ............................................................................ 3<br />
MISSION AND VALUES ........................................................................................ 4<br />
NETWORK CONNECTIVITY AND CONFIGURATION ..................................................... 5<br />
CLASSROOM, LAB, AND RESEARCH COMPUTERS ...................................................... 9<br />
PRINTING....................................................................................................... 11<br />
VIRTUALIZATION REPORT .................................................................................. 14<br />
SERVER INFORMATION .................................................................................. 16<br />
SOFTWARE LIST – CLASSROOM AND LABS .......................................................... 22<br />
MICROSOFT DEVELOPER NETWORK ACADEMIC ALLIANCE...................................... 24<br />
RESEARCH LABS AND PROJECTS ....................................................................... 25<br />
WEBSITES .................................................................................................. 33<br />
POLICIES, PROCEDURES, AND GUIDELINES FOR TECHNOLOGY USAGE ........................ 38<br />
-530-
College <strong>of</strong> IS&T Systems and Support Contact Information<br />
Location and Hours <strong>of</strong> Operation<br />
Location: PKI 356B<br />
Phone: (402)554-4932<br />
Emergency Pager: (402)888-2927<br />
Emergency Email Address: 4028882927@atsbeep.com<br />
Hours <strong>of</strong> Operation: Monday-Friday 8:00am - 5:00pm<br />
Primary IT Contact<br />
Name<br />
Michael Grove<br />
Title<br />
Director<br />
Phone 402-554-2790<br />
Email<br />
mrgrove@unomaha.edu<br />
Email Contact List<br />
The Director will be updating an email list <strong>of</strong> systems contacts. The list will be used to provide general IT<br />
related updates and information to agencies.<br />
Name Title Email Address Phone<br />
James Harr Research Systems Manager jharr@unomaha.edu 554-3219<br />
Joseph Hrabak Production Systems Manager chrabak@unomaha.edu 554-3340<br />
Mohammad Shafiullah Research Systems Manager mshafiullah@unomaha.edu 554-2973<br />
Computing Support Model<br />
The members <strong>of</strong> the Systems Staff at the College <strong>of</strong> Information Science and Technology are dedicated<br />
to providing quality support for faculty, staff, and students. We provide assistance with s<strong>of</strong>tware<br />
installation and troubleshooting, account creation, departmental purchases, printer installation,<br />
hardware repair, security, server configuration and maintenance, backups, web development, and much<br />
more.<br />
Our approach is different than the standard IT support model. Our team pairs up with faculty, staff, and<br />
researchers forming a true symbiotic relationship. We learn about the project or research being<br />
performed, and work to envision new ways to achieve technological goals. In return, the traditional<br />
researcher or program director receives a fully documented computing solution. This allows both<br />
-531-
partners in the process to grow in their understanding <strong>of</strong> the material, and to develop new and<br />
innovative ways to provide IT solutions.<br />
College <strong>of</strong> IS&T Mission and Values<br />
Mission<br />
The College <strong>of</strong> Information Science and Technology (IS&T) represents the joint efforts <strong>of</strong> the <strong>University</strong><br />
<strong>of</strong> <strong>Nebraska</strong>, the State <strong>of</strong> <strong>Nebraska</strong>, and private industry to address the growing global needs for<br />
knowledgeable pr<strong>of</strong>essionals in the area <strong>of</strong> Information Technology. The college is striving to develop<br />
areas <strong>of</strong> national prominence in bioinformatics, wireless networks/mobile computing, management<br />
information systems, information assurance, project management, decision support systems &<br />
visualization, collaboration science, theoretical and applied computing. The college mission is:<br />
To provide comprehensive up-to-date education <strong>of</strong> the highest quality in the various areas <strong>of</strong><br />
information science and technology to individuals at the Metropolitan <strong>Omaha</strong>, state, national<br />
and international level.<br />
To engage in basic and applied research activities to be carried out by students and faculty <strong>of</strong> the<br />
college with collaboration <strong>of</strong> other <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> units as well as pr<strong>of</strong>it and non-pr<strong>of</strong>it<br />
organizations.<br />
To equip college graduates with the knowledge and expertise to contribute significantly to the<br />
work force and to continue to grow pr<strong>of</strong>essionally.<br />
To partner with other university units in the development and utilization <strong>of</strong> information<br />
technology in teaching and service activities.<br />
To partner with local, state, national and international entities in the resolutions <strong>of</strong> information<br />
technology problems and issues.<br />
In order to accomplish the college's mission and vision, the faculty and staff will strive to achieve the<br />
following three strategic goals:<br />
1. Keep students at the center <strong>of</strong> all college efforts;<br />
2. Strive to achieve the highest academic excellence; and<br />
3. Actively lead and collaborate with academic, business and community entities in various projects<br />
related to IS&T.<br />
-532-
Values<br />
The college's overarching philosophy is exemplified by the value statement, "No student will go<br />
unassisted or unchallenged." The college is focused on reaching the next level <strong>of</strong> information technology<br />
innovation through collaboration. This collaboration is fostered by the presence <strong>of</strong> the college in the<br />
Peter Kiewit Institute and is materializing in the form <strong>of</strong> research, teaching and service/outreach<br />
initiatives in partnership with our stakeholders in the community (government, public and private<br />
sector), other academic units across the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> and the rest <strong>of</strong> the <strong>University</strong><br />
<strong>of</strong> <strong>Nebraska</strong> System.<br />
College <strong>of</strong> IS&T Network Connectivity<br />
There are two Gigabit network ports in each faculty and staff <strong>of</strong>fice. If you are experiencing trouble with<br />
your connectivity, please call us at 554-4932. There is also a VPN available and wireless access<br />
throughout the building. See the text below for more information.<br />
VPN<br />
The College <strong>of</strong> IS&T has a Virtual Private Network available for faculty and staff. Connecting to the VPN<br />
allows you to access your files, connect to network shares, print from the wireless network, and more.<br />
Instructions on connecting to the VPN are listed below.<br />
1. Download the IS&T VPN Client. ** If you have a modem in your computer you will need to disable<br />
this. This can be done by opening up the Control Panel and going to Device Manager -> Network<br />
Adapters, then locate your modem and Right-click -> Disable.<br />
2. Navigate to the directory where you saved the file. Double click it to install the application.<br />
3. Click 'Yes' to install the VPN client.<br />
4. Check the box to save a shortcut on your desktop.<br />
5. Double click the 'IS&TVPN - Shortcut' on your desktop to connect to the VPN.<br />
6. You will see a box popup with the UNO logo. Type in your IS&T username and password,<br />
followed by PKI-IST in the 'logon domain' box. (To connect faster in the future, you may check the<br />
'Save Password' or 'Connect Automatically' boxes.)<br />
7. Click connect.<br />
8. You may see your connection status at anytime or disconnect by double clicking the 'IS&TVPN -<br />
Shortcut' on your desktop.<br />
Connecting to My Office PC: Remote Desktop<br />
-533-
You may control your <strong>of</strong>fice computer from a remote location, as long as you are connected to the VPN.<br />
This allows you to have full access to your computers files, printers, programs, etc. See instructions<br />
below.<br />
1. Install the IS&T VPN Client - see instructions above<br />
2. Windows XP: Click Start --> Run --> type 'mstsc' without the quotes, press enter<br />
3. Windows Vista: Click the Windows button (Formerly Start) --> type 'mstsc' without the quotes,<br />
press enter<br />
4. Type the name <strong>of</strong> your computer in the computer field when the remote desktop box appears<br />
and press enter<br />
(example: computer-name.ist.unomaha.edu)<br />
5. You may find your computer name by going to the control panel and clicking 'System'<br />
Wireless Network<br />
The College <strong>of</strong> IS&T provides unencrypted wireless network access based on common 802.11 standards.<br />
Currently there are 30 active access points providing PKI with nearly 100% wireless coverage.<br />
How to use it<br />
You'll need a computer or other portable device with 802.11 wireless networking capability either built<br />
in or with a wireless network card installed. If you do not have or are not sure if your computer or device<br />
has 802.11 wireless networking capabilities, check with the company or person from whom you<br />
obtained the item.<br />
Set your SSID network name <strong>of</strong> 'unowireless'.<br />
The wireless network will attempt to automatically assign the computer or device a network number<br />
using DHCP. You may need to turn the computer or device <strong>of</strong>f and back on so it seeks a network<br />
number. If your computer or device does not have a fairly current version <strong>of</strong> a standard Windows or Mac<br />
operating system, there may be some special steps that system requires you to perform before being<br />
able to use wireless networking with that device. Check the website or call the technical support number<br />
for the device if you're not sure.<br />
-534-
College <strong>of</strong> IS&T Network Configuration<br />
Physical Equipment:<br />
15 Network Switches<br />
1 Core Router<br />
1000 Network Ports<br />
35 Wireless Access Points<br />
Over the past 6 months IS&T Systems has facilitated several network architecture changes in the pursuit<br />
<strong>of</strong> better service to computer users in both performance and security. This portion <strong>of</strong> the document<br />
explains the changes that have been made through the past year.<br />
The use <strong>of</strong> network address translation to increase security<br />
There are several reasons why NAT is common place in current networks. The two most prominent<br />
reasons are a shortage <strong>of</strong> available IP address space and an implicit firewall policy. The network at PKI<br />
uses mixed NAT and public IP addressing. Each has its benefits, but it can also cause problems. The<br />
following diagram is a small part <strong>of</strong> our network 12 months ago.<br />
Private Lab<br />
Networks<br />
Private NAT<br />
Router<br />
PKI Building<br />
Network<br />
PKI Core<br />
Router<br />
Internet<br />
Private<br />
Workstations<br />
Public Workstations<br />
and Servers<br />
IS&T made extensive use <strong>of</strong> private addressing for research networks. The primary goal was to increase<br />
security and that was a success. However, several drawbacks arose. Nearly all traffic is forced through<br />
the Private NAT router. While the NAT router operates at 1000Mbps and UNO’s Internet connection<br />
runs at 100Mbit, a majority <strong>of</strong> burst traffic occurs to/from servers inside PKI. The limited scalability <strong>of</strong><br />
this solution soon became apparent; the NAT router becomes the bottleneck in our design.<br />
To mitigate the bottleneck issue, IS&T took several heavily used servers and multi-homed them. That is<br />
gave them addresses on both public and private networks. While this solution works, it is far from<br />
optimal. It increases management overhead, requires several non-standard tweaks to DNS to keep<br />
clients connecting to the appropriate adapter on a server, and some applications simply don’t function<br />
right under this set up, in particular any application requiring a license server. This is ignoring the fact<br />
that humans do make occasional mistakes and a mistake configuring a DNS entry can render the service<br />
it pertains to useless until it is fixed.<br />
-535-
Transitioning back to all public addresses was not an option and remains so to this day. Several labs use<br />
network sniffers as educational tools and UNO policy dictates that these networks must be isolated on<br />
the layer 1 and 2 network level. A new approach was needed to maintain security, improve<br />
performance, and simplify server management.<br />
A new approach – Internally routable private addresses<br />
IS&T Systems came up with a new network model to solve these issues without increasing our security<br />
footprint. We wanted to make full use <strong>of</strong> the PKI Core. It has the capability to route 1.2Tbps, and has<br />
20Gbps fiber links to the edge switches. Compare this to the 1Gbps the NAT router <strong>of</strong>fers, it is a<br />
phenomenal improvement. We came to the conclusion that we needed to make use <strong>of</strong> the core router<br />
and policy routing to increase performance and decrease management overhead. The following diagram<br />
illustrates our new model, which, excluding a few minor details, has been implemented fully.<br />
Private<br />
Workstations<br />
PKI Border<br />
Router<br />
PKI Building Network<br />
(including the PKI-Core router)<br />
Internet<br />
Public Workstations<br />
and Servers<br />
Private NAT<br />
Router<br />
The new model calls for the core to handle all routing in the building. Private and Public networks are<br />
handled the same. The difference comes when a workstation or server makes a request destined for the<br />
Internet. The core router uses policy routing to forward public addresses directly to the PKI Border<br />
router as usual. However, private addresses are routed to the Private NAT router, now placed at the<br />
border <strong>of</strong> the PKI network. NAT only occurs for packets destined for the Internet or North Campus. The<br />
performance increases and simplification <strong>of</strong> server management became immediately visible to the IS&T<br />
systems staff.<br />
The networks’ bottlenecks have been eliminated and the NAT router is no longer saturated on a daily<br />
basis, research networks are still isolated from the rest <strong>of</strong> the network using VLAN technology, server<br />
-536-
configuration has become significantly simpler, and the NAT router is now able to handle the load<br />
without any question <strong>of</strong> performance.<br />
-537-
College <strong>of</strong> IS&T Classroom, Lab, and Research Computers<br />
The Systems Staff maintains classrooms and computer labs that directly support academic and research<br />
endeavors <strong>of</strong> the College. Each lab is unique in function, and customized to suit student, faculty, and<br />
staff needs. Students, faculty, and staff may login using their UNO netID. Lab hours are posted outside<br />
<strong>of</strong> each room. For s<strong>of</strong>tware installation requests, please contact us at any time.<br />
All computer labs and classrooms have Dell® Precision 390 workstations with the following<br />
specifications:<br />
Intel® Core 2 Duo 2.66Mhz processor<br />
160GB Hard Drive<br />
2GB <strong>of</strong> RAM<br />
NVIDIA® Quadro FX 3500 Video Card<br />
7 USB ports<br />
3 fire wire ports<br />
Audio jacks in the front and rear<br />
DVD/RW Drive<br />
Below is a list <strong>of</strong> classroom and lab functions, number <strong>of</strong> seats, and number <strong>of</strong> computers.<br />
Room Purpose Seats Computers<br />
PKI155 Classroom 45 1<br />
PKI157 Classroom 23 1<br />
PKI158A Public Computer Lab 50 50<br />
PKI158C IST&E Student Computer Lab 42 40<br />
PKI158G “WOW” Room 10 8<br />
PKI158K Data Mining Lab 20 10<br />
PKI160 Instructional Technology Center - Distance Learning 44 1<br />
PKI161 Instructional Technology Center - Distance Learning 26 1<br />
PKI164 Instructional Technology Center - Distance Learning 56 1<br />
PKI172a Dean's Conference Room 8 1<br />
PKI252 Classroom 45 1<br />
PKI256 Classroom 40 1<br />
PKI259 Graduate Student Lab 9 9<br />
PKI260 Instructional Technology Center 45 45<br />
PKI261 Classroom 35 1<br />
PKI263 Classroom 34 1<br />
PKI269 Instructional Technology Center 30 30<br />
PKI270 Classroom 30 1<br />
PKI274 PhD Student Lab 13 13<br />
PKI276 Instructional Technology Center 30 30<br />
PKI277 Conference Room 8 1<br />
PKI278 Instructional Technology Center for Networking 16 16<br />
PKI 279 Instructional Technology Center 30 3<br />
-538-
PKI285A STEAL Lab 3 8 8<br />
PKI335 Classroom 28 1<br />
PKI350 STEAL Lab 1 40 40<br />
PKI355 Graduate Student Lab 2 2<br />
PKI356A One IP Lab 20 7<br />
PKI356C Adjunct Faculty 3 3<br />
PKI357 E-Learning Lab 2 2<br />
PKI356B Systems Office 12 30<br />
PKI359 Classroom 44 1<br />
PKI360 W.I.N.D.S. Research Lab 4 4<br />
PKI361 STEAL Lab 2 25 25<br />
PKI362 CMANTIC Research Lab 4 5<br />
PKI366 Chronoscope Research Lab 5 5<br />
PKI366A Systems Storage 0 4<br />
PKI367 IS&T Attic 12 12<br />
PKI370 MOSAIC Research Lab 4 4<br />
PKI374 Metaverse Research Lab 6 6<br />
PKI375 Multimedia Production Lab 15 15<br />
PKI377 Classroom 30 1<br />
PKI378 Bioinformatics Research Lab 6 6<br />
PKI383 Classroom 32 1<br />
PKI387 Classroom 25 25<br />
Faculty/Staff Office Computers/Laptops 90 120<br />
Laptops Group Decision Support/Systems Checkout 0 24<br />
Totals 1086 607<br />
-539-
College <strong>of</strong> IS&T Printing<br />
Faculty and Staff Printing<br />
There are two Konica Minolta 750 printers available for Faculty and Staff use. They are located in rooms<br />
170 and 270, and have scanning, copying, and stapling functionality built in. These printers are<br />
automatically installed when you login to your <strong>of</strong>fice computer using the IS&T domain. To locate them<br />
on your Windows computer open your control panel and click printers.<br />
Student Printing<br />
All students with a valid UNO Net ID and MavCard may use the printer in lab 158a. For more<br />
information, see instructions here. Graduate and PhD students may print in your respective labs and<br />
<strong>of</strong>fices. If you are experiencing trouble printing, please call us at 554-4932.<br />
Wireless Printing<br />
Faculty and Staff members may print from the wireless network; however you must be connected to our<br />
VPN. After connecting to the VPN, click the install printers link. The 1st and 2nd floor faculty printers will<br />
install automatically.<br />
(Type PKI-IST\your-username and your domain password when prompted)<br />
Step 1) Install IS&T VPN (Windows XP and Vista)<br />
1. Download the IS&T VPN Installer. ** If you have a modem in your computer you will need to<br />
disable this. This can be done by opening up the Control Panel and going to Device Manager -><br />
Network Adapters, then locate your modem and Right-click -> Disable.<br />
2. Navigate to the directory where you saved the file. Double click it to install the application.<br />
3. Click 'Yes' to install the VPN client.<br />
4. Check the box to save a shortcut on your desktop.<br />
5. Double click the 'IS&TVPN - Shortcut' on your desktop to connect to the VPN.<br />
6. You will see a box popup with the UNO logo. Type in your IS&T username and password,<br />
followed by PKI-IST in the 'logon domain' box. (To connect faster in the future, you may check the<br />
'Save Password' or 'Connect Automatically' boxes.)<br />
7. Click connect.<br />
8. You may see your connection status at anytime or disconnect by double clicking the 'IS&TVPN -<br />
Shortcut' on your desktop.<br />
Step 2) Install IS&T Printers (Windows XP and Vista)<br />
1. Download the IS&T Printer Installer.<br />
2. Navigate to the directory where you saved the file. Double click it to install the application.<br />
3. Setup should take anywhere from 10 - 60 seconds. You can watch the status <strong>of</strong> the installation by<br />
going to your Control Panel and opening up the printers folder.<br />
-540-
4. You will receive a success message if the printers install properly, and error message if the install<br />
fails. If you do receive an error message, please contact the systems <strong>of</strong>fice at 554-4932.<br />
Below is a list <strong>of</strong> all printers managed by IS&T Systems. Printers with an * indicate a shared device.<br />
Location<br />
Model<br />
PKI 158A* HP LaserJet 4200n (2)<br />
PKI 170*<br />
Konica Minolta Magicolor<br />
PKI 170B HP Photosmart 1215<br />
PKI 172 HP Laserjet 2200<br />
PKI 172B HP Laserjet 4050<br />
PKI 172C<br />
HP Deskjet 970cxi<br />
PKI 172C HP LaserJet 2200<br />
PKI 172E HP DeskJet 5600<br />
PKI 173A HP Laserjet 4050<br />
PKI 173C Dell 1720<br />
PKI 173D HP LaserJet 2200<br />
PKI 173E HP Officejet 6300<br />
PKI 174C<br />
HP Laserjet 2200DN<br />
PKI 174E HP LaserJet 1018<br />
PKI 174F HP Photosmart 1215<br />
PKI 174G HP PSC 2400<br />
PKI 174H HP LaserJet 4050<br />
PKI 174I HP LaserJet 2200<br />
PKI 175A HP Color Laserjet 4500<br />
PKI 175A<br />
HP Officejet G55<br />
PKI 175c<br />
HP DeskJet 970 CXi<br />
PKI 175D HP LaserJet 3330<br />
PKI 175E HP Laserjet 2100<br />
PKI 176B HP LaserJet 1022<br />
PKI 176C HP DeskJet 5100<br />
PKI 176D*<br />
Magicolor 2300DL<br />
PKI 176D<br />
Konica Minolta 2300DL<br />
PKI 176E HP LaserJet 1022<br />
PKI 177A HP Photosmart 1215<br />
PKI 177A<br />
HP LaserJet4050 Series PS<br />
PKI 177B HP OfficeJet 7400<br />
PKI 177C<br />
HP PhotoSmart C5180<br />
PKI 177D HP Laserjet 2200<br />
PKI 259* HP Laserjet 4050<br />
-541-
PKI 260* HP Laserjet 4050<br />
PKI 269*<br />
HP LaserJet 4350tn Printer<br />
PKI 274*<br />
HP Laserjet 2015DN<br />
PKI 275B<br />
HP LaserJet 1100 Series<br />
PKI 276*<br />
HP LaserJet 4350tn Printer<br />
PKI 279* HP Laserjet 4050<br />
PKI 280A*<br />
HP 4050N<br />
PKI 280B HP Laserjet 4050<br />
PKI 280C HP Color Laserjet 5500<br />
PKI 281A<br />
HP Color Laserjet 2600N<br />
PKI 281C NEC SuperScript 870<br />
PKI 281D HP Color LaserJet 1000<br />
PKI 281E<br />
Hp LaserJet 1320 Series<br />
PKI 282B HP PhotoSmart 1215<br />
PKI 282C HP LaserJet 2200<br />
PKI 282D<br />
HP Pr<strong>of</strong>essional 2000C<br />
PKI 282E HP LaserJet 2420<br />
PKI 282F HP LaserJet 2200<br />
PKI 282G<br />
HP LaserJet 2100TN<br />
PKI 282H HP LaserJet 3030<br />
PKI 282I HP LaserJet 3030<br />
PKI 283B HP PhotoSmart 1215<br />
PKI 283E<br />
HP DeskJet 895C Series<br />
PKI 284A HP PhotoSmart 1215<br />
PKI 284B HP LaserJet 1022<br />
PKI 284C HP LaserJet 1022<br />
PKI 284D hp LaserJet 1320<br />
PKI 284E HP LaserJet 2200<br />
PKI 285A HP PhotoSmart 1215<br />
PKI 286*<br />
HP Laserjet 5550 Color Printer<br />
PKI 355*<br />
HP 2100TN<br />
PKI 356B*<br />
HP LaserJet 4050 Series PS<br />
PKI 360* HP Laserjet 2420<br />
PKI 362*<br />
HP LaserJet 2420 PS<br />
PKI 375 *<br />
Sharp Color Printer<br />
PKI 378* HP LaserJet 2200<br />
PKI 391* HP Laserjet 8100<br />
-542-
College <strong>of</strong> IS&T Virtualization Report – January 2009<br />
During the summer <strong>of</strong> 2008, the PKI Foundation did a round <strong>of</strong> server upgrades for the College <strong>of</strong> IS&T, the<br />
College <strong>of</strong> Engineering, and the PKI Infrastructure group. Virtualization had started to take a foothold in the IT<br />
industry as a cost effective IT tool, so it was debated as to whether to continue using our physical server layout<br />
that we had in the past, or forge ahead with this new technology. After several in depth discussions, it was<br />
decided that all 3 entities would push forward with virtualization. This document gives a broad technical overview<br />
<strong>of</strong> the college <strong>of</strong> IS&T’s virtualization infrastructure.<br />
Virtualization S<strong>of</strong>tware<br />
VMware Infrastructure Enterprise was chosen after a product demo. It proved to be stable, flexible, and was the<br />
