BIS Self-Study Appendices - University of Nebraska Omaha

BIS Self-Study Appendices - University of Nebraska Omaha BIS Self-Study Appendices - University of Nebraska Omaha

23.10.2014 Views

-2-


APPENDIX 1 – INSTITUTIONAL SUMMARY ....................................................................... 5<br />

APPENDIX 2 – COURSE DESCRIPTIONS ........................................................................... 27<br />

APPENDIX 3 – FACULTY VITAE ....................................................................................... 353<br />

APPENDIX 4 – CURRENT LIST OF SERIALS TITLES .................................................. 501<br />

APPENDIX 5 – STRATEGIC PLAN FOR INFORMATION<br />

TECHNOLOGY SERVICE .......................................................................... 503<br />

APPENDIX 6 – COLLEGE OF IS&T SYSTEM OVERVIEW ............................................ 529<br />

APPENDIX 7 – ASSESSMENT DATA COLLECTION ...................................................... 605<br />

-3-


-4-


APPENDIX 1 – INSTITUTIONAL SUMMARY<br />

The Institution<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong><br />

John E. Christensen, Chancellor<br />

Type <strong>of</strong> Control<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> is a comprehensive, public university located in the heart <strong>of</strong><br />

<strong>Nebraska</strong>’s largest city. It is the second-largest higher education campus in the state. UNO is part <strong>of</strong> the<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> system, which also includes the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-Lincoln, the <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> at Kearney and the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Medical Center.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, with 471 full-time faculty members, <strong>of</strong>fers approximately 100<br />

baccalaureate degree programs and more than 60 masters and doctoral degree programs.<br />

Undergraduate degree programs are <strong>of</strong>fered in the colleges <strong>of</strong> Arts and Sciences, Business<br />

Administration, Education, Fine Arts, Information Science and Technology, Public Affairs and Community<br />

Service, and Division <strong>of</strong> Continuing Studies. Programs and courses also are <strong>of</strong>fered in the College <strong>of</strong><br />

Human Resources and Family Sciences, the College <strong>of</strong> Engineering and Technology, the College <strong>of</strong><br />

Agriculture and Natural Resources, and the College <strong>of</strong> Architecture, which are administered by the<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-Lincoln. The College <strong>of</strong> Public Affairs and Community Service is administered by<br />

the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> on both the <strong>Omaha</strong> and Lincoln campuses.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> has a central administration with a President at the helm who reports to an<br />

elected Board <strong>of</strong> Regents. Each campus including UNO has a chancellor who reports to the system<br />

President. UNO is organized into five colleges (College <strong>of</strong> Information Science & Technology, College <strong>of</strong><br />

Fine Arts, Communication and Media, College <strong>of</strong> Public Administration and Community Affairs, College<br />

<strong>of</strong> Education and the College <strong>of</strong> Arts & Sciences), with Deans who report to the Vice Chancellor <strong>of</strong><br />

Academic Affairs.<br />

History <strong>of</strong> Institution<br />

What is now the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> was founded in 1908 as the <strong>University</strong> <strong>of</strong> <strong>Omaha</strong>, a<br />

private non-sectarian college, with a campus at 24th and Pratt Streets in northeast <strong>Omaha</strong>. The first<br />

term <strong>of</strong> the co-educational college began in 1909, under the leadership <strong>of</strong> Dr. Daniel E. Jenkins, with<br />

twenty students.<br />

The movement to make the <strong>University</strong> a municipal institution began in 1929, and in May, 1930 the<br />

citizens <strong>of</strong> <strong>Omaha</strong> voted to establish the Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong>. In the summer <strong>of</strong> 1930, the<br />

<strong>Omaha</strong> Board <strong>of</strong> Education selected the first <strong>University</strong> Board <strong>of</strong> Regents who was inducted into <strong>of</strong>fice<br />

-5-


on July 1, 1930. In January, 1931 the new Board <strong>of</strong> Regents took over the <strong>University</strong> <strong>of</strong> <strong>Omaha</strong> and its<br />

properties.<br />

The expansion <strong>of</strong> the Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong> in the early 1930s led to a decision to move the<br />

campus to a 52-acre site southwest <strong>of</strong> Dodge and 60th Streets. In November 1936, the <strong>University</strong><br />

secured a grant from the Works Progress Administration which, together with some accrued building<br />

funds, financed the construction <strong>of</strong> a Georgian-style building. This building, now called Arts and<br />

Sciences Hall, was finished in 1938 and served as the sole campus building until the 1950s.<br />

In July 1968, the citizens <strong>of</strong> <strong>Omaha</strong> voted to transfer all <strong>University</strong> property to the <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong>, and the former Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong> became the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>.<br />

The <strong>University</strong> began rapid growth when it became a part <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> System.<br />

Enrollment was 8,730 in the fall <strong>of</strong> 1967 which was the last year as the Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong>.<br />

Three years later, enrollment was 13,185, a growth <strong>of</strong> 51 percent in the first three years as the<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>. Student enrollment for the fall 2003 semester is 14,959.<br />

The Dodge Street campus has expanded from its original 52 acres to the current 158.5 acres at two<br />

locations. On January 17, 1998 the Board <strong>of</strong> Regents approved a ground lease with <strong>Nebraska</strong> Housing I<br />

Limited Partnership (with Century Development as the general partner) to provide 576 beds <strong>of</strong> student<br />

housing at UNO. Six buildings and a club/<strong>of</strong>fice was completed for the fall 1999 semester and Scott Hall<br />

was completed for the fall 2000 semester which provided housing for an additional 164 students. Scott<br />

Village opened in fall 2003; total on-campus housing capacity is now 1,212 students. Groundbreaking for<br />

The Peter Kiewit Institute <strong>of</strong> Information Science, Technology and Engineering began on September 10,<br />

1997 and was open for the fall 1999 semester. This 147,797 square foot facility is located on the former<br />

Aksarben property and is designed to meet present needs and has the flexibility to adapt easily to<br />

breaking technologies <strong>of</strong> tomorrow. The building will house UNO’s College <strong>of</strong> Information Science and<br />

Technology and the <strong>Omaha</strong>-based programs <strong>of</strong> UNL’s College <strong>of</strong> Engineering and Technology.<br />

Student Body<br />

With a student body <strong>of</strong> 14,959 undergraduate and graduate students, the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at<br />

<strong>Omaha</strong> strives to treat each student as an individual. The UNO student population is a diverse mix <strong>of</strong> full<br />

and part-time students, men and women, and traditional and non-traditional-age enrollees. Students<br />

come from all walks <strong>of</strong> life, from business pr<strong>of</strong>essionals to international students. Such broad<br />

backgrounds and experiences enrich the classroom atmosphere. Ample opportunity is provided for<br />

specialized study in terms <strong>of</strong> interest, talent and ultimate vocational objective. Thus, the <strong>University</strong> is<br />

concerned that its graduates be good citizens who earn a better living and live a richer, fuller life.<br />

The <strong>University</strong>, in addition to <strong>of</strong>fering courses for college credit, designs training courses for thousands<br />

<strong>of</strong> business and industrial employees; provides in-service training for elementary and secondary school<br />

-6-


teachers; conducts television classes for college credit and sponsors a wide variety <strong>of</strong> conferences,<br />

workshops, lectures, and fine art events to enrich the college credit <strong>of</strong>ferings.<br />

Opportunities for teaching and research abroad, coordinated by the Office <strong>of</strong> International Studies and<br />

Programs, exist through the <strong>University</strong>’s network <strong>of</strong> sister institutions in Germany, India, Japan, Norway<br />

the Philippines, Romania and Czechoslovakia, and through exchange programs with China, Austria,<br />

Russia, Belgium and Mexico.<br />

Regional or Institutional Accreditation<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> is accredited by the North Central Association <strong>of</strong> Colleges and<br />

Secondary Schools, and has programs which are accredited or approved by the National Council for<br />

Accreditation <strong>of</strong> Teacher Education, the Council for Accreditation <strong>of</strong> Counseling and Related Educational<br />

Programs, the National Council on Social Work Education, the Engineers Council for Pr<strong>of</strong>essional<br />

Development, Computing Accreditation Commission/Accreditation Board for Engineering and<br />

Technology, National Association for Industrial Technology, the American Home Economics<br />

Association(for undergraduate programs), the American Dietetic Association, the AACSB International –<br />

the Association to Advance Collegiate Schools <strong>of</strong> Business, the National Association <strong>of</strong> School <strong>of</strong> Music,<br />

the National Association <strong>of</strong> Schools <strong>of</strong> Public Affairs and Administration, the Educational Standards<br />

Board <strong>of</strong> the Board <strong>of</strong> Examiners in Speech-Language Pathology and Audiology, the Commission on<br />

Accreditation <strong>of</strong> Allied Health Education Programs (CAAHEP), the Council on Aviation Administration,<br />

Association <strong>of</strong> Small Business Development Centers, and the American Chemical Society.<br />

UNO’s courses are accepted for purposes <strong>of</strong> teacher certification by the <strong>Nebraska</strong> State Department <strong>of</strong><br />

Education. The Elementary School, Secondary School and Community Counseling programs are<br />

accredited by the Council for the Accreditation <strong>of</strong> Counseling and Related Educational Programs<br />

(CACREP), the national accrediting agency for Counselor Education programs.<br />

Course credits from UNO are accepted by other member colleges and universities <strong>of</strong> the North Central<br />

Association and by member institutions <strong>of</strong> other regional accrediting agencies<br />

Personnel and Policies<br />

Promotion and Tenure<br />

In general, tenure-track junior faculty must be reappointed each year. Their portfolios are reviewed first<br />

by a departmental committee consisting <strong>of</strong> all tenured faculty members within the department. This<br />

committee evaluates the individual's performance as outstanding, above average, average, or belowaverage<br />

in the three categories <strong>of</strong> teaching, research, and service. In addition, a vote is taken on<br />

whether to reappoint the individual. This evaluation and the vote, together with supporting arguments<br />

and recommendations for the department chair and for the individual, are submitted to the faculty<br />

member review and possible comments. Then the portfolios are submitted to the department chair.<br />

-7-


The department chair writes a recommendation on whether to reappoint the individual or not.<br />

Following the Department chair's review, the faculty member reviews the portfolio prior to its<br />

submission to the College Personnel Committee, which similarly evaluates the faculty member's<br />

accomplishments in teaching, research, and service, and votes on reappointment. The recommendation<br />

<strong>of</strong> the Personnel Committee, consisting <strong>of</strong> three members each <strong>of</strong> the ISQA and CS departments, is then<br />

reviewed by the faculty member, and then the portfolio is submitted to the Dean. Having received<br />

recommendations from the committees, the department chair and the College Personnel Committee,<br />

the Dean writes a recommendation to the Senior Vice Chancellor for Academic and Student Affairs, who<br />

makes the final decision on reappointment. Prior to submission to the Vice Chancellors Office, the<br />

faculty member is required to review and sign the portfolios.<br />

The process for tenure and promotion is similar. Unless a faculty member has been hired on a "fasttrack"<br />

to tenure, he or she submits a tenure packet for review during the fall <strong>of</strong> the sixth year <strong>of</strong><br />

employment at UNO. The tenure packet is reviewed by the same committees and individuals as for<br />

reappointment with the faculty member allowed the opportunity to review the portfolio after each<br />

review and recommendation. The difference is that the departmental committee now consists only <strong>of</strong><br />

those individuals who have already received tenure. Each committee votes on whether or not to<br />

recommend tenure and/or promotion. Rather than making the final decision in the case <strong>of</strong> tenure, the<br />

Senior Vice Chancellor for Academic and Student Affairs makes recommendations to the Board <strong>of</strong><br />

Regents, which must approve each decision.<br />

To be eligible for tenure, an individual must be evaluated as outstanding in either teaching or research,<br />

and above average in the other. Service must be average or better. To help make this evaluation more<br />

objective, the College faculty has approved the use <strong>of</strong> a scoring matrix to assist the committees in<br />

evaluating the scholarly contribution <strong>of</strong> various elements <strong>of</strong> the tenure packet. This scoring matrix may<br />

be made available upon request. This matrix is used as an aid in decision making, but does automate<br />

the tenure decision. Committee members rely on their own judgments and letters <strong>of</strong> reference from<br />

those outside the College who may be in a position to evaluate the faculty member's scholarly<br />

contributions.<br />

Depending on their pr<strong>of</strong>essional experience prior to hire, a faculty member may be hired on a "fasttrack"<br />

tenure schedule, submitting a tenure packet in the fall <strong>of</strong> third year <strong>of</strong> employment.<br />

Faculty Salaries<br />

Each February, all faculty members must submit an Annual Performance Review report, which is used as<br />

the basis for annual performance reviews by the Department Faculty, Department Chair, and the Dean.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> chapter <strong>of</strong> the American Association <strong>of</strong> <strong>University</strong> Pr<strong>of</strong>essors in<br />

their collective bargaining agreement with the faculty negotiates with the <strong>University</strong> the total dollars<br />

that shall be used in determining salary increase for satisfactory performance. This is distributed across<br />

campus on an equal increase for each faculty member who has achieved a satisfactory performance<br />

rating.<br />

-8-


The same Annual Performance Review report is used as the basis for determining merit salary<br />

adjustments. Each year, the Senior Vice Chancellor informs the College <strong>of</strong> the availability <strong>of</strong> money for<br />

merit salary increases which is determined from the amount specified in the Union Bargaining<br />

Agreement less any promotion increases achieved by campus faculty during the<br />

reappointment/promotion/tenure process. Each Department Committee reviews the annual<br />

Performance Review Reports and categorizes each faculty member in the three areas <strong>of</strong> research,<br />

service and teaching. The review is submitted to the department chairperson who then uses these<br />

reviews to assist in assessing faculty performance. The chairperson determines categories based upon<br />

department input and to determine merit salary increments which are submitted to the Dean. The<br />

Dean reviews the recommendations and makes any adjustments that he deems appropriate and the<br />

information is forwarded to the Academic and Student Affairs Office.<br />

Faculty Benefits<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> has a workforce <strong>of</strong> approximately 13,000, including faculty and staff<br />

members on campuses and in outreach locations throughout the state. As one <strong>of</strong> <strong>Nebraska</strong>'s largest<br />

employers, the <strong>University</strong> <strong>of</strong>fers excellent benefits, tuition assistance for faculty and staff and their<br />

families, a diverse multicultural work environment and access to tremendous cultural and education<br />

opportunities.<br />

The normal retirement age for all members <strong>of</strong> the <strong>University</strong> staff is 59 1/2 years. Employees may retire<br />

at age 55 after 10 years <strong>of</strong> service with the <strong>University</strong> with earned annuity benefits computed on an<br />

actuarially equivalent basis. An employee also may retire prior to the normal retirement age because <strong>of</strong><br />

physical or mental disability that prevents such employee from satisfactorily performing work. A faculty<br />

member who is disabled because <strong>of</strong> physical or mental disability and who carries the <strong>University</strong> group<br />

long-term disability income insurance may request a disability leave in lieu <strong>of</strong> a disability retirement.<br />

Among the benefits in the Fringe Benefit Program <strong>of</strong>fered to retirees and early retirees are group life<br />

insurance with various age limits, group medical insurance (or health maintenance organization<br />

participation) which includes prescription benefits, group dental insurance, and long-term care<br />

insurance. The retired employee pays the entire premium for these insurance options.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> provides employees a retirement plan for the purpose <strong>of</strong> accumulating<br />

lifetime retirement income through participation in the Basic Retirement Plan. Participation is<br />

mandatory at age 30 and optional at age 26 with two years <strong>of</strong> service. Both the employee and the<br />

<strong>University</strong> contribute to the basic retirement plan based on a percentage <strong>of</strong> income on a pre-tax basis.<br />

The employee chooses between two levels <strong>of</strong> participation: Tier 1 is 3.5 percent for employee’s<br />

contribution and 6.6 percent for the <strong>University</strong>. Tier 2 is 5.5 percent for the employee’s contribution<br />

and 8.0 percent for the <strong>University</strong>. All contributions, including those made by the <strong>University</strong> are vested<br />

immediately in the employee’s name. Employees have the option to allocate contributions with TIAA-<br />

-9-


CREF and/or Fidelity Investments in several investment categories. Accumulations can be accessed after<br />

employment with the <strong>University</strong> is terminated and can be taken as a lifetime retirement annuity or as a<br />

lump sum payment.<br />

Employees may also participate in the Supplemental Retirement Plan (SRA) which establishes individual<br />

annuity and/or custodial accounts for the purpose <strong>of</strong> supplementing the basic retirement plan. Any<br />

employee, regardless <strong>of</strong> age or length <strong>of</strong> service, may enroll in the SRA. All contributions are made on a<br />

pre-tax, voluntary basis and no <strong>University</strong> contributions are made to this plan. Participants may invest<br />

with TIAA-CREF and/or Fidelity Investments. Accumulations can be accessed only after employment<br />

with <strong>University</strong> is terminated and can be taken as a lifetime retirement annuity or as a lump sum<br />

payment. In addition to the basic and supplemental retirement programs, the <strong>University</strong> also<br />

participates in the Federal Social Security Program.<br />

All retired faculty who have met the normal retirement regulations are also eligible for the employee<br />

scholarship program. Retirees whose applications have been approved pay all normal admission and<br />

matriculation fees. They shall also pay all usual course-related costs such as books and supplies. The<br />

courses may be taken for credit or audit. The program allows tuition equal to the <strong>University</strong>’s residencytuition-charge-per-semester<br />

credit hours less $1.00 per semester credit hour. The program is limited to<br />

not more than 15 credit hours in any 12-month period and is restricted to no more than 6 credit hours<br />

per semester. The program also allows retired employees to be eligible for the Dependent Scholarship<br />

Program which allows a spouse or dependent children to use the employee’s scholarship. Full-time<br />

enrollment status is required for a dependent child to be eligible but not for a spouse and is limited to<br />

undergraduate academic credit courses at any campus <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>.<br />

Retired faculty has the same right to <strong>University</strong> non-academic facilities and services as full-time<br />

employees. These include access and/or admission to <strong>University</strong> non-academic facilities, services,<br />

intercollegiate athletic events, and fine arts programs.<br />

-10-


Education Unit<br />

The chief academic <strong>of</strong>ficer is Dr. Terry Hynes, Senior Vice Chancellor <strong>of</strong> Academic Affairs.<br />

The complete hierarchy <strong>of</strong> the educational unit is provided in the following organizational<br />

chart.<br />

-11-


Credit Unit<br />

We count the 50 minute meeting <strong>of</strong> classroom contact as equal to one contact hour and our semesters<br />

are 16 weeks total which includes one week for finals and one week (5 days total) <strong>of</strong> non-class time<br />

(Spring Break in the Spring semester and Fall Break and Thanksgiving Break in the Fall semester) which is<br />

a total <strong>of</strong> 28 weeks <strong>of</strong> scheduled instruction between a fall and spring semester.<br />

Instructional Modes<br />

In addition to traditional on-campus instruction, the College <strong>of</strong> IS&T has been <strong>of</strong>fering online or distance<br />

education courses. The College <strong>of</strong> IS&T collaborates with the Division <strong>of</strong> Continuing Studies to <strong>of</strong>fer<br />

online degrees in a BGS in MIS and BGS in IT. The BS in MIS is only two or three courses from having<br />

their program online. The following courses have been developed into an online <strong>of</strong>fering:<br />

Pre-requisites for BGS in MIS<br />

*CIST 1100 – Introduction to Personal Computers<br />

*CSCI 1400 – Introduction to Computer Programming<br />

*CIST 2500 – Introduction to Statistics<br />

*ISQA 3210 – Advanced Technology for Personal Productivity<br />

Required Courses<br />

*CIST 3100 – Organizations, Applications, and Technology<br />

*CSCI 1620 – Introduction to Computer Science II<br />

*ISQA 3300 – File Structures for Information Systems<br />

*ISQA 3310 – Managing the Database Environment<br />

**ISQA 4110 – Information Systems Analysis<br />

**ISQA 4120 – Systems Design and Implementation<br />

**ISQA 3400 – Business Data Communications<br />

*CIST 3110 – Information Technology Ethics<br />

*CIST 3600 – Information Security and Policy<br />

*denotes the courses that have been developed and available for online <strong>of</strong>fering<br />

**denotes that these courses are under development and will be available Fall Semester 2009.<br />

Several <strong>of</strong> these courses are <strong>of</strong>fered only once a year or twice a year. For example, CIST 3600 is<br />

<strong>of</strong>fered Spring Semester during the daytime and an online course would be available for<br />

evening students. Courses could alternate semesters between an in-person and online delivery<br />

mode.<br />

Grade-Point Average<br />

For all programs in the College <strong>of</strong> IS&T, a minimum cumulative GPA <strong>of</strong> 2.5 is required for graduation. A<br />

student must obtain a grade <strong>of</strong> C- or better in each class counted towards the degree.<br />

-12-


Academic Supporting Units<br />

The following departments teach courses that are required for the MIS major:<br />

Department College Name and Title <strong>of</strong> Responsible Individual<br />

Accounting Business Administration Jack L. Armitage, Department Chair<br />

Economics Business Administration Donald Baum, Department Chair<br />

English Arts & Sciences Susan Naramore Maher, Department Chair<br />

Mathematics Arts & Sciences Jack Heidel, Department Chair<br />

School <strong>of</strong><br />

Communication, Fine Arts, and Jeremy Lipschultz, School Director<br />

Communication Media<br />

Students are also required to take a co-requisite course, which may be chosen from either an ISQA<br />

course or from one <strong>of</strong> the following departments:<br />

Department College Name and Title <strong>of</strong> Responsible Individual<br />

Finance, Banking,<br />

and Law<br />

Marketing and<br />

Management<br />

Business Administration<br />

Business Administration<br />

David Volkman, Department Chair<br />

Phani Tej Adidam, Department Chair<br />

Students also take Distribution requirements which include the Natural Sciences (Biology, Chemistry,<br />

Physics, Geology, etc.), Humanities (History, Philosophy, Religion, selected English courses, Foreign<br />

Languages, etc.), Social Sciences (Anthropology, Goodrich, Sociology, Psychology, Political Sciences,<br />

selected subjects <strong>of</strong> communication, etc.), Racial minorities (Native American studies, Black Studies,<br />

Latino/Latin American studies, etc.), and International dimension/or Women Studies. Most <strong>of</strong> these<br />

courses are taught by the College <strong>of</strong> Arts & Sciences and some by the College <strong>of</strong> Communication, Fine<br />

Arts and Media.<br />

Non-Academic Supporting Units<br />

<br />

Criss Library<br />

Dr. C.C. and Mabel L. Criss Library (http://library.unomaha.edu) serves as the primary source <strong>of</strong><br />

academic information for the <strong>University</strong> community through its collections, academic and reference<br />

services, innovative and modern technology, exhibit and event programming and modern physical<br />

-13-


facilities. A library staff liaison person is specifically assigned to the college <strong>of</strong> IS&T. In addition, the<br />

college <strong>of</strong> IS&T has a faculty member who is a designated library liaison.<br />

Primary contact: Nora Hillyer, IS&T Staff Liaison (nhillyer@mail.unomaha.edu; 554-2138).<br />

PKI Career Resource Center<br />

The Peter Kiewit Institute's Career Resource Center is dedicated to providing and facilitating unique<br />

opportunities that will enhance your college career and allow students to graduate fully prepared to<br />

enter their chosen pr<strong>of</strong>ession well prepared for success!<br />

Opportunities provided to students by the Career Resource Center include:<br />

Internships with a large variety <strong>of</strong> business partners during the academic year and summer.<br />

Internship include full/part-time internships, salaried and "for credit" internships.<br />

Full-time employment opportunities following graduation.<br />

Resume/cover letter development and assistance.<br />

Mock interviews with business/industry representatives.<br />

Networking opportunities with business/industry partners.<br />

A library and other reading material.<br />

An environment conducive to study and interaction with other students and staff.<br />

Primary contact: Doug Bahle, Coordinator, Career Resource Center (dbahle@nufoundation.org;<br />

554-2090)<br />

UNO Career Center<br />

The UNO Career Center (http://unoceo.unomaha.edu/) establishes and develops partnerships<br />

with employers, the community, and alumni to assist students in exploring their career<br />

possibilities. These partnerships provide students, alumni, and faculty with enhanced career<br />

development and educational experiences. The career center <strong>of</strong>fers various services including the<br />

following:<br />

-14-


Fairs & Exhibits<br />

Career Preparation Workshops<br />

Info Sessions & Tables<br />

On-campus Interviews<br />

Resume & Cover Letter<br />

Job Search<br />

Interviewing & Salary<br />

Networking & Apparel<br />

<strong>Self</strong> Assessment<br />

Graduate School Advising<br />

UNO CareerConnect<br />

Primary contact: Michelle Perone, Director, UNO Career Center (554-3523)<br />

Information Technology Services (ITS)<br />

ITS provides customer service and free s<strong>of</strong>tware through a site license program with Micros<strong>of</strong>t and<br />

McAfee. They also <strong>of</strong>fer a laptop loan program and support computer user rooms, labs and Internet<br />

centers in multiple buildings on campus. ITS also provides training for a variety <strong>of</strong> computer programs<br />

including MS Office, Lotus Notes, and Blackboard; supports distance education courses; and manages<br />

campus servers and networks.<br />

Primary contact: Lanyce Keel, Director, ITS (554-2020).<br />

College <strong>of</strong> IS&T Systems Support<br />

The members <strong>of</strong> the Systems Staff at the College <strong>of</strong> Information Science and Technology are dedicated<br />

to providing quality support for faculty, staff and students. Support services provided by this group<br />

include:<br />

S<strong>of</strong>tware Installation and troubleshooting<br />

Classroom server support<br />

Printer Installation<br />

Hardware Repairs<br />

Backups<br />

Website help<br />

Technical specifications<br />

Primary contact: Mike Grove, Director, Systems Support (mgrove@mail.unomaha.edu; 554-4392)<br />

International Studies & Programs (http://world.unomaha.edu)<br />

Since 1973, International Studies and Programs (IS&P) has developed and coordinated UNO’s<br />

international projects, student and faculty exchanges, and the undergraduate program in International<br />

Studies. IS&P serves as a focal point for the international mission <strong>of</strong> the university, cultivating global<br />