industry standard for x86 virtualization at the time (and still is as <strong>of</strong> this document’s publish date). VMware<br />
supports a wide variety <strong>of</strong> features that increase the performance <strong>of</strong> the virtualization farm. A brief summary <strong>of</strong><br />
these features follows:<br />
VMware Virtual Center – A centralized console for managing all aspects <strong>of</strong> the virtualization<br />
cluster.<br />
VMFS – Shared storage file system that runs over Fiber Channel or iSCSI SAN Fabrics.<br />
VMotion/SVMotion – Ability to move a live virtual machine from one ESX host to another<br />
without rebooting, downtime, or loss <strong>of</strong> data.<br />
DRS – Distributed Resource Scheduling. A service that uses VMotion to balance physical server<br />
load to provide optimum VM performance.<br />
VMware HA – A service that monitors hardware health metrics and will evacuate VMs from a<br />
host if hardware failure is eminent.<br />
VMware Consolidated Backup – An API for backup s<strong>of</strong>tware to efficiently back up virtual<br />
machines over the SAN without impacting the performance <strong>of</strong> the cluster.<br />
Performance metrics to measure bottlenecks for cluster performance to help ensure peak<br />
performance.<br />
VMware Converter Enterprise – S<strong>of</strong>tware to convert existing physical servers into virtual servers.<br />
Virtualization Hardware<br />
After reviewing configuration options, 4 Dell 2950 servers were chosen with 8 processor cores, 32GB <strong>of</strong> ram, and<br />
6x1 gigabit network connections. The servers were built with reliability and performance in mind. iSCSI was<br />
chosen as a SAN protocol as it fit into our existing network infrastructure, proved to be more cost-effective than<br />
Fiber-Channel, and is displacing Fiber-Channel as the industry standard storage protocol.<br />
PKI donated space on the EMC CLARiiON to the virtualization farm. The CLARiiON has redundant power, network,<br />
data paths, and data movers. In short, any component can fail without a SAN outage. An EMC AX4-5i was<br />
purchased as a secondary storage medium for backup.<br />
Current State<br />
At the end <strong>of</strong> the summer 2008 semester, the VMware cluster was set up and testing began. The cluster endured<br />
several tests <strong>of</strong> SAN component failure, network failure, hardware failure (memory errors, etc) and still remained<br />
-543-
stable. During the fall semester <strong>of</strong> 2008, virtualization was implemented and IS&T’s existing server infrastructure<br />
was converted over to virtual machines. IS&T maintains a few core servers outside the VMware cluster to keep<br />
vital services operating if the cluster were to suffer a complete failure.<br />
Traditionally, new server hardware requires a fresh Operating System install which lengthens the time required to<br />
implement hardware upgrades. This is no longer true and is a great benefit <strong>of</strong> Virtualization. The decoupling <strong>of</strong><br />
hardware upgrades and s<strong>of</strong>tware upgrades has greatly increased the flexibility and productivity <strong>of</strong> IS&T Systems.<br />
When the next round <strong>of</strong> hardware upgrades come through, a rolling upgrade can and will be performed. That is<br />
upgrade hardware piece by piece while keeping all the VMs operational. This significantly reduces the amount <strong>of</strong><br />
time spent on hardware upgrades and allows s<strong>of</strong>tware upgrades to be performed at a more appropriate time.<br />
Performance<br />
The virtualization cluster has performed beyond expectations. For the month <strong>of</strong> December 2008, CPU load<br />
averaged 11.3% and peaked at 30%; Memory utilization averaged 66%. The cluster currently runs 48 virtual<br />
machines (production, research, and internal R&D VMs). It is important to emphasize that for virtualization<br />
clusters to maintain optimal performance, resource utilization should peak at 80% or below.<br />
Power consumption has been drastically decreased and while metrics for SAN and network are not available, but<br />
the cluster nodes utilize only 800 watts <strong>of</strong> power total, over a 3 fold reduction in power utilization. This has also<br />
reduced the cooling requirements for the production server room. While IS&T does not directly pay for power, it<br />
is an important contribution to keeping the university utility costs down.<br />
The next section <strong>of</strong> the document will list all IS&T servers, both virtual and physical.<br />
-544-
College <strong>of</strong> IS&T Servers<br />
The Systems Staff maintains numerous servers that directly support academic and research endeavors <strong>of</strong> the<br />
College. Each server is unique in function, and customized to suit student, faculty, staff, or project needs.<br />
Production Virtual Machines (16)<br />
VM Hostname Description Contacts<br />
altiris<br />
Deployment Server: Altiris Deployment Server,<br />
Deepfreeze Enterprise Server, DHCP Services for the<br />
Network<br />
-545-<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
bfdc1 Domain Controller for the Blackforest site James Harr<br />
jharr@ist.unomaha.edu<br />
Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
bfdc2 Domain Controller for the Blackforest site James Harr<br />
jharr@ist.unomaha.edu<br />
Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
cistvss IST Systems internal SharePoint server Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
exchange Mail server Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
license1<br />
license2<br />
Licensing server for OPNet, MATLAB, any pooled license<br />
s<strong>of</strong>tware we have.<br />
Redundant license server for MATLAB, any pooled license<br />
s<strong>of</strong>tware we have.<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
manage Production Domain Controller, Production print server Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
metis<br />
Production Domain Controller; McAfee E-Policy<br />
Orchestrator Server; Temporary license server for OPNet<br />
Joe Hrabak<br />
chrabak@mail.unomaha.edu
James Harr<br />
jharr@ist.unomaha.edu<br />
pf1 NAT Router for private network addresses James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
pf2 Redundant NAT router James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
six 2008 test domain controller Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
sus<br />
Windows Server Update Services (Manages s<strong>of</strong>tware<br />
updates for Micros<strong>of</strong>t products)<br />
Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
svn Subversion (revision control) server James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
vpn VPN Server Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
windows-web Primary Production Web Server Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
-546-
College <strong>of</strong> IS&T Production Non-VM Servers (112 including 56 Blackforest nodes)<br />
VM/Non-VM<br />
Hostname<br />
Short Description<br />
Contacts<br />
acm<br />
Web & Project server for the UNO ACM Association <strong>of</strong><br />
Computing Machinery Chapter<br />
-547-<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
Erin Cox tygrr.v2@gmail.com<br />
apollo Community Outreach Production Zac Fowler<br />
zfowler@unomaha.edu<br />
atticfw Community Outreach Firewall Zac Fowler<br />
zfowler@unomaha.edu<br />
azureus Course development server Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
bfnfs Blackforest Cluster Network File System Server James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
biigserver Bioinformatics Development server (Non-VM) James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
biigserver2 biigserver replacement James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
biobase Bioinformatics Course and Development server (Non-VM) James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
bioshare Bioinformatics Sun Storage (Non-VM) Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
Josh Johnston<br />
mociyl@gmail.com<br />
blackforest Blackforest Cluster Web interface (Non-VM) James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
blizzard<br />
Student development server for Programming on the<br />
Internet<br />
Robert Fulkerson<br />
robert.fulkerson@gmail.com<br />
chronoscope Text Mining Lab server (Non-VM) Mohammad Shafiullah<br />
clabsvn<br />
CLAB (Collaborative Laboratory for Applied Bioinformatics)<br />
SVN server (Non-V M)<br />
mshafiullah.ne@gmail.com<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
cmjsp Chad Meyer’s Japanese study web application Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com
Chad Meyer<br />
chadmeyer001@gmail.com<br />
csalpha Computer Science server (Non-VM) Stan Wileman<br />
stanw@unomaha.edu<br />
Csalpha2 Computer Science server (Non-VM) Stan Wileman<br />
stanw@unomaha.edu<br />
Csalpha3 Computer Science server (Non-VM) Stan Wileman<br />
stanw@unomaha.edu<br />
db Community Outreach Database Server Zac Fowler<br />
zfowler@unomaha.edu<br />
callisto Community Outreach Development Server Zac Fowler<br />
zfowler@unomaha.edu<br />
df<br />
Web server for the KEWI (Knowledge Engineering and Web<br />
Intelligence) Group<br />
-548-<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
Josh Johnston<br />
mociyl@gmail.com<br />
elearning Production Faculty/Staff Streaming Media Server Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
esx1 Clustered Virtual Server Farm Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
esx2 Clustered Virtual Server Farm Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
esx3 Clustered Virtual Server Farm Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
esx4 Clustered Virtual Server Farm Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
flashcom Community Outreach Streaming Media Server Zac Fowler<br />
zfowler@unomaha.edu<br />
gsaf Gene Sequence Analysis Facility legacy server at UNMC Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
hive<br />
College <strong>of</strong> IST Ubuntu, CentOS, and OpenBSD mirror (Non-<br />
VM)<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
istaudit Nessus Scanner Server Josh Johnston<br />
mociyl@gmail.com<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
James Harr<br />
jharr@ist.unomaha.edu
ist-file College <strong>of</strong> IST user network shares server (Non-VM) Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
irc Systems Administrators’ communication server James Harr<br />
jharr@ist.unomaha.edu<br />
jrt S<strong>of</strong>tware Engineering course server James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
Josh Johnston<br />
mociyl@gmail.com<br />
karp2 Dr. Chundi’s text mining research server James Harr<br />
james.harr@gmail.com<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
kitty Clone <strong>of</strong> blizzard for testing purposes Bob Fulkerson<br />
rfulk@unomaha.edu<br />
klab<br />
private Wiki for CLAB (Collaborative Laboratory for Applied<br />
Bioinformatics) (Non-VM)<br />
-549-<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
lb1 NAT Router for the Blackforest Cluster (Non-VM) James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
lb2<br />
Redundant NAT Router for the Blackforest Cluster (Non-<br />
VM)<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
mascot Web server for the Bioinformatics tool Mascot Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
missouri Community Outreach Webserver Zac Fowler<br />
zfowler@unomaha.edu<br />
mp1 Bioinformatics course server (for Mark Pauley) (Non-VM) Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
mp2 Bioinformatics course server (for Mark Pauley) (Non-VM) Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
necro Linux Server BackupPC solution James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
oracle Database course server Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
padev Web server for the tool for the pattern discovery and Joe Hrabak
usage in virtual project management<br />
chrabak@mail.unomaha.edu<br />
pegasus Community Outreach Development Server Zac Fowler<br />
zfowler@unomaha.edu<br />
phpmysql<br />
Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
phylogeny<br />
Bioinformatics course<br />
server (for Dhundy Bastola)<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
rain<br />
Rheumatoid Arthritis Investigational Network web server Mohammad Shafiullah<br />
research<br />
(Non-VM)<br />
College <strong>of</strong> IST research Windows Terminal Server (Non-<br />
VM)<br />
mshafiullah.ne@gmail.com<br />
James Harr<br />
jharr@ist.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
sp1<br />
Motif Tools Assessment Project Development server (for<br />
Dan Quest) (Non-VM)<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
sp2<br />
Redundant Motif Tools Assessment Project Development<br />
server (for Dan Quest) (Non-VM)<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
ssp Sharepoint server Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
vulcan Student Programming/Web development James Harr<br />
jharr@ist.unomaha.edu<br />
Joe Hrabak<br />
chrabak@mail.unomaha.edu<br />
Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
zenoss Monitoring server Mohammad Shafiullah<br />
mshafiullah.ne@gmail.com<br />
-550-
College <strong>of</strong> IS&T Classroom and Lab S<strong>of</strong>tware List – Spring 2009<br />
The College <strong>of</strong> IS&T has various s<strong>of</strong>tware available for faculty, staff, and student use in our classroom and labs. Applications with an * indicates site license or open source.<br />
S<strong>of</strong>tware Package 155 157 158a 158c 158k 160 161 164 260 261 269 270 276 278 279 357 359 375 383 387 391<br />
Adobe Reader* x x x x x x x x x x x x x x x x x x x x<br />
Adobe Acrobat Pr<strong>of</strong>essional 8<br />
x<br />
Adobe Creative Suite<br />
x<br />
Adobe Photoshop CS3<br />
x<br />
Adobe Creative Suite 4 Web Prem<br />
AllFusion Suite 7* x x x x x x x x x x x x x x x<br />
ArcView GIS 3.3<br />
x<br />
Camtasia Studio 5<br />
x<br />
CN 3D 4.1 x x x<br />
Clickers* x x x x x x x x x x x x x x x x x x x x<br />
Clickers PowerPoint* x x x x x x x x x x x x x x x x x x x x<br />
ColdFusion Studio<br />
x<br />
Eclipse* x x x x x x x<br />
Firefox* x x x x x x x x x x x x x x x x x x x x<br />
Flash Player* x x x x x x x x x x x x x x x x x x x x<br />
Gimp 2.0* x x x<br />
Gnu Prolog* x x x<br />
Google Earth* x x x<br />
Homesite 4.5* x x x<br />
IBM Rational Requisite Pro x x<br />
Java* x x x x x x x x x x x x x x x x x x x x<br />
Jcreator x x x<br />
Maple x x<br />
MapWin x x<br />
Matlab<br />
x<br />
Maya 7.0<br />
x<br />
McAfee Anti-Virus* x x x x x x x x x x x x x x x x x x x x<br />
Micros<strong>of</strong>t Internet Explorer* x x x x x x x x x x x x x x x x x x x x<br />
Micros<strong>of</strong>t Office 2007* x x x x x x x x x x x x x x x x x x x x<br />
Micros<strong>of</strong>t Project 2007 x x x x x x x x x x x x x x x x x x x x<br />
Micros<strong>of</strong>t Visio 2007 x x x x x x x x x x x x x x x x x x x x<br />
-551-
Micros<strong>of</strong>t Visual Studio 2005* x x x x x x x x<br />
Micros<strong>of</strong>t Visual Studio 2008* x x x x x<br />
Micros<strong>of</strong>t Visual Studio 6* x x x<br />
Micros<strong>of</strong>t Silverlight* x x x x x x x x x x x x x x x x x x x x<br />
Micros<strong>of</strong>t SQL Server x x x<br />
Multisim 7 x x x<br />
Multisim 8 x x x<br />
Netbeans IDE 5.5* x x x<br />
OpNet<br />
x<br />
Oracle x x x x x x x x x x x x x x x x x x<br />
PC Alert* x x x x x x x x x x x x x x x x x x x x<br />
Pov-Ray 3.6 x x x<br />
Primo PDF* x x x x x x x x x x x x x x x x x x x x<br />
Putty* x x x x x x x x x x x x x x x x x x x x<br />
Python* x x x x<br />
Quicktime Player* x x x x x x x x x x x x x x x x x x x x<br />
QT by Trolltech 4.1.1 x x x<br />
Real Player* x x x x x x x x x x x x x x x x x x x x<br />
SAP Front End* x x x<br />
SAS* x x x x x x<br />
See5<br />
x<br />
Shockwave Player* x x x x x x x x x x x x x x x x x x x x<br />
SPSS x x<br />
SQL Yog x x x<br />
SWI Prolog x x x x x x x x x x x x x x x<br />
Terragen x x x<br />
Visual Ham<br />
x<br />
Visual Logic x x<br />
Visual Prolog x x x<br />
WinSCP* x x x x x x x x x x x x x x x x x x x x<br />
-552-
Other S<strong>of</strong>tware Available at the College <strong>of</strong> IS&T<br />
MSDNAA<br />
The Micros<strong>of</strong>t Developer Network Academic Alliance is a program that the College <strong>of</strong> IS&T<br />
subscribes to that allows us to <strong>of</strong>fer free Micros<strong>of</strong>t s<strong>of</strong>tware to Faculty, Staff, and students that<br />
have majors or minors declared in Computer Science, MIS, Bioinformatics, and Information<br />
Assurance. Below is a current list <strong>of</strong> available s<strong>of</strong>tware. For more information, go to<br />
http://www.ist.unomaha.edu/msdnaa . If you would like to provide this to your students,<br />
please send us a class list and course number.<br />
Expression Studio<br />
Micros<strong>of</strong>t Groove 2007<br />
Micros<strong>of</strong>t InfoPath 2007<br />
Micros<strong>of</strong>t OneNote 2007<br />
Micros<strong>of</strong>t Project Pr<strong>of</strong>essional 2007<br />
Micros<strong>of</strong>t SharePoint Designer 2007<br />
Micros<strong>of</strong>t SQL Server 2005 Standard Edition - 32-bit - DVD<br />
Micros<strong>of</strong>t Visio Pr<strong>of</strong>essional 2007<br />
Micros<strong>of</strong>t Visual Studio 2008 Pr<strong>of</strong>essional<br />
Windows Server 2003 R2 Enterprise - 2 Discs<br />
Windows Server 2003 Standard Edition<br />
Windows Server 2003 Web Edition<br />
Windows Server 2008<br />
Windows Services for UNIX<br />
Windows Vista Business (32 and 64bit)<br />
Windows XP Pr<strong>of</strong>essional (32 and 64bit)<br />
-553-
College <strong>of</strong> IS&T Research Labs and Projects<br />
BioCMS<br />
Website: https://biodev.ist.unomaha.edu<br />
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />
Overview:<br />
BioCMS is a prototype version <strong>of</strong> a Content Management System developed for enhancing the<br />
bioinformatics researcher experience. This project is being undertaken by the Genetic Sequence<br />
Analysis Facility at the College <strong>of</strong> IS&T at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> using WebGUI.<br />
Bioinformatics Lab<br />
Location: PKI378<br />
Director: Dr. Hesham Ali, Dean<br />
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />
Equipment:<br />
5 Dell Desktops<br />
1 Mac Desktop<br />
1 Printer<br />
Flat Screen LCD TV<br />
Overview:<br />
Bioinformatics merges computer and information science with the study <strong>of</strong> genetic information and<br />
biological structures. Bioinformatics allows researchers to open new windows <strong>of</strong> insight into our genetic<br />
makeup, providing pathways to understanding disease processes and creating novel diagnostic and<br />
treatment strategies. There is an immense and growing need for experts in this field, in order to<br />
capitalize on the growing body o knowledge regarding the genome.<br />
Blackforest Cluster<br />
Location: PKI158B<br />
Director: Mike Grove<br />
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com, James Harr –<br />
jharr@unomaha.edu<br />
Website: http://blackforest.gds.unomaha.edu/<br />
Equipment:<br />
56 IBM Servers<br />
3.2 TB Centralized Storage<br />
-554-
Overview:<br />
The Blackforest Computing Cluster was funded through the National Science Foundation's Biomedical<br />
Research Infrastructure Network, and is located in the College <strong>of</strong> Information Science and Technology at<br />
the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>. The Blackforest is one <strong>of</strong> four clusters in <strong>Nebraska</strong> funded through<br />
BRIN, each capable <strong>of</strong> utilizing the computational power <strong>of</strong> the others in times <strong>of</strong> need.<br />
Currently the Blackforest Cluster at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> consists <strong>of</strong> forty nodes, which<br />
run MPICH. MPICH is a freely available, portable implementation <strong>of</strong> MPI, the Standard for messagepassing<br />
libraries. Message passing is a paradigm used widely on certain classes <strong>of</strong> parallel machines<br />
especially those with distributed memory. There is also a proprietary web interface solution we call<br />
"Nazo". This interface allows chemical and biomedical researchers to manage their interaction with the<br />
cluster in a simple, easy to understand manner. All results are stored locally, so that researchers can<br />
retrieve any query/job run in the past. In addition, researchers can apply to house their own custom<br />
BLAST databases on the cluster, for faster searches with near real-time updatability.<br />
Chronoscope<br />
Location: PKI366<br />
Director: Dr. Parvathi Chundi<br />
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />
Equipment:<br />
3 Dell Desktops<br />
1 IBM Desktop<br />
1 Server(IBM)<br />
Overview:<br />
The objective <strong>of</strong> this project is to extract temporal information by constructing several time<br />
decompositions (time points). Now we are studying the time decomposition problem in the context <strong>of</strong><br />
medical research abstracts. We extract temporal information pertaining to a disease or an organism by<br />
constructing several time decompositions <strong>of</strong> research abstracts and by correlating the meta-information<br />
associated with the abstracts. This experimental study will demonstrate the effectiveness <strong>of</strong> the time<br />
decomposition method on research journal articles in the medical domain.<br />
CMJSP<br />
Website: http://cmjsp.ist.unomaha.edu/<br />
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />
Overview:<br />
This site is designed to help intermediate and advanced students <strong>of</strong> the Japanese language further<br />
develop their language skills. It works by having the user create lists <strong>of</strong> kanji or words they wish to study<br />
-555-
and then using these lists in review applets. Words can be added to lists by either directly finding words<br />
in the Dictionary, to performing queues on the database to find words that match your criteria. Once<br />
you have a list with all the words you want, go to the Review section to review it.<br />
i3Bio<br />
Website: http://i3bio.gds.unomaha.edu/<br />
Technical Contact: James Harr – jharr@unomaha.edu<br />
Overview:<br />
Advances in medicine such as organ and bone marrow transplantation have increased the number <strong>of</strong><br />
people who are immuno-compromised and susceptible to mycobacterial infections. Mycobacteria in<br />
general and Mycobacterium tuberculosis specifically are known as the great imitators in clinical<br />
medicine because the symptoms that they cause resemble numerous other diseases. The ability to<br />
detect and identify microbial pathogens rapidly for optimal patient management is limited by growthbased<br />
phenotypic testing methods now used in the microbiology laboratory. This limitation is <strong>of</strong> greatest<br />
challenge for the evaluation <strong>of</strong> those pathogens that grow slow, those that require specialized methods<br />
for detection and identification, and for those emerging pathogens that have become more common in<br />
current clinical practice. Organisms commonly associated within this group include, but are not limited<br />
to the Mycobacterium species and fungi.<br />
Cmantic Lab – Collaborative Multi-Agent Networking Technologies and<br />
Intelligent<br />
Location: PKI362<br />
Director: Dr. Raj Dasqupta<br />
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />
Website: http://prithviraj.dasgupta.googlepages.com/cmanticlabpage<br />
Equipment:<br />
4 Dell Desktops<br />
1 Printer<br />
Overview:<br />
This research lab focuses on the following major topics: multi-agent systems, swarmed robotics and<br />
game theory and computational economics.<br />
Led by Dr. Raj Dasgupta, the research focus for the group is in developing technologies for coordinating<br />
individual resource-constrained components to behave collectively and collaboratively as a single, largescale<br />
distributed system. A major application is controlling a team <strong>of</strong> mobile mini-robots using multiagent<br />
algorithms. The unique contribution <strong>of</strong> this research has been to integrate market-based<br />
techniques for multi-robot coordination with swarm-based techniques for robot control.<br />
We are currently developing technologies for coordinating individual resource-constrained components<br />
-556-
to behave collectively and collaboratively as a single, large-scale distributed system. One <strong>of</strong> our major<br />
applications is controlling a team <strong>of</strong> mobile mini-robots using multi-agent algorithms to collaboratively<br />
perform complex tasks in an unknown environment. The unique contribution <strong>of</strong> our research has been<br />
to integrate market-based techniques for multi-robot coordination with swarm-based techniques for<br />
robot control.<br />
The Collaborative Multi-Agent Networking Technologies and Intelligent Coordination Lab is located at<br />
the Peter Kiewit Institute, Room 362.<br />
Data Mining Lab<br />
Location: PKI158K<br />
Director: Dr. Yong Shi<br />
Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />
Website: http://prithviraj.dasgupta.googlepages.com/cmanticlabpage<br />
Equipment:<br />
9 Dell Desktops<br />
Overview:<br />
The data mining research laboratory was set up by NU foundation to support research and teaching on<br />
data warehousing and data mining, and to allow students, faculty, and industry fellows to conduct<br />
application-oriented projects for analytic customer relationship management (CRM), bioinformatics and<br />
other real-world applications. The multidisciplinary nature <strong>of</strong> these projects means that the laboratory<br />
will significantly enhance the collaboration in the departments <strong>of</strong> IS&T: Computer Science and<br />
Information System and Quantitative Analysis, and between IS&T and other university units, such as the<br />
College <strong>of</strong> Engineering and Technology in the PKI building, the College <strong>of</strong> Business Administration at<br />
UNO, UNMC, and numerous business and industry for joint research and teaching activities in data<br />
mining.<br />
E-learning Lab<br />
Location: PKI357<br />
Director: Dr. Leah Pietron<br />
Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />
Website: http://elearning.ist.unomaha.edu<br />
Equipment:<br />
1 Dell Desktop<br />
1 Mac Desktop<br />
Web cameras<br />
Headsets with voice<br />
-557-
Overview:<br />
The E-Learning Lab is designed for faculty and staff to create classroom material (Videos/Lectures) for<br />
online and distance education.<br />
Group Decision Support Lab<br />
Location: PKI279<br />
Director: Dr. GJ deVreede<br />
Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />
Equipment:<br />
22 Dell Laptops<br />
1 Dell Desktop<br />
3 Projectors<br />
Overview:<br />
The Group Decision Support Lab is an active high-tech meeting room with facilities which enhance faceto-face<br />
meetings in the room, as well as computer-mediated collaborations involving participants<br />
worldwide. The lab contains presentation, display, and communication technologies which enhance the<br />
information exchange for all meeting participants. Research efforts in the Group Decision Support Lab<br />
address meeting facilitation, meeting participation, information exchange, and document collaboration.<br />
MTAP<br />
Website: http://biobase.ist.unomaha.edu<br />
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />
Overview:<br />
Automated regulatory motif detection is a fundamental problem in molecular biology. Currently, there<br />
are more than 80 different tools for identification <strong>of</strong> cis-regulatory motifs. Consequently, it is extremely<br />
difficult for the molecular biologist to know which tools are effective even on the most simple <strong>of</strong><br />
genomes. A root cause <strong>of</strong> this is a lack <strong>of</strong> good datasets for benchmarking. Recently, Tompa et al. (2005)<br />
proposed a dataset and complementary benchmark for eukaryotes. In this work, we expand upon this<br />
study by introducing a complementary dataset and benchmark for Escherichia coli and Bacillus subtilis.<br />
Using RegulonDB and DBTBS as our true positives, we evaluated sensitivity, specificity and other<br />
important statistics for prokaryote motif detection programs. Even though this domain is less<br />
challenging than eukaryotes, our preliminary data shows that current motif detection programs still fall<br />
short <strong>of</strong> accurate detection <strong>of</strong> regulatory motifs in prokaryotes. We therefore believe that there is still a<br />
great opportunity for improvement in motif discovery methods.<br />
Metaverse Lab – Second Life<br />
-558-
Location: PKI374<br />
Directors: Dr. Khazanchi, Dr. Ilze Zigurs<br />
Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />
Website: http://slurl.com/secondlife/IS&T%20<strong>Nebraska</strong>%20<strong>Omaha</strong>/131/26/37<br />
Equipment:<br />
4 IBM Desktops<br />
1 Dell Desktop<br />
Flat Screen LCD TV<br />
Headsets<br />
Overview:<br />
Metaverses are fully immersive 3-dimensional virtual worlds in which people interact as avatars with<br />
each other and with s<strong>of</strong>tware agents, using the metaphor <strong>of</strong> the real world but without its physical<br />
limitations. The ubiquitous availability <strong>of</strong> high speed Internet access has spurred enormous interest in<br />
virtual worlds like SecondLife and World <strong>of</strong> Warcraft, both in terms <strong>of</strong> user gaming and potential as a<br />
new technological platform for global virtual collaboration. These environments allow for richer, more<br />
engaging collaboration but their capabilities have yet to be studied and explored in depth. The lab was<br />
setup with seed funding from the NU Foundation Tech Fee grant <strong>of</strong> $200,000 with the primary goal to<br />
sustain a cross-disciplinary and collaborative effort that focuses on leveraging virtual world technology<br />
capabilities for facilitating e-learning and conducting research and development in such immersive,<br />
multi-participant 3D environments. Students and faculty in the lab work on creative projects in<br />
collaboration with other UNO colleges while building on research already conducted under the<br />
supervision <strong>of</strong> Drs. Khazanchi and Zigurs over the past year. The overall research goal <strong>of</strong> the lab is to<br />
enhance virtual team and virtual project management practice in the context <strong>of</strong> these new technology<br />
environments.<br />
Multi-Media Lab<br />
Location: PKI375<br />
Technical Contact: Zac Fowler – zfowler@unomaha.edu<br />
Equipment:<br />
10 Dell Desktops<br />
5 Macintosh<br />
Keyboards<br />
Tape Decks<br />
Recording devices<br />
Modeling and Simulation Lab<br />
Location: PKI370<br />
Director: Dr. Mahadevan Subramaniam<br />
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />
-559-
Equipment:<br />
4 Dell Desktops<br />
1 Printer<br />
Overview:<br />
The Modeling, Simulation and Automated Inference Center (MOSAIC) conducts collaborative<br />
instruction, research, and development in the areas <strong>of</strong> modeling, simulation, visualization, and<br />
verification <strong>of</strong> complex interdisciplinary applications domains including transportation, public health,<br />
intelligent buildings, web, and financial data studies. The laboratory will address the following research<br />
problems that are cross-cutting across several simulation applications.<br />
<strong>Omaha</strong> Wireless<br />
Website: http://omahawireless.unomaha.edu<br />
Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />
Overview:<br />
<strong>Omaha</strong> Wireless Network is a grassroots effort proposed by a group <strong>of</strong> students at the <strong>University</strong> <strong>of</strong><br />
<strong>Nebraska</strong> at <strong>Omaha</strong> to build a wireless Metropolitan Area Network (MAN) in <strong>Omaha</strong>, <strong>Nebraska</strong>, extend<br />
it to the rural areas <strong>of</strong> <strong>Nebraska</strong> and beyond. This is an attempt to provide free, ubiquitous wireless<br />
connectivity to the community. The goal is to build a self-sufficient wireless network that can be used for<br />
various services that may be found on the Internet: web, mail, chat, gaming and resource sharing. Such a<br />
network will not depend on the Internet for content or connectivity. Instead, it can work in conjunction<br />
with the Internet to supplement ways for one to better use connectivity. Users on this wireless network<br />
who wish to share their bandwidth may function as Internet Service Providers (ISPs) and provide access<br />
to the Internet.<br />
Security Technology Evaluation and Analysis Laboratories (STEAL)<br />
Location: PKI350<br />
Director: Dr. Bill Mahoney<br />
Technical Contact: Lucas Wentz – lwentz@unomaha.edu<br />
Equipment:<br />
25 Dell Desktops<br />
Internal, air gapped network<br />
Overview:<br />
The <strong>Nebraska</strong> <strong>University</strong> Consortium on Information Assurance (NUCIA) supports three labs.STEAL One is<br />
designed to be an open laboratory for students to use both for coursework and individual exploration.<br />
The lab is fully configurable, with many different operating systems and application sets to choose from.<br />
-560-
Our goal is to create a flexible environment that can be used to create or simulate any desired computing<br />
capability or environment.<br />
STEAL Two has been designed to be a hands-on instructional laboratory. It has been sized to allow entire<br />
classes (max 28 participants) to collectively engage in academic Information Assurance exercises <strong>of</strong> all<br />
kinds. As with STEAL One, the lab has been designed to be completely flexible, to allow users to simulate<br />
most any type <strong>of</strong> environment imaginable. A set <strong>of</strong> dedicated servers provides backbone services, such<br />
as DNS, DHCP, PXE, TFTP, routing, and the like. Each <strong>of</strong> these services is configurable as well, in order to<br />
allow for more accurate simulations.<br />
STEAL three is a place where NUCIA students, scholars, student workers, Etc congregate and work.<br />
Designed as a lounging area, STEAL 3 generally has a "laid-back" atmosphere where people can relax and<br />
discuss IA topics, get answers to questions from faculty and attend meetings and ad-hoc information<br />
assurance events.<br />
Statpack – (Secure telecommunications application terminal)<br />
Location: PKI364<br />
Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />
Director: Dr. Ann Fruhling<br />
Website: http://statpack.org/<br />
Overview:<br />
The STATPack (Secure Telecommunications Application Terminal) system is an Emergency Response<br />
system for the Public Health Microbiology Laboratories. The STATPack Laboratory is fully equipped to<br />
support this project. The laboratory has 3 client/production computer systems configured for<br />
production support and training, 4 developer work stations for programming and testing, and 3<br />
development servers with version control s<strong>of</strong>tware and server development tools for unit testing,<br />
integration testing and system testing.<br />
Winds Lab – Wireless infrastructure for networks <strong>of</strong> distributed systems<br />
Location: PKI360<br />
Director: Dr. Jong – Hoon Youn<br />
Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />
Website: http://motes.ist.unomaha.edu<br />
Equipment:<br />
Flat screen LCD TV<br />
5 IBM Desktops<br />
1 Mac Desktop<br />
1 Printer<br />
-561-
Overview:<br />
The Wireless Infrastructure for Networks <strong>of</strong> Distributed Sensors (WINDS) laboratory is specifically<br />
designed to include sensor network testbeds for supporting research activities for the college and other<br />
research groups in <strong>Nebraska</strong>. The main goal <strong>of</strong> the research in this lab is to provide an innovative and<br />
comprehensive research and development program that result in solutions for high-speed wireless data<br />
network connectivity problems in rural as well as urban <strong>Nebraska</strong>. In particular, the following four<br />
objectives have been identified for the lab's research efforts.<br />
Develop a wireless network laboratory with testbeds and a working prototype <strong>of</strong> a highperformance<br />
wireless data network infrastructure for supporting research, education, and<br />
services in wireless sensor networks.<br />
Investigate solutions for a number <strong>of</strong> research problems in wireless sensor networks, which have<br />
inhibited complete utilization <strong>of</strong> high-speed wireless data network technology in critical<br />
applications in agriculture, transportation and bio-security in <strong>Nebraska</strong>.<br />
Employ wireless networks solutions in various real-world applications.<br />
The Wireless Infrastructure for Networks <strong>of</strong> Distributed Sensors (WINDS) Lab is located at the Peter<br />
Kiewit Institute, Room 360.<br />
-562-
College <strong>of</strong> IS&T Websites<br />
The Systems Staff maintains numerous websites that directly support academic and research endeavors<br />
<strong>of</strong> the College. Each website is unique in function, and customized to suit student, faculty, staff, or<br />
project needs.<br />
Community Outreach/Web Development<br />
Website Description Location Contacts<br />
www.ist.unomaha.edu College <strong>of</strong> IS&T Linuxweb Roni Myers<br />
aia.ist.unomaha.edu<br />
Society <strong>of</strong> American Institute <strong>of</strong><br />
Architects - <strong>Omaha</strong> Chapter Job<br />
Shadow<br />
Linuxweb<br />
Roni Myers<br />
Kris Nelson, Leo A<br />
Daly<br />
alumni.ist.unomaha.edu College <strong>of</strong> IS&T Alumni Linuxweb Roni Myers<br />
cmi.unomaha.edu<br />
Juvenile Justice Institute Case<br />
Management Inventory System<br />
Linuxweb Roni Myers<br />
Tomas Helikar<br />
insider.ist.unomaha.edu College <strong>of</strong> IS&T Newsletter Linuxweb Roni Myers<br />
istlive.unomaha.edu IS&T Live Linuxweb Roni Myers<br />
www.lewisandclarkne.org <strong>Nebraska</strong> Lewis and Clark Linuxweb Zac Fowler<br />
Bicentennial Commission<br />
americanhistory.unomaha.edu Teaching American History for<br />
Students<br />
Linuxweb Zac Fowler, Steve<br />
Bullock<br />
tahg.org<br />
Teaching American History<br />
(MOCC)<br />
Linuxweb Zac Fowler, Steve<br />
Bullock<br />
theomahaproject.org Teaching American History (OPS) Linuxweb Zac Fowler, Steve<br />
Bullock<br />
world.unomaha.edu International Studies Website Linuxweb Zac Fowler, Deepak<br />
Khazanchi, Mary<br />
Ellen Turner<br />
lewisclarkandbeyond.com/org/net Lewis, Clark and Beyond Linuxweb Zac Fowler<br />
attic.ist.unomaha.edu IS&T Attic website Linuxweb Zac Fowler<br />
skype.ist.unomaha.edu Skype Trial Blog for IS&T College Linuxweb Zac Fowler<br />
mena.unomaha.edu IS&P MENA Exchange blog Linuxweb Zac Fowler<br />
unmcpda.ist.unomaha.edu<br />
Terrecom.ist.unomaha.edu<br />
UNMC PDA project: mobile SQL<br />
replication service and portal<br />
website<br />
Local company development<br />
website<br />
UNMCPDA<br />
Windows-web<br />
Zac Fowler, Deepak<br />
Khazanchi, Lynne<br />
Buchanan (UNMC)<br />
Roni Myers, Zac<br />
Fowler<br />
-563-
Research/Course Websites<br />
Website Description Location Contacts<br />
http://acm.ist.unomaha.edu<br />
Web server for the UNO ACM<br />
Association <strong>of</strong> Computing<br />
Machinery Chapter<br />
acm<br />
James Harr<br />
Mohammad<br />
Erin Cox<br />
http://biobase.ist.unomaha.edu<br />
https://blackforest.gds.unomaha.edu<br />
http://cmjsp.net<br />
http://gsaf.unmc.edu<br />
http://hive.ist.unomaha.edu<br />
https://jrt.ist.unomaha.edu:9443<br />
http://clab.ist.unomaha.edu<br />
http://gsaf.ist.unomaha.edu<br />
https://klab.ist.unomaha.edu<br />
http://mascot.ist.unomaha.edu/mascot<br />
http://biigserver.ist.unomaha.edu/<br />
http://ccliwiki.ist.unomaha.edu<br />
http://ccli.ist.unomaha.edu<br />
Web server hosting wiki pages<br />
for the Motif Tools<br />
Assessment Project<br />
Blackforest Cluster Web<br />
Interface<br />
Website hosting Chad<br />
Meyer’s Japanese <strong>Study</strong><br />
Program<br />
Gene Sequence Analysis<br />
Facility legacy server at UNMC<br />
hosting the GCG Seqweb<br />
website<br />
Website hosting College <strong>of</strong> IST<br />
Ubuntu, CentOS, and<br />
OpenBSD mirror<br />
IBM Rational Jazz Team<br />
Concert website for Harvey<br />
Siy’s S<strong>of</strong>tware Engineering<br />
course<br />
Public wiki website for CIST<br />
Collaborative Laboratory for<br />
Applied Bioinformatics<br />
Wiki website for the Gene<br />
Sequence Analysis Facility<br />
Internal wiki website for CIST<br />
Collaborative Laboratory for<br />
Applied Bioinformatics<br />
Website hosting the<br />
Bioinformatics tool Mascot<br />
Website hosting home pages<br />
for different Bioinformatics<br />
undergraduate, graduate and<br />
Ph.D. students.<br />
Wiki website for the<br />
Integrated Curriculum for<br />
Bioinformatics project<br />
Website for Integrated<br />
Curriculum for Bioinformatics<br />
project<br />
-564-<br />
biobase<br />
blackforest<br />
reslin<br />
gsaf<br />
hive<br />
jrt<br />
klab<br />
klab<br />
klab<br />
mascot<br />
biigserver<br />
mp1<br />
mp1<br />
Mohammad<br />
Daniel Quest<br />
James Harr<br />
Mohammad<br />
James Harr<br />
Mohammad<br />
Mohammad<br />
James Harr<br />
Mohammad<br />
Dhundy Bastola<br />
Jay Hannah<br />
Mohammad<br />
Dhundy Bastola<br />
Jay Hannah<br />
Mohammad<br />
Dhundy Bastola<br />
Jay Hannah<br />
Mohammad<br />
Mohammad<br />
James<br />
Mohammad<br />
Mark Pauley<br />
Mohammad<br />
Mark Pauley<br />
Mohammad<br />
http://ccli_test.ist.unomaha.edu Development wiki for mp1 Mark Pauley
http://mp1.ist.unomaha.edu/blast<br />
Integrated Curriculum for<br />
Bioinformatics project<br />
Website hosting the<br />
wwwblast bioinformatics tool<br />
mp1<br />
Mohammad<br />
Mark Pauley<br />
Mohammad<br />
http://mp2.ist.unomaha.edu/blast<br />
http://phylogeny.ist.unomaha.edu<br />
https:// rain.ist.unomaha.edu<br />
http://df.ist.unomaha.edu/main/<br />
Another website hosting the<br />
wwwblast bioinformatics tool<br />
Wiki website for<br />
Bioinformatics course by<br />
Dhundy Bastola<br />
Rheumatoid Arthritis<br />
Investigational Network web<br />
server<br />
Website for Knowledge<br />
Engineering and Web<br />
Intelligence project<br />
mp2<br />
phylogeny<br />
rain<br />
df<br />
Mark Pauley<br />
Mohammad<br />
Dhundy Bastola<br />
Mohammad<br />
Abhijeet Maskey<br />
Dhundy Bastola<br />
Mohammad<br />
Bill Mahoney<br />
Haifeng Guo<br />
Qiuming Zhu<br />
Ryan Nickell<br />
Matt Payne<br />
Peter Hospodka<br />
William Sousan<br />
James Harr<br />
Mohammad<br />
-565-
Production/Course Websites<br />
Website Description Location Contacts<br />
itd.ist.unomaha.edu<br />
The Journal <strong>of</strong> Information<br />
Technology for Development<br />
windows-web<br />
criwg.ist.unomaha.edu<br />
accreditation.ist.unomaha.edu<br />
Collaboration Researchers’<br />
International Workshop<br />
windows-web<br />
windows-web<br />
Joseph Hrabak, GJ<br />
deVreede<br />
Joseph Hrabak, GJ<br />
deVreede<br />
Joseph Hrabak, Peter<br />
Wolcott<br />
IS&T ABET Page<br />
windows-web Joseph Hrabak, Jerry<br />
viadesign.ist.unomaha.edu Design & Development<br />
Wagner<br />
faculty.ist.unomaha.edu Faculty pages windows-web Joseph Hrabak<br />
archive.ist.unomaha.edu ISQA Archives windows-web Joseph Hrabak<br />
Joseph Hrabak,<br />
Modeling, Simulation and<br />
Mahadevan<br />
mosaic.ist.unomaha.edu Automated Inference Center windows-web Subramaniam<br />
support.ist.unomaha.edu IS&T Systems and IT Support windows-web Joseph Hrabak<br />
Khazanchi.ist.unomaha.edu Deepak Khazanchi's homepage windows-web Joseph Hrabak<br />
cphi.ist.unomaha.edu<br />
Consortium for Publich Health<br />
Informatics<br />
windows-web<br />
Joseph Hrabak, Ann<br />
Fruhling<br />
cist.ist.unomaha.edu CIST Advisory Committee cistvss<br />
Joseph Hrabak, George<br />
Royce<br />
NWINDS.ist.unomaha.edu<br />
<strong>Nebraska</strong> Wireless Infrastructure<br />
for Networks <strong>of</strong> Distributed<br />
Sensors<br />
windows-web<br />
Mohammad Shafiullah,<br />
Jon Youn<br />
amcis2005.isqa.unomaha.edu AMCIS Conference windows-web<br />
Joseph Hrabak, Peter<br />
Wolcott<br />
gstech.ist.unomaha.edu Student workshop windows-web Joseph Hrabak<br />
sponsorsim.ist.unomaha.edu PM Simulation for Sponsors windows-web<br />
The Institute for Collaboration<br />
ics.ist.unomaha.edu<br />
Science<br />
windows-web<br />
cmit.unomaha.edu<br />
iaads.unomaha.edu<br />
Center for Management <strong>of</strong><br />
Information Technology<br />
International Academy for<br />
Advanced Decision Support<br />
windows-web<br />
windows-web<br />
Joseph Hrabak, Deepak<br />
Khazanchi<br />
Joseph Hrabak, GJ<br />
deVreede<br />
Joseph Hrabak, Deepak<br />
Khazanchi<br />
Joseph Hrabak, Jerry<br />
Wagner<br />
omahawireless.unomaha.edu <strong>Omaha</strong> Wireless Project windows-web Mohammad Shafiullah<br />
dm.ist.unomaha.edu Data Mining windows-web Joseph Hrabak, Yong Shi<br />
msdnaa.ist.unomaha.edu Micros<strong>of</strong>t Academic Alliance windows-web Joseph Hrabak<br />
isqa.unomaha.edu ISQA Departmental Site windows-web<br />
Joseph Hrabak, Paul<br />
VanVliet<br />
Joseph Hrabak, Paul<br />
istis.unomaha.edu Information Technology Council windows-web VanVliet<br />
-566-
secondlife.ist.unomaha.edu Metaverse Project windows-web Roni Myers, John Murphy<br />
misso.unomaha.edu MIS Student Group windows-web Joseph Hrabak<br />
phpmyadmin.ist.unomaha.edu PHP Admin Site windows-web Roni Myers<br />
cisco.ist.unomaha.edu Cisco Networking Course windows-web Joseph Hrabak, Bill Pulte<br />
gatech.ist.unomaha.edu Student workshop windows-web Joseph Hrabak<br />
sigitpm.ist.unomaha.edu<br />
Special Interest Group for<br />
Information Technology Project<br />
Management<br />
windows-web<br />
Joseph Hrabak, Deepak<br />
Khazanchi<br />
-567-<br />
Joseph Hrabak, Deepak<br />
Khazanchi<br />
cmit_mutual.ist.unomaha.edu Project Management windows-web<br />
cbctech.ist.unomaha.edu Summer Camp windows-web Roni Myers<br />
<strong>Nebraska</strong> Health Information<br />
nhip.ist.unomaha.edu<br />
Project<br />
windows-web<br />
divtech.ist.unomaha.edu Summer Camp windows-web Roni Myers<br />
Joseph Hrabak, Ann<br />
Fruhling<br />
mosaic.unomaha.edu Global Diffusion <strong>of</strong> the Internet windows-web<br />
Joseph Hrabak, Peter<br />
Wolcott<br />
mymail.ist.unomaha.edu CIST Exchange Email exchange Joseph Hrabak<br />
nucia.unomaha.edu NUCIA homepage helm Lucas Wentz<br />
pietron.ist.unomaha.edu Leah Pietron Course Site cistvss Joseph Hrabak<br />
Redirect for<br />
ist.unomaha.edu - manage www.ist.unomaha.edu manage Joseph Hrabak<br />
Redirect for<br />
ist.unomaha.edu - metis www.ist.unomaha.edu metis Joseph Hrabak<br />
systems.ist.unomaha.edu Systems Office Portal ssp Joseph Hrabak<br />
vulcan.ist.unomaha.edu Vulcan Server Help/FAQ vulcan<br />
sharepointdev.ist.unomaha.edu<br />
Sharepoint Portal / wolcott's<br />
class??<br />
azureus<br />
groyce.ist.unomaha.edu Groyce Sharepoint Portal azureus<br />
James Harr, Joseph<br />
Hrabak<br />
Joseph Hrabak, Peter<br />
Wolcott<br />
Joseph Hrabak, George<br />
Royce<br />
blizzard.ist.unomaha.edu Web Dev Class Server Info Page blizzard<br />
Bob Fulkerson, Joseph<br />
Hrabak<br />
elearning.ist.unomaha.edu<br />
CIST Online Class Multimedia<br />
Server elearnining Joseph Hrabak<br />
teamnet.ist.unomaha.edu Teamnet teamnet Azad, Joseph Hrabak<br />
pattern Tool for Deepak padev<br />
Joseph Hrabak, Pujak<br />
Arora<br />
Capstone Course Sharepoint<br />
Joseph Hrabak, Ann<br />
portal8950.ist.unomaha.edu<br />
portal8950b.ist.unomaha.edu<br />
squishy.ist.unomaha.edu<br />
Portal<br />
Capstone Course Sharepoint<br />
Portal<br />
Resource Site for Bob's Web<br />
Programming Class<br />
portal8950<br />
portal8950<br />
blizzard<br />
Fruhling<br />
Joseph Hrabak, Ann<br />
Fruhling<br />
Bob Fulkerson, Joseph<br />
Hrabak
Executive Memorandum No. 16<br />
Policy for Responsible Use <strong>of</strong> <strong>University</strong> Computers and Information Systems<br />