-15-


awareness and expanding the international connections <strong>of</strong> the students and faculty <strong>of</strong> UNO and the<br />

citizens <strong>of</strong> the State <strong>of</strong> <strong>Nebraska</strong>. IS&P provides outstanding programs and services for prospective and<br />

currently enrolled international students, as well as all other UNO students, faculty and staff. IS&T<br />

international students are serviced by IS&P staff advisors and are the first point <strong>of</strong> contact for all<br />

applicants.<br />

Primary contact: Merry Ellen Turner, Director <strong>of</strong> International Studies & Programs (554-2562;<br />

mturner@mail.unomaha.edu)<br />

UNO Writing Center (http://www.unomaha.edu/writingcenter/)<br />

The Writing Center <strong>of</strong>fers UNO students, faculty, and staff in all university divisions the service to work<br />

with a writing consultant on any university-related writing project. This free service can be used to work<br />

on assignments, resumés, business letters, or other projects. The center’s goal is to encourage students<br />

to become effective, independent writers, rather than edit papers for you, the center helps student<br />

develop the ability to edit their own work. A number <strong>of</strong> IS&T students use this center’s service.<br />

Primary contact: Dorianne Richards, Director (554-3311; drichards@mail.unomaha.edu)<br />

UNO Math and Science Learning Center<br />

The Math-Science Learning Center (MSLC) is a place where UNO students can find the assistance they<br />

need to conquer academic challenges in Math and Science. Model students serve as tutors,<br />

supplemental instruction leaders and study group facilitators trained to assist their peers in achieving<br />

academic success. The MSLC houses meeting alcoves, study/tutoring space, tutorial computers and<br />

reserve study materials. It also <strong>of</strong>fers academic consultation for students seeking to increase their<br />

overall learning effectiveness and efficiency.<br />

Primary contact: Dr. Dana Richter-Egger, Director<br />

UNO Honors Program<br />

The mission <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> Honors Program is to provide an enhanced and<br />

supportive learning environment responsive to the educational needs <strong>of</strong> highly able and/or<br />

exceptionally motivated undergraduate students. This goal will be accomplished through participation <strong>of</strong><br />

faculty noted for excellence in teaching by providing small honor sections <strong>of</strong> regular courses,<br />

interdisciplinary Honors colloquia, special seminars, and increased opportunity for undergraduate<br />

research/creative activity. The <strong>University</strong> Honors Program is a program with its own budget with a<br />

Director who is responsible to the Vice Chancellor for Academic and Student Affairs through the<br />

Associate Vice Chancellor for Academic Affairs. The Director works closely with the <strong>University</strong> Honors<br />

Committee to establish and review policies and procedures for the <strong>University</strong> Honors Program.<br />

Primary contact: Dr. Rosalie C. Saltzman, Director (rsaltzma@mail.unomaha.edu; 554-4963)<br />

-16-


Faculty Workload<br />

<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> and the college <strong>of</strong> IS&T has specific guidelines on faculty workload.<br />

Teaching load per faculty member per term is based on a 12-hour equivalent workload. (Most courses<br />

are taught as a 3-hour course.) Tenured and tenure-track faculty members on an average teach 6 hours<br />

per semester with the additional 6 hours for research and/or service activities. Newly recruited faculty<br />

members will have their teaching workload further reduced normally to give them opportunity to begin<br />

their research (if recruited directly after receiving their Ph.D.) or an opportunity to continue their<br />

research activities while acclimating to a new academic environment.<br />

-17-


Day<br />

Co-op<br />

Off<br />

Campus<br />

Alternate<br />

Mode<br />

Now<br />

Accredited.<br />

Not Now<br />

Accredited<br />

Now<br />

Accredited<br />

Not Now<br />

Accredited<br />

Nominal<br />

Years to<br />

Complete<br />

Administrative<br />

Head<br />

Table 1. Programs Offered by the Educational Unit<br />

Program Title 1 Modes Offered 2<br />

Administrative<br />

Unit or Units<br />

(e.g. Dept.)<br />

Exercising<br />

Budgetary<br />

Control<br />

BS Computer Science X 4 Quiming Zhu Computer<br />

Science<br />

X<br />

Submitted for<br />

Evaluation 3<br />

Offered, Not<br />

Submitted for<br />

Evaluation 4<br />

BS Management<br />

Information Systems<br />

X 4 Ilze ZIgurs ISQA X<br />

BS Bioinformatics X X<br />

BS Information<br />

Assurance<br />

X<br />

X<br />

MS Computer<br />

Science<br />

X 2 Quiming Zhu<br />

Computer<br />

Science<br />

X<br />

MS Management<br />

Information Systems<br />

X 2 Ilze Zigurs ISQA X<br />

-18-


List <strong>of</strong> the titles <strong>of</strong> all degrees <strong>of</strong>fered by the education unit responsible for the programs being evaluated, undergraduate and graduate, granted by the institution. If there are<br />

differences in the degrees awarded for completion <strong>of</strong> co-op programs, these should be clearly indicated.<br />

1<br />

Give program title as shown on a graduate’s transcript<br />

2<br />

Indicate all modes in which the program is <strong>of</strong>fered. If separate accreditation is requested for an alternative mode, list on a separate line.<br />

Describe “Other” by footnote.<br />

3<br />

Only those programs being submitted at this time for reaccreditation (now accredited) or initial accreditation (not now accredited) should be<br />

checked in this column.<br />

-19-


Table 2. Degrees Awarded and Transcript Designations by Educational Unit<br />

Modes Offered 2 Alternative Name <strong>of</strong> Degree<br />

Program Title 1 Day Co-op Off Campus Mode<br />

Awarded 3 Designation on Transcript 4<br />

Dept: Computer Science<br />

Major Computer Science<br />

Dept: Information Systems<br />

Quantitative Analysis<br />

Major: Management<br />

Information Systems<br />

Bachelor <strong>of</strong><br />

Science in<br />

Computer Science<br />

Bachelor <strong>of</strong><br />

Science in<br />

Management<br />

Information<br />

Systems<br />

Complete the table for all programs, as follows:<br />

1<br />

Give the program title as <strong>of</strong>ficially published in catalog.<br />

2<br />

List the mode for each program <strong>of</strong>fered. 3 List degree awarded for each mode <strong>of</strong>fered. If different degrees are awarded, list on separate lines.<br />

4<br />

Indicate how the program is listed on transcript for each mode <strong>of</strong>fered. If different designations are used, list on separate lines.<br />

-20-


The transcript <strong>of</strong> a Computer Science major would show the following information:<br />

Current Academic Program:<br />

Information Science & Technology<br />

Bachelor <strong>of</strong> Science, Computer Sci<br />

Major: Computer Science<br />

The transcript <strong>of</strong> a Management Information Systems major would show the following information:<br />

Current Academic Program:<br />

Information Science & Technology<br />

Bach <strong>of</strong> Science, Mgmt Info Systems<br />

Major: Management Info Systems<br />

-21-


Table 3. Support Expenditures<br />

Information Systems and Quantitative Analysis<br />

Fiscal Year 2007-2008 2008-2009 2009-2010<br />

Expenditure Category<br />

Operations (not including staff) 25,480 34,808 34,808<br />

Travel 26,048 17,786 17,786<br />

Equipment<br />

(a) Institutional Funds 0 0 0<br />

(b) Grants and Gifts<br />

Graduate Teaching Assistants 45,234 47,686 47,548<br />

Part-time Assistance<br />

7,976 915 945<br />

(other than teaching)<br />

Faculty Salaries 1,356,993 1,553,708 1,615,708<br />

College <strong>of</strong> IS&T<br />

Fiscal Year 2007-2008 2008-2009 2009-2010<br />

Expenditure Category<br />

Operations (not including staff) 293,154 356,258 370,508<br />

Travel 69,818 74,305 71,333<br />

Equipment<br />

(a) Institutional Funds 11,432 0 0<br />

(b) Grants and Gifts<br />

Graduate Teaching Assistants 314,150 189,767 197,357<br />

Part-time Assistance<br />

217,828 87,485 90,984<br />

(other than teaching)<br />

Faculty Salaries 3,735,088 4,117,042 4,420,273<br />

Approximately 24% <strong>of</strong> total faculty salaries for their benefits are not included in Faculty Salary<br />

figures.<br />

-22-


Table 4. Personnel and Students<br />

Information Systems and Quantitative Analysis<br />

Year: __2008-2009___<br />

HEAD COUNT FTE RATIO TO<br />

FT PT<br />

FACULTY<br />

Administrative .6 0 .6<br />

Faculty (tenure-track) 13.4 0 13.4<br />

Other Faculty (excluding student<br />

Assistants) 2 3 2.75<br />

Student Teaching Assistants 0 0 0 0<br />

Student Research Assistants 4 0 4 25%<br />

Technicians/Specialists 0 0 0 0<br />

Office/Clerical Employees 1 0 1 6%<br />

Others 0 0 0 0<br />

Undergraduate Student enrollment<br />

Graduate Student enrollment<br />

*The undergraduate student enrollment figures include Freshmen and Sophomores.<br />

College <strong>of</strong> IS&T<br />

Year: __2008-2009___<br />

HEAD COUNT FTE RATIO TO<br />

FT PT<br />

FACULTY<br />

Administrative 2.7 0 2.7<br />

Faculty (tenure-track) 30.3 0 30.3<br />

Other Faculty (excluding student<br />

Assistants) 12 .29 12.29<br />

Student Teaching Assistants 4 0 4 9%<br />

Student Research Assistants 20 0 20 47%<br />

Technicians/Specialists 7 1.9 8.9 21%<br />

Office/Clerical Employees 6 .5 6.5 15%<br />

Others 7.05 0 7.05 17%<br />

Undergraduate Student enrollment 473 123 522 14%<br />

Graduate Student enrollment 78 182 95 6%<br />

*The undergraduate student enrollment figures include Freshmen and Sophomores and<br />

one Early Entry.<br />

*Others including advising, grant writer and IT Outreach<br />

-23-


Total<br />

Undergrad<br />

Total<br />

Grad<br />

Table 5. Program Enrollment and Degree Data<br />

Information Systems and Quantitative Analysis<br />

Enrollment Year<br />

Degrees Conferred<br />

Academic<br />

Year<br />

1st 2nd 3 rd 4th 5th Bachelor Master Doctor Other<br />

CURRENT FT 26 35 34 43 138 34<br />

Fall 2008 08-09 PT 5 4 10 28 5 52 109<br />

1 FT 31 29 40 41 1 142 40<br />

Fall 2007 07-08 PT 10 11 12 18 3 54 84 50 35 45<br />

2 FT 34 35 44 39 1 153 34<br />

Fall 2006 06-07 PT 3 7 15 29 7 61 82 57 27 11<br />

3 FT 42 34 46 57 179 31<br />

Fall 2005 05-06 PT 5 3 17 41 8 74 87 68 38<br />

4 FT 26 42 61 50 3 182 27<br />

Fall 2004 04-05 PT 1 5 19 53 11 89 89 94 26<br />

5 FT 40 53 63 80 4 240 57<br />

Fall 2003 03-04 PT 7 16 29 49 7 108 99 78 52<br />

Note: 08-09 Degrees Conferred will be made available during the campus visit in fall 2009.<br />

The 1 st year column includes some undeclared majors.<br />

The 5 th year columns reports special undergraduates and undergraduates enrolled in only a certificate program. Give <strong>of</strong>ficial fall term<br />

enrollment figures (head count) for the current and preceding five academic years and undergraduate and graduate degrees conferred during<br />

each <strong>of</strong> those years. The "current" year means the academic year preceding the fall visit.<br />

FT--full time, PT—part time<br />

-24-


Table 6. Faculty Salary Data 1<br />

Information Systems and Quantitative Analysis<br />

Academic Year 2008-2009<br />

Pr<strong>of</strong>essor<br />

Associate<br />

Pr<strong>of</strong>essor Assistant Pr<strong>of</strong>essor Instructor<br />

Number 2 9 3 2<br />

High 157,544 129,304 108,130 47,491<br />

Mean 152,439 99,299 105,355 44,157<br />

Low 147,334 85,929 100,000 40,823<br />

1<br />

College <strong>of</strong> IS&T<br />

Chairs and segregated salary support is not included in these figures. The Instructor<br />

column includes Instructors and Lecturers.<br />

Academic Year 2008-2009<br />

Pr<strong>of</strong>essor<br />

Associate<br />

Pr<strong>of</strong>essor Assistant Pr<strong>of</strong>essor Instructor Other<br />

Number 9 14 8 8 8<br />

High 157,544 129,304 108,130 59,484 158,327<br />

Mean 113,261 99,485 98,742 42,196 71,416<br />

Low 94,797 85,929 82,994 39,924 57,757<br />

1<br />

Chairs and segregated salary support is not included in these figures. The Instructor<br />

column includes Assistant Instructors and Lecturers. Other column includes Senior<br />

Community Service Associate, Senior Fellows, Senior Research Fellows and Senior<br />

Research Tech Fellows. This does not include any faculty support from grants.<br />

-25-


-26-


APPENDIX 2 – COURSE DESCRIPTIONS<br />

For each required or elective course in the program that can be counted in the curriculum being reviewed for<br />

accreditation, include a two-page or three-page course outline, as indicated below, at this point in the <strong>Self</strong>-<strong>Study</strong><br />

Report. If your documentation does not exactly follow this format, be sure that all <strong>of</strong> the requested information<br />

(if applicable) is present, and please in any case adhere to a common format for all course descriptions. If some <strong>of</strong><br />

this documentation is on-line (e. g., in an instructor’s web site), please give here the URLs for accessing any such<br />

materials. These URLs should be made accessible to the visiting team as soon as the <strong>Self</strong>-<strong>Study</strong> is sent to them.<br />

As described in Section H <strong>of</strong> the General Instructions for the <strong>Self</strong>-<strong>Study</strong>, the course outline for each required or<br />

elective computing course in the program (including those that satisfy the IS Environment component <strong>of</strong> an<br />

Information Systems program) must also be included in a display <strong>of</strong> course materials that is available for study at<br />

all times during the evaluation visit.<br />

-27-


-28-


CIST 1010 Foundations <strong>of</strong> Information Science and Technology<br />

Department and Course Number CIST 1010<br />

Course Title<br />

Course Coordinator<br />

Total Credits 1<br />

Date <strong>of</strong> Last Revision 10/12/08<br />

Foundations <strong>of</strong> Information Science and Technology<br />

Ilze Zigurs<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

An introduction to the information age; focus on foundations <strong>of</strong> information technologies,<br />

problem solving, information system applications, and social issues. Also describes careers in<br />

information related fields.<br />

1.2 For whom course is intended.<br />

This course is the first <strong>of</strong> six included in the College <strong>of</strong> IS&T’s new core curriculum. Core courses<br />

are to be taken by students before moving into their major area <strong>of</strong> study in the college.<br />

Foundations <strong>of</strong> IS&T is for all students coming into the college (i.e., new incoming freshmen,<br />

transfers from other colleges and universities, and transfers from other colleges in UNO), as well<br />

as students from other colleges who are interested in an overview <strong>of</strong> the broad topics in<br />

information science and technology.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

There are no prerequisites for the course.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

None.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

This course is unique in taking an experiential approach to the discovery <strong>of</strong> information science<br />

and technology. Students have the opportunity to find out what the College <strong>of</strong> Information<br />

Science and Technology is all about – the main areas <strong>of</strong> study, the big topics in the field, and the<br />

opportunities that are ahead. In-class exercises allow students to experience the “inner workings”<br />

<strong>of</strong> information technology and get a first-hand feel for what they might do, so that they can make<br />

informed choices for their careers as students and beyond.<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 Understand the main areas <strong>of</strong> study in information science and technology.<br />

2.2 Recognize and appreciate the range <strong>of</strong> career options in information science and technology.<br />

2.3 Be able to find answers to questions during your career as a student here.<br />

2.4 Know how to connect with faculty members in your areas <strong>of</strong> interest<br />

-29-


2.5 Know how to connect with staff members who can help you accomplish your academic goals .<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence.<br />

3.1 Description <strong>of</strong> College <strong>of</strong> IS&T; Foundation <strong>of</strong> information science 2 hours<br />

and technology fields<br />

3.2 Foundations <strong>of</strong> bioinformatics; experiencing bioinformatics 2 hours<br />

3.3 Foundations <strong>of</strong> computer science; experiencing computer science 2 hours<br />

3.4 Foundations <strong>of</strong> management information systems; experiencing 2 hours<br />

management information systems<br />

3.5 Foundations <strong>of</strong> information assurance; experiencing information 2 hours<br />

assurance<br />

3.6 IT innovation and problem solving 1 hour<br />

3.7 Careers and career development in IS&T 2 hours<br />

3.8 Interdisciplinary issues in IS&T; Social impacts 2 hours<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The class is a mix <strong>of</strong> experiential exercises with discussion. Exercises are conducted in lab sessions<br />

and follow-up discussion builds on what was learned in lab. Guest instructors are included to<br />

expose students to a broad range <strong>of</strong> faculty in the college as well as some guests from industry.<br />

Virtual learning environments and collaboration technologies expose students to leading-edge<br />

methods for collaborative learning.<br />

4.2 Student role in the course.<br />

Students are asked to learn concepts through experiencing them, not to memorize lists and<br />

specific content presented in class. In addition, they are required to apply these concepts in<br />

discussion and exploration.<br />

5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students are continuously evaluated during the course. Each experiential exercise is preceded by<br />

research on that topic and a short written assignment.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

The final grade will be calculated as follows:<br />

Component<br />

Grading<br />

Class attendance and participation in exercises 50%<br />

-30-


Weekly written assignments 50%<br />

5.3 Grading scale and criteria.<br />

The course is a pass-fail course. Students must achieve at least 2500 out <strong>of</strong> 3000 possible points in<br />

order to pass the course. Each weekly assignment is worth 100 points and each weekly class<br />

attendance/participation is worth 100 points.<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

There are no textbooks or required/suggested reading materials.<br />

6.2 Other suggested reading materials, if any.<br />

Current news articles as assigned.<br />

6.3 Other sources <strong>of</strong> information.<br />

The students are provided handouts <strong>of</strong> selected overheads presented in each class presentation<br />

to help them to identify key concepts.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 8<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __15___ written reports (not including exams, tests, quizzes,<br />

or commented programs) to typically __1__ pages and to make __0__ oral presentations <strong>of</strong> typically<br />

_____ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as<br />

well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

One speaker per semester<br />

-31-


10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

No coverage<br />

11.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

One speaker per semester<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections<br />

No coverage<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

6/24/03 ABET cleanup Wolcott<br />

10/12/08 Change to experiential exercises;<br />

Zigurs<br />

Update approach to evaluation to<br />

having regular assignments over the<br />

course <strong>of</strong> the semester;<br />

Update course coordinator<br />

-32-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 1010<br />

Course Title<br />

Foundations <strong>of</strong> Information Science and Technology<br />

Course Coordinator<br />

Ilze Zigurs<br />

Total Credits 1<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the main areas <strong>of</strong> study in<br />

information science and technology.<br />

Recognize and appreciate the range <strong>of</strong> career<br />

options in information science and technology.<br />

Be able to find answers to questions during your<br />

career as a student here<br />

Know how to connect with faculty members in<br />

your areas <strong>of</strong> interest<br />

Know how to connect with staff members who<br />

can help you accomplish your academic goals<br />

S X X X X X X<br />

S X X X X<br />

X X X X X X X X<br />

X<br />

X<br />

X<br />

-33-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-34-


CIST 1100 Introduction to Computing<br />

Department and Course Number CIST 1100<br />

Course Title<br />

Introduction to Personal Computing<br />

Course Coordinator<br />

Mary Levesque<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/13/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course is an introduction to program development using Visual Basic, Excel and<br />

Access.<br />

1.2 For whom course is intended.<br />

Designed for majors in the College <strong>of</strong> IS&T and others required to take it as a pre-requisite<br />

for CIST 1400<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

None.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

None.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

2.0 Objectives:<br />

There are no unusual circumstances for this course.<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 Understanding <strong>of</strong> the program development cycle,<br />

2.2 Create basic Visual Basic programs<br />

2.3 Apply introductory user interface design practices<br />

2.4 Create functional databases using Micros<strong>of</strong>t Access<br />

2.5 Create and use Excel spreadsheets<br />

3.0 Content and Organization:<br />

3.1 Introduction to Spreadsheets – 13.5 Hours<br />

3.1.1 Introduction to Micros<strong>of</strong>t Excel (4.5 hours)<br />

3.1.2 Charts and Graphs in Excel (1.5 hours)<br />

3.1.3 3D Workbooks and file Linking (1.5 hours)<br />

-35-


3.1.4 List and Data Management (3.0 hours)<br />

3.1.5 Exam (1.5 hours)<br />

3.2 Introduction to Programming – 21.0 hours<br />

3.2.1 CPU Fundamentals (1.5 hours, integrated with other topics)<br />

3.2.2 Introduction to programming languages<br />

3.2.3 Problem solving<br />

3.2.4 User-interface design issues (1.5 hours)<br />

3.2.5 Fundamentals <strong>of</strong> Visual Basic (3.0 hours)<br />

3.2.6 Functions (1.5 hours)<br />

3.2.7 Procedures (1.5 hours)<br />

3.2.8 Decisions (4.5 hours)<br />

3.2.9 Repetition (3.0 hours)<br />

3.2.10 Files (1.5 hours)<br />

3.2.11 Arrays (1.5 hours, if time allows)<br />

3.2.12 Exam (1.5 hours)<br />

3.3 Introduction to Database – 10.5 hours<br />

3.3.1 Introduction to Micros<strong>of</strong>t Access (1.5 hours)<br />

3.3.2 Access Tables (3.0 hours)<br />

3.3.3 Reports and Queries from a Data base (1.5 hours)<br />

3.3.4 Miscellaneous (1.5 hours)<br />

3.3.5 Relating Tables (1.5 hours)<br />

3.3.6 Exam (1.5 hours)<br />

-36-


4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The course will be taught through lecture, discussions and demonstrations in the Visual Basic,<br />

Access and Excel applications.<br />

4.2 Student role in the course.<br />

Students will be evaluated through programming assignments, Micros<strong>of</strong>t Application assignments<br />

(written and computer) quizzes and three exams.<br />

4.3 Contact hours.<br />

3 hours<br />

5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

The grade will be based on a combination <strong>of</strong> quizzes, examinations, applications, and<br />

programming assignments.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

The grade will be determined from a weighted average that may resemble the following:<br />

Component<br />

Grading<br />

Quizzes 10%<br />

Exams 50%<br />

Program assignments 40%.<br />

5.3 Grading scale and criteria.<br />

-37-


Points Grade<br />

96-100% A+<br />

92-95% A<br />

89-91% A-<br />

86-88% B+<br />

82-85% B<br />

79-81% B-<br />

76-78% C+<br />

72-75% C<br />

69-71% C-<br />

66-68% D+<br />

62-65% D<br />

59-61% D-<br />

0-58% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Shelly, Gary, Cashman, Thomas, and Hoisington, Corinne, Mocros<strong>of</strong>t Visual Basic 2008 for<br />

Windows and Modile Applications, Introductory.<br />

6.1.2 Farrell, Joyce, Programming Logic and Design Fifth Edition bundled with a flowcharting<br />

tool called Visual Logic<br />

6.1.3 Shelly, Gary, Cashman, Thomas, and Quasney, Jeffrey, Micros<strong>of</strong>t Office Excel 2007<br />

Complete Concepts and Techniques.<br />

6.1.4 Shelly, Gary, Cashman, Thomas, Pratt, Philip, and Last, Mary, Micros<strong>of</strong>t Office Access<br />

2007 Complete Concepts and Techniques.<br />

6.2 Other sources <strong>of</strong> information.<br />

Students are directed to search the World Wide Web for other relevant material.<br />

6.3 Current bibliography <strong>of</strong> resource for student’s information.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category<br />

Core<br />

Hardware and s<strong>of</strong>tware 15<br />

Networking and telecommunications<br />

Modern programming language 18<br />

Analysis and Design 2<br />

Data management 9<br />

Role <strong>of</strong> IS in Organizations<br />

Advanced<br />

-38-


8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___0__ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __0___ pages and to make ___0__ oral presentations <strong>of</strong> typically<br />

__0___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

No coverage<br />

11.0 Problem analysis:<br />

No coverage<br />

12.0 Solution design:<br />

No coverage<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

9/26/02 Initial ABET version Levesque<br />

6/24/03 ABET cleanup Wolcott<br />

10/13/08 Reference list updated Levesque<br />

-39-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 1100<br />

Course Title<br />

Introduction to Personal Computing<br />

Course Coordinator<br />

Mary Levesque<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/13/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understanding <strong>of</strong> the program<br />

X<br />

development cycle,<br />

Create basic Visual Basic programs X X S<br />

Apply introductory user interface design X X S<br />

practices<br />

Create functional databases using<br />

X X S<br />

Micros<strong>of</strong>t Access<br />

Create and use Excel spreadsheets X S S<br />

-40-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-41-


-42-


CIST 1300 Introduction to Web Development<br />

Department and Course Number CIST 1300 / CSCI 1300<br />

Course Title<br />

Introduction to Web Development<br />

Course Coordinator<br />

Robert Fulkerson<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision November 17, 2008<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> course (Catalog description)<br />

This course will provide students with a practical introduction to web development. By learning<br />

the basic skills needed to develop an interactive website, students will develop an understanding<br />

<strong>of</strong> the web development task and an appreciation <strong>of</strong> the importance <strong>of</strong> the Internet in both<br />

business and academic environments. Specific technical topics to be covered include XHTML, CSS,<br />

the Unix/Linux operating system, web server s<strong>of</strong>tware, and a programming language. As part <strong>of</strong><br />

the class, each student will develop a working website.<br />

1.2 For whom course is intended<br />

This course is intended for all college students with an interest in computers.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