OFFICE OF THE PRESIDENT Executive Memorandum No. 16<br />
1. Purpose<br />
It is the purpose <strong>of</strong> this Executive Memorandum to set forth the <strong>University</strong>'s administrative policy and<br />
provide guidance relating to responsible use <strong>of</strong> the <strong>University</strong>'s electronic information systems.<br />
2. General<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> strives to maintain access for its faculty, staff, students, administrators and<br />
Regents (the "users") to local, national and international sources <strong>of</strong> information and to provide an<br />
atmosphere that encourages sharing <strong>of</strong> knowledge, the creative process and collaborative efforts within<br />
the <strong>University</strong>'s educational, research and public service missions. Access to electronic information<br />
systems at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> is a privilege, not a right, and must be treated as such by all users<br />
<strong>of</strong> these systems. All users must act honestly and responsibly. Every user is responsible for the integrity<br />
<strong>of</strong> these information resources. All users must respect the rights <strong>of</strong> other computer users, respect the<br />
integrity <strong>of</strong> the physical facilities and controls, and respect all pertinent license and contractual<br />
agreements related to <strong>University</strong> information systems. All users shall act in accordance with these<br />
responsibilities, and the relevant local, state and federal laws and regulations. Failure to so conduct<br />
oneself in compliance with this Policy may result in denial <strong>of</strong> access to <strong>University</strong> information systems or<br />
other disciplinary action.<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> is a provider <strong>of</strong> a means to access the vast and growing amount <strong>of</strong><br />
information available through electronic information resources. The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> is not a<br />
regulator <strong>of</strong> the content <strong>of</strong> that information and takes no responsibility for the content <strong>of</strong> information,<br />
except for that information the <strong>University</strong> itself and those acting on its behalf create. Any persons<br />
accessing information through the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> information systems must determine for<br />
themselves and their charges whether any source is appropriate for viewing.<br />
Accepting any account and/or using the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>'s information systems shall constitute an<br />
agreement on behalf <strong>of</strong> the user or other individual accessing such information systems to abide and be<br />
bound by the provisions <strong>of</strong> this Policy. The <strong>University</strong> may restrict or prohibit the use <strong>of</strong> its information<br />
systems in response to complaints presenting evidence <strong>of</strong> violations <strong>of</strong> <strong>University</strong> policies or state or<br />
federal laws. When it has been determined that there has been a violation, the <strong>University</strong> may restrict<br />
or prohibit access by an <strong>of</strong>fending party to its information systems through <strong>University</strong>-owned or other<br />
computers, remove or limit access to material posted on <strong>University</strong>-owned computers or networks, and,<br />
if warranted, institute other disciplinary action.<br />
3. Definitions<br />
For purposes <strong>of</strong> this policy the following definitions shall apply:<br />
a. Electronic communications shall mean and include the use <strong>of</strong> information systems in the<br />
communicating or posting <strong>of</strong> information or material by way <strong>of</strong> electronic mail, bulletin boards,<br />
-568-
World Wide Web (internet), or other such electronic tools.<br />
b. Information systems shall mean and include computers, networks, servers and other similar devices<br />
that are administered by the <strong>University</strong> and for which the <strong>University</strong> is responsible. "Networks" shall<br />
mean and include video, voice and data networks, routers and storage devices.<br />
c. Obscene with respect to obscene material shall mean (1) that an average person applying<br />
contemporary community standards would find the material taken as a whole predominantly appeals to<br />
the prurient interest or a shameful or morbid interest in nudity, sex, or excretion, (2) the material<br />
depicts or describes in a patently <strong>of</strong>fensive way sexual conduct specifically set out in Neb. Rev. Stat. §§<br />
28-807 to 28-809, as amended, and (3) the material taken as a whole lacks serious literary, artistic,<br />
political, or scientific value.<br />
4. Permitted Uses<br />
<strong>University</strong> Business Use and Limited Personal Use.<br />
<strong>University</strong> information systems are to be used predominately for <strong>University</strong>-related business. However,<br />
personal use is permitted so long as it conforms with this Policy and does not interfere with <strong>University</strong><br />
operations or an employee user's performance <strong>of</strong> duties as a <strong>University</strong> employee. As with permitted<br />
personal use <strong>of</strong> telephones for local calls, limited personal use <strong>of</strong> information systems does not<br />
ordinarily result in additional costs to the <strong>University</strong> and may actually result in increased efficiencies.<br />
Personal use <strong>of</strong> any <strong>University</strong> information system to access, download, print, store, forward, transmit<br />
or distribute obscene material is prohibited. UNDER ALL CIRCUMSTANCES, PERSONAL USE BY<br />
EMPLOYEES MUST COMPLY WITH SUBSECTION b. OF THIS SECTION AND SHALL NOT CONFLICT WITH AN<br />
EMPLOYEE'S PERFORMANCE OF DUTIES AND RESPONSIBILITIES FOR THE UNIVERSITY. Personal use may<br />
be denied when such use requires an inordinate amount <strong>of</strong> information systems resources (e.g. storage<br />
capacity).<br />
Prior Approval Required for Personal Use for Outside Consulting, Business or Employment.<br />
Personal use <strong>of</strong> <strong>University</strong> information systems resources or equipment by any user for personal<br />
financial gain in connection with outside (non-<strong>University</strong>) consulting, business or employment is<br />
prohibited, except as authorized for employees by Section 3.4.5 <strong>of</strong> the Bylaws <strong>of</strong> the Board <strong>of</strong> Regents.<br />
Employee personal use in conjunction with outside pr<strong>of</strong>essional consulting, business or employment<br />
activities is permitted only when such use has been expressly authorized and approved by the <strong>University</strong><br />
Administration or the Board <strong>of</strong> Regents, as appropriate, in accordance with the requirements <strong>of</strong> said<br />
Section 3.4.5 <strong>of</strong> the Bylaws.<br />
5. Access<br />
Unauthorized access to information systems is prohibited. No one should use the ID or password <strong>of</strong><br />
another; nor should anyone provide his or her ID or password to another, except in the cases necessary<br />
to facilitate computer maintenance and repairs. When any user terminates his or her relation with the<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, his or her ID and password shall be denied further access to <strong>University</strong><br />
computing resources.<br />
6. Misuse <strong>of</strong> Computers and Network Systems<br />
Misuse <strong>of</strong> <strong>University</strong> information systems is prohibited. Misuse includes the following:<br />
Attempting to modify or remove computer equipment, s<strong>of</strong>tware, or peripherals without proper<br />
authorization.<br />
-569-
Accessing without proper authorization computers, s<strong>of</strong>tware, information or networks to which the<br />
<strong>University</strong> belongs, regardless <strong>of</strong> whether the resource accessed is owned by the <strong>University</strong> or the abuse<br />
takes place from a non-<strong>University</strong> site.<br />
c. Taking actions, without authorization, which interfere with the access <strong>of</strong> others to information<br />
systems.<br />
d. Circumventing logon or other security measures.<br />
e. Using information systems for any illegal or unauthorized purpose.<br />
f. Personal use <strong>of</strong> information systems or electronic communications for non-<strong>University</strong> consulting,<br />
business or employment, except as expressly authorized pursuant to Section 3.4.5 <strong>of</strong> the Bylaws <strong>of</strong> the<br />
Board <strong>of</strong> Regents.<br />
g. Sending any fraudulent electronic communication.<br />
h. Violating any s<strong>of</strong>tware license or copyright, including copying or redistributing copyrighted s<strong>of</strong>tware,<br />
without the written authorization <strong>of</strong> the s<strong>of</strong>tware owner.<br />
i. Using electronic communications to violate the property rights <strong>of</strong> authors and copyright owners. (Be<br />
especially aware <strong>of</strong> potential copyright infringement through the use <strong>of</strong> e-mail. See the provisions under<br />
"E-Mail" contained in this Policy.)<br />
j. Using electronic communications to harass or threaten users in such a way as to create an atmosphere<br />
which unreasonably interferes with the education or the employment experience. Similarly, electronic<br />
communications shall not be used to harass or threaten other information recipients, in addition to<br />
<strong>University</strong> users.<br />
k. Using electronic communications to disclose proprietary information without the explicit permission<br />
<strong>of</strong> the owner.<br />
l. Reading other users' information or files without permission.<br />
m. Academic dishonesty.<br />
n. Forging, fraudulently altering or falsifying, or otherwise misusing <strong>University</strong> or non-<strong>University</strong> records<br />
(including computerized records, permits, identification cards, or other documents or property).<br />
o. Using electronic communications to hoard, damage, or otherwise interfere with academic resources<br />
available electronically.<br />
p. Using electronic communications to steal another individual's works, or otherwise misrepresent one's<br />
own work.<br />
q. Using electronic communications to fabricate research data.<br />
r. Launching a computer worm, computer virus or other rogue program.<br />
s. Downloading or posting illegal, proprietary or damaging material to a <strong>University</strong> computer.<br />
t. Transporting illegal, proprietary or damaging material across a <strong>University</strong> network.<br />
u. Personal use <strong>of</strong> any <strong>University</strong> information system to access, download, print, store, forward, transmit<br />
or distribute obscene material.<br />
v. Violating any state or federal law or regulation in connection with use <strong>of</strong> any information system.<br />
7. Privacy<br />
a. User Privacy Not Guaranteed. When <strong>University</strong> information systems are functioning properly, a user<br />
can expect the files and data he or she generates to be private information, unless the creator <strong>of</strong> the file<br />
or data takes action to reveal it to others. Users should be aware, however, that no information system<br />
is completely secure. Persons both within and outside <strong>of</strong> the <strong>University</strong> may find ways to access files.<br />
ACCORDINGLY, THE UNIVERSITY CANNOT AND DOES NOT GUARANTEE USER PRIVACY and users should<br />
be continuously aware <strong>of</strong> this fact.<br />
-570-
. Repair and Maintenance <strong>of</strong> Equipment. Users should be aware that on occasion duly authorized<br />
<strong>University</strong> information systems technological personnel have authority to access individual user files or<br />
data in the process <strong>of</strong> performing repair or maintenance <strong>of</strong> computing equipment the <strong>University</strong> deems<br />
is reasonably necessary, including the testing <strong>of</strong> systems in order to ensure adequate storage capacity<br />
and performance for <strong>University</strong> needs. Information systems technological personnel performing repair<br />
or maintenance <strong>of</strong> computing equipment are prohibited by law from exceeding their authority <strong>of</strong> access<br />
for repair and maintenance purposes or from making any use <strong>of</strong> individual user files or data for any<br />
purpose other than repair or maintenance services performed by them.<br />
c. Response to a Public Records Request, Administrative or Judicial Order or Request for Discovery in the<br />
Course <strong>of</strong> Litigation. Users should be aware that the <strong>Nebraska</strong> public records statutes are very broad in<br />
their application. Certain records, such as unpublished research in progress, proprietary information,<br />
personal information in personnel and student records are protected from disclosure. However, most<br />
other <strong>University</strong> records contained in electronic form require disclosure if a public record request is<br />
made. Users should remember this when creating any electronic information, especially e-mail. Also,<br />
users should be aware that the <strong>University</strong> will comply with any lawful administrative or judicial order<br />
requiring the production <strong>of</strong> electronic files or data stored in the <strong>University</strong>'s information systems, and<br />
will provide information in electronic files or data stored in the <strong>University</strong>'s information systems in<br />
response to legitimate requests for discovery <strong>of</strong> evidence in litigation in which the <strong>University</strong> is involved.<br />
d. Response to Misuse <strong>of</strong> Computers and Network Systems. When for reasonable cause, as such cause<br />
may be determined by the Office <strong>of</strong> the Vice President and General Counsel, it is believed that an act <strong>of</strong><br />
misuse as defined in section 6 above has occurred, then the chief information services <strong>of</strong>ficer serving<br />
Central Administration or serving the relevant campus may access any account, file or other data<br />
controlled by the alleged violator and share such account information, file or other data with those<br />
persons authorized to investigate and implement sanctions in association with the misuse <strong>of</strong> the<br />
<strong>University</strong>'s computer and information systems. Should any <strong>of</strong> the chief information service <strong>of</strong>ficers<br />
reasonably believe that a misuse is present or imminent such that the potential for damage to the<br />
system or the information stored within it, is genuine and serious (e.g. hacking, spamming or theft), then<br />
the chief information <strong>of</strong>ficer may take such action as is necessary to protect the information system and<br />
the information stored in it, including the denial <strong>of</strong> access to any <strong>University</strong> or non-<strong>University</strong> user,<br />
without a determination from the Office <strong>of</strong> the Vice President and General Counsel regarding<br />
reasonable cause; provided however, that the chief information <strong>of</strong>ficer shall contact the Office <strong>of</strong> the<br />
Vice President and General Counsel as soon as possible to confirm that any protective actions taken<br />
were appropriate and within the parameters <strong>of</strong> this executive memorandum. Executive Memorandum No. 16<br />
-571-
e. Access to Information Concerning Business Operations. Employees regularly carry out the business<br />
functions <strong>of</strong> the <strong>University</strong> using the <strong>University</strong>'s information systems. business records, inquiries and<br />
correspondence are <strong>of</strong>ten stored such that individuals may control the access to particular information<br />
stored within the <strong>University</strong>'s information system. Should any employee become unavailable, be<br />
incapacitated due to illness or other reasons, or refuse to provide the information necessary to carry out<br />
the employee's job responsibilities in a reasonably timely manner, then following consultation with and<br />
approval by the Office <strong>of</strong> the Vice President and General Counsel, the chief information <strong>of</strong>ficer <strong>of</strong> Central<br />
Administration or <strong>of</strong> the relevant campus may access the employee's records in order to carry out<br />
<strong>University</strong> business operations on behalf <strong>of</strong> the unavailable or uncooperative employee.<br />
8. E-mail<br />
a. Applicability. ALL POLICIES STATED HEREIN ARE APPLICABLE TO E-MAIL. E-mail should reflect careful,<br />
pr<strong>of</strong>essional and courteous drafting-particularly since it is easily forwarded to others. Never assume that<br />
only the addressee will read your e-mail. Be careful about attachments and broad publication messages.<br />
Copyright laws and license agreements also apply to e-mail.<br />
b. E-mail Retention. E-mail messages should be deleted once the information contained in them is no<br />
longer useful. When e-mail communications are sent, the e-mail information is stored in one or more<br />
backup files for the purposes <strong>of</strong> "disaster recovery", i.e. inadvertent or mistaken deletions, system<br />
failures. In order to provide for the recovery <strong>of</strong> deleted e-mail, while maintaining efficient use <strong>of</strong> storage<br />
capabilities, e-mail information on backup files shall be retained for a period <strong>of</strong> time not to exceed seven<br />
days.<br />
9. Web Pages<br />
The Central Administration and each <strong>University</strong> campus may establish standards for those Web Pages<br />
considered to be "<strong>of</strong>ficial" pages <strong>of</strong> the <strong>University</strong>. All <strong>of</strong>ficial Web Pages shall contain the administrative<br />
unit's logo in the header and footer in order to identify it as an <strong>of</strong>ficial <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Web Page.<br />
No other Web Pages shall be allowed to use <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> logos without the express<br />
permission <strong>of</strong> the <strong>University</strong>.<br />
Originators <strong>of</strong> all Web Pages using information systems associated with the <strong>University</strong> shall comply with<br />
<strong>University</strong> policies and are responsible for complying with all federal, state and local laws and<br />
regulations, including copyright laws, obscenity laws, laws relating to libel, slander and defamation, and<br />
laws relating to piracy <strong>of</strong> s<strong>of</strong>tware.<br />
The persons creating a Web Page are responsible for the accuracy <strong>of</strong> the information contained in the<br />
Web Page. Content should be reviewed on a timely basis to assure continued accuracy. Web Pages<br />
should include a phone number or e-mail address <strong>of</strong> the person to whom questions/comments may be<br />
addressed, as well as the most recent revision date.<br />
10. Notification<br />
This Policy shall be published in all employee and faculty handbooks and student catalogs, and placed on<br />
the World Wide Web in order to fully notify users <strong>of</strong> its existence.<br />
11. Application and Enforcement<br />
-572-
This Policy applies to all administrative units <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>. The Central Administration<br />
and each <strong>University</strong> campus is encouraged to provide supplemental policy guidance, consistent with this<br />
Policy, designed to implement the provisions herein.<br />
Each <strong>University</strong> campus shall be responsible for enforcing this Policy in a manner best suited to its own<br />
organization. It is expected that enforcement will require cooperation between such departments as<br />
computer systems administration, human resources, affirmative action, academic affairs and student<br />
affairs. Prior to any denial <strong>of</strong> access or other disciplinary action, a user shall be provided with such due<br />
process as may be recommended by the <strong>University</strong>'s Office <strong>of</strong> the General Counsel.<br />
Reference: August 28, 2001<br />
-573-
IS&T Systems Policies, Procedures, and Guidelines for<br />
Technology Usage<br />
**All policies and guidelines are for internal usage only, and act as an extension <strong>of</strong> and remain<br />
subordinate to Executive Memorandum 16<br />
Guidelines on Anti-Virus Processes<br />
Recommended processes to prevent virus problems:<br />
Always run the standard, supported anti-virus (McAfee) s<strong>of</strong>tware is available from the download<br />
site. Download and run the current version; download and install anti-virus s<strong>of</strong>tware updates as<br />
they become available.<br />
NEVER open any files or macros attached to an email from an unknown, suspicious or<br />
untrustworthy source. Delete these attachments immediately, then "double delete" them by<br />
emptying your Trash.<br />
Delete spam, chain, and other junk email without forwarding, in accordance with the<br />
<strong>University</strong>'s Computer Usage Policy .<br />
Never download files from unknown or suspicious sources.<br />
Avoid direct disk sharing with read/write access unless there is absolutely a business<br />
requirement to do so.<br />
Always scan a media (floppy disks, CD-ROMs, DVD-ROMs, USB devices) from an unknown source<br />
for viruses before using it.<br />
Back-up critical data and system configurations on a regular basis and store the data in a safe<br />
place.<br />
If lab testing conflicts with anti-virus s<strong>of</strong>tware, run the anti-virus utility to ensure a clean<br />
machine, disable the s<strong>of</strong>tware, and then run the lab test. After the lab test, enable the anti-virus<br />
s<strong>of</strong>tware. When the anti-virus s<strong>of</strong>tware is disabled, do not run any applications that could<br />
transfer a virus, e.g., email or file sharing.<br />
New viruses are discovered almost every day. Periodically check your anti-virus s<strong>of</strong>tware for<br />
updates.<br />
-574-
Automatically Forwarded Email Policy<br />
1.0 Purpose<br />
To prevent the unauthorized or inadvertent disclosure <strong>of</strong> sensitive company information.<br />
2.0 Scope<br />
This policy covers automatic email forwarding, and thereby the potentially inadvertent transmission <strong>of</strong><br />
sensitive information by all employees, vendors, and agents operating on behalf <strong>of</strong> the College <strong>of</strong><br />
Information Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>.<br />
3.0 Policy<br />
Employees must exercise utmost caution when sending any email from inside the College <strong>of</strong> Information<br />
Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> to an outside network. Unless approved<br />
by an employee's manager, email will not be automatically forwarded to an external destination.<br />
Sensitive information, as defined in the Information Sensitivity Policy, will not be forwarded via any<br />
means, unless that email is critical to business and is encrypted.<br />
4.0 Definitions<br />
Terms<br />
Email<br />
SMTP.<br />
Forwarded email<br />
Definitions<br />
The electronic transmission <strong>of</strong> information through a mail protocol such as<br />
Programs such as Eudora and Micros<strong>of</strong>t Outlook use SMTP.<br />
Email resent from internal networking to an outside point.<br />
Sensitive information Information is considered sensitive if it can be damaging to the College <strong>of</strong><br />