MATH 1310 (or equivalent)<br />

1.4 Prerequisites <strong>of</strong> the course (Topics)<br />

1.4.1 User knowledge <strong>of</strong> a computer (PC or equivalent), keyboard and mouse<br />

1.4.2 Basic algebra<br />

1.5 Unusual circumstances <strong>of</strong> the course<br />

None<br />

2.0 Objectives<br />

2.1 List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

Students successfully completing this class will have developed:<br />

1.5.1 A working knowledge <strong>of</strong> a command-line oriented operating system.<br />

1.5.2 The ability to write simple programs in the Perl programming language.<br />

1.5.3 The ability to create an XHTML standards-compliant web page.<br />

1.5.4 The ability to create standards-compliant CSS documents.<br />

-43-


3.0 Content and Organization<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> contact hours on each).<br />

3.1 Introduction and Overview 3<br />

3.2 Unix 1.5<br />

3.2.1 asdjklfasjd<br />

3.2.2 Overview <strong>of</strong> Unix<br />

3.2.3 ssh<br />

3.2.4 mkdir<br />

3.2.5 chmod<br />

3.2.6 directory structure<br />

3.2.7 cd<br />

3.2.8 ls<br />

3.2.9 mv<br />

3.2.10 rm<br />

3.2.11 vim<br />

Contact Weeks<br />

3.3 XHTML 6<br />

3.3.1 Overview<br />

3.3.2 Web browsers<br />

3.3.3 Web servers<br />

3.3.4 Block vs. Inline elements<br />

3.3.5 Content vs. Structure<br />

3.3.6 URLs, relative and absolute<br />

3.3.7 Minimal page (, , , , , )<br />

3.3.8 Headers (, , , , , )<br />

3.3.9 Paragraphs, line breaks and blocks (, , , )<br />

3.3.10 Naming and labeling elements (, )<br />

3.3.11 Comments ()<br />

3.3.12 Formatting (, , , , , , , )<br />

3.3.13 Block quotes ()<br />

3.3.14 More formatting (, , , )<br />

3.3.15 Abbreviations and acronyms (, )<br />

3.3.16 Images ()<br />

3.3.17 Image types (JPEG, GIF, PNG)<br />

3.3.18 Links (, )<br />

3.3.19 Lists (, , , , , )<br />

3.3.20 Tables (, , , )<br />

-44-


3.4 CSS 4.5<br />

3.4.1 Overview<br />

3.4.2 Inline vs. Embedded vs. External<br />

3.4.3 Inline CSS via style attribute<br />

3.4.4 CSS Predefined Values<br />

3.4.5 CSS Lengths / Percentages (em, px, in, cm, mm, pt, pc)<br />

3.4.6 RGB triplets for color<br />

3.4.7 Common properties used for formatting (border, border-color, width, padding, font-size,<br />

font-family, background-color, border-top, border-bottom, etc)<br />

3.4.8 Embedded CSS via tag<br />

3.4.9 Style sheets and rules<br />

3.4.10 External CSS via tag<br />

3.4.11 Pseudo-classes<br />

3.4.12 What is meant by “Cascading” style sheets<br />

3.5 Box Model <strong>of</strong> CSS Layout<br />

Perl 18<br />

3.5.1 Overview<br />

3.5.2 Machine language, Assembly Language, High-level Language<br />

3.5.3 Compiling<br />

3.5.4 Basic output using print, printf<br />

3.5.5 Types <strong>of</strong> programming errors (syntax, runtime, semantic)<br />

3.5.6 Scalar data type<br />

3.5.7 Basic input using <br />

3.5.8 Variable interpolation<br />

3.5.9 Escape characters<br />

3.5.10 chomp() and chop()<br />

3.5.11 Basic arithmetic (+, -, *, /, %, **, ., x)<br />

3.5.12 Precedence <strong>of</strong> operators<br />

3.5.13 Compound assignment operators<br />

3.5.14 Unary increment and decrement operators<br />

3.5.15 if selection<br />

3.5.16 if/else selection<br />

3.5.17 Boolean expressions (&&, ||, !)<br />

3.5.18 Uninitialized variables<br />

3.5.19 while repetition<br />

3.5.20 until repetition<br />

3.5.21 Array data type<br />

3.5.22 foreach repetition<br />

3.5.23 for repetition<br />

3.5.24 Data::Dumper for debugging<br />

3.5.25 Hash data type<br />

3.6 XHTML Forms 3<br />

-45-


3.6.1 Overview<br />

3.6.2 Submit and reset buttons<br />

3.6.3 Checkboxes and radio buttons<br />

3.6.4 Text fields, password fields, text areas<br />

3.6.5 Combo boxes<br />

3.7 CGI 6<br />

3.7.1 Overview<br />

3.7.2 Static content vs. dynamic content<br />

3.7.3 CGI defined<br />

3.7.4 Basic CGI using simple Content-Type: text/html<br />

3.7.5 CGI.pm overview<br />

3.7.6 CGI.pm to create basic XHTML<br />

3.7.7 CGI::Carp for debugging<br />

3.7.8 CGI.pm to create XHTML forms<br />

3.7.9 CGI.pm to process forms<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used<br />

The material is taught through lectures based on a common set <strong>of</strong> slides for all instructors. Some<br />

sections may use hands-on laboratory classrooms for each lecture or for special lectures<br />

throughout the semester.<br />

4.2 Student role in the course<br />

Students are encouraged to read the material in the books in advance <strong>of</strong> the lecture so that new<br />

concepts and terms are not “sprung on them”. They are encouraged to participate in class<br />

discussions and ask questions when the material is unclear since all <strong>of</strong> the material is cumulative<br />

and builds on understanding <strong>of</strong> the material that has come before it in the course.<br />

4.3 Contact hours<br />

5.0 Evaluation<br />

The course usually meets for two 75-minute periods weekly (3.0 contact hours).<br />

5.1 Types <strong>of</strong> student products that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. (For laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Each student will write complete approximately 15 assignments on the various topics as they are<br />

covered during the semester. These assignments will include creating XHTML web pages, CSS style<br />

-46-


sheets and Perl programs. Additionally, the students will take a mid-term and a final exam along<br />

with quizzes as needed.<br />

5.2 Basis for determining the final grade.<br />

70% <strong>of</strong> grade will be based on the program/homework scores, 30% <strong>of</strong> the grade will be based on<br />

the quiz and exam scores.<br />

5.3 Grading scale.<br />

6.0 Resource Material<br />

A+ 97% - 100% 4.00 GPA<br />

A 93% - 96% 4.00 GPA<br />

A- 90% - 92% 3.67 GPA<br />

B+ 87% - 89% 3.33 GPA<br />

B 83% - 86% 3.00 GPA<br />

B- 80% - 82% 2.67 GPA<br />

C+ 77% - 79% 2.33 GPA<br />

C 73% - 76% 2.00 GPA<br />

C- 70% - 72% 1.67 GPA<br />

D+ 67% - 69% 1.33 GPA<br />

D 63% - 66% 1.00 GPA<br />

D- 60% - 62% 0.67 GPA<br />

F 0% - 59% 0.00 GPA<br />

6.1 Textbook(s) or other required readings<br />

6.1.1 Randall L. Schwartz, Tom Phoenix, brian d foy. Learning Perl, Fourth Edition. O’Reilly,<br />

2005.<br />

6.1.2 Elizabeth Castro. HTML, XHTML and CSS, Sixth Edition. Peachpit Press, 2006.<br />

6.2 Other suggested reading materials, if any<br />

6.1.3 http://www.perl.com/<br />

6.1.4 http://www.w3.org/<br />

6.1.5 http://www.w3schools.com/<br />

6.3 Current bibliography and other resources<br />

7.0 Computing Accreditation Commission Category Content (class time in hours)<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language 43.5<br />

Analysis and Design<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

-47-


8.0 Oral and Written Communications<br />

Every student is required to submit at least 0 written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically N/A pages and to make 0 oral presentations <strong>of</strong> typically 0<br />

minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as<br />

for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth)?<br />

None.<br />

10.0 Theoretical content<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

None.<br />

11.0 Problem analysis<br />

Please describe the analysis experiences common to all course sections.<br />

Students will learn a number <strong>of</strong> fundamental computer concepts and skills. At the end <strong>of</strong> the course, they<br />

will be able to apply these skills to the development <strong>of</strong> their own dynamic, data-driven web site.<br />

12.0 Solution design<br />

Please describe the design experiences common to all course sections.<br />

This course will require the student to apply a set <strong>of</strong> initially unfamiliar tools to a diverse set <strong>of</strong> problems.<br />

As the student works through each problem, he/she will gain experience and competence in the broader<br />

skill <strong>of</strong> problem solving.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

4/22/2004 Initial ABET version Pauley<br />

3/9/2005 Change to initial course <strong>of</strong> a sequence Brown Also formatted the course to be<br />

suitable for General Education<br />

8/18/05 Reorganization <strong>of</strong> Content and<br />

Pauley<br />

Organization section to make the course<br />

more web page centric. Also added a<br />

semester project.<br />

9/11/06 Further reorganization <strong>of</strong> Content and Pauley<br />

-48-


Organization to make the course even<br />

more web page centric.<br />

4/21/08 Revision to reflect course conversion to Fulkerson<br />

Perl since Fall 2007<br />

4/24/08 Revision to reflect CSCI 1300 cross-listing Fulkerson<br />

and removal <strong>of</strong> “database” in course<br />

description<br />

11/17/08 Update to include CS Program outcomes Fulkerson<br />

-49-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> CS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 1300 / CSCI 1300<br />

Course Title<br />

Introduction to Web Development<br />

Course Coordinator<br />

Robert Fulkerson<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision November 17, 2008<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

A working knowledge <strong>of</strong> a command-line<br />

oriented operating system<br />

The ability to write simple programs in the<br />

Perl programming language.<br />

The ability to create an XHTML standardscompliant<br />

web page<br />

The ability to create standards-compliant CSS<br />

documents.<br />

S S<br />

X S S X<br />

X X S S X S<br />

X X S S X S<br />

-50-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-51-


-52-


CIST 1400 Introduction to Computer Programming<br />

Department and Course Number CIST 1400<br />

Course Title<br />

Introduction to Computer Programming<br />

Course Coordinator<br />

Robert Fulkerson<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision April 24, 2008<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

An introduction to programming within the context <strong>of</strong> a high level modern programming<br />

language. Coverage <strong>of</strong> fundamental programming concepts and program design; including arrays,<br />

user defined types, and objects. This course has a laboratory component in CIST 1404. This lab is<br />

optional.<br />

1.2 For whom course is intended.<br />

This course is intended for freshman-level students in the College <strong>of</strong> IS&T. It also serves many<br />

other departments, including math, education, geography/geology and engineering.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

MATH 1310 AND EITHER CIST 1100 OR CIST 1300<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

Fundamental computing basics and familiarity with computer processing (input, output). Basic<br />

college algebra.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 The student should be able to write moderately complex programs in the Java language that<br />

accomplish moderately difficult tasks.<br />

2.2 The students are prepared for the continuation <strong>of</strong> their Java studies in CSCI 1620.<br />

2.3 The students should be comfortable working in a Unix-based console environment.<br />

3.0 Content and Organization<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> contact hours on each).<br />

-53-


3.1 Overview (1.5 hrs)<br />

3.1.1 What is a computer<br />

3.1.2 Machine Language<br />

3.1.3 Assembly Language<br />

3.1.4 High-Level Langauge<br />

3.1.5 Compiling bytecode<br />

3.2 Introduction to console-based Java Applications (6 hrs)<br />

3.2.1 Basic program structure<br />

3.2.2 Console output with System.out.printf()<br />

3.2.3 Console output with System.out.print()<br />

3.2.4 Console output with System.out.println()<br />

3.2.5 Variables<br />

3.2.6 int<br />

3.2.7 Console Input Using the Scanner Class<br />

3.2.8 Arithmetic (+, -, *, /, %)<br />

3.2.9 Precedence <strong>of</strong> operators<br />

3.2.10 Equality and relational operators (==, !=, , =)<br />

3.2.11 if<br />

3.3 Introduction to Classes and Objects (7.5 hrs)<br />

3.3.1 Classes, objects and instance variables<br />

3.3.2 Declaring a class with a method<br />

3.3.3 Instantiating an object <strong>of</strong> a class<br />

3.3.4 Declaring a method with a parameter<br />

3.3.5 Primitive types<br />

3.3.6 Constructors<br />

3.4 Control Structures (10.5 hrs)<br />

3.4.1 if<br />

3.4.2 if/else<br />

3.4.3 switch<br />

3.4.4 while<br />

3.4.5 do/while<br />

3.4.6 for<br />

3.4.7 Boolean operators (&&, ||, !)<br />

3.4.8 break<br />

3.4.9 continue<br />

3.5 Arithmetic (1.5 hrs)<br />

3.5.1 Compound assignment operators<br />

3.5.2 Unary increment and decrement operators<br />

3.6 Methods (9 hrs)<br />

-54-


3.6.1 Static methods<br />

3.6.2 Static fields<br />

3.6.3 Math class<br />

3.6.4 Java API packages<br />

3.6.5 Methods with multiple parameters<br />

3.6.6 Argument promotion and casting<br />

3.6.7 Scope<br />

3.6.8 Method overloading<br />

3.7 Arrays (9 hrs)<br />

3.7.1 Introduction to Arrays<br />

3.7.2 Arrays and References<br />

3.7.3 Programming with Arrays<br />

3.7.4 Multidimensional Arrays<br />

3.7.5 Searching and sorting<br />

3.7.6 Variable length argument lists<br />

3.7.7 Command-line arguments<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used.<br />

The material is taught through lectures based on a common set <strong>of</strong> slides, assignments and other<br />

documents for all instructors.<br />

4.2 Student role in the course.<br />

Students are encouraged to read the material in the book in advance <strong>of</strong> the lecture so that new<br />

concepts and terms are not “sprung on them”. They are encouraged to participate in class<br />

discussions and ask questions when the material is unclear since all <strong>of</strong> the material is cumulative<br />

and builds on understanding <strong>of</strong> the material that has come before it in the course.<br />

4.3 Contact hours.<br />

5.0 Evaluation<br />

3.0 contact hours per week<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Each student will write approximately 15 – 20 complete console-based Java programs on<br />

the various topics as they are covered during the semester. Additionally, the students will<br />

take four substantial quizzes and a final exam. There may be writing assignments to help<br />

build a fundamental understanding <strong>of</strong> key programming concepts.<br />

-55-


5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

60% <strong>of</strong> grade will be based on the program/homework scores, 40% <strong>of</strong> the grade will be<br />

based on the quiz and final exam scores.<br />

5.3 Grading scale and criteria.<br />

6.0 Resource Material<br />

A+ 97% - 100% 4.00 GPA<br />

A 93% - 96% 4.00 GPA<br />

A- 90% - 92% 3.67 GPA<br />

B+ 87% - 89% 3.33 GPA<br />

B 83% - 86% 3.00 GPA<br />

B- 80% - 82% 2.67 GPA<br />

C+ 77% - 79% 2.33 GPA<br />

C 73% - 76% 2.00 GPA<br />

C- 70% - 72% 1.67 GPA<br />

D+ 67% - 69% 1.33 GPA<br />

D 63% - 66% 1.00 GPA<br />

D- 60% - 62% 0.67 GPA<br />

F 0% - 59% 0.00 GPA<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Java How to Program, Seventh Edition, Deitel & Deitel, 2007<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Thinking in Java, Fourth Edition, Bruce Eckel, 2006<br />

6.2.2 Java Pocket Guide, Robert Liquori, Patricia Liquori, 2008<br />

6.3 Other sources <strong>of</strong> information.<br />

6.3.1 asdjklajsd<br />

6.3.2 Student study groups<br />

6.3.3 Tutoring provided by the College <strong>of</strong> IS&T<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

7.0 Computing Accreditation Commission (CAC) Category Content (class time in hours)<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

-56-


8.0 Oral and Written Communications<br />

Modern programming language 43.5<br />

Analysis and Design<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

Every student is required to submit at least ___0__ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __0___ pages and to make __0___ oral presentations <strong>of</strong> typically<br />

__0___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

None.<br />

10.0 Theoretical content<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

None.<br />

11.0 Problem analysis<br />

Students must be able to identify the desired goals from a problem statement.<br />

12.0 Solution design<br />

Although each programming assignment targets some topics more than others (namely those that have<br />

been recently presented in the lectures), the solutions will be designed using cumulative knowledge.<br />

Students will design a solution by selecting those techniques that are appropriate to the problem at hand.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

12/16/2002 Initial ABET version Fulkerson<br />

06/13/2003 Cleanup Wileman<br />

12/04/2007 First draft for migration to Java Dasgupta<br />

04/21/2008 Second draft for migration to Java Fulkerson<br />

-57-


04/24/2008 Third draft, minor updates Fulkerson<br />

11/17/08 Update to include CS Program<br />

Outcomes table<br />

Fulkerson<br />

-58-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 1400<br />

Course Title<br />

Introduction to Computer Programming<br />

Course Coordinator<br />

Robert Fulkerson<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision May 27, 2009<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

The student should be able to write<br />

moderately complex programs in the Java<br />

language that accomplish moderately<br />

difficult tasks.<br />

The students are prepared for the<br />

continuation <strong>of</strong> their Java studies in CSCI<br />

1620.<br />

The students should be comfortable<br />

working in a Unix-based console<br />

environment.<br />

S X S<br />

S X S<br />

X S<br />

-59-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-60-


CIST 2500 Introduction to Applied Statistics for IS&T<br />

Department and Course Number CIST 2500<br />

Course Title<br />

Introduction to Applied Statistics for IS&T<br />

Course Coordinator<br />

L<strong>of</strong>tollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 6/24/03<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course emphasizes the function <strong>of</strong> statistics in information science and technology<br />

including topics such as descriptive statistical measures, probability, discrete probability,<br />

sampling, estimation analysis, hypothesis testing, regression, and analysis <strong>of</strong> variance. A<br />

well-known computer package will be used to support the problem-solving process.<br />

1.2 For whom course is intended.<br />

The course is primarily intended for College <strong>of</strong> Information Science and Technology<br />

(CIST) undergraduate and graduate students who need to satisfy foundation requirements.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 MATH 2030 or MATH 2040 or permission <strong>of</strong> advisor<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Combinatorics<br />

1.4.2 Probability<br />

1.4.3 Discrete Random Variables<br />

1.4.4 Continuous Random Variables<br />

1.4.5 Polynomial Equations<br />

1.4.6 Quadratic Equations<br />

1.4.7 Log and Natural Log Functions<br />

1.4.8 Exponential Functions<br />

1.4.9 Summations (single, double and triple)<br />

1.4.10 Binomial Functions<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives:<br />

The broad objective <strong>of</strong> this course is to enable you to gain an overview <strong>of</strong> the functions <strong>of</strong> statistics<br />

in modern business. This course will facilitate your understanding <strong>of</strong> the concepts and your<br />

-61-


development <strong>of</strong> the skills needed to apply statistics to the business decision-making process. This<br />

course will also enable you to extend your understanding and use <strong>of</strong> computer-based statistical tools<br />

and provide opportunities to use them to analyze business problems.<br />

3.0 Content and Organization:<br />

Contact Hours<br />

3.1 Data and Statistics 2<br />

3.2 Descriptive Statistics I: Tabular and Graphical Methods 3<br />

3.3 Descriptive Statistics II: Numerical Methods 5<br />

3.4 Probability 1<br />

3.5 Discrete Probability Distributions 2<br />

3.6 Continuous Probability Distributions 1<br />

3.7 Sampling and Sampling Distributions 5<br />

3.8 Interval Estimation 4<br />

3.9 Hypothesis Testing 5<br />

3.10 Statistical Inference about Means with Two Populations 3<br />

3.11 Analysis <strong>of</strong> Variance 4<br />

3.12 Regression Analysis 5<br />

3.13 Interpretation <strong>of</strong> Statistics for Technology Pr<strong>of</strong>essionals 3<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The course uses a combination <strong>of</strong> approaches including lecturing, problem solving, contemporary<br />

project using a statistical packages (MINITAB and Excel), and exams<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in discussion on assigned readings, complete<br />

assigned projects, and complete required examinations<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Class attendance and participation<br />

Three to four problem-solving projects using a statistical package<br />

Three examinations with combination <strong>of</strong> problem solving and multiple-choice questions about<br />

the concepts discussed in the class.<br />

Component<br />

Grading<br />

-62-


Class attendance and participation 10%<br />

Examinations 60%<br />

Projects 30%<br />

5.2 Grading scale and criteria.<br />

The final grade is based on the percentage <strong>of</strong> points that the student receives out <strong>of</strong> the<br />

total possible points for the course. The guaranteed grade scale is shown in the following<br />

table. A curve may be used to scale the entire class higher, if necessary, but scaling down<br />

will not be done.<br />

Points<br />

92-100% A<br />

89-91% A-<br />

86-88% B+<br />

82-85% B<br />

79-81% B-<br />

76-78% C+<br />

72-75% C<br />

69-71% C-<br />

66-68% D+<br />

62-65% D<br />

59-61% D-<br />


7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design<br />

Data management 5<br />

Role <strong>of</strong> IS in Organizations 3<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least _3___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically ___5__ pages and to make __0___ oral presentations <strong>of</strong> typically<br />

___0__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage.<br />

10.0 Theoretical content:<br />

Contact Hours<br />

Descriptive Statistics 8<br />

Sampling and Sampling Distributions 5<br />

Interval Estimation 3<br />

Hypothesis Testing 5<br />

Analysis <strong>of</strong> Variance 4<br />

Regression Analysis 5<br />

11.0 Problem analysis:<br />

11.1 Data Collections<br />

11.2 Data Organization<br />

11.3 Data Analysis<br />

12.0 Solution design:<br />

-64-


Student design the appropriate experimental design using statistical models and a well known statistical<br />

s<strong>of</strong>tware such as Excel or MINITAB. Then the appropriate conclusions will be drawn from the results for a<br />

better decision-making.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

10/9/200 Initial ABET version Najjar<br />

6/24/03 ABET clean-up Wolcott<br />

6/25/03 Expansion <strong>of</strong> prerequisite topics Najjar Prerequisite topics previously listed<br />

just prerequisite class titles.<br />

Mapping <strong>of</strong> CS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 2500<br />

Course Title<br />

Introduction to Applied Statistics for IS&T<br />

Course Coordinator<br />

L<strong>of</strong>tollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/27/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

-65-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Course objective<br />

The broad objective <strong>of</strong> this course is to enable<br />

you to gain an overview <strong>of</strong> the functions <strong>of</strong><br />

statistics in modern business. This course will<br />

facilitate your understanding <strong>of</strong> the concepts and<br />

your development <strong>of</strong> the skills needed to apply<br />

statistics to the business decision-making process.<br />

This course will also enable you to extend your<br />

understanding and use <strong>of</strong> computer-based<br />

statistical tools and provide opportunities to use<br />

them to analyze business problems.<br />

S<br />

S<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

-66-


11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-67-


-68-


CIST 3000 Advanced Technical Writing for IS&T<br />

Department and Course Number CIST 3000<br />

Course Title<br />

Advanced Composition for IS & T<br />

Course Coordinator<br />

Sheri Hronek<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/15/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Advanced Composition for IS & T provides students with instruction and practice in<br />

academic writing for the technical sciences. The course focuses on principles <strong>of</strong> rhetoric<br />

and composition, advanced library-based research techniques, academic modes <strong>of</strong> writing<br />

suited to the technical sciences, style, grammar, and punctuation, all with attention to<br />

adapting writing to suit the needs <strong>of</strong> various academic and pr<strong>of</strong>essional audiences.<br />

1.2 For whom course is intended.<br />

Undergraduate students in IS & T or other students interested in academic writing in the<br />

technical sciences.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

ENGL1160 (or placement in a 3 rd year writing course)<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

Students should be able to demonstrate the basic writing competencies developed during<br />

their freshman composition course work.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

2.0 Objectives:<br />

None<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

By the end <strong>of</strong> the course, students will exhibit:<br />

2.1 an advanced understanding <strong>of</strong> various academic-based writing strategies and <strong>of</strong> the genres<br />

appropriate for and expected in the technical sciences<br />

2.2 an ability to apply field-related, advanced research skills including a knowledge <strong>of</strong> scholarly, peerreviewed<br />

journals and indexes, the use <strong>of</strong> primary sources, the ability to evaluate sources, and<br />

expertise in using field-appropriate documentation<br />

-69-


2.3 a sophisticated understanding <strong>of</strong> grammar and language issues as they apply to writing generally<br />

and to the style expected in academic writing in the technical sciences<br />

2.4 developed pr<strong>of</strong>iciency in using discourse-community specific language, including vocabulary and<br />

style<br />

2.5 a sophisticated understanding <strong>of</strong> writing as a process that includes multiple drafts that<br />

productively and effectively respond to feedback<br />

2.6 an understanding <strong>of</strong> how writing functions in various academic and pr<strong>of</strong>essional communities<br />

students will encounter in their personal, pr<strong>of</strong>essional, and academic life<br />

2.7 a mature awareness <strong>of</strong> audience and the ability to adapt writing to various audiences and<br />

purposes<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> hours on each).<br />

As various instructors will teach the course, the sequence <strong>of</strong> topics may vary. The following table<br />

provides a suggested sequence based on collaborative research proposals and projects (groups <strong>of</strong><br />

3-4).<br />

3.1 Discourse communities & academic/pr<strong>of</strong>essional communication practices 3<br />

3.2 Writing fundamentals overview 3<br />

3.3 Style 1: Discourse communities & tiles<br />

3.4 Style II: General Stylistic Conventions 3<br />

3.5 General technical stylistic conventions<br />

3.6 Diction & Style<br />

3.7 Theoretical/historical research overview 3<br />

3.8 Theoretical/historical research proposals<br />

3.9 Collaboration<br />

3.10 Style III Persuasive writing<br />

3.11 Using sources 3<br />

3.12 Style IV: Paragraphing<br />

3.13 Style V: Tone 3<br />

3.14 Peer Review practices<br />

3.15 Shifting from proposal to research<br />

3.16 Research project norming<br />

3.17 Style VI: Syntactical Revision Workshop 3<br />

Class Hours<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

-70-


Teaching methods may vary from instructor to instructor. The course may include any <strong>of</strong><br />

the following: lectures, writing/draft workshops, group discussion, norming sessions,<br />

library research instruction, and peer-review sessions.<br />

4.2 Student role in the course.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

The student’s role in the course flows from the objectives and content benchmarks<br />

outlined above (2.1). In general, students should seek to develop and advance their<br />

academic writing skills through active, conscientious engagement in the various writing<br />

projects and activities.<br />

3 hours<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

As writing projects may vary from instructor to instructor, the following list is suggestive<br />

only.<br />

5.1.1 Field Description (technically informed audience)<br />

5.1.2 Field Introduction (nontechnically informed audience)<br />

5.1.3 Peer-Reviewed Journal Analysis<br />

5.1.4 Library-Based Research Proposal (individual or collaborative)<br />

5.1.5 Library-Based Research Project (individual or collaborative)<br />

5.1.6 Abstract<br />

5.1.7 Project Plans<br />

5.1.8 Individual Activity Logs<br />

5.1.9 Semester <strong>Self</strong>-Assessment memos<br />

5.1.10 Research Presentation (individual or collaborative)<br />

5.1.11 Portfolio<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

The basis for determining the final may vary depending on instructors. The following is a<br />

suggestive model assessing both individual and collaborative writing efforts.<br />

5.2.1 Individual Assessments:<br />

Documentation Exams I & II 10%<br />

Field Description & Intro 5%<br />

Journal Analysis 15%<br />

-71-


5.2.2 Individual Effort & Work Participation 15%<br />

Abstract<br />

Documentation Workshop<br />

Individual Portfolio<br />

Quote, Paraphrase, Summary Ex.<br />

5.2.3 Individual’s Collaborative Effort & Work 15%<br />

5.2.4 Group Assignments:<br />

Research Proposal & Deliverables 15%<br />

Research Project & Deliverables 25%<br />

-72-


5.3 Grading scale and criteria.<br />

6.0 Resource Material<br />

98-100 A+<br />

95-97 A<br />

92-94 A-<br />

88-91 B+<br />

85-87 B<br />

82-84 B-<br />

78-81 C+<br />

75-77 C<br />

72-74 C-<br />

68-71 D+<br />

65-67 D<br />

62-64 D-<br />

-61 F<br />

An “I” or “IP” will be awarded only if a student is unable to complete the course<br />

requirements due to circumstances beyond her/his control as specified in the UNO<br />

catalog. The student must also have substantially completed the course and have a<br />

passing grade when the grade <strong>of</strong> “I” is requested.<br />

6.1 Textbooks and/or other required readings used in course.<br />

Textbook selection may vary from instructor to instructor. The following is a suggestive<br />

list.<br />

6.1.1 Hansen, K. (1998). A rhetoric for the social sciences: A guide to academic and pr<strong>of</strong>essional<br />

communication. Upper Saddle River, NJ: Prentice Hall.<br />

6.1.2 Jones, D. (1998). Technical writing style. Boston: Allyn and Bacon.<br />

6.1.3 Lunsford, A. A. (2008). The St. Martin’s handbook (6th ed.). Boston: Bedford/St.Martin’s.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Readings that support the students’ development as writers are recommended,<br />

particularly peer-reviewed, article-length or book-length works. Students should also<br />

become familiar with the APA Publication Manual (2001) or other style guides suitable to<br />

academic writing in the technical sciences.<br />

6.3 Other sources <strong>of</strong> information.<br />

6.3.1 Industry white papers & reports related to areas <strong>of</strong> technical research.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

-73-


6.4.1 Alred, G., Brusaw, C., & Oliu, W. (1992). The pr<strong>of</strong>essional writer: A guide for advanced<br />

technical writing. New York: St. Martin’s Press. American Psychological Association.<br />

(2001). Publication manual (5th ed.). Washington, DC: American Psychological<br />

Association.<br />

6.4.2 Coe, M. (1996). Human factors for technical communication. New York: Wiley.<br />

6.4.3 Coletta, W. J. (1992). The ideologically based use <strong>of</strong> language in scientific and technical<br />

communication. Technical Communication Quarterly, 1(1), 59-70.<br />

6.4.4 Day, R. (1988). How to write and publish scientific paper (3rd ed.). Phoenix, AZ: Oryx.<br />

6.4.5 Day , R. (1992). Scientific English: A guide for scientists and other pr<strong>of</strong>essionals. Phoenix,<br />

AZ: Oryx.<br />

6.4.6 Ede, L., & Lunsford, A. (1990). Singular texts/plural authors: Perspectives on collaborative<br />

writing. Carbondale: Southern Illinois <strong>University</strong> Press.<br />

6.4.7 Gross, A. G. (1996). The rhetoric <strong>of</strong> science. Cambridge, MA: Harvard <strong>University</strong> Press.<br />

6.4.8 Gurak, L. J. (2000). Oral presentations for technical communications. Boston: Allyn &<br />

Bacon.<br />

6.4.9 Hager, P. J., & Scheiber, H. J. (1997). Designing and delivering scientific, technical, and<br />

managerial presentations. New York: Wiley.<br />

6.4.10 Halloran, M. (1978). Technical writing and the rhetoric <strong>of</strong> science. Journal <strong>of</strong> Technical<br />

Writing and Communication, 8(2), 77-88.<br />

6.4.11 Haring-Smith, T. (1993). Learning together: An introduction to collaborative learning. New<br />

York: HarperCollins.<br />

6.4.12 H<strong>of</strong>t, N. L. (1995). International technical communication: How to export information<br />

about high technology. New York: Wiley.<br />

6.4.13 Houp, K. W., Pearsall, T. E., & Thebeaux, E. (1998). Reporting technical information (9th<br />

ed.). Boston: Allyn & Bacon.<br />

6.4.14 Locke, D. (1992). Science as writing. New Haven, CT: Yale <strong>University</strong> Press.<br />

6.4.15 Miller, C. (1984). Genre as social action. Quarterly Journal <strong>of</strong> Speech, 70, 151-167.<br />

6.4.16 Penrose, A. M., and Katz, S. B. (2004). Writing in the sciences: Exploring conventions <strong>of</strong><br />

scientific discourse (2nd ed.). Boston: Allyn and Bacon.<br />

6.4.17 Porush, D. (1995). A short guide to writing about science. New York: HarperCollins.<br />

6.4.18 Prelli, L. J. (1989). A rhetoric <strong>of</strong> science: Inventing scientific discourse. Columbia:<br />

<strong>University</strong> <strong>of</strong> South Carolina Press.<br />

6.4.19 Rude, C. D. (2002). Technical editing (3rd ed.). New York: Longman.<br />

6.4.20 Sanders, S (1988). How can technical writing be persuasive? In L. Beene & P. White (Eds.),<br />

Solving problems in technical writing (pp. 55-78). New York: Oxford <strong>University</strong> Press.<br />

6.4.21 Schindler, G. E., Jr. (1975). Why engineers and scientists write as they do— Twelve<br />

characteristics <strong>of</strong> their prose. IEEE Transactions on Pr<strong>of</strong>essional Communication, 18(1), 5-<br />

10.<br />

6.4.22 Young, J. Z. (1965). Doubt and certainty in science. In J. Harrison (Ed.), Scientists as writers<br />

(pp. 49-51). Cambridge, MA: MIT Press.<br />

7.0 (Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category<br />

Content (class time in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 0 0<br />

Networking and telecommunications 0 0<br />

Modern programming language 0 0<br />

-74-


Analysis and Design<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

As this course focuses on students’ development as writers, these areas are not directly addressed.<br />

Students may, however, engage any <strong>of</strong> these areas in individual/collaborative writing projects. See 8.0<br />

7.0 (Fill out for CSCI and CIST courses) Estimate Computer Science Accreditation Board (CSAB)<br />

Category Content (class time in hours):<br />

CSAB Category Core Advanced<br />

Data structures 0 0<br />

Computer organization and architecture 0 0<br />

Algorithms and s<strong>of</strong>tware design 0 0<br />

Concepts <strong>of</strong> programming languages 0 0<br />

As this course focuses on students’ development as writers, these areas are not directly addressed.<br />

Students may, however, engage any <strong>of</strong> these areas in individual/collaborative writing projects. See 8.0<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___6__ written reports (not including exams, tests, quizzes, or<br />

commented programs) <strong>of</strong> typically __1-20___ pages and to make ___1__ oral presentations <strong>of</strong> typically<br />

__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

As this is an academic-based writing course, Instructors should present some <strong>of</strong> the basic<br />

principles <strong>of</strong> effective academic document design based on appropriate manuscript preparation<br />

style guides, such as the APA Publication Manual (2001). Students should also demonstrate their<br />

understanding <strong>of</strong> the importance <strong>of</strong> good design through their research presentations.<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

The course should address social and ethical issues related to the practice <strong>of</strong> writing. One area <strong>of</strong><br />

concern is style, particularly the importance <strong>of</strong> unbiased language use (in terms <strong>of</strong> gender,<br />

race/ethnicity, etc.), the role <strong>of</strong> the detached persona, and other elements as specified by the<br />

American Psychological Association’s Publication Manual (2001). Students should be expected to<br />

reflect awareness <strong>of</strong> pr<strong>of</strong>essional language use concerns in all their writing.<br />

-75-


10.0 Theoretical content:<br />

Another area <strong>of</strong> concern should be the ethics <strong>of</strong> working with sources, especially in terms <strong>of</strong><br />

understanding and avoiding plagiarism.<br />

All <strong>of</strong> these issues are explored and reiterated throughout the semester.<br />

Students may also explore social and ethical issues related to the technical fields through their<br />

individual or collaborative research projects.<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

11.0 Problem analysis:<br />

The course should cover relevant rhetorical and compositional theories and practices related to<br />

the process <strong>of</strong> writing such as invention, audience analysis, stylistics, and<br />

argumentation/persuasion in technical academic writing. Theories <strong>of</strong> collaboration as a<br />

community <strong>of</strong> practice are also addressed.<br />

These theories and their application to writing are discussed throughout the semester.<br />

Students may also explore theoretical material through their individual and collaborative projects.<br />

Please describe the analysis experiences common to all course sections.<br />

12.0 Solution design:<br />

Analytical activities generally should focus on examining practical issues related to the writing &<br />

research process. These include, but are not limited to, audience analysis, research planning and<br />

coordination, self-assessment, source assessment, solving problems in the research process,<br />

solving problems in collaboration, and so forth.<br />

While all writing for the class should encourage analysis (implicitly or explicitly), one major writing<br />

project should have an explicitly analytical focus. This may vary from instructor to instructor.<br />

Please describe the design experiences common to all course sections.<br />

CHANGE HISTORY<br />

Students should be encouraged to address solution design as part <strong>of</strong> problem analysis. Forms<br />

(project planning, individual/group activity logs) may be used to help students construct effective<br />

solution decisions by encouraging them to define problems, articulate potential solutions, and the<br />

rationale for the proposed solutions. Ultimately, students’ writing should reflect their abilities to<br />

effectively handle problems with research, collaboration, the writing process, and so forth.<br />

Date Change By whom Comments<br />

5/15/08 Created Hronek<br />

-76-


-77-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> CS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 3000<br />

Course Title<br />

Advanced Technical Writing for IS&T<br />

Course Coordinator<br />

Sheri Hronek<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/15/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

an advanced understanding <strong>of</strong> various<br />

academic-based writing strategies and <strong>of</strong> the<br />

genres appropriate for and expected in the<br />

technical sciences<br />

an ability to apply field-related, advanced<br />

research skills including a knowledge <strong>of</strong><br />

scholarly, peer-reviewed journals and<br />

indexes, the use <strong>of</strong> primary sources, the<br />

ability to evaluate sources, and expertise in<br />

using field-appropriate documentation<br />

a sophisticated understanding <strong>of</strong> grammar<br />

and language issues as they apply to writing<br />

generally and to the style expected in<br />

academic writing in the technical sciences<br />

S<br />

S<br />

S<br />

developed pr<strong>of</strong>iciency in using discourse- S<br />

-78-


community specific language, including<br />

vocabulary and style<br />

a sophisticated understanding <strong>of</strong> writing as a<br />

process that includes multiple drafts that<br />

productively and effectively respond to<br />

feedback<br />

an understanding <strong>of</strong> how writing functions in<br />

various academic and pr<strong>of</strong>essional<br />

communities students will encounter in their<br />

personal, pr<strong>of</strong>essional, and academic life<br />

a mature awareness <strong>of</strong> audience and the<br />

ability to adapt writing to various audiences<br />

and purposes<br />

S<br />

S<br />

S<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-79-


-80-


CIST 3100 Organizations, Applications, and Technology<br />

Department and Course Number CIST 3100<br />

Course Title<br />

Organizations, Applications and Technology<br />

Course Coordinator<br />

Paul van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/2008<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course<br />

This survey course provides an introduction to organizations and the role information and information<br />

systems play in supporting operations, decision-making, processes, quality management, and strategic<br />

activities <strong>of</strong> an organization. In addition, the course covers management <strong>of</strong> the IS function, strategic and<br />

regulatory issues <strong>of</strong> telecommunications, and ethical and legal issues.<br />

1.2 For whom course is intended<br />

The course is intended for undergraduate students in the schools <strong>of</strong> IS&T, Business Administration and<br />

Engineering who need to learn the fundamentals <strong>of</strong> Management Information Systems.<br />

1.3 Prerequisites <strong>of</strong> the course<br />

None<br />

1.4 Unusual circumstances <strong>of</strong> the course<br />

As <strong>of</strong> January 2007, this course is regularly <strong>of</strong>fered as an online course.<br />

2.0 Objectives:<br />

2.1 To understand the role <strong>of</strong> information systems and the subsequent challenges in today’s<br />

competitive business environment<br />

2.2 To understand the diversity <strong>of</strong> Information Systems and networks in the enterprise<br />

2.3 To understand Information Systems, organizations and management models, roles and their<br />

impact on the decision making process.<br />

2.4 To understand how Internet technology, electronic commerce, and electronic web based systems<br />

have transformed organizations, business models, supply chains and quality<br />

2.5 To understand basic computer hardware and s<strong>of</strong>tware and information systems security and<br />

control<br />

2.6 To obtain a basic understanding <strong>of</strong> s<strong>of</strong>tware applications such as operating systems, file<br />

management and data storage<br />

2.7 To gain a basis understanding <strong>of</strong> the challenges <strong>of</strong> maintaining a traditional data environment<br />

versus a database environment<br />

-81-


2.8 To gain a basis understanding <strong>of</strong> telecommunications and networks, including the Internet.<br />

2.9 To understand the business value <strong>of</strong> systems and technology<br />

2.10 To understand how organizations can use expert systems and case-based reasoning to capture<br />

knowledge<br />

2.11 To understand the legal and ethical impacts <strong>of</strong> information systems<br />

3.0 Content and Organization<br />

-82-<br />

Contact Hours<br />

3.1 Introduction to course, description <strong>of</strong> course requirements,<br />

and a discussion <strong>of</strong> expectations for the course 3<br />

3.2 Information Systems in Global Business Today. 3<br />

3.3 Global E-Business: How Businesses Use Information Systems 3<br />

3.4 Information Systems, Organizations, and Strategy 3<br />

3.5 Ethical and Social Issues in Information Systems 3<br />

3.6 IT Infrastructure and Emerging Technologies 3<br />

3.7 Foundations <strong>of</strong> Business Intelligence:<br />

Databases and Information Management 3<br />

3.8 Telecommunications, the Internet, and Wireless Technology 3<br />

3.9 Securing Information Systems 3<br />

3.10 Achieving Operation Excellence and Customer Intimacy:<br />

Enterprise Applications 3<br />

3.11 E-Commerce: Digital Markets, Digital Goods 3<br />

3.12 Managing Knowledge 3<br />

3.13 Enhancing Decision Making 3<br />

3.14 Building Systems 3<br />

3.15 Project Management: Establishing the Business Value <strong>of</strong><br />

Systems and Managing Change 3<br />

3.16 Managing Global Systems 3<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used<br />

The primary teaching method will be discussion <strong>of</strong> chapter contents, case studies, lecture, and<br />

discussion questions.<br />

4.2 Student role in the course<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned projects and papers, and complete required examinations.<br />

4.3 Contact hours<br />

Three (3) hours per week.<br />

5.0 Evaluation<br />

Note: exact contact hours may vary for the online version <strong>of</strong> this course; however, the contents <strong>of</strong><br />

the online course follows the regular course closely.


5.1 Types <strong>of</strong> student products<br />

The student products will be: two examinations (a midterm and final) or a single comprehensive<br />

examination, a ten-page research paper, a group term project, and other small assignments as<br />

deemed useful by the instructor.<br />

5.2 Basis for determining the final grade<br />

Grades will be determined on the basis <strong>of</strong> the student’s participation in class (10%), the student’s<br />

performance on examinations (30%), development <strong>of</strong> a ten-page research report based on<br />

readings from the trade and empirical literature (30%), and completion <strong>of</strong> the term project (30%).<br />

Component<br />

Grading<br />

Examination(s) 30%<br />

Class Participation 10%<br />

Research Paper 30%<br />

Term project 30%<br />

5.3 Grading Scale and Criteria<br />

Earned Grade<br />

Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />

59% F<br />

6.0 Resource Material:<br />

6.1 The latest edition <strong>of</strong> textbook(s) or other required readings used in the course, or equivalent.<br />

-83-


6.1.1 Loudon, K.C. and Loudon, J.P. (2007) Management Information Systems: Managing the<br />

Digital Firm, 10th Edition, Saddle River, NJ: Prentice Hall.<br />

6.2 Other suggested reading materials or equivalent<br />

Additional articles relating to the various topics in the course can be made available at the UNO<br />

Library or via online links. These articles are used to supplement topics presented in various<br />

chapters.<br />

6.3 Other sources for gathering information or equivalent<br />

Students are encouraged to read articles in current pr<strong>of</strong>essional and trade journals and websites<br />

that are relevant to topics in information systems. The process is particularly important in<br />

keeping current with technology and new methodologies.<br />

6.4 Current Bibliography:<br />

6.4.1 Jessup, L. & Valacich, J. (2008) Information Systems Today; Managing in the Digital World,<br />

3rd Edition, Saddle River, NJ: Prentice Hall.<br />

6.4.2 Stair, R. & Reynolds, G., (2006) Principles <strong>of</strong> Information Systems; A Managerial Approach,<br />

7th Edition, Boston, MA: Thomson Course Technology.<br />

6.4.3 Turban, E., Rainer, Jr., R.K., & Potter, R.E. (2005) Introduction to Information Technology,<br />

3rd Edition, Hoboken, NJ, John Wiley & Sons, Inc.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 3<br />

Networking and telecommunications 4<br />

Modern programming language 0<br />

Analysis and Design 2<br />

Data management 3<br />

Role <strong>of</strong> IS in Organizations 8<br />

8.0 Oral and Written Communications:<br />

Written research reports, and optional case study assignments and review questions provide<br />

opportunities for written and oral communication. The students also collaborate on written term projects<br />

which emphasize pr<strong>of</strong>essional communication practices.<br />

Note: for the online version <strong>of</strong> the course, oral student presentations are <strong>of</strong>ten impractical, and written<br />

assignments are regularly substituted.<br />

-84-


9.0 Social and Ethical Issues: Contact Hrs. 3<br />

Every student will be expected to understand the ethical impacts <strong>of</strong> information systems including:<br />

auditing <strong>of</strong> computer systems, the ethical, social and political needs <strong>of</strong> society, the ethical issues involved<br />

in any situation, ethical principles for conduct, and ethical conduct policies as they relate to information<br />

systems<br />

10.0 Theoretical content:<br />

Contact Hours<br />

10.1 Value Chain Model 1<br />

10.2 Industry Competitive Forces Model 1<br />

11.0 Problem analysis:<br />

Case studies are provided at the end <strong>of</strong> each <strong>of</strong> 15 chapters, providing the instructor with the opportunity<br />

to have the students analyze them.<br />

12.0 Solution design:<br />

Review problems are provided at the end <strong>of</strong> each <strong>of</strong> 15 chapters, providing the instructor with the<br />

opportunity to have the students develop solutions and appropriate answers to them.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

9/22/2002 Initial ABET version Van Vliet<br />

6/12/03 Remove Prerequisite. Course Change lw CIST 2010 no longer required<br />

Form 2/11/03<br />

6/24/03 ABET cleanup Wolcott<br />

9/13/2007 Change course number from CIST Van Vliet<br />

2110 to CIST 3100<br />

9/13/2007 Update document to match current Van Vliet<br />

text contents and assignments<br />

9/13/2007 Update document to include e- Van Vliet<br />

learning adjustments<br />

10/12/2008 Reviewed course document, found<br />

contents to be current.<br />

Van Vliet<br />

-85-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 3100<br />

Course Title<br />

Organizations, Applications and Technology<br />

Course Coordinator<br />

Paul van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

To understand the role <strong>of</strong> information systems S S S S X<br />

and the subsequent challenges in today’s<br />

competitive business environment<br />

To understand the diversity <strong>of</strong> Information<br />

S S S X<br />

Systems and networks in the enterprise<br />

To understand Information Systems,<br />

S S S X X<br />

organizations and management models, roles and<br />

their impact on the decision making process.<br />

To understand how Internet technology,<br />

S S S X X X<br />

electronic commerce, and electronic web based<br />

systems have transformed organizations,<br />

business models, supply chains and quality<br />

To understand basic computer hardware and<br />

S X S<br />

s<strong>of</strong>tware and information systems security and<br />

control<br />

To obtain a basic understanding <strong>of</strong> s<strong>of</strong>tware<br />

S X S<br />

applications such as operating systems, file<br />

management and data storage<br />

To gain a basis understanding <strong>of</strong> the challenges <strong>of</strong> S X S<br />

-86-


maintaining a traditional data environment versus<br />

a database environment<br />

To gain a basis understanding <strong>of</strong><br />

telecommunications and networks, including the<br />

Internet.<br />

To understand the business value <strong>of</strong> systems and<br />

technology<br />

To understand how organizations can use expert<br />

systems and case-based reasoning to capture<br />

knowledge<br />

To understand the legal and ethical impacts <strong>of</strong><br />

information systems<br />

S X S<br />

S S X X<br />

S S S<br />

S S S X X<br />

-87-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-88-


CIST 3110 Information Technology Ethics<br />

Department and Course Number CIST 3110<br />

Course Title<br />

Information Technology Ethics<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 09/10/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course will cover the development and need for issues regarding privacy and the application<br />

<strong>of</strong> computer ethics to information technology.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate management information systems (MIS), computer<br />

science (CS), information assurance (IA), and bioinformatics majors.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

CIST 3110 - Organizations, Applications & Technology or equivalent.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Introduction to Information Systems<br />

1.4.2 Review <strong>of</strong> Social, Privacy, Legal, and Ethics theory<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> student behavior.<br />

The student will:<br />

2.1 Be able to determine the impact <strong>of</strong> the privacy laws on information security policies.<br />

2.2 Understand the issues related to intellectual freedom, intellectual property, and copyright law as<br />

they relate to electronic publishing.<br />

2.3 Be able to determine and identify ethical procedures and behaviors in the organization related to<br />

information security.<br />

2.4 Be able to identify issues <strong>of</strong> pr<strong>of</strong>essional conduct in information technology case studies.<br />

-89-


2.5 Be able to apply <strong>University</strong> standards <strong>of</strong> ethical conduct in preparing assignments for all<br />

coursework.<br />

2.6 Learn the areas most impacted by ethical decisions by pr<strong>of</strong>essionals in the computing field and<br />

will gain skills in making such decisions.<br />

2.7 Identify key ethical concerns <strong>of</strong> information technology specialists.<br />

2.8 Apply theories <strong>of</strong> ethics to case situations in the context <strong>of</strong> organizational use <strong>of</strong> information<br />

technology.<br />

2.9 Appreciate how rapid changes in technology might affect ethical issues and changing norms <strong>of</strong><br />

behavior.<br />

2.10 Understand the issues related to privacy and confidentiality as they relate to information<br />

technology.<br />

2.11 Understand the ethical issues associated with gathering, storing and accessing genetic<br />

information in databases.<br />

2.12 Recognize the differences in ethical codes <strong>of</strong> conduct in different cultures and countries.<br />

2.13 Understand the ethical issues that arise from findings in genomic and bioinformatics analyses.<br />

2.14 The student will study and apply the following:<br />

2.14.1 Business Rules<br />

2.14.2 Firewalls<br />

2.14.3 Cryptography<br />

2.14.4 Privacy Laws<br />

2.14.5 Copyright Ownership<br />

2.14.6 Privacy, Publicity and Defamation<br />

2.14.7 Trademarks and Unfair Competition in Cyberspace<br />

2.14.8 Intellectual Property<br />

2.14.9 Contrast <strong>of</strong> Law vs. Ethic<br />

2.14.10 Organizational Ethical Principles<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence<br />

Contact Hours<br />

3.1 Frameworks for Ethical and Policy Analysis 3<br />

3.1.1 Moral Frameworks<br />

3.1.2 General Framework for Ethical Analysis<br />

3.2 Unwrapping the Gift<br />

3.2.1 The Ubiquity <strong>of</strong> Computers and the Rapid Pace <strong>of</strong> Change 3<br />

3.2.2 New Developments and Dramatic Impacts<br />

3.2.3 An Introduction to Some Issues and Themes<br />

3.2.4 Ethics<br />

3.3 Privacy 3<br />

3.3.1 Privacy and Computer Technology<br />

3.3.2 “Big Brother Is Watching You.”<br />

3.3.3 Diverse Privacy Topics<br />

3.3.4 Protecting Privacy: Technology, Markets, Rights and Laws<br />

3.3.5 Communications<br />

-90-


3.4 Freedom <strong>of</strong> Speech 3<br />

3.4.1 Changing Communications Paradigms<br />

3.4.2 Offensive Speech and Censorship in Cyberspace<br />

3.4.3 Anonymity<br />

3.4.4 Spam<br />

3.4.5 Ensuring Valuable and Diverse Content<br />

3.5 Intellectual Property<br />

3.5.1 Intellectual Property and Changing Technology<br />

3.5.2 Copyright Law<br />

3.5.3 Copying and Sharing<br />

3.5.4 Search Engines and Online Libraries<br />

3.5.5 Free-Speech Issues<br />

3.5.6 Free S<strong>of</strong>tware<br />

3.5.7 Issues for S<strong>of</strong>tware Developers<br />

3.6 Computer Crime 3<br />

3.6.1 Introduction<br />

3.6.2 Hacking<br />

3.6.3 Identity Theft and Credit-Card Fraud<br />

3.6.4 Scams and Forgery<br />

3.6.5 Crime Fighting Versus Privacy and Civil Liberties<br />

3.6.6 Whose Laws Rule the Web?<br />

3.7 Work 3<br />

3.7.1 Fears and Questions<br />

3.7.2 The Impact on Employment<br />

3.7.3 The Work Environment<br />

3.7.4 Employee Crime<br />

3.7.5 Employee Monitoring<br />

3.8 Evaluating and Controlling Technology 3<br />

3.8.1 Information, Knowledge, and Judgment<br />

3.8.2 Computers and Community<br />

3.8.3 The Digital Divide<br />

3.8.4 Evaluations <strong>of</strong> the Impact <strong>of</strong> Computer Technology<br />

3.8.5 Making Decisions About Technology<br />

3.9 Errors, Failures, and Risk<br />

3.9.1 Failures and Errors in Computer Systems<br />

3.9.2 Case <strong>Study</strong>: The Therac-25<br />

3.9.3 Increasing Reliability and Safety<br />

3.9.4 Dependence, Risk, and Progress<br />

3.10 Pr<strong>of</strong>essional Ethics and Responsibilities 3<br />

3.10.1 What is Pr<strong>of</strong>essional Ethics?<br />

3.10.2 Ethical Guidelines for Computer Pr<strong>of</strong>essionals<br />

3.10.3 Scenarios<br />

3.11 The S<strong>of</strong>tware Engineering Code and the ACM Code<br />

3.12 ethical Cases in Social, Legal, Privacy and Ethics 15<br />

4.0 Teaching Methodology:<br />

-91-


4.1 Methods to be used.<br />

The primary teaching methods will be instructor-led discussions, student-led small group<br />

discussions, case studies, lecture, guest speakers, and demonstration.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstrations, analyze selected cases, lead and participate<br />

in discussions on assigned readings and cases, complete assigned projects, and complete required<br />

examinations.<br />

4.3 Contact hours.<br />

Three hours per week<br />

5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

The student products will be group and individual case analysis reports, article reviews, book<br />

reports, quizzes, computer projects, examinations, term paper, and oral presentations.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Grades will be determined on the following basis:<br />