Information Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> or its reputation or standing.<br />
Unauthorized Disclosure The intentional or unintentional revealing <strong>of</strong> restricted information to<br />
people who do not have a need to know that information.<br />
-575-
Database Password Policy<br />
1.0 Purpose<br />
This policy states the requirements for securely storing and retrieving database usernames and<br />
passwords (i.e., database credentials) for use by a program that will access a database running on one <strong>of</strong><br />
the College <strong>of</strong> Information Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>’s networks.<br />
Computer programs running on the College <strong>of</strong> Information Science and Technology at the <strong>University</strong> <strong>of</strong><br />
<strong>Nebraska</strong> <strong>Omaha</strong>'s networks <strong>of</strong>ten require the use <strong>of</strong> one <strong>of</strong> the many internal database servers. In<br />
order to access one <strong>of</strong> these databases, a program must authenticate to the database by presenting<br />
acceptable credentials. The database privileges that the credentials are meant to restrict can be<br />
compromised when the credentials are improperly stored.<br />
2.0 Scope<br />
This policy applies to all s<strong>of</strong>tware that will access a College <strong>of</strong> Information Science and Technology at the<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> multi-user production database.<br />
3.0 Policy<br />
3.1 General<br />
In order to maintain the security <strong>of</strong> the College <strong>of</strong> Information Science and Technology at the <strong>University</strong><br />
<strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>'s internal databases, access by s<strong>of</strong>tware programs must be granted only after<br />
authentication with credentials. The credentials used for this authentication must not reside in the<br />
main, executing body <strong>of</strong> the program's source code in clear text. Database credentials must not be<br />
stored in a location that can be accessed through a web server.<br />
3.2 Specific Requirements<br />
3.2.1. Storage <strong>of</strong> Data Base User Names and Passwords<br />
Database user names and passwords may be stored in a file separate from the executing body <strong>of</strong><br />
the program's code. This file must not be world readable.<br />
Database credentials may reside on the database server. In this case, a hash number identifying<br />
the credentials may be stored in the executing body <strong>of</strong> the program's code.<br />
Database credentials may be stored as part <strong>of</strong> an authentication server (i.e., an entitlement<br />
directory), such as an LDAP server used for user authentication. Database authentication may<br />
occur on behalf <strong>of</strong> a program as part <strong>of</strong> the user authentication process at the authentication<br />
server. In this case, there is no need for programmatic use <strong>of</strong> database credentials.<br />
Database credentials may not reside in the documents tree <strong>of</strong> a web server.<br />
Pass through authentication (i.e., Oracle OPS$ authentication) must not allow access to the<br />
database based solely upon a remote user's authentication on the remote host.<br />
Passwords or pass phrases used to access a database must adhere to the Password Policy.<br />
3.2.2. Retrieval <strong>of</strong> Database User Names and Passwords<br />
If stored in a file that is not source code, then database user names and passwords must be read<br />
from the file immediately prior to use. Immediately following database authentication, the<br />
memory containing the user name and password must be released or cleared.<br />
-576-
The scope into which you may store database credentials must be physically separated from the<br />
other areas <strong>of</strong> your code, e.g., the credentials must be in a separate source file. The file that<br />
contains the credentials must contain no other code but the credentials (i.e., the user name and<br />
password) and any functions, routines, or methods that will be used to access the credentials.<br />
For languages that execute from source code, the credentials' source file must not reside in the<br />
same browse able or executable file directory tree in which the executing body <strong>of</strong> code resides.<br />
3. Access to Database User Names and Passwords<br />
Every program or every collection <strong>of</strong> programs implementing a single business function must<br />
have unique database credentials. Sharing <strong>of</strong> credentials between programs is not allowed.<br />
Database passwords used by programs are system-level passwords as defined by the Password<br />
Policy.<br />
Developer groups must have a process in place to ensure that database passwords are<br />
controlled and changed in accordance with the Password Policy. This process must include a<br />
method for restricting knowledge <strong>of</strong> database passwords to a need-to-know basis.<br />
4.0 Definitions<br />
Term<br />
Definition<br />
Computer language A language used to generate programs.<br />
Credentials<br />
Something you know (e.g., a password or pass phrase), and/or something that<br />
identifies you (e.g., a user name, a fingerprint, voiceprint, retina print). Something you know and<br />
something that identifies you are presented for authentication.<br />
Entitlement<br />
The level <strong>of</strong> privilege that has been authenticated and authorized. The privileges<br />
level at which to access resources.<br />
Executing body<br />
program.<br />
Hash<br />
The series <strong>of</strong> computer instructions that the computer executes to run a<br />
An algorithmically generated number that identifies a datum or its location.<br />
LDAP<br />
Lightweight Directory Access Protocol, a set <strong>of</strong> protocols for accessing<br />
information directories.<br />
Module<br />
A collection <strong>of</strong> computer language instructions grouped together either logically<br />
or physically. A module may also be called a package or a class, depending upon which computer<br />
language is used.<br />
Name space<br />
A logical area <strong>of</strong> code in which the declared symbolic names are known and<br />
outside <strong>of</strong> which these names are not visible.<br />
Production<br />
implemented or tested.<br />
Ethics Policy<br />
S<strong>of</strong>tware that is being used for a purpose other than when s<strong>of</strong>tware is being<br />
-577-
1. Overview<br />
The College <strong>of</strong> Information Science and Technology systems staff at the <strong>University</strong> <strong>of</strong><br />
<strong>Nebraska</strong> <strong>Omaha</strong>’s purpose for this ethics policy is to establish a culture <strong>of</strong> openness, trust<br />
and integrity in business practices. Effective ethics is a team effort involving the<br />
participation and support <strong>of</strong> every systems employee. All employees should familiarize<br />
themselves with the ethics guidelines that follow this introduction.<br />
The systems staff is committed to protecting employees, partners, vendors and the company<br />
from illegal or damaging actions by individuals, either knowingly or unknowingly. When the<br />
systems staff addresses issues proactively and uses correct judgment, it will help set us apart<br />
from competitors.<br />
The College <strong>of</strong> Information Science and Technology will not tolerate any wrongdoing or<br />
impropriety at anytime. We will take the appropriate measures act quickly in correcting the<br />
issue if the ethical code is broken. Any infractions <strong>of</strong> this code <strong>of</strong> ethics will not be tolerated.<br />
2. Purpose<br />
Our purpose for authoring a publication on ethics is to emphasize the employee’s and<br />
consumer’s expectation to be treated to fair business practices. This policy will serve to<br />
guide business behavior to ensure ethical conduct.<br />
3. Scope<br />
This policy applies to employees, contractors, consultants, temporaries, and other workers at<br />
College <strong>of</strong> Information Science and Technology systems staff, including all personnel<br />
affiliated with third parties.<br />
4. Policy<br />
4.1. Executive Commitment to Ethics<br />
4.1.1. Managers within College <strong>of</strong> Information Science and Technology systems staff<br />
must set a prime example. In any business practice, honesty and integrity must be<br />
top priority for executives.<br />
4.1.2. Executives must have an open door policy and welcome suggestions and concerns<br />
from employees. This will allow employees to feel comfortable discussing any<br />
issues and will alert executives to concerns within the work force.<br />
4.1.3. Executives must disclose any conflict <strong>of</strong> interests regard their position within<br />
College <strong>of</strong> Information Science and Technology.<br />
4.2. Employee Commitment to Ethics<br />
4.2.1. The College <strong>of</strong> Information Science and Technology systems employees will treat<br />
everyone fairly, have mutual respect, promote a team environment and avoid the<br />
intent and appearance <strong>of</strong> unethical or compromising practices.<br />
4.2.2. Every employee needs to apply effort and intelligence in maintaining ethics value.<br />
4.2.3. Employees must disclose any conflict <strong>of</strong> interests regard their position within the<br />
College <strong>of</strong> Information Science and Technology.<br />
4.2.4. Employees will help to increase customer and vendor satisfaction by providing<br />
quality product s and timely response to inquiries.<br />
4.3. Company Awareness<br />
-578-
4.3.1. Promotion <strong>of</strong> ethical conduct within interpersonal communications <strong>of</strong> employees<br />
will be rewarded.<br />
4.3.2. The College <strong>of</strong> Information Science and Technology systems staff will promote a<br />
trustworthy and honest atmosphere to reinforce the vision <strong>of</strong> ethics within the<br />
organization.<br />
4.4. Maintaining Ethical Practices<br />
4.4.1. The College <strong>of</strong> Information Science and Technology systems staff will reinforce<br />
the importance <strong>of</strong> the integrity message and the tone will start at the top. Every<br />
employee, manager, director needs consistently maintain an ethical stance and<br />
support ethical behavior.<br />
4.4.2. Systems employees should encourage open dialogue, get honest feedback and<br />
treat everyone fairly, with honesty and objectivity.<br />
4.4.3. College <strong>of</strong> Information Science and Technology systems staff has established a<br />
best practice disclosure committee to make sure the ethical code is delivered to all<br />
employees and that concerns regarding the code can be addressed.<br />
4.5. Unethical Behavior<br />
4.5.1. Systems employees will avoid the intent and appearance <strong>of</strong> unethical or<br />
compromising practice in relationships, actions and communications.<br />
4.5.2. Harassment or discrimination will not be tolerated.<br />
4.5.3. Unauthorized use <strong>of</strong> company trade secrets & marketing, operational, personnel,<br />
financial, source code, & technical information integral to the success <strong>of</strong> our<br />
organization will not be tolerated.<br />
4.5.4. College <strong>of</strong> Information Science and Technology will not permit impropriety at any<br />
time and we will act ethically and responsibly in accordance with laws.<br />
4.5.5. Systems employees will not use organizational assets or business relationships for<br />
personal use or gain.<br />
-579-
Extranet Policy<br />
1.0 Purpose<br />
This document describes the policy under which third party organizations connect to College <strong>of</strong><br />
Information Science and Technology networks for the purpose <strong>of</strong> transacting business related to the<br />
College <strong>of</strong> Information Science and Technology.<br />
2.0 Scope<br />
Connections between third parties that require access to non-public College <strong>of</strong> Information Science and<br />
Technology resources fall under this policy, regardless <strong>of</strong> whether a Telco circuit (such as frame relay or<br />
ISDN) or VPN technology is used for the connection. Connectivity to third parties such as the Internet<br />
Service Providers (ISPs) that provide Internet access for the College <strong>of</strong> Information Science and<br />
Technology or to the Public Switched Telephone Network does NOT fall under this policy.<br />
3.0 Policy<br />
3.1 Pre-Requisites<br />
3.1.1 Security Review<br />
All new extranet connectivity will go through a security review with the College <strong>of</strong> Information Science<br />
and Technology’s system staff. The reviews are to ensure that all access matches the business<br />
requirements in a best possible way, and that the principle <strong>of</strong> least access is followed.<br />
3.1.2 Third Party Connection Agreement<br />
All new connection requests between third parties and the College <strong>of</strong> Information Science and<br />
Technology require that the third party and the College <strong>of</strong> Information Science and Technology<br />
representatives agree to and sign the Third Party Agreement. This agreement must be signed by<br />
management <strong>of</strong> the Sponsoring Organization as well as a representative from the third party who is<br />
legally empowered to sign on behalf <strong>of</strong> the third party. The signed document is to be kept on file with<br />
the relevant extranet group. Documents pertaining to connections into College <strong>of</strong> Information Science<br />
and Technology labs are to be kept on file with the College <strong>of</strong> Information Science and Technology’s<br />
systems staff.<br />
3.1.3 Business Case<br />
All production extranet connections must be accompanied by a valid business justification, in writing,<br />
that is approved by a project manager in the extranet group. Lab connections must be approved by the<br />
College <strong>of</strong> Information Science and Technology. Typically this function is handled as part <strong>of</strong> the Third<br />
Party Agreement.<br />
3.1.4 Point Of Contact<br />
The Sponsoring Organization must designate a person to be the Point <strong>of</strong> Contact (POC) for the extranet<br />
connection. The POC acts on behalf <strong>of</strong> the Sponsoring Organization, and is responsible for those portions<br />
<strong>of</strong> this policy and the Third Party Agreement that pertain to it. In the event that the POC changes, the<br />
relevant extranet Organization must be informed promptly.<br />
3.2 Establishing Connectivity<br />
-580-
Sponsoring Organizations within the College <strong>of</strong> Information Science and Technology that wish to<br />
establish connectivity to a third party are to file a new site request with the proper extranet group. The<br />
extranet group will engage College <strong>of</strong> Information Science and Technology systems staff to address<br />
security issues inherent in the project. The Sponsoring Organization must provide full and complete<br />
information as to the nature <strong>of</strong> the proposed access to the extranet group and the College <strong>of</strong><br />
Information Science and Technology, as requested.<br />
All connectivity established must be based on the least-access principle, in accordance with the<br />
approved business requirements and the security review. In no case will the College <strong>of</strong> Information<br />
Science and Technology rely upon the third party to protect the College <strong>of</strong> Information Science and<br />
Technology’s network or resources.<br />
3.3 Modifying or Changing Connectivity and Access<br />
All changes in access must be accompanied by a valid business justification, and are subject to security<br />
review. Changes are to be implemented via corporate change management process. The Sponsoring<br />
Organization is responsible for notifying the extranet management group and/or the College <strong>of</strong><br />
Information Science and Technology when there is a material change in their originally provided<br />
information so that security and connectivity evolve accordingly.<br />
3.4 Terminating Access<br />
When access is no longer required, the Sponsoring Organization within the College <strong>of</strong> Information<br />
Science and Technology must notify the extranet team responsible for that connectivity, which will then<br />
terminate the access. This may mean a modification <strong>of</strong> existing permissions up to terminating the circuit,<br />
as appropriate. The extranet and lab security teams must conduct an audit <strong>of</strong> their respective<br />
connections on an annual basis to ensure that all existing connections are still needed, and that the<br />
access provided meets the needs <strong>of</strong> the connection. Connections that are found to be depreciated,<br />
and/or are no longer being used to conduct College <strong>of</strong> Information Science and Technology business,<br />
will be terminated immediately. Should a security incident or a finding that a circuit has been<br />
deprecated and is no longer being used to conduct the College <strong>of</strong> Information Science and Technology<br />
business necessitate a modification <strong>of</strong> existing permissions, or termination <strong>of</strong> connectivity, the College<br />
<strong>of</strong> Information Science and Technology and/or the extranet team will notify the POC or the Sponsoring<br />
Organization <strong>of</strong> the change prior to taking any action.<br />
4.0 Definitions<br />
Terms<br />
Definitions<br />
Circuit<br />
For the purposes <strong>of</strong> this policy, circuit refers to the method <strong>of</strong> network access,<br />
whether it's through traditional ISDN, Frame Relay etc., or via VPN/Encryption technologies.<br />
Sponsoring Organization The organization who requested that the third party have access into<br />
the College <strong>of</strong> Information Science and Technology.<br />
Third Party<br />
A business that is not a formal or subsidiary part <strong>of</strong> the College <strong>of</strong> Information<br />
Science and Technology.<br />
-581-
Information Sensitivity Policy<br />
1.0 Purpose<br />
The Information Sensitivity Policy is intended to help employees determine what information can be<br />
disclosed to non-employees, as well as the relative sensitivity <strong>of</strong> information that should not be<br />
disclosed outside <strong>of</strong> the College <strong>of</strong> Information Science and Technology without proper authorization.<br />
The information covered in these guidelines includes, but is not limited to, information that is either<br />
stored or shared via any means. This includes: electronic information, information on paper, and<br />
information shared orally or visually (such as telephone and video conferencing).<br />
All system employees should familiarize themselves with the information labeling and handling<br />
guidelines that follow this introduction. It should be noted that the sensitivity level definitions were<br />
created as guidelines and to emphasize common sense steps that you can take to protect College <strong>of</strong><br />
Information Science and Technology Confidential information (e.g., Confidential information should not<br />
be left unattended in conference rooms).<br />
Please Note: The impact <strong>of</strong> these guidelines on daily activity should be minimal.<br />
Questions about the proper classification <strong>of</strong> a specific piece <strong>of</strong> information should be addressed to your<br />
manager. Questions about these guidelines should be addressed to the College <strong>of</strong> Information Science<br />
and Technology systems manager.<br />
2.0 Scope<br />
All College <strong>of</strong> Information Science and Technology information is categorized into two main<br />
classifications:<br />
College <strong>of</strong> Information Science and Technology Public<br />
College <strong>of</strong> Information Science and Technology Confidential<br />
College <strong>of</strong> Information Science and Technology Public information is information that has been declared<br />
public knowledge by someone with the authority to do so, and can freely be given to anyone without<br />
any possible damage to the College <strong>of</strong> Information Science and Technology.<br />
College <strong>of</strong> Information Science and Technology Confidential contains all other information. It is a<br />
continuum, in that it is understood that some information is more sensitive than other information, and<br />
should be protected in a more secure manner. Included is information that should be protected very<br />
closely, such as student information, development programs, and other information integral to the<br />
success <strong>of</strong> the organization. Also included in College <strong>of</strong> Information Science and Technology Confidential<br />
is information that is less critical, such as telephone directories, general corporate information,<br />
personnel information, etc..<br />
A subset <strong>of</strong> College <strong>of</strong> Information Science and Technology Confidential information is “College <strong>of</strong><br />
Information Science and Technology Third Party Confidential" information. This is confidential<br />
information belonging or pertaining to another corporation which has been entrusted to the College <strong>of</strong><br />
Information Science and Technology by that company under non-disclosure agreements and other<br />
contracts. Examples <strong>of</strong> this type <strong>of</strong> information include everything from joint development efforts to<br />
vendor lists, customer orders, and supplier information. Information in this category ranges from<br />
-582-
extremely sensitive to information about the fact that we've connected a supplier / vendor into the<br />
College <strong>of</strong> Information Science and Technology's network to support our operations.<br />
College <strong>of</strong> Information Science and Technology personnel are encouraged to use common sense<br />
judgment in securing College <strong>of</strong> Information Science and Technology Confidential information to the<br />
proper extent. If an employee is uncertain <strong>of</strong> the sensitivity <strong>of</strong> a particular piece <strong>of</strong> information, he/she<br />
should contact their manager<br />
3.0 Policy<br />
The Sensitivity Guidelines below provides details on how to protect information at varying sensitivity<br />
levels. Use these guidelines as a reference only, as College <strong>of</strong> Information Science and Technology<br />
Confidential information in each column may necessitate more or less stringent measures <strong>of</strong> protection<br />
depending upon the circumstances and the nature <strong>of</strong> the College <strong>of</strong> Information Science and Technology<br />
Confidential information in question.<br />
3.1 Minimal Sensitivity: General organizational information; some personnel and technical<br />
information<br />
Marking guidelines for information in hardcopy or electronic form.<br />
Note: any <strong>of</strong> these markings may be used with the additional annotation <strong>of</strong> "3rd Party<br />
Confidential".<br />
Marking is at the discretion <strong>of</strong> the owner or custodian <strong>of</strong> the information. If marking is desired,<br />
the words "College <strong>of</strong> Information Science and Technology Confidential" may be written or<br />
designated in a conspicuous place on or in the information in question. Other labels that may be<br />
used include "College <strong>of</strong> Information Science and Technology Proprietary" or similar labels at<br />
the discretion <strong>of</strong> your individual business unit or department. Even if no marking is present,<br />
College <strong>of</strong> Information Science and Technology information is presumed to be "College <strong>of</strong><br />