Component<br />

Grading<br />

Participation in project/term paper 15%<br />

Book report 10%<br />

Case studies 10%<br />

Oral presentation 5%<br />

Quizzes on readings 10%<br />

Midterm 20%<br />

Final exam 20%<br />

In-class participation 10%<br />

5.3 Grading scale and criteria.<br />

-92-


Points<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />


6.2.11 Cato Institute, a libertarian perspective<br />

6.2.12 Thomas, Library <strong>of</strong> Congress site for bills currently going through the U.S. Congress and<br />

recent U.S. laws.<br />

6.2.13 Privacy.org, news and advocacy <strong>of</strong> strong privacy regulation (EPIC and Privacy<br />

International)<br />

6.2.14 TRUSTe<br />

6.2.15 Federal Trade Commission<br />

6.2.16 "Freedom <strong>of</strong> Speech and Information Privacy" (Eugene Volokh, UCLA Law School)<br />

6.2.17 Federal Bureau <strong>of</strong> Investigation (Use site search tool for "Carnivore," etc.)<br />

6.2.18 Echelonwatch (American Civil Liberties Union, EPIC, and others)<br />

6.2.19 Cryptography issues and legislation (Center for Democracy and Technology).<br />

6.2.20 "Cryptography's Role in Securing the Information Society" (National Academy <strong>of</strong> Sciences)<br />

6.2.21 "Encryption Policy for the 21st Century" (Cato Institute)<br />

6.2.22 CryptoRights Foundation<br />

6.2.23 National Security Agency<br />

6.2.24 EFF's archive on the Digital Millennium Copyright Act<br />

6.2.25 Digitalconsumer.org and its Consumer Technology Bill <strong>of</strong> Rights.<br />

6.2.26 American Library Association Office for Intellectual Freedom, includes the ALA Resolution<br />

on the Use <strong>of</strong> Filtering S<strong>of</strong>tware in Libraries.<br />

6.2.27 Chilling Effects Clearinghouse, information about Internet legal issues related to "ceaseand-desist"<br />

letters, letters claiming violation <strong>of</strong> copyright, trademark, and so forth, and<br />

threatening legal action if the claimed violations continue. (EFF and several major law<br />

schools)<br />

6.2.28 Recording Industry Association <strong>of</strong> America<br />

6.2.29 ACM<br />

6.2.30 IEEE Computer Society<br />

6.2.31 Online Ethics Center for Engineering and Science (Case Western Reserve <strong>University</strong>)<br />

Electronic Frontiers Australia<br />

6.2.32 Privacy Commissioner <strong>of</strong> Australia<br />

6.2.33 Privacy Commissioner <strong>of</strong> Canada<br />

6.2.34 "Privacy as Censorship A Skeptical View <strong>of</strong> Proposals to Regulate Privacy in the Private<br />

Sector" (Cato Institute)<br />

6.2.35 Genetics and Public Health in the 21st Century (2000) Muin Khoury, Wylie Burke, and<br />

Elisabeth Thomson, Eds., Oxford <strong>University</strong> Press.<br />

6.2.36 Annual Review <strong>of</strong> Genomics and Human Genetics (yearly since 2000). Eric Lander, David<br />

Page and Richard Lifton, Eds., Annual Reviews, Academic Press.<br />

6.2.37 Nuffield Council on Bioethics Reports: Reports and discussion papers assembled by an<br />

independent body that considers the ethical issues arising from developments in<br />

medicine and biology that plays a major role in contributing to policy making and<br />

stimulating debated in bioethics. http://www.nuffieldbiotethics.org/home<br />

6.3 Other sources <strong>of</strong> information.<br />

Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />

relevant to topics in systems information security privacy and ethics. The process is particularly<br />

important in keeping current with technology and new methodologies.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

-94-


6.4.1 Computer and Internet Use on Campus: A Legal Guide to Issues <strong>of</strong> Intellectual Property,<br />

Free Speech, and Privacy, by Constance S. Hawke, John Wiley & Sons, September 1, 2000<br />

6.4.2 Borders in Cyberspace: Information Policy and the Global Information Infrastructure<br />

(Publication <strong>of</strong> the Harvard Information Infrastructure Project) by Brian Kahin and Charles<br />

Nesson, MIT Press, March 1997.<br />

6.4.3 Cybercrime: Law Enforcement, Security and Surveillance in the Information Age by Tom<br />

Douglas, Routledge, and July 2000.<br />

6.4.4 Data Privacy in the Information Age by Jacqueline Klosek, Praeger Publishing, August 30,<br />

2000.<br />

6.4.5 Database Nation: The Death <strong>of</strong> Privacy in the 21st Century by Simson Garfinkel, O'Reilly &<br />

Associates, and January 2000.<br />

6.4.6 ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy<br />

Regulations, by Timothy D. Casey, Wiley, 2000.<br />

6.4.7 Technology and Privacy: The New Landscape, by Philip E. Agre, and Marc Rotenberg. , MIT<br />

Press, September 1998.<br />

6.4.8 Internet Privacy Protection Guide by J. K. Santiago, Boggy Cove, Inc. 1999.<br />

6.4.9 Building in Big Brother: The Cryptographic Policy Debate by Lance J. H<strong>of</strong>fman, Springer<br />

Verlag, April 1995.<br />

6.4.10 Computer Rules: A Guide to Formulating Computer Operating & Security Policy for Users<br />

by Randal F. Fleury, Compupol, Inc., 1998.<br />

6.4.11 Technology and Privacy: The New Landscape, by Philip E. Agre and Marc Rotenberg, MIT<br />

Press, September 1998 or most recent edition.<br />

6.4.12 Legislating Privacy: Technology, Social Values, and Public Policy, by Priscilla M. Regan,<br />

<strong>University</strong> <strong>of</strong> North Carolina Press, September 1995.<br />

6.4.13 Managing Privacy: Information Technology and Corporate America, by H. Jeff Smith,<br />

<strong>University</strong> <strong>of</strong> North Carolina Press, June 1994.<br />

6.4.14 Computers, Ethics and Social Values by Deborah G. Johnson and Helen Nissenbaum,<br />

Prentice Hall, February 2, 1995.<br />

6.4.15 Computers, Ethics, and Society by M. David Ermann, Mary B. Williams, and Michele S.<br />

Shauf, Oxford <strong>University</strong> Press, April 1997.<br />

6.4.16 Sex, Laws, and Cyberspace: Freedom and Censorship on the Frontiers <strong>of</strong> the Online<br />

Revolution, by Jonathan Wallace and Mark Mangan, Henry Holt, March 1997.<br />

6.4.17 Computer and Information Ethics by John Weckert and Douglas Adeney, Greenwood<br />

Publishing Group, May 1997.<br />

6.4.18 Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing by Tom Forester<br />

and Perry Morrison, MIT Press, December1993.<br />

6.4.19 The Information Systems Security Officer's Guide: Establishing and<br />

6.4.20 Managing an Information Protection Program, by Gerald Kovacich, Butterworth-<br />

Heinemann, 1998.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 3<br />

Networking and telecommunications 3<br />

-95-


Modern programming language<br />

Analysis and Design<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 10<br />

8.0 Oral and Written Communications:<br />

Every student will be required to:<br />

(1) Complete individually the analysis <strong>of</strong> ten to fifteen in class mini-cases and actively participate<br />

in the instructor lead discussions.<br />

(2) Either individually or as a member <strong>of</strong> a small group, analyze six to ten major cases, prepare<br />

either a two to four-page point paper report or a six-page narrative report about the case, and<br />

lead or participate in the in-class discussions.<br />

(3) Lead several small group discussions about the cases<br />

(4) Prepare oral presentations <strong>of</strong> approximately 10-minute duration that present an analysis <strong>of</strong><br />

select cases.<br />

All papers and presentations will be evaluated for technical content, application <strong>of</strong> principles,<br />

appropriateness <strong>of</strong> format, use <strong>of</strong> supporting materials, and correct use <strong>of</strong> grammar and spelling rules.<br />

9.0 Social and Ethical Issues:<br />

This course focuses on the ethical, social, legal, and privacy issues in the information technology,<br />

bioinformatics, and health care industries. After extensive presentations <strong>of</strong> the fundamental theories and<br />

principles <strong>of</strong> ethical behavior, the students will apply the theories and principles to cases and real-world<br />

situations current to these industries.<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

No coverage.<br />

11.0 Problem analysis:<br />

A major part <strong>of</strong> this course is case analysis. Throughout the presentation <strong>of</strong> the theoretical materials,<br />

there will be shore in-class exercises that provide situations for student analysis. These exercises provide<br />

the students with models and processes that will be applied to the more formal lengthier cases and to<br />

situations that the students will encounter in business and industry.<br />

12.0 Solution design:<br />

-96-


The students apply what they have learned in this class to cases and everyday events in the industries <strong>of</strong><br />

focus. Students will be expected to determine the consequences for unethical behavior and to provide<br />

solid justification for their decisions.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

2/14/03 Initial ABET version Pietron<br />

6/24/03 ABET cleanup Wolcott<br />

10/10/08 Major changes to outline, assignments, Scho<strong>of</strong>f<br />

textbook.<br />

6/23/2009 Update <strong>of</strong> the course matrix Pietron<br />

-97-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 3110<br />

Course Title<br />

Information Technology Ethics<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 9/10/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Be able to determine the impact <strong>of</strong> the<br />

privacy laws on information security policies.<br />

Understand the issues related to intellectual<br />

freedom, intellectual property, and copyright<br />

law as they relate to electronic publishing.<br />

Be able to determine and identify ethical<br />

procedures and behaviors in the organization<br />

related to information security.<br />

X<br />

X<br />

X X S X<br />

Be able to identify issues <strong>of</strong> pr<strong>of</strong>essional X X S X<br />

conduct in information technology case<br />

studies.<br />

Be able to apply <strong>University</strong> standards <strong>of</strong> X X S X<br />

-98-<br />

S<br />

S


ethical conduct in preparing assignments for<br />

all coursework.<br />

Learn the areas most impacted by ethical<br />

decisions by pr<strong>of</strong>essionals in the computing<br />

field and will gain skills in making such<br />

decisions.<br />

Identify key ethical concerns <strong>of</strong> information<br />

technology specialists.<br />

Apply theories <strong>of</strong> ethics to case situations in<br />

the context <strong>of</strong> organizational use <strong>of</strong><br />

information technology.<br />

Appreciate how rapid changes in technology<br />

might affect ethical issues and changing<br />

norms <strong>of</strong> behavior.<br />

Understand the issues related to privacy and<br />

confidentiality as they relate to information<br />

technology.<br />

Understand the ethical issues associated with<br />

gathering, storing and accessing genetic<br />

information in databases.<br />

Recognize the differences in ethical codes <strong>of</strong><br />

conduct in different cultures and countries.<br />

Understand the ethical issues that arise from<br />

findings in genomic and bioinformatics<br />

analyses.<br />

The student will study and apply the<br />

following:<br />

X<br />

X X S<br />

X X S<br />

X<br />

X X S<br />

X X S<br />

Business Rules x S<br />

Firewalls X X S<br />

Cryptography X X S<br />

Privacy Laws X X S<br />

Copyright Ownership X X S<br />

Privacy, Publicity and Defamation X S<br />

Trademarks and Unfair Competition in<br />

X X S<br />

Cyberspace<br />

Intellectual Property X X S<br />

Contrast <strong>of</strong> Law vs. Ethics X S<br />

Organizational Ethical Principles X S<br />

S<br />

S<br />

S<br />

S<br />

S<br />

X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

-99-


1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-100-


CIST 3600 Information Security and Policy<br />

Department and Course Number CIST 3600<br />

Course Title<br />

Course Coordinator<br />

Information Security and Policy<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 6/23/2009<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course provides an introduction to the fundamental principles and topics <strong>of</strong> Information<br />

Assurance. The principles are laid out in such a way that computer pr<strong>of</strong>essionals not only learn<br />

about principles; they learn them in a logical order that provides a framework for developing and<br />

performing the security tasks. The course will address hardware, s<strong>of</strong>tware, processes,<br />

communications, applications, and policies and procedures relative to information assurance in<br />

the organization.<br />

This course is intended as a first course in Information Assurance at the undergraduate level. This<br />

course will be a pre-requisite for additional information and network security courses for the<br />

Information Assurance concentration in the undergraduate MIS program.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate information assurance (IA), management information<br />

systems (MIS) and computer science (CS) majors.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 3100<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Types <strong>of</strong> Processing Systems<br />

1.4.2 Essential Concepts <strong>of</strong> Networks<br />

1.4.3 Introduction to Topologies<br />

1.4.4 Understanding <strong>of</strong> TCP/IP<br />

1.4.5 Introduction to Systems Analysis, Design, and Databases<br />

1.4.6 Principles <strong>of</strong> Management<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

-101-


2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes<br />

2.1 Identify the fundamental principles <strong>of</strong> Information Security<br />

2.2 Demonstrate an understanding: the concept <strong>of</strong> threat, evaluation <strong>of</strong> assets, information assets,<br />

physical, operational, and information security – and how they are interrelated<br />

2.3 Understand risk analysis and risk management<br />

2.4 Demonstrate the ability to design and guide the development <strong>of</strong> a security policy for any<br />

corporate environment.<br />

2.5 Demonstrate an understanding <strong>of</strong> mitigation approaches – technical and administrative<br />

2.6 Understand the need for a comprehensive security model and its implications for the security<br />

manager<br />

2.7 Understand the need for the careful design <strong>of</strong> a secure corporate information infrastructure.<br />

2.8 Demonstrate an understanding <strong>of</strong> security technologies.<br />

2.9 Understand the relationship network infrastructure equipment to the implementation <strong>of</strong> a given<br />

security policy.<br />

2.10 Display an introductory understanding <strong>of</strong> basic cryptography, its implementation considerations<br />

and key management<br />

2.11 Understand the importance <strong>of</strong> secure system management - economical and corporation<br />

implications<br />

2.12 The Role <strong>of</strong> Procedures and Education in the overall Corporate Security Solution<br />

3.0 Content and Organization:<br />

3.1 The Future <strong>of</strong> Business 1.0<br />

3.2 Introduction to Information Security 1.0<br />

Contact hours<br />

3.3 Inspection 1.5<br />

3.3.1 Resource Inventory<br />

3.3.2 Threat Assessment<br />

3.3.3 Identifying Vulnerabilities<br />

3.3.4 Assigning Safeguards<br />

3.3.5 Evaluation <strong>of</strong> Current Status<br />

3.4 Protection 1.5<br />

3.4.1 Awareness<br />

3.4.2 Access<br />

3.4.3 Identification<br />

3.4.4 Authentication<br />

-102-


3.4.5 Authorization<br />

3.4.6 Availability<br />

3.4.7 Accuracy<br />

3.4.8 Confidentiality<br />

3.4.9 Accountability<br />

3.4.10 Administration<br />

3.5 Detection 1.5<br />

3.5.1 Intruder Types<br />

3.5.2 Intrusion Methods<br />

3.5.3 Intrusion Process<br />

3.5.4 Detection Methods<br />

3.6 Reaction 1.5<br />

3.6.1 Incident Determination<br />

3.6.2 Incident Notification<br />

3.6.3 Incident Containment<br />

3.6.4 Assessing Damage<br />

3.6.5 Incident Recovery<br />

3.6.6 Automated Response<br />

3.7 Reflection 1.5<br />

3.7.1 Incident Documentation<br />

3.7.2 Incident Evaluation<br />

3.7.3 Legal Prosecution<br />

3.7.4 The Future <strong>of</strong> Information Security<br />

3.8 What is Security Engineering 1.5<br />

3.9 Protocols 1.5<br />

3.10 Passwords 1.5<br />

3.11 Access Controls 1.5<br />

3.12 Cryptography 1.5<br />

3.13 Distributed Systems 1.5<br />

3.14 Multilevel Security 1.5<br />

3.15 Multilateral Security 1.5<br />

3.16 Banking and Bookkeeping 1.5<br />

3.17 Monitoring Systems 1.5<br />

3.18 Nuclear Command and Control 1.5<br />

3.19 Security Printing and Seals 1.5<br />

3.20 Biometrics 1.5<br />

3.21 Physical Tamper Resistance 1.5<br />

3.22 Emission Security 1.5<br />

3.23 Electronic and Information Warfare 1.5<br />

3.24 Telecom System Security 1.5<br />

3.25 Network Attack and Defense 1.5<br />

3.26 Protecting E-Commerce Systems 1.5<br />

-103-


3.27 Copyright and Privacy Protection 1.5<br />

3.28 E-Policy 1.5<br />

3.29 Management Issues 1.5<br />

3.30 System Evaluation and Assurance 1.5<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching method will be discussion, programming-related projects and<br />

demonstrations, case studies, lecture, expert speakers and security-related application<br />

demonstrations.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned programming-related projects, and complete required examinations.<br />

4.3 Contact hours<br />

3.0<br />

5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

The student products will be article reviews, projects, examinations, and oral presentations.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Grades will be determined on the basis <strong>of</strong> the student’s participation in research, presentation <strong>of</strong><br />

results, participation through class discussion, and achievement on examinations. The specific<br />

weights shall be specified in the outline for the particular class.<br />

5.3 Grading scale and criteria.<br />

Points Grading<br />

97 – 100% A+<br />

94 – 96% A<br />

90 – 93% A–<br />

87 – 89% B+<br />

84 – 86% B<br />

80 – 83% B–<br />

77 – 79% C+<br />

-104-


70 – 76% C<br />

70 – 73% C-<br />

67 – 69% D+<br />

64 – 66% D<br />

60 – 63% D–<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 asjdkflaj<br />

6.1.2 Information Security Protecting the Global Enterprise, by Donald L. Pipkin, Prentice-Hall,<br />

2000. (or more recent text)<br />

6.1.3 Security Engineering, by Ross Anderson, Wiley Computer Publishing, 2001. (or more<br />

recent text)<br />

6.2 Other suggested reading materials, if any.<br />

Additional articles that have been collected for various topics are available at the UNO Library.<br />

These articles are used to supplement topics presented in various chapters.<br />

6.3 Other sources <strong>of</strong> information<br />

Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />

relevant to topics in systems analysis and design. The process is particularly important in keeping<br />

current with technology and new methodologies.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

6.4.1 Designing Network Security by Merike and Kaeo, Cisco Systems, Macmillan<br />

Publishing, 1999.<br />

6.4.2 Computer and Internet Use on Campus: A Legal Guide to Issues <strong>of</strong> Intellectual<br />

Property, Free Speech, and Privacy, by Constance S. Hawke, John Wiley & Sons,<br />

September 1, 2000<br />

6.4.3 Borders in Cyberspace: Information Policy and the Global Information Infrastructure<br />

(Publication <strong>of</strong> the Harvard Information Infrastructure Project) by Brian Kahin and Charles<br />

Nesson, MIT Press, March 1997.<br />

6.4.4 Cybercrime: Law Enforcement, Security and Surveillance in the Information Age by Tom<br />

Douglas, Routledge, and July 2000.<br />

6.4.5 Data Privacy in the Information Age by Jacqueline Klosek, Praeger Publishing, August 30,<br />

2000.<br />

6.4.6 ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy<br />

Regulations, by Timothy D. Casey, Wiley, 2000.<br />

6.4.7 Technology and Privacy: The New Landscape, by Philip E. Agre, and Marc Rotenberg. , MIT<br />

Press, September 1998.<br />

6.4.8 Internet Privacy Protection Guide by J. K. Santiago, Boggy Cove, Inc. 1999.<br />

-105-


6.4.9 E-Policy: How to Develop Computer, E-Policy, and Internet Guidelines to Protect Your<br />

Company and Assets by Michael R. Overly, AMACOM, September 1998.<br />

6.4.10 Computer and Information Ethics by John Weckert and Douglas Adeney, Greenwood<br />

Publishing Group, May 1997.<br />

6.4.11 Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing by Tom Forester<br />

and Perry Morrison, MIT Press, December1993.<br />

6.4.12 The Information Systems Security Officer's Guide: Establishing and Managing an<br />

Information Protection Program by Gerald Kovacich, Butterworth-Heinemann, 1998<br />

6.4.13 Information Warfare and Security by Dorothy E. Denning, Addison Wesley, 1999.<br />

6.4.14 Cyberwar 2.0: Myths, Mysteries and Realities, Alan D. Campen and Douglas H. Dearth,<br />

AFCEA Press, 1998.<br />

6.4.15 The Art <strong>of</strong> Information Warfare: Insight into the Knowledge Warrior Philosophy, by<br />

Richard Forno and Ronald Baklarz, Upublish.com, 1999.<br />

6.4.16 Big Brother NSA, and It's Little Brother; National Security Agency's Global Surveillance<br />

Network, by Cook, HSPI, March 1999.<br />

6.4.17 Maximum Security; A Hacker's Guide to Protecting Your Internet Site and Network with<br />

CDROM Anonymous / Sams Publishing, SAMS, 1998.<br />

6.4.18 Information Warfare : Chaos on the Electronic Superhighway by Winn Schwartau,<br />

Thunder's Mouth Pr. October 1996 .<br />

6.4.19 Information Warfare : Principles and Operations by Edward Waltz, Artech House,<br />

September 1998.<br />

6.4.20 Strategic Appraisal: The Changing Role <strong>of</strong> Information in Warfare by John White, Zalmay<br />

Khalilzad , Andrew W. Marshall, Rand Corporation, May 1999.<br />

6.4.21 Toward a Revolution in Military Affairs : Defense and Security at the Dawn <strong>of</strong> the Twenty-<br />

First Century (Contributions in Military Studies, No. 197) by Thierry Gongora and Harald<br />

Von Riekh<strong>of</strong>f, Greenwood Publishing Group, June 30, 2000.<br />

6.4.22 Hacker Pro<strong>of</strong>; The Ultimate Guide to Network Security with CDROM by Lars Klander,<br />

Jamsa Press, 2000.<br />

6.4.23 Hacking Exposed; Network Security Secrets and Solutions, 2000, SAMS.<br />

6.4.24 Designing Network Security by Merike Kaeo, Cisco Systems, Macmillan Publishing, 1999.<br />

7.0 Estimate Computer Science Accreditation Board (CSAB) Category Content (class time in hours):<br />

CSAB Category Core Advanced<br />

Data structures<br />

Computer organization and architecture 12<br />

Algorithms and s<strong>of</strong>tware design<br />

Concepts <strong>of</strong> programming languages<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __2___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __10-20___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

-106-


9.0 Social and Ethical Issues:<br />

The course will address the social and ethical issues on Information Assurance. Students will be graded on<br />

their understanding <strong>of</strong> these topics by class participation, exams, or researches.<br />

10.0 Theoretical content:<br />

10.1 The fundamental principles <strong>of</strong> Information Security 2<br />

10.2 The basic concept <strong>of</strong> threat, evaluation <strong>of</strong> assets, information assets,<br />

physical, operational, and information security and how they are related. 2<br />

Hours<br />

11.0 Problem analysis:<br />

The students will learn the principles that are used by computer pr<strong>of</strong>essionals. They will not only learn<br />

about principles; but learn them in a logical order that provides a framework for developing and<br />

performing the security tasks. The course will address hardware, s<strong>of</strong>tware, processes, communications,<br />

applications, and policies and procedures relative to information assurance in the organization.<br />

12.0 Solution design<br />

Using these established principles and frameworks, students will build and maintain secure and reliable<br />

information systems. Students also learn to design and guide the development <strong>of</strong> a security policy for any<br />

corporate environment.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

11/2/02 Initial ABET version Pietron<br />

6/25/03 ABET clean-up Wolcott<br />

10/14/08 Update to course title, description and Pietron<br />

prerequisites<br />

6/23/2009 Updated course objectives to <strong>BIS</strong> program<br />

objectives<br />

Pietron<br />

-107-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 3600<br />

Course Title<br />

Information Security and Policy<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/27/09<br />

S – Strong relationship<br />

X –Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Identify the fundamental principles <strong>of</strong><br />

Information Security<br />

Demonstrate an understanding: the<br />

concept <strong>of</strong> threat, evaluation <strong>of</strong> assets,<br />

information assets, physical, operational,<br />

and information security – and how they<br />

are interrelated<br />

Understand risk analysis and risk<br />

management<br />

Demonstrate the ability to design and<br />

guide the development <strong>of</strong> a security<br />

policy for any corporate environment.<br />

Demonstrate an understanding <strong>of</strong><br />

mitigation approaches – technical and<br />

administrative<br />

X x x x x x x x x X<br />

S S S<br />

S S S S S S<br />

S S S X X X<br />

S<br />

S<br />

-108-


Understand the need for a<br />

comprehensive security model and its<br />

implications for the security manager<br />

Understand the need for the careful<br />

design <strong>of</strong> a secure corporate information<br />

infrastructure.<br />

Demonstrate an understanding <strong>of</strong><br />

security technologies.<br />

Understand the relationship network<br />

infrastructure equipment to the<br />

implementation <strong>of</strong> a given security policy.<br />

Display an introductory understanding <strong>of</strong><br />

basic cryptography, its implementation<br />

considerations and key management<br />

Understand the importance <strong>of</strong> secure<br />

system management - economical and<br />

corporation implications<br />

The Role <strong>of</strong> Procedures and Education in<br />

the overall Corporate Security Solution<br />

s<br />

s<br />

X S S S<br />

S<br />

S S<br />

S<br />

X X<br />

X x X<br />

-109-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-110-


CIST 4360 Foundations <strong>of</strong> Information Assurance<br />

Department and Course Number CIST 4360 CSCI 4360-001 CSCI 8366-001<br />

Course Title<br />

Foundations <strong>of</strong> Information Assurance<br />

Course Coordinator<br />

Blaine Burnham and Robin Gandhi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision May 26, 2009<br />

Semester Offered Fall 2009<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The purpose <strong>of</strong> the course is to provide students with a comprehensive overview <strong>of</strong> the<br />

Information Assurance subject area starting from its foundational roots and to prepare students<br />

for more extensive study in the subject. The course topics outline what we knew during the early<br />

days <strong>of</strong> the field, what we now know, what has been done until now, and what are the<br />

challenging problems still exist.<br />

1.2 For whom course is intended.<br />

This course is intended for graduate and undergraduate students with IA majors in the College <strong>of</strong><br />

IS&T who understand how computers are organized, how they compute and how they<br />

communicate. These students need to have an uncommon passion for learning and the need to<br />

have a highly motivated curiosity. Typically the class is designed for students that are seniors or<br />

graduate students. However, admission for any qualified student may be arranged with<br />

permission <strong>of</strong> the instructor.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 Introduction to information assurance (IASC 1100, CIST 3600, or instructor permission).<br />

1.3.2 Computer networking (CSCI 3550 or ISQA 3400, or instructor permission).<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Core terms and principles <strong>of</strong> information assurance: Confidentiality, Integrity, Availability,<br />

Threats, Vulnerabilities, Types <strong>of</strong> Malware, Authorization, Access Control, Accountability,<br />

Identification, Authentication, Security Controls, and Defense in Depth.<br />

1.4.2 Computer networking topics: Media, Protocol Stacks, Protocol Encapsulation, ARP, IP<br />

addressing, IP routing, ICMP, DHCP, TCP Virtual Circuits, Network Address Translation,<br />

DNS, and HTTP.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

-111-


2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 Know and comprehend the principle concepts <strong>of</strong> information assurance.<br />

2.2 Apply methods and tools associated with information assurance to<br />

engineer dependable s<strong>of</strong>tware systems.<br />

2.3 Analyze case studies related to information assurance to<br />

synthesize meaningful class presentations and discussions.<br />

2.4 Criticize current information assurance approaches.<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence. (Total 43.5 topic hours assuming a 15 week<br />

schedule and 1.5 hours for midterm)<br />

3.1 What is Information? (1 hour)<br />

3.2 Legal, Privacy and Ethical Issues (1.5 hour)<br />

3.2.1 Information and Law<br />

3.2.2 Computer crime<br />

3.2.3 Ethical reasoning<br />

3.3 Overview <strong>of</strong> Information Assurance (3 hours)<br />

3.3.1 A Taxonomy <strong>of</strong> Information Assurance<br />

3.3.2 The meaning <strong>of</strong> “Secure”<br />

3.3.3 Attacks and Computer Criminals<br />

3.3.4 A Vulnerability Taxonomy<br />

3.4 Genesis <strong>of</strong> the Field (6 hours)<br />

3.4.1 The problem description, The Ware Report<br />

3.4.2 Proposed solutions, The Anderson Report<br />

3.4.3 Design principle for secure systems<br />

3.5 General Operating System (3 hours)<br />

3.5.1 Shared Resources<br />

3.5.2 Access Control Mechanisms<br />

3.5.3 General Operating System Process Management<br />

3.5.4 Memory and Address Protection<br />

3.5.5 File Protection<br />

3.5.6 User protection<br />

-112-


3.6 Identification and Authentication (1 hours)<br />

3.6.1 Trusted Path<br />

3.7 Designing Trusted Operating System (3 hours)<br />

3.7.1 Characteristics <strong>of</strong> a Trusted Operating System<br />

3.7.2 Kernelized Design<br />

3.7.3 Separation/Isolation<br />

3.7.4 Virtualization<br />

3.7.5 Layered Design<br />

3.8 Security Models (3 hours)<br />

3.8.1 Information Classification<br />

3.8.2 Bell Lapadula<br />

3.8.3 BIBA<br />

3.8.4 Clark Wilson<br />

3.8.5 Chinese Wall Policy<br />

3.9 Case <strong>Study</strong>: Trusted Operating Systems Architecture (3 hours)<br />

3.9.1 Analysis <strong>of</strong> the Multics Ring Architecture<br />

3.10 Trusted Operating System Assurance (6 hours)<br />

3.10.1 The History <strong>of</strong> Assurance in Computer Systems<br />

3.10.2 Assurance methods<br />

3.10.3 Trusted Computer System Evaluation<br />

Criteria (TCSEC): The Orange Book<br />

3.11 Trusted Database Implementation (3 hours)<br />

3.11.1 Security requirements for databases<br />

3.11.2 Inference problems in databases<br />

3.11.3 Multilevel Databases<br />

3.12 Security in Network (3 hours)<br />

3.12.1 Common Threats to Networks<br />

3.12.2 Network Security Controls<br />

3.12.3 Firewalls and IDS<br />

3.13 Fundamentals <strong>of</strong> Cryptography (6 hours)<br />

3.13.1 Background on Cryptography<br />

3.13.2 Cryptographic Algorithms<br />

3.13.3 Applying Cryptography<br />

3.13.4 Attacks against Cryptography<br />

-113-


3.14 Risk Management (1 hour)<br />

3.14.1 Security Planning<br />

3.14.2 Risk Analysis<br />

3.14.3 Organization Security Policies<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The course will be presented primarily in lecture form. However, students will be expected to<br />

participate in discussions <strong>of</strong> the various topics as they are studied. In addition to the study <strong>of</strong> the<br />

text, students must do homework as assigned. Two tests will be given. A written paper with oral<br />

presentation as a semester project will be required.<br />

4.2 Student role in the course.<br />

The students will be involved through exams, homework, projects, and discussions with each<br />

other.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

5.1 Project.<br />

3 hours per week.<br />

Students will complete a semester long project. The purpose <strong>of</strong> the semester project is to<br />

demonstrate some in-depth knowledge <strong>of</strong> a topic related to the class subject material. Students<br />

can choose to write a research paper exploring some topic related to the class, to demonstrate a<br />

security application program, or to develop a programming project. Students will summarize the<br />

lessons learned from the project with a 10-15 page report and 20 minute conference quality<br />

power point presentation.<br />

5.2 Laboratory Assignments.<br />

The course includes a scheduled Laboratory component. The purpose <strong>of</strong> the Labs is to give<br />

students the opportunity to develop an operational understanding <strong>of</strong> many <strong>of</strong> the concepts<br />

discussed in class as well as additional ones. Each lab exercise will involve an investigation into<br />

some part <strong>of</strong> the subject matter. Each exercise will result in a 5 page written paper and a 10-<br />

minute presentation suitable for presentation at a faculty / student brown-bag forum. Laboratory<br />

assignments will generally require access to STEAL-1 outside <strong>of</strong> class.<br />

Daily Assignments.<br />

-114-


Daily assignments will be for each student to bring to each class a one page write-up <strong>of</strong> two<br />

current events articles and two web sites <strong>of</strong> substantive internet information security resource.<br />

Each <strong>of</strong> these current event articles and web site references needs to be accompanied with a<br />

short and incisive discussion <strong>of</strong> why the article or reference is relevant. The student should be<br />

prepared to discuss these them class.<br />

5.3 Exams.<br />

Student performance will be evaluated through three examinations: 2 in-class exams and a<br />

comprehensive Final Exam. All these exams will include a variety <strong>of</strong> question types to measure<br />

student understanding <strong>of</strong> the material. Tentatively, exams are scheduled every seven weeks.<br />

5.4 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Two exams will be given during the course:<br />

15% Exam 1<br />

15% Exam 2<br />

25% Lab<br />

20% Final exam<br />

15% Semester project<br />

5% Class attendance and participation<br />

5% Daily written assignments<br />

5.5 Grading scale and criteria.<br />

98 –100% A+<br />

93 – 97% A<br />

90 – 92% A-<br />

88 – 89% B+<br />

83 – 87% B<br />

80 – 82% B-<br />

78 – 79% C+<br />

72 – 77% C<br />

70 – 72% C-<br />

68 – 69% D+<br />

62 – 67% D<br />

60 – 62% D-<br />

0 – 59% F<br />

6.0 Resource Material<br />

-115-


6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Pfleeger, C.P., & Pfleeger, S.L. (2003). Security in Computing (3rd ed.). Upper Saddle River,<br />

NJ: Pearson Education, Inc.<br />

6.1.2 Anderson, R. (2001). Security Engineering: A Guide to Building Dependable Distributed<br />

Systems (1st ed.). Wiley.<br />

6.1.3 Schneier, B. (2000). Secrets and Lies: Digital Security in a Networked World (1st ed.). John<br />

Wiley & Sons.<br />

6.1.4 Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook <strong>of</strong> Applied<br />

Cryptography. CRC Press Series on Discrete Mathematics and Its Applications.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Graff, M.G. & van Wyk, K. R. (2003). Secure Coding: Principles and Practice, O’Reilly &<br />

Associates, Inc.<br />

6.2.2 Bishop, M. (2005). Introduction to Computer Security. Addison-Wesley Pr<strong>of</strong>essional.<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional materials and online resources will be identified for students at the beginning <strong>of</strong> the<br />

course and as the course progresses.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

6.4.1 Anderson, J.P. (1972). Computer Security Technology Planning <strong>Study</strong>, ESD-TR-73-51,<br />

ESD/AFSC, Hanscom AFB, Bedford, MA 01731 [NTIS AD-758 206]<br />

6.4.2 Bell, D. E & La Padula, L. (1975). Secure Computer System: Unified Exposition and Multics<br />

Interpretation, ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA 01731. [DTIC AD-<br />

A023588]<br />

6.4.3 Department <strong>of</strong> Defense. (1983, 1985). Trusted Computer System Evaluation Criteria<br />

(Orange Book). DoD 5200.28-STD<br />

6.4.4 Karger, P. A. & Schell, R. R. (1974). MULTICS Security Evaluation: Vulnerability Analysis.<br />

ESD-TR-74-193 Vol. II, ESD/AFSC, Hanscom AFB, Bedford, MA 01731.<br />

6.4.5 Ware, W. (1970) Security Controls for Computer Systems (U): Report <strong>of</strong> Defense Science<br />

Board Task Force on Computer Security. Rand Report R609-1, The RAND Corporation,<br />

Santa Monica, CA.<br />

7.0 Computer Science Accreditation Board (CSAB) Category Content (class time in hours)<br />

CSAB Category Core Advanced<br />

Data structures 5 10<br />

Computer organization and architecture 5 5<br />

Algorithms and s<strong>of</strong>tware design 10 5<br />

Concepts <strong>of</strong> programming languages 5<br />

8.0 Oral and Written Communications:<br />

-116-


Every student is required to submit at least __1 written summary per class period (not including exams,<br />

tests, quizzes, or commented programs) to typically __2__ page and to be prepared to make __1__ oral<br />

presentation per class period <strong>of</strong> typically __3-5__ minutes duration. Include only material that is graded<br />

for grammar, spelling, style, and so forth, as well as for technical content, completeness, and accuracy.<br />

Additionally, every student is required to submit at least __1 written semester project report (not<br />

including exams, tests, quizzes, or commented programs) to typically __10-15__ pages and to make __1__<br />

oral presentation <strong>of</strong> typically __20__ minutes duration.<br />

9.0 Social and Ethical Issues:<br />

Embedded in material covered throughout the course.<br />

10.0 Theoretical content<br />

Contact hours<br />

10.1 What is information assurance? 1.0<br />

10.2 Secure system engineering 0.5<br />

10.3 Intrinsic and extrinsic assurance activities and their interdependencies 1.0<br />

11.0 Problem analysis<br />

Students experience analysis <strong>of</strong> information assurance problems through class examples, homework<br />

exercises, and semester project report.<br />

12.0 Solution design<br />

The semester long project will provide the students with hands-on experience with tools and techniques<br />

for information assurance.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

02/20/2009 Initial ABET version Robin Gandhi<br />

05/26/2009 Corrected the CSCI Course No. Robin Gandhi<br />

-117-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 4360<br />

Course Title<br />

Foundations <strong>of</strong> Information Assurance<br />

Course Coordinator<br />

Blaine Burnham and Robin Gandhi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision May 26, 2009<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Know and comprehend the principle<br />

concepts <strong>of</strong> information assurance.<br />

Apply methods and tools associated with<br />

information assurance to<br />

engineer dependable s<strong>of</strong>tware systems.<br />

Analyze case studies related to<br />

information assurance to<br />

synthesize meaningful class presentations<br />

and discussions.<br />

Criticize current information assurance<br />

approaches.<br />

X S X X S X X X X<br />

S S S X S S X S S X S S S<br />

S S S S S X S X X X X S<br />

S S S S X S X X X S<br />

-118-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-119-


-120-


CIST 4370<br />

Security Administration<br />

Department and Course Number CIST 4370/IASC 4370<br />

Course Title<br />

Host Security Administration Using Windows<br />

Course Coordinator<br />

Stephen Nugen<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision Feb 17, 2009<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Students will learn the principles and practice <strong>of</strong> secure system administration <strong>of</strong><br />

host computers using Micros<strong>of</strong>t Windows operating systems. Lecture,<br />

demonstrations, and hands-on assignments include installation, storage<br />

management, account management, service management, and scripting. Students<br />

will learn how to assess and harden Windows-based hosts operating in server and<br />

client roles.<br />

1.2 For whom course is intended.<br />

This course is intended to be a second course for the Information Assurance degree<br />

or the Information Assurance concentration at the undergraduate level; and a<br />

foundation course for graduate study.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 Computer networking (CSCI 3550 or ISQA 3400, or instructor permission).<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Core terms and principles <strong>of</strong> Information Assurance such as: Confidentiality,<br />

Integrity, Availability, Threats, Vulnerabilities, Types <strong>of</strong> Malware,<br />

Authorization, Access Control, Accountability, Identification, Authentication,<br />

Security Controls, Defense in Depth, Certification and Accreditation.<br />

1.4.2 Understanding <strong>of</strong> networking topics such as: Media, Protocol Stacks, Protocol<br />

Encapsulation, Ethernet, TCP/IP suite, IP addressing, IP routing, TCP Virtual<br />

Circuits, and Network Address Translation.<br />

1.4.3 Understanding the role <strong>of</strong> network application protocols like ARP, ICMP,<br />

DHCP, DNS, and HTTP.<br />

1.4.4 Understanding basic programming constructs sufficient to understand<br />

presented content on Shell Scripting.<br />

-121-


1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives<br />

2.1 Understand core principles <strong>of</strong> Information Assurance with respect to host security.<br />

2.2 Identify key sources for Information Assurance requirements with respect to how<br />

operating systems are installed, configured, and maintained.<br />

2.3 Understand the system administration and security impacts <strong>of</strong> different host<br />

architectures.<br />

2.4 Understand and demonstrate different options for installing the host operating<br />

system.<br />

2.5 Understand and demonstrate different options for user interfaces with respect to<br />

host security.<br />

2.6 Understand and demonstrate how to configure, inspect, and monitor host storage<br />

mechamisms, including disks, partitions and volumes, file systems, and access<br />

controls.<br />

2.7 Understand and demonstrate how to write system administration scripts.<br />

2.8 Understand and demonstrate how to configure operating system services.<br />

2.9 Understand and demonstrate how to configure and manage Windows domains,<br />

including domain user credentials.<br />

2.10 Understand and demonstrate how to securely configure and manage Windows<br />

networking and host firewall.<br />

2.11 Identify options for host vulnerability assessments, including frameworks and tools.<br />

3.0 Content and Organization<br />

Contact hours<br />

3.1 Introduction and context 1.5<br />

3.2 Core security principles and requirements 3.0<br />

3.3 Host considerations 3.0<br />

3.4 Boot process and operating system installations 4.5<br />

3.5 Configuring and inspecting host system state 6.0<br />

3.6 Special focus on storage management 3.0<br />

3.7 Special focus on scripting 6.0<br />

3.8 Windows domains 3.0<br />

3.9 Windows networking 4.5<br />

3.10 Operating system services 6.0<br />

3.11 Host assessments 4.5<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used.<br />

-122-


The primary teaching methods will be lecture, discussion, demonstrations, lab<br />

exercises, and reading assignments.<br />

4.2 Student role in the course.<br />

Students will attend lectures and demonstrations, participate in discussions,<br />

complete and submit lab and other assignments, and complete required<br />

examinations.<br />

4.3 Contact hours.<br />

5.0 Evaluation<br />

In-class contact consists <strong>of</strong> two 75-minute lectures per week (3.0 contact<br />

hours/week).<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For<br />

Laboratory projects, specify the number <strong>of</strong> weeks spent on each project.<br />

Students will complete individual assignments requiring independent study and<br />

preparing short written responses to instructor-provided questions.<br />

Students will also complete small and large laboratory assignments and projects with<br />

specified deliverables such as: Report <strong>of</strong> Findings; Test Cases; and Annotated Source<br />

Code. Most laboratory assignments will be be due within one to two weeks <strong>of</strong><br />

assignment. Some laboratory assignments will be started in-class. Laboratory<br />

assignments will require access to STEAL-1 outside <strong>of</strong> class.<br />

Student performance will also be evaluated through two examinations: Midterm and<br />

a comprehensive Final Exam. Both <strong>of</strong> these exams will include a variety <strong>of</strong> question<br />

types to measure student understanding <strong>of</strong> the material.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Grades will be determined on the following basis:<br />

Assignments 55%<br />

Midterm 20%<br />

Final Exam 25%<br />

-123-


100%<br />

5.3 Grading scale and criteria.<br />

Points Grading<br />

99 – 100% A+<br />

92 – 98% A<br />

90 – 91% A–<br />

88 – 89% B+<br />

82 – 87% B<br />

80 – 81% B–<br />

78 – 79% C+<br />

72 – 77% C<br />

70 – 71% C-<br />

68 – 69% D+<br />

62 – 67% D<br />

60 – 61% D–<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course. No required textbook.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Mueller, J.P. (2007). Windows Administration at the Command Line.<br />

Indianapolis, Wiley.<br />

6.2.2 Northrup, T. & Thomoas, O. (2004). Implementing and Administering Security<br />

in a Micros<strong>of</strong>t Windows Server 2003 Network. Redmond, WA: Micros<strong>of</strong>t Press.<br />

6.2.3 Russel, C., Crawford, S., & Gerend, J. (2003). Micros<strong>of</strong>t Windows Server 2003<br />

Administrator's Companion. Redmond, WA: Micros<strong>of</strong>t Press.<br />

6.2.4 Russinovich, M. & Solomon, D. (2005). Micros<strong>of</strong>t Windows Internals, Fourth<br />

Edition. Redmond, WA: Micros<strong>of</strong>t Press.<br />

6.2.5 Scambray, J. & McClure, S. (2003). Hacking Exposed Windows Server 2003.<br />

New York, McGraw-Hill.<br />

6.2.6 Scambray, J. & McClure, S. (2008). Hacking Exposed Windows: Windows<br />

Security Secrets & Solutions, Third Ed. New York, McGraw-Hill.<br />

6.2.7 Stanek, W. R. (2004). Micros<strong>of</strong>t Windows Server 2003 Inside Out. Redmond,<br />

WA: Micros<strong>of</strong>t Press.<br />

6.2.8 Stanek, W. R. (2007). Windows Vista Administrator's Pocket Reference.<br />

Redmond, WA: Micros<strong>of</strong>t Press.<br />

6.2.9 Stanek, W. R. (2008). Micros<strong>of</strong>t Windows Command-Line Administrator’s<br />

Pocket Consultant, Second Edition. Redmond, WA: Micros<strong>of</strong>t Press.<br />

-124-


6.3 Other sources <strong>of</strong> information.<br />

Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals<br />

that are relevant to security administration using Windows. The process is<br />

particularly important in keeping current with technology and new methodologies.<br />

6.4 Current bibliography <strong>of</strong> online resources for student’s information.<br />

6.4.1 Carnegie Mellon S<strong>of</strong>tware Engineering Institute. (2009). CERT Coordination<br />

Center. Available from http://www.cert.org/<br />

6.4.2 CERIAS (Purdue). (2009). CERIAS Blog. Available from<br />

http://www.cerias.purdue.edu/site/blog<br />

6.4.3 Defense Information Systems Agency: Information Assurance Support<br />

Environment. (2009). Security Technical Implementation Guides (STIGS) and<br />

Supporting Documents. Available from http://iase.disa.mil/stigs/index.html<br />

6.4.4 Department <strong>of</strong> Homeland Security. (2009). National Vulnerability Database.<br />

Available from http://nvd.nist.gov/<br />

6.4.5 Intini, F. (2008.) Feliciano Intini's Micros<strong>of</strong>t Security Taxonomy 2.0. Available<br />

from http://blogs.technet.com/feliciano_intini/pages/<br />

micros<strong>of</strong>t-blogs-and-web-resources-about-security.aspx<br />

6.4.6 Jones, J. (2009). Jeff Jones Security Blog. Available from<br />

http://blogs.technet.com/security/default.aspx<br />

6.4.7 LeBlanc, D. (2009). David LeBlanc's Web Log. Available from<br />

http://blogs.msdn.com/david_leblanc/<br />

6.4.8 Margois, A. (n.d.) Aaron Margosis' "Non-Admin" WebLog. Available from<br />

http://blogs.msdn.com/Aaron_Margosis/<br />

6.4.9 Micros<strong>of</strong>t. (2006). BOOT.INI and ARC Path Naming Conventions and Usage.<br />

Available from http://support.micros<strong>of</strong>t.com/kb/102873/EN-US/<br />

6.4.10 Micros<strong>of</strong>t. (2006). Adding Optional Components to Add/Remove Programs<br />

Tool. Available from http://support.micros<strong>of</strong>t.com/kb/223182/en-us<br />

6.4.11 Micros<strong>of</strong>t. (2006). Security Monitoring and Attack Detection. Available from<br />

http://www.micros<strong>of</strong>t.com/downloads/details.aspx?<br />

FamilyID=1E194D99-5734-4B02-9CAA-C80F5C0FB0C0&displaylang=en<br />

6.4.12 Micros<strong>of</strong>t. (2007). How To Add, Modify, Or Delete Registry Subkeys And<br />

Values By Using A Registration Entries (.Reg) File. Available from<br />

http://support.micros<strong>of</strong>t.com/kb/310516/<br />

6.4.13 Micros<strong>of</strong>t. (2008). Windows Registry Information for Advanced Users.<br />

Available from http://support.micros<strong>of</strong>t.com/kb/256986/<br />

6.4.14 Micros<strong>of</strong>t. (2009). Micros<strong>of</strong>t Malware Protection Center: Threat Research &<br />

Response Blog. Available from http://blogs.technet.com/mmpc/<br />

6.4.15 Micros<strong>of</strong>t. (2009). Security Research & Defense. Available from<br />

http://blogs.technet.com/swi/default.aspx<br />

6.4.16 Micros<strong>of</strong>t. (2009). The Micros<strong>of</strong>t Security Response Center (MSRC). Available<br />

from http://blogs.technet.com/msrc/default.aspx<br />

-125-


6.4.17 Micros<strong>of</strong>t. (2009). Windows Client TechCenter. Available from<br />

http://technet.micros<strong>of</strong>t.com/en-us/windows/default.aspx<br />

6.4.18 Micros<strong>of</strong>t. (2009). Windows Server TechCenter. Available from<br />

http://technet.micros<strong>of</strong>t.com/en-us/windowsserver/default.aspx<br />

6.4.19 National Information Assurance Training and Education Center. (2009). Home<br />

Page. Available from http://niatec.info/ViewPage.aspx?id=0.<br />

6.4.20 National Institute <strong>of</strong> Standards and Technology: Computer Security Division.<br />

(2009). Computer Security Resource Center. Available from<br />

http://csrc.nist.gov/index.html<br />

6.4.21 Schneirer, B. (2009). Schneier on Security. Available from:<br />

http://www.schneier.com/blog/<br />

6.4.22 US-CERT. (2009). Technical Users. Available from http://www.uscert.gov/nav/t01/<br />

7.0 CSAB and CAC Category Content (class time in hours)<br />

(CS Program) Estimate Computer Science Accreditation Board (CSAB) Category Content<br />

CSAB Category Core Advanced<br />

Data structures 1 2<br />

Computer organization and<br />

2<br />

6<br />

architecture<br />

Algorithms and s<strong>of</strong>tware design 3<br />

Concepts <strong>of</strong> programming languages 3<br />

8.0 Oral and Written Communications<br />

All student submissions will be evaluated for technical content, application <strong>of</strong> principles,<br />

completeness, accuracy, and use <strong>of</strong> use <strong>of</strong> supporting materials.<br />

Student submittals such as justification <strong>of</strong> test cases or why certain attributes are more<br />

valued in system administrators than other attributes will be also be graded for clarity <strong>of</strong> the<br />

communication which includes: structure, grammar, spelling, for formatting.<br />

Every student will be required to participate in classroom discussion.<br />

Every student will be encouraged to help other students resolve laboratory problems and to<br />

share their experiences and lessons-learned.<br />

9.0 Social and Ethical Issues<br />

The course will address the social and ethical issues related to the special role <strong>of</strong> System<br />

Administration, including: individual privacy, sensitivity <strong>of</strong> information, and investigating<br />

-126-


potential misuse. Students will be graded on their understanding <strong>of</strong> these topics through<br />

participation, assignments, and examinations.<br />

10.0 Theoretical Content<br />

10.1 Transforming broad security policies into specific security controls 6.0<br />

(e.g., access controls and audit).<br />

10.2 Analyzing trade<strong>of</strong>fs between decreased attack surface and diminished 6.0<br />

functionality.<br />

11.0 Problem Analysis<br />

Students will learn the principles <strong>of</strong> host system administration, illustrated through<br />