Information Science and Technology Confidential" unless expressly determined to be College <strong>of</strong><br />
Information Science and Technology Public information by a College <strong>of</strong> Information Science and<br />
Technology employee with authority to do so.<br />
Access: College <strong>of</strong> Information Science and Technology employees, contractors, people with a<br />
business need to know.<br />
Distribution within the College <strong>of</strong> Information Science and Technology: Standard inter<strong>of</strong>fice<br />
mail approved electronic mail and electronic file transmission methods.<br />
Distribution outside <strong>of</strong> College <strong>of</strong> Information Science and Technology internal mail: U.S. mail<br />
and other public or private carriers approved electronic mail and electronic file transmission<br />
methods.<br />
Electronic distribution: No restrictions except that it is sent to only approved recipients.<br />
Storage: Keep from view <strong>of</strong> unauthorized people; erase whiteboards, do not leave in view on<br />
tabletop. Machines should be administered with security in mind. Protect from loss; electronic<br />
information should have individual access controls where possible and appropriate.<br />
Disposal/Destruction: Deposit outdated paper information in specially marked disposal bins on<br />
College <strong>of</strong> Information Science and Technology premises; electronic data should be<br />
expunged/cleared. Reliably erase or physically destroy media.<br />
-583-
Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil<br />
and/or criminal prosecution to the full extent <strong>of</strong> the law.<br />
3.2 More Sensitive: Business, financial, technical, and most personnel information<br />
Marking guidelines for information in hardcopy or electronic form.<br />
Note: any <strong>of</strong> these markings may be used with the additional annotation <strong>of</strong> "3rd Party<br />
Confidential". As the sensitivity level <strong>of</strong> the information increases, you may, in addition or instead<br />
<strong>of</strong> marking the information " College <strong>of</strong> Information Science and Technology Confidential" or<br />
“College <strong>of</strong> Information Science and Technology Proprietary", wish to label the information "<br />
College <strong>of</strong> Information Science and Technology Internal Use Only" or other similar labels at the<br />
discretion <strong>of</strong> your individual business unit or department to denote a more sensitive level <strong>of</strong><br />
information. However, marking is discretionary at all times.<br />
Access: College <strong>of</strong> Information Science and Technology employees and non-employees with<br />
signed non-disclosure agreements who have a business need to know.<br />
Distribution within the College <strong>of</strong> Information Science and Technology: Standard inter<strong>of</strong>fice<br />
mail approved electronic mail and electronic file transmission methods.<br />
Distribution outside <strong>of</strong> College <strong>of</strong> Information Science and Technology internal mail: Sent via<br />
U.S. mail or approved private carriers.<br />
Electronic distribution: No restrictions to approved recipients within the College <strong>of</strong> Information<br />
Science and Technology, but should be encrypted or sent via a private link to approved<br />
recipients outside <strong>of</strong> College <strong>of</strong> Information Science and Technology premises.<br />
Storage: Individual access controls are highly recommended for electronic information.<br />
Disposal/Destruction: In specially marked disposal bins on College <strong>of</strong> Information Science and<br />
Technology premises; electronic data should be expunged/cleared. Reliably erase or physically<br />
destroy media.<br />
Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil<br />
and/or criminal prosecution to the full extent <strong>of</strong> the law.<br />
3.3 Most Sensitive: Trade secrets & marketing, operational, personnel, financial, source code, &<br />
technical information integral to the success <strong>of</strong> our company<br />
Marking guidelines for information in hardcopy or electronic form.<br />
Note: any <strong>of</strong> these markings may be used with the additional annotation <strong>of</strong> "3rd Party<br />
Confidential". To indicate that College <strong>of</strong> Information Science and Technology Confidential<br />
information is very sensitive, you may should label the information “College <strong>of</strong> Information<br />
Science and Technology Internal: Registered and Restricted", " College <strong>of</strong> Information Science<br />
and Technology Eyes Only", " College <strong>of</strong> Information Science and Technology Confidential" or<br />
similar labels at the discretion <strong>of</strong> your individual business unit or department. Once again, this<br />
type <strong>of</strong> College <strong>of</strong> Information Science and Technology Confidential information need not be<br />
marked, but users should be aware that this information is very sensitive and be protected as<br />
such.<br />
-584-
Access: Only those individuals (College <strong>of</strong> Information Science and Technology employees and<br />
non-employees) designated with approved access and signed non-disclosure agreements.<br />
Distribution within the College <strong>of</strong> Information Science and Technology: Delivered direct -<br />
signature required, envelopes stamped confidential, or approved electronic file transmission<br />
methods.<br />
Distribution outside <strong>of</strong> College <strong>of</strong> Information Science and Technology internal mail: Delivered<br />
direct; signature required; approved private carriers.<br />
Electronic distribution: No restrictions to approved recipients within the College <strong>of</strong> Information<br />
Science and Technology, but it is highly recommended that all information be strongly<br />
encrypted.<br />
Storage: Individual access controls are very highly recommended for electronic information.<br />
Physical security is generally used, and information should be stored in a physically secured<br />
computer.<br />
Disposal/Destruction: Strongly Encouraged: In specially marked disposal bins on College <strong>of</strong><br />
Information Science and Technology premises; electronic data should be expunged/cleared.<br />
Reliably erase or physically destroy media.<br />
Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil<br />
and/or criminal prosecution to the full extent <strong>of</strong> the law.<br />
4.0 Definitions<br />
Terms and Definitions<br />
Appropriate measures<br />
To minimize risk to the College <strong>of</strong> Information Science and Technology from an outside business<br />
connection. College <strong>of</strong> Information Science and Technology computer use by competitors and<br />
unauthorized personnel must be restricted so that, in the event <strong>of</strong> an attempt to access College <strong>of</strong><br />
Information Science and Technology information, the amount <strong>of</strong> information at risk is minimized.<br />
Configuration <strong>of</strong> College <strong>of</strong> Information Science and Technology -to-other business connections<br />
Connections shall be set up to allow other businesses to see only what they need to see. This involves<br />
setting up both applications and network configurations to allow access to only what is necessary.<br />
Delivered Direct; Signature Required<br />
Do not leave in inter<strong>of</strong>fice mail slot; call the mail room for special pick-up <strong>of</strong> mail.<br />
Approved Electronic File Transmission Methods<br />
Includes supported FTP clients and Web browsers.<br />
Envelopes Stamped Confidential<br />
You are not required to use a special envelope. Put your document(s) into an inter<strong>of</strong>fice envelope, seal<br />
it, address it, and stamp it confidential.<br />
Approved Electronic Mail<br />
Includes all mail systems supported by the College <strong>of</strong> Information Science and Technology systems staff.<br />
These include, but are not necessarily limited to, Lotus Notes and Micros<strong>of</strong>t Exchange. If you have a<br />
business need to use other mailers contact the appropriate support organization.<br />
-585-
Approved Encrypted email and files<br />
Techniques include the use <strong>of</strong> DES and PGP. DES encryption is available via many different public domain<br />
packages on all platforms. PGP use within the College <strong>of</strong> Information Science and Technology is done via<br />
a license. Please contact the appropriate support organization if you require a license.<br />
Company Information System Resources<br />
Company Information System Resources include, but are not limited to, all computers, their data and<br />
programs, as well as all paper information and any information at the Internal Use Only level and above.<br />
Expunge<br />
To reliably erase or expunge data on a PC or Mac you must use a separate program to overwrite data,<br />
supplied as a part <strong>of</strong> Norton Utilities. Otherwise, the PC or Mac's normal erasure routine keeps the data<br />
intact until overwritten. The same thing happens on UNIX machines, but data is much more difficult to<br />
retrieve on UNIX systems.<br />
Individual Access Controls<br />
Individual Access Controls are methods <strong>of</strong> electronically protecting files from being accessed by people<br />
other than those specifically designated by the owner. On UNIX machines, this is accomplished by<br />
careful use <strong>of</strong> the chmod command (use man chmod to find out more about it). On Mac’s and PC's, this<br />
includes using passwords on screensavers, such as Disklock.<br />
Insecure Internet Links<br />
Insecure Internet Links are all network links that originate from a locale or travel over lines that are not<br />
totally under the control <strong>of</strong> the College <strong>of</strong> Information Science and Technology.<br />
Encryption<br />
International issues regarding encryption are complex. Follow organizational guidelines on export<br />
controls on cryptography, and consult your manager and/or corporate legal services for further<br />
guidance.<br />
One Time Password Authentication<br />
One Time Password Authentication on Internet connections is accomplished by using a onetime<br />
password token to connect to College <strong>of</strong> Information Science and Technology's internal network over<br />
the Internet. Contact the systems staff for more information on how to set this up.<br />
Physical Security<br />
Physical security means either having actual possession <strong>of</strong> a computer at all times, or locking the<br />
computer in an unusable state to an object that is immovable. Methods <strong>of</strong> accomplishing this include<br />
having a special key to unlock the computer so it can be used, thereby ensuring that the computer<br />
cannot be simply rebooted to get around the protection. If it is a laptop or other portable computer,<br />
never leave it alone in a conference room, hotel room or on an airplane seat, etc. Make arrangements to<br />
lock the device in a hotel safe, or take it with you. In the <strong>of</strong>fice, always use a lockdown cable. When<br />
leaving the <strong>of</strong>fice for the day, secure the laptop and any other sensitive material in a locked drawer or<br />
cabinet.<br />
Private Link<br />
-586-
A Private Link is an electronic communications path that the College <strong>of</strong> Information Science and<br />
Technology has control over its entire distance. For example, all College <strong>of</strong> Information Science and<br />
Technology networks are connected via a private link.<br />
-587-
Lab Anti-Virus Policy<br />
1.0 Purpose<br />
To establish requirements which must be met by all computers connected to College <strong>of</strong> Information<br />
Science and Technology (IS&T) lab networks to ensure effective virus detection and prevention.<br />
2.0 Scope<br />
This policy applies to all IS&T lab computers that are PC-based or utilize PC-file directory sharing. This<br />
includes, but is not limited to, desktop computers, laptop computers, file/ftp/tftp/proxy servers, and any<br />
PC based lab equipment such as traffic generators.<br />
3.0 Policy<br />
All IS&T PC-based lab computers must have IS&T 's standard, supported anti-virus s<strong>of</strong>tware installed<br />
(McAfee) and scheduled to run at regular intervals. In addition, the anti-virus s<strong>of</strong>tware and the virus<br />
pattern files must be kept up-to-date. Virus-infected computers must be removed from the network<br />
until they are verified as virus-free. Systems Managers are responsible for creating procedures that<br />
ensure anti-virus s<strong>of</strong>tware is run at regular intervals, and computers are verified as virus-free. Any<br />
activities with the intention to create and/or distribute malicious programs into IS&T networks (e.g.,<br />
viruses, worms, Trojan horses, e-mail bombs, etc.) are prohibited, in accordance with the Computer Use<br />
Policy.<br />
Refer to IS&T 's Anti-Virus Recommended Processes to help prevent virus problems.<br />
Noted exceptions: Machines with operating systems other than those based on Micros<strong>of</strong>t products are<br />
exceptions at the current time.<br />
-588-
Password Policy<br />
1.0 Overview<br />
Passwords are an important aspect <strong>of</strong> computer security. They are the front line <strong>of</strong> protection for user<br />
accounts. A poorly chosen password may result in the compromise <strong>of</strong> the College <strong>of</strong> Information Science<br />
and Technology's (IS&T) entire corporate network. As such, all IS&T employees (including contractors<br />
and vendors with access to IS&T systems) are responsible for taking the appropriate steps, as outlined<br />
below, to select and secure their passwords.<br />
2.0 Purpose<br />
The purpose <strong>of</strong> this policy is to establish a standard for creation <strong>of</strong> strong passwords, the protection <strong>of</strong><br />
those passwords, and the frequency <strong>of</strong> change.<br />
3.0 Scope<br />
The scope <strong>of</strong> this policy includes all personnel who have or are responsible for an account (or any form<br />
<strong>of</strong> access that supports or requires a password) on any system that resides at any IS&T facility, has<br />
access to the IS&T network, or stores any non-public IS&T information.<br />
4.0 Policy<br />
4.1 General<br />
All system-level passwords (e.g., root, enable, NT admin, application administration accounts,<br />
etc.) must be changed on at least a quarterly basis.<br />
All production system-level passwords must be part <strong>of</strong> the IS&T administered global password<br />
management database.<br />
All user-level passwords (e.g., email, web, desktop computer, etc.) must be changed at least<br />
every six months. The recommended change interval is every four months.<br />
User accounts that have system-level privileges granted through group memberships or<br />
programs such as "sudo" must have a unique password from all other accounts held by that<br />
user.<br />
Passwords must not be inserted into email messages or other forms <strong>of</strong> electronic<br />
communication.<br />
Where SNMP is used, the community strings must be defined as something other than the<br />
standard defaults <strong>of</strong> "public," "private" and "system" and must be different from the passwords<br />
used to log in interactively. A keyed hash must be used where available (e.g., SNMPv2).<br />
All user-level and system-level passwords must conform to the guidelines described below.<br />
4.2 Guidelines<br />
A. General Password Construction Guidelines<br />
Passwords are used for various purposes at the IS&T. Some <strong>of</strong> the more common uses include: user level<br />
accounts, web accounts, email accounts, screen saver protection, voicemail password, and local router<br />
logins. Since very few systems have support for one-time tokens (i.e., dynamic passwords which are only<br />
used once), everyone should be aware <strong>of</strong> how to select strong passwords.<br />
Poor, weak passwords have the following characteristics:<br />
The password contains less than eight characters<br />
-589-
The password is a word found in a dictionary (English or foreign)<br />
The password is a common usage word such as:<br />
o Names <strong>of</strong> family, pets, friends, co-workers, fantasy characters, etc.<br />
o Computer terms and names, commands, sites, companies, hardware, s<strong>of</strong>tware.<br />
o The words "UNO", " IS&T ", "<strong>Omaha</strong>", “password” or any derivation.<br />
o Birthdays and other personal information such as addresses and phone numbers.<br />
o Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc.<br />
o Any <strong>of</strong> the above spelled backwards.<br />
o Any <strong>of</strong> the above preceded or followed by a digit (e.g., secret1, 1secret)<br />
o Blank password<br />
Strong passwords have the following characteristics:<br />
Contain both upper and lower case characters (e.g., a-z, A-Z)<br />
Have digits and punctuation characters as well as letters e.g., 0-9, !@#$%^&*()_+|~-<br />
=\`{}[]:";'?,./)<br />
Are at least eight alphanumeric characters long and is a passphrase (Ohmy1stu9).<br />
Is not a word in any language, slang, dialect, jargon, etc.<br />
Are not based on personal information, names <strong>of</strong> family, etc.<br />
Passwords should never be written down or stored on-line. Try to create passwords that can be<br />
easily remembered. One way to do this is create a password based on a song title, affirmation,<br />
or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and<br />
the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.<br />
NOTE: Do not use either <strong>of</strong> these examples as passwords!<br />
B. Password Protection Standards<br />
Do not use the same password for IS&T accounts as for other non- IS&T access (e.g., personal ISP<br />
account, option trading, benefits, etc.). Where possible, don't use the same password for various IS&T<br />
access needs. Select a separate password to be used for an NT account and a UNIX account.<br />
Do not share IS&T passwords with anyone, including administrative assistants or secretaries. All<br />
passwords are to be treated as sensitive, Confidential IS&T information.<br />
Here is a list <strong>of</strong> "dont's":<br />
Don't reveal a password over the phone to ANYONE<br />
Don't reveal a password in an email message<br />
Don't reveal a password to the boss<br />
Don't talk about a password in front <strong>of</strong> others<br />
Don't hint at the format <strong>of</strong> a password (e.g., "my family name")<br />
Don't reveal a password on questionnaires or security forms<br />
Don't share a password with family members<br />
Don't reveal a password to co-workers while on vacation<br />
-590-
If someone demands a password, refer them to this document or have them call someone in the<br />
Information Security Department.<br />
Do not use the "Remember Password" feature <strong>of</strong> applications (e.g., Lotus Notes, Outlook, and Netscape<br />
Messenger).<br />
Again, do not write passwords down and store them anywhere in your <strong>of</strong>fice. Do not store passwords in<br />
a file on ANY computer system (including Palm Pilots or similar devices) without encryption.<br />
Change passwords at least once every six months (except system-level passwords which must be<br />
changed quarterly). The recommended change interval is every four months.<br />
If an account or password is suspected to have been compromised, report the incident to IS&T systems<br />
managers and change all passwords.<br />
C. Application Development Standards<br />
Application developers must ensure their programs contain the following security precautions.<br />
Applications:<br />
should support authentication <strong>of</strong> individual users, not groups.<br />
should not store passwords in clear text or in any easily reversible form.<br />
should provide for some sort <strong>of</strong> role management, such that one user can take over the<br />
functions <strong>of</strong> another without having to know the other's password.<br />
should support TACACS+ , RADIUS and/or X.509 with LDAP security retrieval, wherever possible.<br />
5.0 Definitions<br />
Terms<br />
Definitions<br />
Application Administration Account Any account that is for the administration <strong>of</strong> an application<br />
(e.g., Oracle database administrator, ISSU administrator).<br />
-591-
Personal Communication Devices and Voicemail Policy<br />
1.0 Purpose<br />
This document describes Information Security's requirements for Personal Communication Devices and<br />
Voicemail for the College <strong>of</strong> Information Science and Technology. (IS&T)<br />
2.0 Scope<br />
This policy applies to any use <strong>of</strong> Personal Communication Devices and IS&T Voicemail issued by IS&T or<br />
used for IS&T business.<br />
3.0 Policy<br />
3.1 Issuing Policy<br />
Personal Communication Devices (PCDs) will be issued only to IS&T personnel with duties that require<br />
them to be in immediate and frequent contact when they are away from their normal work locations.<br />
For the purpose <strong>of</strong> this policy, PCDs are defined to include handheld wireless devices, cellular<br />
telephones, laptop wireless cards and pagers. Effective distribution <strong>of</strong> the various technological devices<br />
must be limited to persons for whom the productivity gained is appropriate in relation to the costs<br />
incurred.<br />
Handheld wireless devices may be issued, for operational efficiency, to IS&T personnel who need to<br />
conduct immediate, critical IS&T business. These individuals generally are at the executive and<br />
management level. In addition to verbal contact, it is necessary that they have the capability to review<br />
and have documented responses to critical issues.<br />
3.2 Bluetooth<br />
Hands-free enabling devices, such as the Bluetooth, may be issued to authorized IS&T personnel who<br />
have received approval. Care must be taken to avoid being recorded when peering Bluetooth adapters,<br />
Bluetooth 2.0 Class 1 devices have a range <strong>of</strong> 330 feet.<br />
3.3 Voicemail<br />
Voicemail boxes may be issued to IS&T personnel who require a method for others to leave messages<br />
when they are not available. Voicemail boxes must be protected by a PIN which must never be the<br />
same as the last four digits <strong>of</strong> the telephone number <strong>of</strong> the voicemail box.<br />
3.4 Loss and Theft<br />
Files containing confidential or sensitive data may not be stored in PCDs unless protected by approved<br />
encryption. Confidential or sensitive data shall never be stored on a personal PCD. Charges for repair<br />
due to misuse <strong>of</strong> equipment or misuse <strong>of</strong> services may be the responsibility <strong>of</strong> the employee, as<br />
determined on a case-by-case basis. The cost <strong>of</strong> any item beyond the standard authorized equipment is<br />
also the responsibility <strong>of</strong> the employee. Lost or stolen equipment must immediately be reported.<br />
3.5 Personal Use<br />
PCDs and voicemail are issued for IS&T business. Personal is allowed but should be limited.<br />
3.6 PCD Safety<br />
-592-
Conducting telephone calls or utilizing PCDs while driving can be a safety hazard. Drivers should use<br />
PCDs while parked or out <strong>of</strong> the vehicle. If employees must use a PCD while driving, IS&T requires the<br />
use <strong>of</strong> hands-free enabling devices.<br />
4.0 Definitions<br />
Term<br />
Bluetooth<br />
Definition<br />
Bluetooth is an industrial specification for wireless personal area networks<br />
(PANs), also known as IEEE 802.15.1. Bluetooth provides a way to connect<br />
and exchange information between devices such as personal digital<br />
assistants (PDAs), and mobile phones via a secure, globally unlicensed<br />
short-range radio frequency. Source: Wikipedia<br />
Confidential or sensitive data All data that is not approved for public release shall be considered<br />