Micros<strong>of</strong>t Windows operating system environment. Students will demonstrate and extend<br />

their understanding <strong>of</strong> those principles by solving problems in Windows system<br />

administration.<br />

12.0 Solution design<br />

Students will develop command pipelines and scripts for secure host system administration,<br />

choosing the appropriate commands and structures. Students will develop resourceconstrained<br />

host security assessment approaches, defending their trade<strong>of</strong>f choices.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

02/17/2009 Revised ABET version Nugen Prerequisites changed.<br />

-127-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 4370/IASC 4370<br />

Course Title<br />

Host Security Administration Using Windows<br />

Course Coordinator<br />

Stephen Nugen<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision Feb 17, 2009<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand core principles <strong>of</strong><br />

Information Assurance with respect<br />

to host security.<br />

Identify options for host<br />

vulnerability assessments, including<br />

frameworks and tools.<br />

Identify key sources for Information<br />

Assurance requirements with<br />

respect to how operating systems<br />

are installed, configured, and<br />

maintained.<br />

Understand the system<br />

administration and security impacts<br />

<strong>of</strong> different host architectures.<br />

Understand and demonstrate<br />

different options for installing the<br />

X<br />

X<br />

X X X<br />

X<br />

X<br />

-128-


host operating system.<br />

Understand and demonstrate<br />

different options for user interfaces<br />

with respect to host security.<br />

Understand and demonstrate how<br />

to configure, inspect, and monitor<br />

host storage mechamisms, including<br />

disks, partitions and volumes, file<br />

systems, and access controls.<br />

Understand and demonstrate how<br />

to write system administration<br />

scripts.<br />

Understand and demonstrate how<br />

to configure operating system<br />

services.<br />

Understand and demonstrate how<br />

to configure and manage Windows<br />

domains, including domain user<br />

credentials.<br />

Understand and demonstrate how<br />

to securely configure and manage<br />

Windows networking and host<br />

firewall.<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

-129-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-130-


CIST 4540<br />

Computer Security Management<br />

Department and Course Number CIST 4540<br />

Course Title<br />

Computer Security Management<br />

Course Coordinator<br />

Dwight Haworth<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision November 15, 2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The purpose <strong>of</strong> this course is to integrate concepts and techniques from security assessment,<br />

risk mitigation, disaster planning, and auditing to identify, understand, and propose solutions<br />

to problems <strong>of</strong> computer security and security administration.<br />

1.2 For whom course is intended.<br />

This course is intended for all students in the College <strong>of</strong> Information Science and Technology<br />

who desire to increase their understanding <strong>of</strong> computer security management.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 4360 – Foundations <strong>of</strong> Information Assurance<br />

1.3.2 or permission <strong>of</strong> the instructor.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Familiarity with computer hardware and system s<strong>of</strong>tware.<br />

1.4.2 Familiarity with the glossary <strong>of</strong> computer security.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes. The student will be<br />

able to<br />

2.1 Plan an organizational security assessment,<br />

2.2 Specify the required characteristics <strong>of</strong> a system for a specific application,<br />

2.3 Specify a network architecture to support given policy requirements,<br />

2.4 Create a Disaster Response Plan, and<br />

Identify the informational needs <strong>of</strong> a Computer Security Manager.<br />

-131-


3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> contact hours on each).<br />

Hours<br />

3.1 Management responsibilities and liabilities 3.0<br />

3.2 Turquoise Book 3.0<br />

3.3 Vulnerability Assessment 3.0<br />

3.4 Physical threats 3.5<br />

3.5 Protecting Internet-visible systems 3.0<br />

3.6 Orange Book 6.0<br />

3.7 Common Criteria Standards 3.0<br />

3.8 S<strong>of</strong>tware Development Issues 1.5<br />

3.9 Continuity planning 3.0<br />

3.10 Disaster recovery 6.0<br />

3.11 Computer emergency response teams 4.0<br />

3.12 Auditing Computer Security 3.0<br />

3.13 Monitoring and Control Systems 1.5<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

4.1.1 Lecture and discussion <strong>of</strong> assigned material<br />

4.1.2 The student is to prepare reports that require the application <strong>of</strong> principles and techniques<br />

presented in class.<br />

4.1.3 The student will read print media for articles related to the subject matter for the week<br />

and submit a brief synopsis <strong>of</strong> the article.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstration, participate in discussion on assigned<br />

readings, take required quizzes, complete assigned projects, and complete required<br />

examinations<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three contact hours per week<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

5.1.1 Informational Analysis <strong>of</strong> Value Chain Activity (3)<br />

5.1.2 Design <strong>of</strong> a network security architecture (2)<br />

5.1.3 Recovery Process Planning (2)<br />

-132-


5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Component Grading<br />

Quizzes 10%<br />

Two Examinations 50%<br />

Assignments 40%.<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-87% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />


7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 3<br />

Networking and telecommunications 3<br />

Modern programming language 0.5<br />

Analysis and Design 12<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 4.5<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __2___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __10___ pages and to make __0___ oral presentations <strong>of</strong> typically<br />

_____ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as<br />

well as for technical content, completeness, and accuracy. Each graduate student will submit one paper<br />

<strong>of</strong> at least 15 pages (excluding front- and back-matter).<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

None<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

None.<br />

11.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

The student will analyze the value chain <strong>of</strong> a real company to identify critical informational flows along<br />

with material flows necessary to maintain the operation <strong>of</strong> the value chain processes.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

The student will design a partitioned network structure to achieve varying levels <strong>of</strong> protection for the<br />

information resources within each partition.<br />

-134-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

11/15/08 Projects Changed DAH CC Toolbox Not Available<br />

-135-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 4540<br />

Course Title<br />

Computer Security Management<br />

Course Coordinator<br />

Dwight A. Haworth<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 11/15/08<br />

S – Strong relationship<br />

X –Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Plan an organizational security<br />

assessment<br />

Specify the required characteristics <strong>of</strong> a<br />

system for a specific application<br />

Specify a network architecture to support<br />

given policy requirements<br />

Create a Disaster Response Plan<br />

Identify the informational needs <strong>of</strong> a<br />

Computer Security Manager<br />

X<br />

X<br />

X<br />

X X X<br />

X<br />

-136-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-137-


-138-


CSCI 1620<br />

Introduction to Computer Science II<br />

Department and Course Number CSCI 1620<br />

Course Title<br />

Introduction to Computer Science II<br />

Course Coordinator<br />

John Clark<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision December 12, 2008<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (catalog description)<br />

Advanced topics in programming; topics in data representation and manipulation, data structures,<br />

problem solving and algorithm design.<br />

1.2 For whom course is intended<br />

This course is designed primarily for computer science and information systems majors.<br />

1.3 Prerequisites <strong>of</strong> the course (courses)<br />

CSCI 1610 or CIST 1400 with a grade <strong>of</strong> “C” or better<br />

1.4 Prerequisites <strong>of</strong> the course (topics).<br />

Basic programming skills and facility with:<br />

1.4.1 Input/output<br />

1.4.2 Control structures<br />

1.4.3 Using functions<br />

1.4.4 Arrays<br />

1.4.5 Pointers<br />

1.4.6 Basic object properties<br />

1.5 Unusual circumstances <strong>of</strong> the course<br />

None<br />

2.0 Objectives<br />

2.1 sdfgskdl<br />

2.2 Describe the basic data types used in algorithms and discuss their implementation on modern<br />

computer systems.<br />

2.3 Discuss the concept <strong>of</strong> an abstract data type and how it is related to the concept <strong>of</strong> an object in<br />

the context <strong>of</strong> object-oriented programming.<br />

2.4 Characterize the ways in which the scope <strong>of</strong> an object can be controlled, with specific references<br />

to the features available in C++ for controlling object lifetimes.<br />

2.5 Discuss the use <strong>of</strong> recursion and iteration as alternate techniques for solving problems. Comment<br />

on the manner in which local variables are preserved, and on the space/time trade<strong>of</strong>fs in each<br />

approach.<br />

2.6 Describe several elementary sorting algorithms and comment on their running times using the<br />

“big O” notation. Describe efficient algorithms to identify all permutations <strong>of</strong> a set <strong>of</strong> items, and<br />

-139-


to identify all possible combinations <strong>of</strong> a set <strong>of</strong> items. Comment on the running time <strong>of</strong> these<br />

algorithms.<br />

2.7 Comment on the design <strong>of</strong> algorithms, specifically with regard to verifying their correctness.<br />

Discuss the potential effects <strong>of</strong> the failure <strong>of</strong> an algorithm.<br />

2.8 Discuss operator overloading, specifically as it is used in the C++ programming language. Indicate<br />

its purpose, appropriate circumstances for its use, and how the compiler decides which function<br />

to use when an overloaded operated is utilized.<br />

2.9 Illustrate the use <strong>of</strong> templates in the C++ programming language. Indicate how the appropriate<br />

use <strong>of</strong> templates can reduce the size <strong>of</strong> a source program. Comment on whether the size <strong>of</strong> the<br />

object program is also reduced when templates are employed.<br />

2.10 Comment on techniques for defining objects that store collections <strong>of</strong> other objects. Indicate<br />

typical ways in which the objects in these collections may be accessed, including specific coding<br />

examples in C++.<br />

2.11 Describe the stack, queue, and list abstract data types. Provide example implementations in the<br />

C++ programming language. Illustrate the use <strong>of</strong> these data types in several classic applications.<br />

2.12 Define a generic tree abstract data type. Discuss how a generic tree differs from a search tree.<br />

Demonstrate implementation <strong>of</strong> binary trees and binary search trees in the C++ programming<br />

language. Illustrate the use <strong>of</strong> tree is solutions to several classic applications.<br />

3.0 Content and Organization<br />

3.1 Data Representation (2 hours)<br />

3.1.1 Basic Data Types<br />

3.1.2 Computer Storage <strong>of</strong> Basic Data Types<br />

3.2 Abstract Data Types & Objects (4 hours)<br />

3.2.1 Abstract Data Type Specification<br />

3.2.2 Object Specification<br />

3.2.3 Object Implementation<br />

3.2.4 Object Instantiation<br />

3.3 Dynamic Memory Management (3 hours)<br />

3.4 Recursion (5 hours)<br />

3.4.1 Space, Time and Computability Considerations<br />

3.4.2 Run Time Stack<br />

3.4.3 Combinations & Permutations<br />

3.5 Basic sorting techniques (4 hours)<br />

3.5.1 Definition <strong>of</strong> sorting<br />

3.5.2 Basic algorithms for sorting<br />

3.5.3 The “big O” notation<br />

3.5.4 Recursion and sorting<br />

-140-


3.6 Object Oriented Techniques (6 hours)<br />

3.6.1 Operator Overloading<br />

3.6.2 Template Objects<br />

3.7 Collection Classes (4 hours)<br />

3.7.1 Composite Objects<br />

3.7.2 Access Collections<br />

3.7.3 Group Collections<br />

3.7.4 Organizing Collections<br />

3.8 Stacks & Queues (5 hours)<br />

3.8.1 Expression Analysis<br />

3.8.2 Priority Queues<br />

3.8.3 Resource Allocation<br />

3.8.4 Event Driven Simulations<br />

3.9 Linked Lists (4 hours)<br />

3.9.1 Singly Linked<br />

3.9.2 Circular<br />

3.9.3 Doubly Linked<br />

3.10 Trees (8 hours)<br />

3.10.1 Structure<br />

3.10.2 Binary<br />

3.10.3 Binary Search Trees<br />

3.10.4 Parsing<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used<br />

This course is presented primarily through lectures.<br />

4.2 Student role in the course<br />

The student in this course will analyze algorithms, code object oriented and linear data structure<br />

programs, write programs, and work on group projects.<br />

4.3 Contact hours<br />

Three hours per week<br />

-141-


5.0 5.0 Evaluation<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The grade for a student will be based on a combination <strong>of</strong> homework, group projects and<br />

examinations. Between one and two weeks will be spent on each laboratory project.<br />

5.2 Basis for determining the final grade<br />

Traditionally, approximately 60 to 70 percent <strong>of</strong> the grade will be determined by<br />

performance on between 7 and 9 laboratory projects. Scores on examinations and<br />

quizzes will be the basis for the remaining part <strong>of</strong> the grade, with a midterm examination<br />

having a typical weight <strong>of</strong> 10 percent, and a final examination having a weight <strong>of</strong> 20<br />

percent..<br />

Laboratory assignments will be evaluated using the following components and weights:<br />

40 percent for correctness, 40 percent for documentation/ease <strong>of</strong> use and ease <strong>of</strong><br />

maintenance, and 20 percent for having all required components submitted (source files,<br />

output examples, etc.). Suitable penalties for tardiness will be imposed (e.g. 15 percent if<br />

an submission is more than three days late).<br />

5.3 Grading scale and criteria<br />

Points<br />

Grade<br />

97 – 100% A+<br />

93 – 96% A<br />

90 – 92% A-<br />

87 – 89% B+<br />

83 – 86% B<br />

80 – 82% B-<br />

77 – 79% C+<br />

73 – 76% C<br />

70 – 72% C-<br />

67 – 69% D+<br />

63 – 66% D<br />

60 – 62% D-<br />

0 – 59% F<br />

6.0 Resource Material<br />

-142-


6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Ford & Topp,. Data Structures With C++ , Prentice Hall, 1996 (or a more recent<br />

text)<br />

6.2 Other suggested reading materials, if any<br />

None<br />

6.3 Other sources <strong>of</strong> information<br />

None<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information<br />

None<br />

7.0 Computer Science Accreditation Board (CSAB) Category Content (class time in hours)<br />

CSAB Category Core Advanced<br />

Data structures 15<br />

Computer organization and architecture<br />

Algorithms and s<strong>of</strong>tware design 10<br />

Concepts <strong>of</strong> programming languages 20<br />

8.0 Oral and Written Communications<br />

Every student is required to submit at least __0___ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically _____ pages and to make ___0__ oral<br />

presentations <strong>of</strong> typically _____ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy<br />

9.0 Social and Ethical Issues<br />

The importance <strong>of</strong> testing algorithms is made clear to students. Examples <strong>of</strong> algorithm failure<br />

and the impact <strong>of</strong> these failures are presented.<br />

10.0 Theoretical content<br />

This course introduces algorithmic problem-solving in the context <strong>of</strong> a modern programming language.<br />

Such topics as problem solving strategies, basic data structures, data and procedural abstraction, and<br />

algorithmic complexity are treated.<br />

-143-


Contact Hours<br />

10.1 Data Representation 2.0<br />

10.2 Abstract Data Types and Objects 4.0<br />

10.3 Dynamic Memory Management 3.0<br />

10.4 Recursion 5.0<br />

10.5 Object Oriented Techniques 6.0<br />

10.6 Collection Classes 4.0<br />

10.7 Stacks & Queues 5.0<br />

10.8 Linked Lists 4.0<br />

10.9 Trees 8.0<br />

11.0 Problem analysis<br />

Basic problem analysis is a focal point <strong>of</strong> this course. While learning the techniques <strong>of</strong> abstraction and<br />

encapsulation for basic data structures, the programming exercises provide opportunities to use the<br />

analysis techniques discussed in class.<br />

12.0 Solution design<br />

This course amplifies the object-oriented programming techniques introduced in CIST 1400. Students<br />

learn fundamental techniques for organizing data using a variety <strong>of</strong> classic data structures. Treatment <strong>of</strong><br />

memory management and recursion complement the discussion <strong>of</strong> these data structures. The significance<br />

<strong>of</strong> choosing the appropriate data structure for a solution is illustrated throughout the design <strong>of</strong> solutions<br />

to the programming exercises.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

02/20/1998 Original version Clark<br />

06/13/2003 Cleanup, ABET-specific material Wileman<br />

12/2/2008 Cleanup, ABET-specific material Clark<br />

-144-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CSCI 1620<br />

Course Title<br />

Introduction to Computer Science II<br />

Course Coordinator<br />

John W. Clark<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 12/2/2008<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Describe the basic data types<br />

Abstract data types and objectoriented<br />

programming<br />

Object scope<br />

Recursion and iteration techniques for<br />

solving problems<br />

Searching, sorting and “big O”<br />

notation<br />

Operator overloading<br />

C++ templates<br />

S<br />

S<br />

S<br />

X X X<br />

X S S<br />

Collections and storage classes S X<br />

Linear storage types ( stack, queue,<br />

S<br />

X<br />

and list )<br />

X<br />

S<br />

S<br />

-145-


Trees and binary search trees S X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-146-


ISQA 3150 Principles <strong>of</strong> Quantitative Analysis<br />

Department and Course Number ISQA 3150<br />

Course Title<br />

Principles <strong>of</strong> Quantitative Analysis<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/02/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course is designed to give students the principles <strong>of</strong> Quantitative Analysis, a scientific<br />

approach to decision making that involves the operations <strong>of</strong> organizational systems.<br />

Quantitative Analysis attempts to solve the conflicts <strong>of</strong> interest among the components <strong>of</strong><br />

the organization in a way that is best for the organization as a whole.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to<br />

understand the principles <strong>of</strong> Quantitative Analysis. It is one <strong>of</strong> elective courses for<br />

undergraduates who wish to pursue Data Mining and Business Intelligence.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

CIST 1100 and CIST 2500<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Introduction to Visual Basic Programming,<br />

1.4.2 Program development cycle<br />

1.4.3 Training in spreadsheets and database<br />

1.4.4 Statistics in information science and technology<br />

1.4.5 A well-known computer package being used to support the problem-solving<br />

process.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 To structure the real-life situation into a mathematical model, and abstract the essential elements<br />

so that a solution relevant to the decision maker’s objective can be sought. This involves looking<br />

at the problem in the context <strong>of</strong> the entire organizational system;<br />

2.2 To explore the structure <strong>of</strong> such solutions and develop systematic procedures for obtaining them;<br />

-147-


2.3 To develop a solution that yields an optimal value <strong>of</strong> the organizational system measure <strong>of</strong><br />

desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong> desirability.<br />

3.0 Content and Organization:<br />

3.1 Introduction 3<br />

3.2 Linear Programming: Model Formulation & Graphical<br />

3.3 Solution, Computer Solution and Modeling Examples 12<br />

3.4 Integer Programming 6<br />

3.5 Transportations 6<br />

3.6 Multi-criteria Decision Making 6<br />

3.7 Decision Analysis 6<br />

3.8 Forecasting 6<br />

3.9 Inventory Management 6<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures.<br />

4.2 Student role in the course.<br />

-148-<br />

Contact hours<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Components<br />

Grading<br />

Exams 60%<br />

Class Project 25%


Class Participation / Homework 15%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

96 – 100% A+<br />

90 – 95% A<br />

86 – 89% B+<br />

80 – 85% B<br />

76 – 79% C+<br />

70 – 75% C<br />

66 – 69% D+<br />

60 – 65% D<br />

< 60% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 B. W. Taylor III, Management Science, Prentice Hall, 9th Ed.<br />

6.1.2 B. Render, R. M. Star JR, and N. Balakrishnan, Managerial Decision Modeling,<br />

Prentice Hall, 2nd Ed.<br />

6.1.3 B. Render, R. M. Star JR, and M. E. Hanna, Quantitative Analysis for Management,<br />

Prentice Hall, 8th Ed. (or more recent text)<br />

6.2 Other suggested reading materials, if any.<br />

None<br />

6.3 Other sources <strong>of</strong> information.<br />

None<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

-149-


Modern programming language 12<br />

Analysis and Design 9<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 6<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___3__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically __30___ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __10___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

Hours<br />

10.1 Linear Programming 12<br />

10.2 Integer Programming 6<br />

10.3 Transportations 6<br />

10.4 Multi-criteria Decision Making 6<br />

10.5 Decision Analysis 6<br />

10.6 Forecasting 6<br />

11.0 Problem analysis:<br />

Students learn the principles <strong>of</strong> Quantitative Analysis, a scientific approach to decision making<br />

that involves the operations <strong>of</strong> organizational systems. They learn to solve the conflicts <strong>of</strong><br />

interest among the components <strong>of</strong> the organization in a way that is best for the organization as a<br />

whole.<br />

12.0 Solution design:<br />

Students learn to develop a solution that yields an optimal value <strong>of</strong> the organizational system<br />

measure <strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />

desirability.<br />

-150-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

12/2002 Initial ABET version Shi<br />

6/25/03 ABET cleanup Wolcott<br />

10/09/07 Update <strong>of</strong> resource material Shi<br />

10/02/08 Review completed Shi<br />

-151-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3150<br />

Course Title<br />

Principles <strong>of</strong> Quantitative Analysis<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Structure the real-life situation into a<br />

mathematical model, and abstract the<br />

essential elements so that a solution<br />

relevant to the decision maker’s objective<br />

can be sought. This involves looking at<br />

the problem in the context <strong>of</strong> the entire<br />

organizational system;<br />

Explore the structure <strong>of</strong> such solutions<br />

and develop systematic procedures for<br />

obtaining them;<br />

Develop a solution that yields an optimal<br />

value <strong>of</strong> the organizational system<br />

measure <strong>of</strong> desirability, or compare<br />

alternative courses <strong>of</strong> action by<br />

evaluating their measure <strong>of</strong> desirability.<br />

S<br />

S<br />

S<br />

X<br />

S<br />

S<br />

-152-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-153-


-154-


ISQA 3210 Advanced Technology for Personal Productivity<br />

Department and Course Number ISQA 3210<br />

Course Title<br />

Advanced Technology for Personal Productivity<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/13/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The purpose <strong>of</strong> this class is to give students extensive coverage in the area <strong>of</strong> the<br />

microcomputers and its components, operating systems (Windows XP, Windows Vista),<br />

an <strong>of</strong>fice suite (Micros<strong>of</strong>t Office 2007), and e-commerce site/intranet/internet design<br />

(HTML/XML).<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate MIS majors and minors who wish to study<br />

Advanced Technology for Personal Productivity including the area <strong>of</strong> the microcomputers<br />

and its components, operating systems, an <strong>of</strong>fice suite, and e-commerce<br />

site/intranet/internet design.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

CIST 1100<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Fundamental Competencies in Word, Excel, Access, and PowerPoint<br />

1.4.2 Basic Operating Systems operations<br />

1.4.3 Understanding <strong>of</strong> Hardware Components<br />

1.4.4 Proposal Development<br />

1.4.5 HTML and Web Design<br />

1.4.6 Basic HTML<br />

1.4.7 Introduction to Graphics<br />

1.4.8 Basic Web Design Principles<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

-155-


2.0 Objectives:<br />

2.1 Build and maintain personal computers: Students will complete an End User Needs<br />

Analysis and complete specifications for a proposed client. They will use a lab<br />

environment to build and repair current problems with personal computers.<br />

2.2 Learn to configure and install operating systems (Windows 98/Windows 2000/Windows<br />

XP): Students will deal with configuration and installation <strong>of</strong> an operating system in a LAN<br />

environment, if labs and time are available.<br />

2.3 Develop an e-commerce site/intranet/internet and develop personal and client home<br />

pages using HTML/DHTML/JavaScript. If time allows, students will be given instruction on<br />

using Cold Fusion.<br />

2.4 Learn to use word processing (Word 2000/XP), spreadsheets (Excel 2000/XP), database<br />

management (Access 2000/XP), and presentation graphics (PowerPoint 2000/XP)<br />

programs. In addition, desktop publishing (Publisher 2000) and photo editor (PhotoDraw<br />

2000) might be covered.<br />

3.0 Content and Organization:<br />

3.1 Managing and Maintaining PC 3.0<br />

3.2 End User Analysis Project 3.0<br />

3.3 Operating Systems - Windows 98 & Windows NT/2000/XP 3.0<br />

3.4 HTML 15.0<br />

3.5 DHTML 6.0<br />

3.6 Word 2000 3.0<br />

3.7 Excel 2000 3.0<br />

3.8 Access 2000 3.0<br />

3.9 PowerPoint 2000 3.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

Contact hours<br />

The primary teaching methods include lectures, hands-on demonstrations, and guidance<br />

on the semester projects.<br />

4.2 Student role in the course.<br />

Students will attend lectures, complete homework assignments, and unit projects<br />

4.3 Contact hours.<br />

-156-


5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Operating Systems Exercises<br />

End User Analysis project<br />

Office XP/2000 Word, Excel, Access, and PowerPoint projects<br />

E-Commerce Web Design Project<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

End User Analysis Project 15%<br />

HTML Projects 35%<br />

Web Design/Page Project 10%<br />

Word 2000 10%<br />

Excel 2000 10%<br />

Access 2000 10%<br />

PowerPoint 2000 10%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97% - 100% A+<br />

93% - 96% A<br />

90% - 92% A-<br />

87% - 89% B+<br />

83% - 86% B<br />

80% - 82% B-<br />

77% - 79% C+<br />

73% - 76% C<br />

70% - 72% C-<br />

67% - 69% D+<br />

63% - 66% D<br />

60% - 62% D-<br />

0% - 59% F<br />

-157-


6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Micros<strong>of</strong>t Office 2000, Advanced Concepts and Techniques by Gary B. Shelly,<br />

Thomas J. Cashman, and Misty E. Vermaat. Course Technology, 2000.<br />

6.1.2 Creating Web Pages with HTML and Dynamic HTML by Patrick Carey, Course<br />

Technology, 2001.<br />

6.1.3 Micros<strong>of</strong>t XP New Features Guide: Changes from Office 2000 to Office XP<br />

(packaged with Micros<strong>of</strong>t Office 2000 textbook)<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Web Style Guide: Basic Design Principles for Creating Web Sites by Patrick Lynch<br />

and Sarah Horton, Prentice-Hall, 2001.<br />

6.2.2 Principles <strong>of</strong> Web Design by Joel Skalar, Course Technology, 2001<br />

6.2.3 Cold Fusion by Kapathi & Kapathi, Course Technology, 2002.<br />

6.2.4 A+ Guide to Managing and Maintaining Your PC, Third Edition by Jean Andrews,<br />

Course Technology, 2002.<br />

6.2.5 Designing Web Pages with Cascading Style Sheets by Joel Skalar, Course<br />

Technology, 2001.<br />

6.2.6 Cascading Style Sheets: Designing for the Web, Second Edition by Hakon Wium Lie<br />

and Bert Bos, Addison Wesley, 2001.<br />

6.2.7 Creative HTML Design by Lynda Weinman & William Weinman, Prentice-Hall,<br />

2000.<br />

6.2.8 Micros<strong>of</strong>t Windows 98 for Power Users by Harry L.Phillips, Course Technology,<br />

2000.<br />

6.2.9 Micros<strong>of</strong>t Windows 2000 for Power Users by Harry L.Phillips, Course Technology,<br />

2001.<br />

6.2.10 Micros<strong>of</strong>t MS-DOS Command Line - Comprehensive by Harry L.Phillips, Course<br />

Technology, 2001.<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional course content, either with pages developed especially for this course or with<br />

links to additional course materials, will be provided during the semester.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