confidential or sensitive.<br />
-593-
Power Outage Policy and Procedures for Production Systems<br />
I. Current Building Situation During a Power Outage<br />
a. A pair <strong>of</strong> 40kVA battery backup units operating in parallel will maintain power to the<br />
equipment located in: 158B, 158R, 166, 158C, 158A, and the building keycard security<br />
system.<br />
b. The building’s emergency generator should cut in automatically during a power outage.<br />
However, the transfer switch appears to be incorrectly installed, which requires an<br />
occasional manual start.<br />
c. Building blast/fire doors will close during a power outage<br />
d. Faculty wall power outlets are not on UPS or generator power by default.<br />
e. Backup cooling units located in server rooms are NOT on the UPS, and will disengage<br />
when power fails.<br />
II.<br />
Policies and Priorities<br />
a. The following priorities are to be maintained during a power outage:<br />
1. A monitoring device inside the 158R server room that will collect critical<br />
operating environment and status data will be active at all times. This unit<br />
must have keyboard, mouse, and display access maintained at all times.<br />
2. Power to Primary and Backup Domain Controllers must be maintained at all<br />
times, unless operational failure is imminent due to environmental conditions.<br />
3. Power to Domain Name Servers must be maintained at all times, unless<br />
operational failure due to environmental conditions is imminent.<br />
4. Power to File Servers must be maintained for 30 minutes past the start <strong>of</strong> the<br />
outage, to allow faculty, staff, and students, time to save any open files.<br />
5. Power to E-mail servers must be maintained at all times, unless operational<br />
failure due to environmental conditions is imminent.<br />
6. Power to Certificate Servers must be maintained at all times, unless<br />
operational failure is imminent due to environmental conditions.<br />
7. All other production servers not mentioned above will be shut down 15<br />
minutes after the start <strong>of</strong> the power outage, following the defined<br />
procedures.<br />
b. The following personnel are to be notified immediately at the onset <strong>of</strong> a power outage.<br />
Notification should be <strong>of</strong> an automatic nature, provided by a monitoring service:<br />
1. Senior Systems Managers<br />
2. Production Systems Managers<br />
3. Research Systems Managers<br />
c. The following personnel are to direct the implementation <strong>of</strong> procedures during a power<br />
outage. These personnel are listed in order <strong>of</strong> required response:<br />
1. Assistant Production Systems Managers<br />
2. Senior Production Systems Managers<br />
-594-
3. College Computing Director/Dean’s Office<br />
d. In the event that insufficient College personnel are available to respond to the power<br />
outage, the Senior Systems Manager for the College <strong>of</strong> Engineering Technology should<br />
be contacted by the Senior Production Systems Managers to request aid.<br />
e. Each individually cooled environment (i.e. 158B, 158R, etc) should remain isolated from<br />
the remainder <strong>of</strong> the cooled environments for as long as possible.<br />
f. When power is restored to the building, a waiting period <strong>of</strong> 5 minutes should be<br />
observed to ensure that a subsequent power failure will not occur.<br />
g. When powering up equipment after a power failure, the following priorities should be<br />
observed. Each category should be completely restored before the next category is<br />
begun.<br />
1. Network Infrastructure<br />
2. Primary Domain Controllers<br />
3. Backup Domain Controllers<br />
4. Domain Name Servers<br />
5. File Servers<br />
6. E-mail and Certificate Servers<br />
7. All other systems<br />
h. After power failure ends, e-mail notification should be sent to all students, faculty, and<br />
staff to alert them to the occurrence. Systems Managers should prioritize data and<br />
system recovery over all other assignments for a minimum <strong>of</strong> two hours after a power<br />
failure.<br />
III.<br />
Procedures for Power Outages<br />
These procedures are intended to be followed in order by the person assuming<br />
responsibility during a power outage.<br />
1. Facilities Management and Planning should be notified <strong>of</strong> the outage. If not during<br />
normal working hours (8:00 a.m. to 6:00 p.m.) Campus Security should be notified.<br />
During notification, manual verification <strong>of</strong> the generator’s start should be requested.<br />
2. All College Production and Research Managers should be notified <strong>of</strong> the outage.<br />
3. CET Systems managers should be notified <strong>of</strong> the outage.<br />
4. Wide-area notification mechanisms should be utilized to notify Faculty, Staff and<br />
Students connected to College computing resources <strong>of</strong> the imminent shutdown <strong>of</strong> those<br />
resources, and the time frame for that shutdown. Notifications should be repeated<br />
every 15 minutes during the wait/notification period.<br />
5. Alternative cooling mechanisms should be located and brought to standby positions<br />
near all critical locations. The following locations have priority in the following order:<br />
o 158G – UPS Battery Room<br />
o 158R – Production Systems Server room<br />
o 158B – Research Systems Room<br />
-595-
6. After the required notification and wait period, all non-critical systems should be<br />
powered down.<br />
7. After the required notification and wait period, all File Servers should be shut down.<br />
8. Environmental factors within the monitored areas should be constantly watched. If<br />
environmental conditions continue to deteriorate, alternate cooling mechanisms should<br />
be implemented.<br />
9. Should dangerous conditions occur, a notification/wait period <strong>of</strong> 15 minutes should be<br />
instituted. Should dangerous conditions continue, affected critical systems should be<br />
powered down in the following order:<br />
o Backup Domain Controllers<br />
o E-mail and Certificate Servers<br />
o Domain Name Servers and Primary Domain Controllers.<br />
10. Upon Power restoration, systems should be restored according to policy.<br />
11. All Systems manager should be notified <strong>of</strong> the end <strong>of</strong> the outage.<br />
12. Notification should be sent to all Faculty, Staff, and Students, detailing the power<br />
outage, the duration, and any known effects <strong>of</strong> the outage, including damaged<br />
equipment and procedures for reporting problems to the Systems Office.<br />
13. For a minimum <strong>of</strong> two hours following the outage, Systems Repair Priority should be<br />
allocated to data and systems recovery first.<br />
14. A report should be sent from the responsible systems manager to the rest <strong>of</strong> the<br />
systems managers detailing the outage, duration, effects, and any suggested changes to<br />
better respond to future outages.<br />
-596-
Server Malware Protection Policy<br />
1.0 Overview: The College <strong>of</strong> Information Science and Technology (IS&T) is entrusted with the<br />
responsibility to provide pr<strong>of</strong>essional management <strong>of</strong> clients servers as outlined in each <strong>of</strong> the contracts<br />
with its customers. Inherent in this responsibility is an obligation to provide appropriate protection<br />
against malware threats, such as viruses and spyware applications. Effective implementation <strong>of</strong> this<br />
policy will limit the exposure and effect <strong>of</strong> common malware threats to the systems they cover.<br />
2.0 Purpose: The purpose <strong>of</strong> this policy is to outline which server systems are required to have antivirus<br />
and/or anti-spyware applications.<br />
3.0 Scope: This policy applies to all servers that IS&T is responsible to manage. This explicitly includes<br />
any system for which IS&T has a contractual obligation to administer. This also includes all server<br />
systems setup for internal use by IS&T staff, regardless <strong>of</strong> whether IS&T retains administrative obligation<br />
or not.<br />
4.0 Policy: IS&T operations staff will adhere to this policy to determine which servers will have antivirus<br />
and/or anti-spyware applications installed on them and to deploy such applications as appropriate.<br />
4.1 ANTI-VIRUS<br />
All servers MUST have an anti-virus application installed that <strong>of</strong>fers real-time scanning protection to files<br />
and applications running on the target system if they meet one or more <strong>of</strong> the following conditions:<br />
Non-administrative users have remote access capability<br />
The system is a file server<br />
NBT/Micros<strong>of</strong>t Share access is open to this server from systems used by non-administrative<br />
users<br />
HTTP/FTP access is open from the Internet<br />
Other “risky” protocols/applications are available to this system from the Internet at the<br />
discretion <strong>of</strong> the IS&T systems managers<br />
All servers SHOULD have an anti-virus application installed that <strong>of</strong>fers real-time scanning protection to<br />
files and applications running on the target system if they meet one or more <strong>of</strong> the following conditions:<br />
Outbound web access is available from the system<br />
4.2 MAIL SERVER ANTI-VIRUS<br />
If the target system is a mail server it MUST have either an external or internal anti-virus scanning<br />
application that scans all mail destined to and from the mail server. Local anti-virus scanning<br />
applications MAY be disabled during backups if an external anti-virus application still scans inbound<br />
emails while the backup is being performed.<br />
4.3 ANTI-SPYWARE<br />
All servers MUST have an anti-spyware application installed that <strong>of</strong>fers real-time protection to the target<br />
system if they meet one or more <strong>of</strong> the following conditions:<br />
Any system where non-technical or non-administrative users have remote access to the<br />
system and ANY outbound access is permitted to the Internet<br />
-597-
Any system where non-technical or non-administrative users have the ability to install<br />
s<strong>of</strong>tware on their own<br />
4.4 NOTABLE EXCEPTIONS<br />
An exception to the above standards will generally be granted with minimal resistance and<br />
documentation if one <strong>of</strong> the following notable conditions apply to this system:<br />
The system is a SQL server<br />
The system is used as a dedicated mail server<br />
The system is not a Windows based platform<br />
5.0 Definitions:<br />
TERM DEFINITION<br />
Server For purposes <strong>of</strong> this policy, a server is any computer system residing in the physically<br />
secured data center owned and operated by IS&T. In addition, this includes any system<br />
running an operating system specifically intended for server usage as defined by the<br />
IS&T systems staff that has access to internal secure networks. This includes, but is not<br />
limited to, Micros<strong>of</strong>t Server 2000 and all permutations, Micros<strong>of</strong>t Server 2003 and all<br />
permutations, any Linux/Unix based operating systems, and MAC operating systems<br />
that external users are expected to regularly connect to and VMS.<br />
Malware<br />
Spyware<br />
S<strong>of</strong>tware designed to infiltrate or damage a computer system without the owner's<br />
informed consent. It is a blend <strong>of</strong> the words "malicious" and "s<strong>of</strong>tware". The expression<br />
is a general term used by computer pr<strong>of</strong>essionals to mean a variety <strong>of</strong> forms <strong>of</strong> hostile,<br />
intrusive, or annoying s<strong>of</strong>tware or program code.<br />
Broad category <strong>of</strong> s<strong>of</strong>tware designed to intercept or take partial control <strong>of</strong> a computer's<br />
operation without the informed consent <strong>of</strong> that machine's owner or legitimate user.<br />
While the term taken literally suggests s<strong>of</strong>tware that surreptitiously monitors the user, it<br />
has also come to refer more broadly to s<strong>of</strong>tware that subverts the computer's operation<br />
for the benefit <strong>of</strong> a third party.<br />
Anti-virus S<strong>of</strong>tware<br />
Consists <strong>of</strong> computer programs that attempt to identify, thwart and eliminate computer<br />
viruses and other malicious s<strong>of</strong>tware (malware).<br />
-598-
Server Security Policy<br />
1.0 Purpose<br />
The purpose <strong>of</strong> this policy is to establish standards for the base configuration <strong>of</strong> internal server<br />
equipment that is owned and/or operated by the College <strong>of</strong> Information Science and Technology. (IS&T)<br />
Effective implementation <strong>of</strong> this policy will minimize unauthorized access to IS&T proprietary<br />
information and technology.<br />
2.0 Scope<br />
This policy applies to server equipment owned and/or operated by IS&T, and to servers registered under<br />
any IS&T -owned internal network domain.<br />
This policy is specifically for equipment on the internal IS&T network. For secure configuration <strong>of</strong><br />
equipment external to IS&T on the DMZ, refer to the Internet DMZ Equipment Policy.<br />
3.0 Policy<br />
3.1 Ownership and Responsibilities<br />
All internal servers deployed at IS&T must be owned by an operational group that is responsible for<br />
system administration. Approved server configuration guides must be established and maintained by<br />
each operational group, based on business needs and approved by IS&T Director <strong>of</strong> IT. Operational<br />
groups should monitor configuration compliance and implement an exception policy tailored to their<br />
environment. Each operational group must establish a process for changing the configuration guides,<br />
which includes review and approval by the IS&T Director <strong>of</strong> IT.<br />
Servers must be registered within the corporate enterprise management system. At a minimum,<br />
the following information is required to positively identify the point <strong>of</strong> contact:<br />
o Server contact(s) and location, and a backup contact<br />
o Hardware and Operating System/Version<br />
o Main functions and applications, if applicable<br />
Information in the enterprise management system must be kept up-to-date.<br />
Configuration changes for production servers must follow the appropriate change management<br />
procedures.<br />
3.2 General Configuration Guidelines<br />
Operating System configuration should be in accordance with approved systems guidelines.<br />
Services and applications that will not be used must be disabled where practical.<br />
Access to services should be logged and/or protected through access-control methods, when<br />
possible.<br />
The most recent security patches must be installed on the system as soon as practical, the only<br />
exception being when immediate application would interfere with business requirements.<br />
Trust relationships between systems are a security risk, and their use should be avoided. Do not<br />
use a trust relationship when some other method <strong>of</strong> communication will do.<br />
Always use standard security principles <strong>of</strong> least required access to perform a function.<br />
Do not use root when a non-privileged account will do.<br />
-599-
If a methodology for secure channel connection is available (i.e., technically feasible), privileged<br />
access must be performed over secure channels, (e.g., encrypted network connections using<br />
SSH or IPSec).<br />
Servers should be physically located in an access-controlled environment.<br />
Servers are specifically prohibited from operating from uncontrolled cubicle areas.<br />
3.3 Monitoring<br />
All security-related events on critical or sensitive systems must be logged and audit trails saved<br />
as follows:<br />
o All security related logs will be kept online for a minimum <strong>of</strong> 1 week.<br />
o Daily incremental backups will be retained for at least 1 month.<br />
o Weekly full backups <strong>of</strong> logs will be retained for at least 1 month.<br />
o Monthly full backups will be retained for a minimum <strong>of</strong> 2 years.<br />
Security-related events will be reported to IS&T systems managers, who will review logs and<br />
report incidents to the IS&T Director <strong>of</strong> IT. Corrective measures will be prescribed as needed.<br />
Security-related events include, but are not limited to:<br />
o Port-scan attacks<br />
o Evidence <strong>of</strong> unauthorized access to privileged accounts<br />
o Anomalous occurrences that are not related to specific applications on the host.<br />
3.4 Compliance<br />
Audits will be performed on a regular basis by authorized organizations within the College.<br />
Audits will be managed by the IS&T systems managers, in accordance with the Audit Policy.<br />
Every effort will be made to prevent audits from causing operational failures or disruptions.<br />
Audits will not be used for purposes <strong>of</strong> scanning faculty, staff, and student personal data.<br />
4.0 Definitions<br />
Term<br />
DMZ<br />
Server<br />
Definition<br />
De-militarized Zone. A network segment external to the corporate production network.<br />
For purposes <strong>of</strong> this policy, a Server is defined as an internal IS&T Server. Desktop<br />
machines and Lab equipment are not relevant to the scope <strong>of</strong> this policy.<br />
-600-
Teaching Assistant, Graduate Assistant, PhD Student, and Student<br />
Worker Acceptable Computer Use Policy<br />
The positions this document is directed towards are by their nature desirable and prestigious positions<br />
for students to hold. This also implies that the positions are only awarded to those students who have<br />
the maturity to also bear the responsibility implied in these positions. This document enacts into<br />
College policy those responsible behaviors before signing this policy. After signing this policy,<br />
responsible behavior will be expected. The College <strong>of</strong> Information Science and Technology, in many<br />
cases, provides student workers, graduate assistants, PhD students, and teaching assistants with a<br />
computer to use in the normal course <strong>of</strong> performing their day to day work. These computers are<br />
provided for the express purpose <strong>of</strong> performing College business. College computer users should be<br />
aware these are not personal systems, but rather are intended as utility systems that will be used in<br />
many cases by several people during a given day. IN the interest <strong>of</strong> providing a reliable service and one<br />
in which College computer users are abiding by ethical standards and the laws in effect where this<br />
computer use takes place, this acceptable us policy has been implemented. These policies are not<br />
intended for computers used in research projects or by Faculty. Student users <strong>of</strong> <strong>University</strong> computer<br />
systems agree to the following conditions. Failure to comply with this agreement and the documents<br />
reference in this agreement will result in loss <strong>of</strong> access to these systems and/or services, and possible<br />
other disciplinary or legal action.<br />
May not use these systems to harass or threaten individuals or groups or to create a hostile<br />
environment.<br />
May not store or transfer copyrighted material without the consent or public release by the<br />
legal owner <strong>of</strong> that material, including but not limited to s<strong>of</strong>tware, pictures, video, audio, and<br />
written material as defined by the United States Copyright Office in this document:<br />
http://lcweb.loc.gov/copyright<br />
May not access or attempt to access computing resources without proper authorization,<br />
including unauthorized use <strong>of</strong> someone’s account and password.<br />
May not send or present potentially damaging computer s<strong>of</strong>tware, including but not limited to<br />
computer viruses, and computer worms.<br />
May not use these systems for unsolicited bulk distribution <strong>of</strong> material or information to <strong>of</strong>f<br />
campus systems, including but not limit to mass email. May not use <strong>University</strong> systems or<br />
network resources for distribution <strong>of</strong> copyrighted computer s<strong>of</strong>tware, images, music, video or<br />
documents unless expressly permitted by the copyright holder.<br />
My not load or run peer-to-peer applications that are intended for the distribution <strong>of</strong> s<strong>of</strong>tware<br />
or digital media (music, video, or text). These applications include, but are not limited to Audio<br />
Galaxy, Napster, Bear Share, Lime Wire, mIRC, Bit Torrent, Azureus, and similar systems.<br />
May not store information or use these systems in any ways that violate state or federal laws or<br />
<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> policies including executive memorandum 16<br />
http://www.nebraska.edu/about/exec_memo16.pdf .<br />
May not sue these systems for commercial, business or any for-pr<strong>of</strong>it use without documented<br />
permission from the systems administrator and the individual to whom that administrator<br />
reports. The documented permission requirement shall include UNO Lotus Notes email or<br />
printed and signed documents.<br />
May not run additional services without documented permission from the <strong>of</strong>ficial administrators<br />
<strong>of</strong> the system.<br />
-601-
May not use these systems, the services on these systems or the network, to capture private<br />
information or content from other systems or to probe for system and service vulnerabilities<br />
without documented permission from the systems<br />
Continued on Next Page <br />
administrator <strong>of</strong> target systems. Loading <strong>of</strong> s<strong>of</strong>tware used for these purposes such as network<br />
sniffers, password crackers, and port scanners onto <strong>University</strong> systems is sufficient cause to<br />
assume this activity is taking place and to cause disciplinary action to be taken.<br />
If an investigation takes place, you understand that any and all <strong>of</strong> your UNO accounts and<br />
computer use may be subject to review by a designated system administrator and/or UNO<br />
Student Affairs and/or UNO security organizations, as accounts are considered to be the<br />
property <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>. Your accounts may be disabled during any<br />
investigation.<br />
Signed: ______________________________________________________________________________<br />
Printed Name: _______________________________________<br />
Date: __________________________<br />
Witnessed: __________________________________________<br />
Date: __________________________<br />
-602-
Virtual Private Network (VPN) Policy<br />
1.0 Purpose<br />
The purpose <strong>of</strong> this policy is to provide guidelines for Remote Access IPSec or L2TP Virtual Private<br />
Network (VPN) connections to the College <strong>of</strong> Information Science and Technology (IS&T) corporate<br />
network.<br />
2.0 Scope<br />
This policy applies to all IS&T employees, contractors, consultants, temporaries, and other workers<br />
including all personnel affiliated with third parties utilizing VPNs to access the IS&T network. This policy<br />
applies to implementations <strong>of</strong> VPN that are directed through an IPSec Concentrator.<br />
3.0 Policy<br />
Approved IS&T employees and authorized third parties (customers, vendors, etc.) may utilize the<br />
benefits <strong>of</strong> VPNs, which are a "user managed" service. This means that the user is responsible for<br />
selecting an Internet Service Provider (ISP), coordinating installation, installing any required s<strong>of</strong>tware,<br />
and paying associated fees. Further details may be found in the Remote Access Policy.<br />
Additionally,<br />
1. It is the responsibility <strong>of</strong> employees with VPN privileges to ensure that unauthorized users are<br />
not allowed access to IS&T internal networks.<br />
2. VPN use is to be controlled using either a one-time password authentication such as a token<br />
device or a RADIUS/ldap system with a strong passphrase.<br />
3. When actively connected to the corporate network, VPNs will force all traffic to and from the PC<br />
over the VPN tunnel: all other traffic will be dropped.<br />
4. Dual (split) tunneling is NOT permitted; only one network connection is allowed.<br />
5. VPN gateways will be set up and managed by IS&T systems network operational groups.<br />
6. All computers connected to IS&T internal networks via VPN or any other technology must use<br />
the most up-to-date anti-virus s<strong>of</strong>tware that is the corporate standard (McAfee); this includes<br />
personal computers.<br />
7. VPN users will be automatically disconnected from IS&T 's network after thirty minutes <strong>of</strong><br />
inactivity. The user must then logon again to reconnect to the network. Pings or other artificial<br />
network processes are not to be used to keep the connection open.<br />
8. The VPN concentrator is limited to an absolute connection time <strong>of</strong> 72 hours.<br />
9. Users <strong>of</strong> computers that are not IS&T-owned equipment must configure the equipment to<br />
comply with IS&T's VPN and Network policies.<br />
10. Only IS&T-approved VPN clients may be used.<br />
11. By using VPN technology with personal equipment, users must understand that their machines<br />
are a de facto extension <strong>of</strong> IS&T's network, and as such are subject to the same rules and<br />
regulations that apply to IS&T -owned equipment, i.e., their machines must be configured to<br />
comply with IS&T’s Security Policies.<br />
4.0 Definitions<br />
Term<br />
IPSec Concentrator<br />
Definition<br />
A device in which VPN connections are terminated.<br />
-603-
Wireless Communication Policy<br />
1.0 Purpose<br />
This policy discusses access to College <strong>of</strong> Information Science and Technology (IS&T) research networks<br />
via wireless communication mechanisms. Only wireless systems that meet the criteria <strong>of</strong> this policy or<br />
have been granted an exclusive waiver by IS&T systems managers in conjunction with the PKI Network<br />
Administrator are approved for connectivity to IS&T's networks.<br />
2.0 Scope<br />
This policy covers all wireless data communication devices (e.g., personal computers, cellular phones,<br />
PDAs, etc.) connected to any <strong>of</strong> IS&T 's internal networks. This includes any form <strong>of</strong> wireless<br />
communication device capable <strong>of</strong> transmitting packet data. Wireless devices and/or networks without<br />
any connectivity to IS&T’s networks do not fall under the purview <strong>of</strong> this policy.<br />
3.0 Policy<br />
3.1 Register Access Points and Cards<br />
All wireless Access Points / Base Stations connected to IS&T research networks must be registered and<br />
approved by the IS&T Director <strong>of</strong> IT in conjunction with the PKI Network Administrator. These Access<br />
Points / Base Stations are subject to periodic penetration tests and audits. All wireless Network<br />
Interface Cards (i.e., PC cards) used in laptop or desktop computers must be registered with IS&T<br />
systems staff and the PKI Network Administrator.<br />
3.2 Approved Research Projects<br />
All wireless LAN projects for research must be approved by the Dean <strong>of</strong> the College <strong>of</strong> Information<br />
Science and Technology.<br />
3.3 Technical Implementation/Virtual LAN<br />
All approved projects must be planned and implemented by the IS&T systems staff in conjunction with<br />
the PKI Network Administrator. All computers with wireless LAN devices for research projects must<br />
utilize an approved VLAN. All implementations must not interfere with the production (“unowireless”)<br />
network.<br />
3.4 Setting the SSID<br />
The SSID must be registered with IS&T systems staff and the PKI Network Administrator. The SSID<br />
shall not be named “unowireless”. The SSID shall not contain any identifying information such as<br />
student or employee name, or product identifier.<br />
4.0 Definitions<br />
Terms<br />
User Authentication<br />
VLAN<br />
“unowireless”<br />
Definitions<br />
A method by which the user <strong>of</strong> a wireless system can be verified as a legitimate<br />
user independent <strong>of</strong> the computer or operating system being used.<br />
a method <strong>of</strong> creating independent logical networks within a physical network.<br />
The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> production wireless network.<br />
-604-
APPENDIX 7 – ASSESSMENT DATA COLLECTION<br />
This appendix contains examples <strong>of</strong> the instruments used to collect assessment data, or extracts <strong>of</strong><br />
reports that reflect the assessment data. The complete set <strong>of</strong> assessments may be accessed at:<br />
http://accreditation.ist.unomaha.edu/<br />
To log in, use the username: pki-ist\abet<br />
and password: accreditus2<br />
-605-
Program Objectives<br />
Advisory Board<br />
-606-
Student Focus Group<br />
Questions for Student Focus Group 2008-10-24<br />
Initial Evaluation <strong>of</strong> Courses<br />
1. To what extent do you feel that the courses that you took are a valuable part <strong>of</strong> the curriculum?<br />
2. To what extent do you feel that you learned a lot in the courses that you took?<br />
Feedback on Courses<br />
For each course, students identified strengths, weaknesses, their own preparedness, and improvements.<br />
Curriculum Improvements<br />
How can we improve the undergraduate curriculum?<br />
Staying Power<br />
What would it take for you to stay at IS&T and enter the graduate program?<br />
-607-
Alumni Web Survey<br />
Introduction<br />
Thank you for taking the time to respond to this survey. The purpose <strong>of</strong> this survey is to get feedback<br />
from alumni <strong>of</strong> the College <strong>of</strong> IS&T on two important items:<br />
How well the program prepared you for a career in an IT-related pr<strong>of</strong>ession, and<br />
How the program might be improved to better prepare current and future students.<br />
Your opinions are a vital part <strong>of</strong> our on-going efforts to improve our programs.<br />
Survey<br />
1. Please indicate the undergraduate program from which you graduated:<br />
a. BS Information Systems<br />
b. BS Computer Science<br />
c. BS Bioinformatics<br />
2. Which <strong>of</strong> the following have you participated in within the last year (choose all that<br />
apply)?<br />
a. <strong>Self</strong>-paced tutorial<br />
b. Conferences<br />
c. Workshops<br />
d. Training courses<br />
e. College courses<br />
f. Other (explain)<br />
3. Have you taken any graduate courses since you received your bachelor’s degree?<br />
a. Yes<br />
b. No<br />
4. Have you completed a graduate program (e.g. MS, PhD) since you received you<br />
bachelor’s degree?<br />
a. Yes<br />
b. No<br />
5. For each <strong>of</strong> the following, (1) Indicate how important each has been to your work life,<br />
and (2) how well the undergraduate program prepared you to do it.<br />
How important to your How well did the<br />
work life?<br />
undergraduate program<br />
prepared you to do it?<br />
Understanding the role <strong>of</strong><br />
information systems in the<br />
context <strong>of</strong> the entire<br />
Very important<br />
Important<br />
Neither important nor<br />
-608-<br />
Very well<br />
Well<br />
Neither well nor poorly
organization<br />
Having strong analytic,<br />
problem solving, and critical<br />
thinking skills<br />
Having good interpersonal<br />
communication skills<br />
unimportant<br />
Unimportant<br />
Very unimportant<br />
Very important<br />
Important<br />
Neither important nor<br />
unimportant<br />
Unimportant<br />
Very unimportant<br />
Very important<br />
Important<br />
Neither important nor<br />
unimportant<br />
Unimportant<br />
Very unimportant<br />
Poorly<br />
Very poorly<br />
Very well prepared<br />
Well prepared<br />
Neither well prepared nor<br />
poorly prepared<br />
Poorly prepared<br />
Very poorly prepared<br />
Very well prepared<br />
Well prepared<br />
Neither well prepared nor<br />
poorly prepared<br />
Poorly prepared<br />
Very poorly prepared<br />
Having good team skills<br />
Having strong ethical<br />
principles<br />
Designing, implementing,<br />
delivering or managing<br />
technological solutions to<br />
organizational problems or<br />
opportunities<br />
Very important<br />
Important<br />
Neither important nor<br />
unimportant<br />
Unimportant<br />
Very unimportant<br />
Very important<br />
Important<br />
Neither important nor<br />
unimportant<br />
Unimportant<br />
Very unimportant<br />
Very important<br />
Important<br />
Neither important nor<br />
unimportant<br />
Unimportant<br />
Very unimportant<br />
Very well prepared<br />
Well prepared<br />
Neither well prepared nor<br />
poorly prepared<br />
Poorly prepared<br />
Very poorly prepared<br />
Very well prepared<br />
Well prepared<br />
Neither well prepared nor<br />
poorly prepared<br />
Poorly prepared<br />
Very poorly prepared<br />
Very well prepared<br />
Well prepared<br />
Neither well prepared nor<br />
poorly prepared<br />
Poorly prepared<br />
Very poorly prepared<br />
Building and/or using current<br />
techniques, skills, & tools<br />
appropriate to your job.<br />
Very important<br />
Important<br />
Neither important nor<br />
unimportant<br />
Unimportant<br />
Very unimportant<br />
-609-<br />
Very well prepared<br />
Well prepared<br />
Neither well prepared nor<br />
poorly prepared<br />
Poorly prepared<br />
Very poorly prepared<br />
Engaging in continuing Very important Very well prepared
pr<strong>of</strong>essional development<br />
(e.g. classes, workshops,<br />
seminars, conferences, selflearning)<br />
Important<br />
Neither important nor<br />
unimportant<br />
Unimportant<br />
Very unimportant<br />
a.<br />
Well prepared<br />
Neither well prepared nor<br />
poorly prepared<br />
Poorly prepared<br />
Very poorly prepared<br />
6. In your opinion, how well do the program outcomes listed below indicate what a graduate<br />
from the program should know or be able to do?<br />
a. Very well<br />
b. Well<br />
c. Neither well nor poorly<br />
d. Poorly<br />
e. Very poorly<br />
Students will have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to<br />
the discipline.<br />
Students will understand the local and global role <strong>of</strong> IS in supporting and enabling processes and<br />
strategies at the individual, organizational, and societal level.<br />
Students will communicate effectively to a range <strong>of</strong> audiences through listening and through<br />
oral, written, and visual presentation.<br />
Students will work effectively in a team environment and collaborate with others to accomplish<br />
a common goal.<br />
Students will understand and apply appropriate types <strong>of</strong> computer-based tools to support<br />
communication.<br />
Students will understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />
Students will understand and model organizational processes and data.<br />
-610-
Students will design, integrate, implement, and evaluate a computer-based system, process,<br />
component, or program to meet desired needs.<br />
Students will manage projects.<br />
Students will manage IS with a specified application environment.<br />
Students will manage change.<br />
Students will recognize the need for continuing pr<strong>of</strong>essional development.<br />
7. How could this list be improved? (open ended)<br />
8. Are there some topics or learning experiences that were missing from the program when<br />
you were in it that you feel should be a part <strong>of</strong> the program today?<br />
9. Envisioning the evolution <strong>of</strong> the role <strong>of</strong> information technologies in our world over the<br />
next five years, are there particular topics, issues, trends, tools, or practices that you feel<br />
we should pay particular attention to?<br />
10. Please suggest some changes not mentioned elsewhere that, if implemented, would<br />
improve the quality <strong>of</strong> the program from which you graduated.<br />
-611-
Survey <strong>of</strong> Graduates<br />
1. From which program are you graduating?<br />
a. Bachelor <strong>of</strong> Science in Bioinformatics<br />
b. Bachelor <strong>of</strong> Science in Computer Science<br />
c. Bachelor <strong>of</strong> Science in Information Assurance<br />
d. Bachelor <strong>of</strong> Science in Information Systems<br />
2. In the year following graduation, I will<br />
a. Stay in <strong>Nebraska</strong><br />
b. Leave <strong>Nebraska</strong><br />
c. Don’t know<br />
3. In the year following graduation, I am going to (check all that apply):<br />
a. Attend graduate school<br />
i. At UNO<br />
ii. Elsewhere<br />
b. Work in the IT field<br />
i. I am currently employed in IT (provide job title)<br />
ii. I have an <strong>of</strong>fer for a job in IT (provide job title)<br />
iii. I am searching for a job in IT<br />
c. Work in a non-IT field<br />
d. Other (specify)<br />
e. Don’t know<br />
4. Which <strong>of</strong> the following types <strong>of</strong> pr<strong>of</strong>essional development do you plan on taking within the next<br />
year? (Check all that apply)<br />
a. College course<br />
b. Training course<br />
c. Workshop<br />
d. <strong>Self</strong>-paced tutorial (e.g. web-based)<br />
e. Other (specify)<br />
5. Please provide one or more suggestions for improving the undergraduate program from which<br />
you are graduating.<br />
-612-
College Statistics Report<br />
Objective #2: Students receiving a bachelor’s degree from the College <strong>of</strong> IS&T are employed in a job that makes use <strong>of</strong> their education<br />
Measure Data collected AY 2002-2003 AY 2003-2004 AY 2004-2005 AY 2006-2007<br />
UO2.M4 Retention rates (CS) Fall-to-fall retention rates for full-time,<br />
73% 77% 88% 84%<br />
Retention rates (IS) degree-seeking freshmen taking courses<br />
82% 90% 100% 73%<br />
Retention rates (Total) within IS&T<br />
75% 80% 89% 80%<br />
UO2.M5 Minority retention rates (CS) Fall-to-fall retention rates for first-time,<br />
75% 86% 100% 67%<br />
Minority retention rates (IS) full-time minority degree-seeking students 100% 100% n/a 100%<br />
Minority retention rates<br />
(Total)<br />
within IS&T<br />
78% 88% 100% 71%<br />
Objective #6: Students, faculty, and staff in the College <strong>of</strong> IS&T participate in community and pr<strong>of</strong>essional outreach<br />
Measure Data collected 2002 2004 2005 2006<br />
UO6.M2 Internships<br />
Number <strong>of</strong> internships (calendar year) 84 79 64 56<br />
Number <strong>of</strong> firms involved 54 51 (est)<br />
Number <strong>of</strong> internship opportunities<br />
91 324 476 1176<br />
<strong>of</strong>fered from Career Resource Center<br />
(calendar year)<br />
Number <strong>of</strong> Career Resource Center<br />
200 (est) 430 600 750<br />
partner organizations<br />
UO6.M9 Funding from the community Dollar amount $ 452,943 $ 1,100,000<br />
Number <strong>of</strong> funded projects 11 19<br />
Access to education Number <strong>of</strong> distance education enabled<br />
25 20 1 3<br />
UO6.M12<br />
course sections<br />
Number <strong>of</strong> students enrolled in distance ed<br />
263 34 1 15<br />
courses<br />
UO6.M13 Events encouraging Number <strong>of</strong> events 15 22 22 13<br />
participation <strong>of</strong> underrepresented<br />
Number <strong>of</strong> individuals involved 585 438 719 932<br />
groups<br />
Objective #7: Resources available in the College <strong>of</strong> IS&T are appropriate to the programs <strong>of</strong>fered and are used in an<br />
efficient and effective manner.<br />
Measure Data collected AY 2002-2003 AY 2004-2005 AY 2005-2006 AY 2006-2007<br />
UO7.M1 Human Resources<br />
Student/Faculty ratio 31 27 23 21<br />
Faculty/Admin support staff (FTE) ratio 7.4 6.8 6.3 6.5<br />
Faculty/ Tech support staff (FTE) ratio 12.3 5.2 6.3 5.6<br />
Student/Tech support staff (FTE) ratio 379 143 145 115<br />
Student/ Advisor (FTE) ratio 413 412 387 357<br />
Student/ Admin support (FTE) ratio 227.4 185.6 145 133.8<br />
UO7.M3 IS&T financial assistance/ student ratio 0 $ 16.98 $ 18.90 $ 22.18<br />
Financial Resources Annual budget for physical and human $ 5,364,108 $ 6,058,836 $ 6,726,702 $ 7,300,862<br />
UO7.M4<br />
resources in IS&T<br />
UO7.M7 Physical Resources<br />
Number <strong>of</strong> sections <strong>of</strong> IS&T classes 459 471 443 268<br />
Number <strong>of</strong> sections IS&T classes not<br />
22 22 13 6<br />
<strong>of</strong>fered at PKI because <strong>of</strong> space<br />
constraints<br />
UO7.M9<br />
Number <strong>of</strong> students enrolled in IS&T /<br />
workstations ratio<br />
3.5 2.9 2.7 2.5<br />
-613-
Faculty Annual Reviews<br />
Objective #4<br />
Objective #5<br />
Objective #6<br />
2003 2005 2007 2009<br />
Faculty in the College <strong>of</strong> IS&T contribute to the advancement <strong>of</strong> their disciplines through<br />
scholarly activity<br />
Peer-reviewed journal articles 20 15 22 28<br />
Peer-reviewed proceedings 29 16 35 37<br />
Conference presentations 11 14 13 8<br />
Book chapters 7 18 9 10<br />
Monographs / Books 2 3 2 2<br />
Editorial board service 22 25 24 30<br />
Other editorial activity (e.g. conference<br />
section chair) 20 18 20 13<br />
Grants funded (No.) 12 19 11 13<br />
Grants funded ($) $ 374,507 $ 422,339 $ 1,643,474 $ 891,207<br />
Grants submitted (unfunded) 20 3 10 21<br />
Scholarly activity with direct relevance to UG<br />
students 6 1 0 38<br />
Faculty and staff in the College <strong>of</strong> IS&T regularly update their pr<strong>of</strong>essional knowledge and skills<br />
and continually develop and enhance programs to meet the needs <strong>of</strong> our students and<br />
community.<br />
Count <strong>of</strong> pr<strong>of</strong>essional development activities<br />
related to courses in various categories 2 5 13 20<br />
Count <strong>of</strong> pr<strong>of</strong>essional development activities<br />
related to advising & support 0 0 1 0<br />
New courses 12 15 6 1<br />
Courses with major change 6 12 11 6<br />
Courses with minor change 26 11 10 32<br />
Students, faculty, and staff in the College <strong>of</strong> IS&T participate in community and pr<strong>of</strong>essional<br />
outreach.<br />
Number <strong>of</strong> projects with external clients<br />
(graduate) 49 58 16 12<br />
Number <strong>of</strong> projects with external clients<br />
(undergraduate) 30 24 22 26<br />
Membership in corporate, pr<strong>of</strong>essional,<br />
advisory, or civic boards 6 2 2 0<br />
Pr<strong>of</strong>essional publications and media<br />
appearances 1 0 5 0<br />
Speaches to popular conferences, civic<br />
groups, meetings 15 9 13 22<br />
Training, consulting, technology transfer<br />
activities 1 3 4 4<br />
Contributions to other institutes 1 8 1 1<br />
Volunteer work 10 1 0 1<br />
-614-
Faculty Questionnaire<br />
General<br />
1. With which department are you affiliated?<br />
Library Facilities<br />
1. The library resources are adequate to enable you to meet your responsibilities and pr<strong>of</strong>essional needs.<br />
2. The process by which you may request the library to order books or subscriptions is adequate<br />
[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />
3. The pr<strong>of</strong>essional librarians and library support staff adequately support your responsibilities and pr<strong>of</strong>essional needs<br />
[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />
4. Access to the library’s system for locating and obtaining information is adequate.<br />
[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />
Classroom Equipment<br />
5. The equipment available in classrooms where you teach is adequate for your teaching needs.<br />
[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />
Faculty Offices<br />
Labs<br />
6. Your <strong>of</strong>fice enables you to meet your responsibilities and pr<strong>of</strong>essional needs<br />
[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />
7. The special purpose labs (e.g. those on the 3rd floor) are adequate to meet your needs.<br />
Support Staff<br />
8. The number <strong>of</strong> support staff is adequate to enable you to meet your responsibilities and pr<strong>of</strong>essional needs.<br />
Comment<br />
If you wish, please elaborate on any answer given above.<br />
-615-
Task list, resource list<br />
Economic Feasibility Analysis<br />
Statement <strong>of</strong> work<br />
Enterprise model<br />
Workflow<br />
Baseline Project Plan<br />
Meeting minutes, other comm.<br />
process model<br />
IDEF0<br />
use cases<br />
work flow<br />
Tracking GANTT<br />
Update <strong>of</strong> project plan<br />
IDEF1X ER Diagram<br />
Database Design<br />
Computer Architecture Design<br />
Control plan<br />
Interface design<br />
Structure Charts (proprietary s<strong>of</strong>tware)<br />
Testing plan<br />
Implementation plan<br />
Maintenance plan<br />
Documentation<br />
System construction/prototyping<br />
Final GANTT diagram<br />
Rework <strong>of</strong> Economic Feasibility Analysis<br />
Post project evaluation<br />
Correspondence between original<br />
requirements analysis and final deliverables<br />
Group presentation<br />
Program Outcomes<br />
Capstone project review<br />
M2 M4 M5 M6 M8 M9<br />
M1 M3 M7 Other<br />
PROJECT:<br />
EVALUATOR:<br />
DATE:<br />
U - Unsatisfactory<br />
E - Emerging<br />
P - Pr<strong>of</strong>icient<br />
D - Distinguished<br />
NO - Not Observed<br />
Objective (a) Students w ill have an ability to apply know ledge <strong>of</strong> computing<br />
and mathematics appropriate to the discipline.<br />
Objective (b) Students w ill have a broad organizational and real-w orld<br />
perspective<br />
(1) Understand the local and global role <strong>of</strong> information systems in supporting<br />
and enabling processes and strategies at the individual, organizational, and<br />
societal level<br />
Objective (c) Students w ill have strong analytic, problem solving, and critical<br />
thinking skills<br />
(1) Apply traditional and contemporary analysis and design techniques to<br />
identify and analyze organizational problems or opportunities, formulate<br />
appropriate strategies and solutions using information technologies, and<br />
evaluate the effectiveness <strong>of</strong> propos<br />
Objective (d) Students w ill have good interpersonal communication, team<br />
skills, and strong ethical principles<br />
(1) Communicate effectively to a range <strong>of</strong> audiences through listening and<br />
through oral, written, and visual presentation<br />
(2) W ork effectively in a team environment and collaborate with others to<br />
accomplish a common goal.<br />
(3) Understand and apply appropriate types <strong>of</strong> computer-based tools to<br />
support communication.<br />
(4) Understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong><br />
conduct<br />
Objective (e) Students w ill be able to design, implement, deliver, and<br />
manage technological solutions to organizational problems or to take<br />
advantage <strong>of</strong> opportunities.<br />
(1) Understand and model organizational processes and data<br />
(2) Design, integrate, implement, and evaluate a computer-based system,<br />
process, component, or program to meet desired needs.<br />
(3) Manage projects.<br />
(4) Manage information systems within a specific application environment<br />
(5) Manage organizational change<br />
(6) Manage project change<br />
Principal strengths:<br />
Principal weaknesses:<br />
Suggestions for improving the content or pedagogy <strong>of</strong> ISQA 4110 and ISQA 4120:<br />
-616-
Writing sample<br />
-617-
Topic area exam<br />
ISQA 3300 File Structures<br />
-618-
CIST 2500 Statistics<br />
-619-
Ethics case study<br />
-620-