-158-


CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 10<br />

Networking and telecommunications 6<br />

Modern programming language 6<br />

Analysis and Design 10<br />

Data management 6<br />

Role <strong>of</strong> IS in Organizations 8<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __2___ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically __15-50___ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __10___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

Social and ethical issues are threaded throughout all the units <strong>of</strong> this course: operating systems,<br />

personal computer maintenance, end user analysis project, Office XP, and the development <strong>of</strong> an<br />

e-commerce site. Topics include piracy <strong>of</strong> s<strong>of</strong>tware, inappropriate duplication <strong>of</strong> s<strong>of</strong>tware,<br />

privacy and security issues regarding data collected on the web sites.<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

No coverage.<br />

11.0 Problem analysis:<br />

The students will complete an End User Needs Analysis project that involves solving a problem<br />

presented to them in a scenario. They have to conduct the research and make recommendations<br />

based on the request for proposals (RFP) presented by the proposal client.<br />

Students learn to analyze configurations, operating and network, and conduct routine<br />

maintenance on their personal and business machines. The learn how to load two major types <strong>of</strong><br />

operating systems: Windows (2000/XP) and Linux (Red Hat 7.4).<br />

-159-


Each student or group <strong>of</strong> two students must create a web site for a client. The student must<br />

analyze the needs <strong>of</strong> the web site and use the appropriate tools to develop and design the web<br />

application.<br />

12.0 Solution design:<br />

The end user project provides the analysis to select the appropriate s<strong>of</strong>tware and hardware<br />

solve the problem for the client. Based on this research, the student recommends systems<br />

configuration, network implications and solutions, and application solutions.<br />

Student will learn to develop an e-commerce site/intranet/internet and develop personal and<br />

client home pages using HTML/DHTML/JavaScript. If time allows, students will be given<br />

instruction on using Cold Fusion and Photoshop. The students will learn not only the code, but<br />

the design elements behind the development <strong>of</strong> pages, graphics, and web sites.<br />

Students will also learn design features <strong>of</strong> the <strong>of</strong>fice suite including word processing (Word<br />

2000/XP), spreadsheets (Excel 2000/XP), database management (Access 2000/XP), and<br />

presentation graphics (PowerPoint 2000/XP) programs. In addition, desktop publishing (Publisher<br />

2000) and photo editor (PhotoDraw 2000) might be covered.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

11/2/02 Initial ABET version Pietron<br />

6/25/03 ABET cleanup Wolcott<br />

10/13/08 Update to course description and<br />

prerequisites<br />

Pietron<br />

-160-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Department and Course Number ISQA 3210<br />

Course Title<br />

Advanced Technology for Personal Productivity<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Build and maintain personal computers:<br />

Students will complete an End User<br />

Needs Analysis and complete<br />

specifications for a proposed client. They<br />

will use a lab environment to build and<br />

repair current problems with personal<br />

computers<br />

Learn to configure and install operating<br />

systems (Windows 98/Windows<br />

2000/Windows XP): Students will deal<br />

with configuration and installation <strong>of</strong> an<br />

operating system in a LAN environment,<br />

if labs and time are available.<br />

Develop an e-commerce<br />

site/intranet/internet and develop<br />

personal and client home pages using<br />

HTML/DHTML/JavaScript. If time allows,<br />

students will be given instruction on<br />

using Cold Fusion.<br />

X<br />

-161-<br />

X<br />

X<br />

X


Learn to use word processing (Word<br />

2000/XP), spreadsheets (Excel 2000/XP),<br />

database management (Access 2000/XP),<br />

and presentation graphics (PowerPoint<br />

2000/XP) programs. In addition, desktop<br />

publishing (Publisher 2000) and photo<br />

editor (PhotoDraw 2000) might be<br />

covered.<br />

S<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-162-


ISQA 3250 Intermediate Quantitative Analysis<br />

Department and Course Number ISQA 3250<br />

Course Title<br />

Intermediate Quantitative Analysis<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/02/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course is designed to provide students advanced decision making models in solving<br />

business case problems. These models include transportation models, integer<br />

programming, goal programming, simulation applications, Markov process in market<br />

shares and dynamic programming. A variety <strong>of</strong> computer s<strong>of</strong>tware will be applied to<br />

formulate and solve both case-study and real-life problems.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to<br />

understand the advanced Quantitative Analysis. It is one <strong>of</strong> elective courses for<br />

undergraduates who wish to pursue Knowledge Management, Data Mining and Business<br />

Intelligence.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 1100<br />

1.3.2 CIST 2500<br />

1.3.3 ISQA 3150<br />

1.3.4 or equivalent<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Introduction to Visual Basic Programming,<br />

1.4.2 Program development cycle<br />

1.4.3 Training in spreadsheets and database<br />

1.4.4 Statistics in information science and technology<br />

1.4.5 A well-known computer package being used to support the problem-solving<br />

process.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

-163-


None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 To structure the real-life situation into advanced mathematical models, and abstract the<br />

essential elements so that a solution relevant to the decision maker’s objective can be<br />

sought. This involves looking at the problem in the context <strong>of</strong> the entire organizational<br />

system;<br />

2.2 To explore the structure <strong>of</strong> such solutions and develop systematic procedures for<br />

obtaining them;<br />

2.3 To develop a solution that yields an optimal value <strong>of</strong> the organizational system measure<br />

<strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />

desirability.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Introduction 3<br />

3.2 Transportation Models: Part I 6<br />

3.3 Transportation Models: Part II 6<br />

3.4 Integer Programming 9<br />

3.5 Goal Programming 6<br />

3.6 Simulation 6<br />

3.7 Markov Processes 6<br />

3.8 Dynamic Programming 6<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures.<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

4.3 Contact hours.<br />

Three (3) hours per week<br />

-164-


5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Components<br />

Grading<br />

Exams 60%<br />

Class Project 25%<br />

Class Participation / Homework 15%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

96 – 100% A+<br />

90 – 95.9% A<br />

86 – 89.9% B+<br />

80 – 85.9% B<br />

76 – 79.9% C+<br />

70 – 75.9% C<br />

66 – 69.9% D+<br />

60 – 65.9% D<br />

< 60% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 B. W. Taylor III, Management Science, Prentice Hall, 9th Ed.<br />

6.1.2 B. Render, R. M. Star JR, and N. Balakrishnan, Managerial Decision Modeling,<br />

Prentice Hall, 2nd Ed.<br />

6.1.3 B. Render, R. M. Star JR, and M. E. Hanna, Quantitative Analysis for Management,<br />

Prentice Hall, 8th Ed. (or more recent text)<br />

6.2 Other suggested reading materials, if any.<br />

-165-


None<br />

6.3 Other sources <strong>of</strong> information.<br />

None<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language 12<br />

Analysis and Design 6<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 3<br />

8.0 Oral and Written Communications<br />

Every student is required to submit at least ___3__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically ___30__ pages and to make _1____ oral<br />

presentations <strong>of</strong> typically ___10__ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

Hours<br />

10.1 Integer Programming 9<br />

10.2 Transportations 12<br />

10.3 Goal Programming 6<br />

10.4 Markov Processes 6<br />

10.5 Dynamic Programming 6<br />

-166-


11.0 Problem analysis:<br />

Students learn the advanced models <strong>of</strong> Quantitative Analysis, a scientific approach to decision<br />

making that involves the operations <strong>of</strong> organizational systems. They learn to solve the conflicts<br />

<strong>of</strong> interest among the components <strong>of</strong> the organization in a way that is best for the organization<br />

as a whole.<br />

12.0 Solution design:<br />

Students learn to develop a solution that yields an optimal value <strong>of</strong> the organizational system<br />

measure <strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />

desirability.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

Fall 2001 Created Shi<br />

6/25/03 ABET cleanup Wolcott<br />

10/09/07 Update <strong>of</strong> resource material Shi<br />

10/02/08 Review completed Shi<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3250<br />

Course Title<br />

Intermediate Quantitative Analysis<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

-167-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Course objective<br />

Structure the real-life situation into<br />

advanced mathematical models, and<br />

abstract the essential elements so that a<br />

solution relevant to the decision maker’s<br />

objective can be sought. This involves<br />

looking at the problem in the context <strong>of</strong><br />

the entire organizational system<br />

Explore the structure <strong>of</strong> such solutions<br />

and develop systematic procedures for<br />

obtaining them<br />

Develop a solution that yields an optimal<br />

value <strong>of</strong> the organizational system<br />

measure <strong>of</strong> desirability, or compare<br />

alternative courses <strong>of</strong> action by<br />

evaluating their measure <strong>of</strong> desirability<br />

S<br />

S<br />

X S X<br />

S S X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

-168-


9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-169-


-170-


ISQA 3300 File Structures for Information Systems<br />

Department and Course Number ISQA 3300<br />

Course Title<br />

File Structures for Information Systems<br />

Course Coordinator<br />

Dwight Haworth<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/30/09<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The purpose <strong>of</strong> this course is to introduce the student to computer file organizations<br />

and access methods. A fundamental understanding <strong>of</strong> the performance implications<br />

<strong>of</strong> each file organization is developed to allow the students to make information<br />

systems design choices that will optimize the performance <strong>of</strong> business information<br />

systems.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate students in the College <strong>of</strong> Information<br />

Science and Technology who wish to pursue the Bachelor <strong>of</strong> Science in Management<br />

Information Systems (<strong>BIS</strong>) degree. It is one <strong>of</strong> the required courses for the degree.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

CSCI 1620 - Introduction Computer Science II.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Ability to program using procedural logic.<br />

1.4.2 Ability to use Micros<strong>of</strong>t Excel.<br />

1.4.3 Familiarity with probability distributions.<br />

1.4.4 Familiarity with computer hardware and s<strong>of</strong>tware.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes. The student will be<br />

able to<br />

2.1 Comprehension <strong>of</strong> computer hardware components,<br />

2.2 Comprehension <strong>of</strong> the attributes and functions <strong>of</strong> file systems,<br />

2.3 Application <strong>of</strong> storage devices to meet specified requirements,<br />

2.4 Analysis <strong>of</strong> file organizations to meet specified response time and storage constraints,<br />

2.5 Evaluate the output <strong>of</strong> processing algorithms with respect to selected performance criteria, and<br />

2.6 Program file processing algorithms (application) using pseudocode.<br />

-171-


3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify approximate number <strong>of</strong> contact<br />

hours on each).<br />

Hours<br />

3.1.1 Computer hardware capabilities and limitations 3.0<br />

3.1.2 File programming fundamentals 3.0<br />

3.1.3 Physical storage organization 3.0<br />

3.1.4 File system implementations (Windows and Unix) 6.0<br />

3.1.5 Techniques for evaluating file performance 3.0<br />

3.1.6 Sorting, searching, and indexing 6.0<br />

3.1.7 Sort-merge and the balance line algorithm 3.0<br />

3.1.8 Indexes 3.0<br />

3.1.9 Tree structures and their maintenance 5.0<br />

3.1.10 Static Hashing 4.0<br />

3.1.11 Extendible Hashing 3.0<br />

3.1.12 Continuous track storage (CDROM, DVD, etc) 1.5<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

4.1.1 Lecture and discussion <strong>of</strong> assigned material<br />

4.1.2 The student is to use a modern programming language to implement selected file<br />

structures and access algorithms.<br />

4.1.3 Laboratory: The student must use a computer to solve assigned problems. The student is<br />

to arrange his/her own laboratory time as needed to complete each assignment. Students<br />

may use their own microcomputer to complete assigned problems.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstration, participate in discussion on assigned<br />

readings, take required quizzes, complete assigned projects, and complete required<br />

examinations.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three contact hours per week<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

5.1.1 History <strong>of</strong> storage technologies (1)<br />

5.1.2 Programming the priming read algorithm (1)<br />

5.1.3 Storage utilization efficiency using blocking (1)<br />

5.1.4 Balance line programming (2)<br />

5.1.5 Static Hashing Algorithm Evaluation (2)<br />

5.1.6 Static hashing programming (2)<br />

-172-


5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Component Approx.<br />

Weight<br />

Quizzes 10%<br />

Two Examinations 50%<br />

Assignments 40%.<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-87% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />


6.4.3 File Systems: Structures and Algorithms, by T. Harbron (1988)<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 9<br />

Networking and telecommunications<br />

Modern programming language 6<br />

Analysis and Design 24<br />

Data management 4<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __0___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically _____ pages and to make __0___ oral presentations <strong>of</strong> typically _____<br />

minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as<br />

for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

None<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

File processing theory 1.5<br />

Probability theory (Poisson Distribution) 1.5<br />

11.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

The student will analyze various file access alternatives to determine which produces the most efficient<br />

storage utilization. The student will analyze hashing algorithms to determine which produces the fewest<br />

collisions.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

The student will use a balance line algorithm to implement one <strong>of</strong> three types <strong>of</strong> problem solutions. The<br />

student will design a static hashing system store a specified number <strong>of</strong> records.<br />

-174-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

6/12/03 Change prerequisite. Course Change Form<br />

5/15/03.<br />

Lw<br />

Change prereq. From CIST 1400 to<br />

CSCI 1620 so students have more<br />

programming experience.<br />

6/25/03 ABET cleanup Wolcott<br />

3/25/08 Update content and required textbook Haworth<br />

5/30/09 Update student outcomes and map<br />

outcomes to Program outcomes<br />

Haworth<br />

-175-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3300<br />

Course Title<br />

File Structures for Information Systems<br />

Course Coordinator<br />

Dwight A. Haworth<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/30/09<br />

S – Strong relationship<br />

X –Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Comprehension <strong>of</strong> computer hardware<br />

components<br />

Comprehension <strong>of</strong> the attributes and<br />

functions <strong>of</strong> file systems<br />

Application <strong>of</strong> storage devices to meet<br />

specified requirements<br />

Analysis <strong>of</strong> file organizations to meet<br />

specified response time and storage<br />

constraints<br />

Evaluate the output <strong>of</strong> processing<br />

algorithms with respect to selected<br />

performance criteria<br />

Program file processing algorithms<br />

(application) using pseudocode<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

-176-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-177-


-178-


ISQA 3310 Managing the Database Environment<br />

Department and Course Number ISQA 3310<br />

Course Title<br />

Managing the Database Environment<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 1/31/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Introduction to business database design and management functions. The focus is on the use <strong>of</strong><br />

current database management systems (DBMS) to support the data management function <strong>of</strong> an<br />

organization. Topics include data modeling, database design, SQL, data management and<br />

database administration. Hands-on experience in database design, creation, and use is provided.<br />

1.2 For whom course is intended.<br />

This course is intended for the undergraduates who wish to pursue the Bachelor <strong>of</strong> Science in<br />

Management Information Systems (<strong>BIS</strong>) degree. It is one <strong>of</strong> the required courses for the degree.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 ISQA 3210 Advanced Technology for Personal Productivity (co-requisite)<br />

1.3.2 CIST 1100 Introduction to Personal Programming<br />

1.3.3 CIST 3100 Organizations, Applications, and Technology<br />

or equivalent.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 General knowledge <strong>of</strong> Windows environment from user’s perspective<br />

1.4.2 Introductory exposure to Micros<strong>of</strong>t Access<br />

1.4.3 Knowledge <strong>of</strong> basic storage architecture and terminology<br />

1.4.4 Basic familiarity with the role <strong>of</strong> data within organizations<br />

1.4 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

-179-


2.0 Objectives:<br />

2.1 Distinguish between ‘data’ and ‘information’.<br />

2.2 Define the terms 'database', 'database management system' and distinguish between such<br />

systems and their predecessors.<br />

2.3 Define the characteristics and benefits <strong>of</strong> the relational database model.<br />

2.4 Use SQL to define and modify database objects, and retrieve data.<br />

2.5 Describe the database development process, and explain how it fits into the broader context <strong>of</strong><br />

systems analysis, design, and implementation.<br />

2.6 Use data modeling techniques and tools to develop data models.<br />

2.7 Design appropriately normalized relations in a relational DBMS.<br />

2.8 Design and implement a relational database system <strong>of</strong> modest size using a contemporary DBMS.<br />

2.9 Identify the data integrity and security issues associated with database systems and explain how<br />

these are addressed in contemporary database management systems.<br />

2.10 Discuss the issues and techniques used with databases in a distributed environment, including the<br />

Internet.<br />

2.11 Explain the purpose, architecture, and associated terminology <strong>of</strong> data warehousing.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 File processing systems definition and components <strong>of</strong> database system 3.0<br />

3.2 Micros<strong>of</strong>t Access DBMS 1.5<br />

3.3 The Relational Model 1.5<br />

3.4 SQL & PL/SQL 9.0<br />

3.5 Database development process 4.5<br />

3.6 Data modeling & Entity-Relationship Diagramming 6.0<br />

3.7 Logical database design: ERD to tables, Functional dependencies 4.5<br />

3.8 Logical database design: Normalization 3.0<br />

3.9 Transaction Processing & Concurrency Control 3.0<br />

3.10 Business Intelligence and Data Warehousing 3.0<br />

3.11 Databases and the Internet 3.0<br />

-180-


4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods are lectures, discussion, and in-class demonstrations. Both the<br />

normal class meeting and the Internet-only teaching are available.<br />

4.2 Student role in the course.<br />

The student attends lectures, participate in the class discussion and complete assignments,<br />

required examinations and the semester database project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students participate in the class discussion and complete assignments, required examinations and<br />

the semester database project.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Components Grading<br />

Exams 30%<br />

Assignments 50%<br />

Project 15%<br />

Participation 5%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />

-181-


students primarily learn the relational model; in the part <strong>of</strong> databases in the distributed environment,<br />

students learn distributed databases and the relationship between databases and Internet.<br />

12.0 Solution design:<br />

Students learn the methods and processes needed to develop and design databases: the data modeling<br />

and logical database design. Students will complete the semester database project by designing and<br />

implementing a modest-size, but realistic database application.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

12/19/02 Time spent with Access limited to just<br />

database construction<br />

Wolcott The how-tos <strong>of</strong> interface design will<br />

be provided via links to optional<br />

tutorial. The database class will<br />

focus on the database issues, not<br />

12/19/02 Database administration dropped from<br />

content<br />

12/19/02 Amount <strong>of</strong> time on databases in a<br />

distributed environment, data<br />

warehousing, databases and the Internet<br />

reduced to 1.5 weeks total<br />

6/12/03 Change course description and<br />

prerequisites.<br />

Wolcott<br />

Wolcott<br />

Wild<br />

complete systems development.<br />

ISQA 4300 Database Administration<br />

is available, and more time is<br />

needed in ISQA 3310 for core<br />

concepts.<br />

Databases and the Internet and<br />

databases in a distributed<br />

environment covered in ISQA 4380.<br />

More room left for core topics<br />

Change description to reflect actual<br />

course content and update<br />

prerequisites needed.<br />

6/25/03 ABET cleanup Wolcott Updated prerequisite topics to<br />

reflect new requirement for CIST<br />

1100<br />

10/3/07 Updated resource material Wolcott Update <strong>of</strong> textbook<br />

1/31/08 Insertion <strong>of</strong> table mapping course<br />

objectives to program outcomes<br />

1/31/08 Course objectives updated to improve<br />

wording.<br />

Wolcott<br />

Wolcott<br />

‘Understand’ changed to a more<br />

active verb, e.g. ‘explain’, ‘describe’<br />

in many cases.<br />

10/13/08 Included more business intelligence Wolcott<br />

coverage<br />

10/31/08 Included PL/SQL coverage Wolcott In response to demand by students<br />

and IS&T advisory group.<br />

2/12/09 Updated resource material to APA citation<br />

format.<br />

Wolcott<br />

-183-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3310<br />

Course Title<br />

Managing the Database Environment<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 1/31/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Distinguish between ‘data’ and<br />

‘information’.<br />

Define the terms 'database', 'database<br />

management system' and distinguish<br />

between such systems and their<br />

predecessors.<br />

Define the characteristics and benefits <strong>of</strong><br />

the relational database model.S<br />

Use SQL to define and modify database<br />

objects, and retrieve data.<br />

Describe the database development<br />

process, and explain how it fits into the<br />

broader context <strong>of</strong> systems analysis,<br />

design, and implementation.<br />

Use data modeling techniques and tools<br />

to develop data models.<br />

Design appropriately normalized relations<br />

in a relational DBMS.<br />

Design and implement a relational<br />

X<br />

X<br />

X<br />

X<br />

S<br />

X<br />

X<br />

S<br />

S<br />

S<br />

-184-


database system <strong>of</strong> modest size using a<br />

contemporary DBMS.<br />

Identify the data integrity and security<br />

issues associated with database systems<br />

and explain how these are addressed in<br />

contemporary database management<br />

systems.<br />

Discuss the issues and techniques used<br />

with databases in a distributed<br />

environment, including the Internet.<br />

Explain the purpose, architecture, and<br />

associated terminology <strong>of</strong> data<br />

warehousing.<br />

X<br />

X<br />

X<br />

-185-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-186-


ISQA 3400 Business Data Communications<br />

Department and Course Number ISQA 3400<br />

Course Title<br />

Business Data Communications<br />

Course Coordinator<br />

Kerry Ward<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/01/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Data Communications principles and service operations with computers and telecommunication<br />

systems for operational analysis and decision making. This course will focus on breath, not depth<br />

-- concepts rather than specific technologies because concepts remain constant over time, while<br />

technologies change from year to year. Students are expected to master the basic terminologies<br />

and concepts, not necessarily to become experts in computer networking, nor to know the<br />

engineering details <strong>of</strong> any technology.<br />

1.2 For whom course is intended.<br />

This course is required for those students pursuing undergraduate and graduate degrees. It is one<br />

<strong>of</strong> the required courses for <strong>BIS</strong> degree.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 3100 Organizations, Applications, and Technology<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Computer architecture basics<br />

1.4.2 Transmission links<br />

1.4.3 Network topologies<br />

1.4.4 Network security and management<br />

1.4.5 Network protocols<br />

1.4.6 Network standards<br />

1.4.7 OSI model<br />

1.4.8 Internetworking<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Learn data communications principles and service operations with computers and<br />

telecommunication systems for operational analysis and decision making.<br />

-187-


2.2 Master the basic terminology and concepts <strong>of</strong> data communications.<br />

2.3 Analyze and design a system or a sub-system <strong>of</strong> a large scale system for the semester project<br />

applying the tools and techniques learn in the course.<br />

2.4 Carry out hands-on projects to understand data communications models.<br />

2.5 Understand network implementation, management, and use.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Data Transmission 12.0<br />

3.1.1 asjdklaj<br />

3.1.2 Introduction<br />

3.1.3 Internet Trends<br />

3.1.4 Naming With the Domain Name System<br />

3.1.5 Transmission Media<br />

3.1.6 Long-Distance Communication (carriers,<br />

3.1.7 Modulation, and Modems)<br />

3.2 Networking and Packet Transmission 21.0<br />

3.2.1 Packets, Frames, and Error Detection<br />

3.2.2 LAN Technologies and Network Topology<br />

3.2.3 Hardware Addressing and Frame Type Identification<br />

3.2.4 LAN Wiring, Physical Topology, and Interface Hardware<br />

3.2.5 Extending LANs: Fiber Modems, Repeaters, Bridges, and Switches<br />

3.2.6 Long-Distance Digital Connection Technologies<br />

3.2.7 WAN Technologies and Routing<br />

3.2.8 Connection-Oriented Networking and ATM<br />

3.2.9 Network characteristics: Ownership, Service Paradigm, and Performance<br />

3.2.10 Protocols and Layering<br />

3.3 Internetworking 9.0<br />

3.3.1 Internetworking: Concepts, Architecture, and Protocols<br />

3.3.2 IP: Internet Protocol and Addresses<br />

3.3.3 Binding Protocol Addresses (ARP)<br />

3.3.4 IP Datagrams and Datagram Forwarding<br />

3.3.5 IP Encapsulation, Fragmentation, and Reassembly<br />

3.3.6 The Future IP (Ipv6)<br />

3.3.7 An Error Reporting Mechanism (ICMP)<br />

3.3.8 TCP: Reliable Transport Service<br />

3.3.9 Network Security<br />

4.0 Teaching Methodology:<br />

-188-


4.1 Methods to be used.<br />

The primary teaching methods will be interactive lectures, article discussions and actual cases.<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in in-class discussion, complete quizzes, exams,<br />

assignments and the semester project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will complete quizzes, exams, assignments and semester projects.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

Exams 37.5%<br />

Quizzes 6.25%<br />

Class Participation 6.25%<br />

Class Assignments 12.5%<br />

Class Project Report 25%<br />

Final Exam 12.5%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

98 – 100% A+<br />

90 – 97% A<br />

87 – 89% A-<br />

84 – 86% B+<br />

80 – 83% B<br />

77 – 79% B-<br />

74 – 76% C+<br />

70 – 73% C<br />

67 – 69% C-<br />

64 – 66% D+<br />

-189-


60 – 63% D<br />

57 – 59% D-<br />


Note: For the class project report, a student is expected to work alone or work in project team <strong>of</strong> 2 or 3<br />

students and complete a report and one presentation. The individual assignment requires a student to<br />

complete a summary and one presentation. The student is also expected to complete the team<br />

assignment including a report and one presentation.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

This course primarily provides an overview <strong>of</strong> data communication and computer networking concepts,<br />

and includes the following topics:<br />

10.1 Data Transmission (3 hours)<br />

10.2 Packet Transmission (3 hours)<br />

10.3 OSI Reference model (3 hours)<br />

10.4 Internetworking concepts (3 hours)<br />

11.0 Problem analysis:<br />

Students learn data communications principles and service operations with computers and<br />

telecommunication systems for operational analysis and decision making. Students will learn to analyze a<br />

systems or a sub system <strong>of</strong> a large scale system for the semester project applying the tools and<br />

techniques learn in the course.<br />

12.0 Solution design:<br />

Students will learn to design a systems or a sub system <strong>of</strong> a large scale system applying the tools and<br />

techniques learn in the course. Specially, they will complete the design document for the semester<br />

project.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

6/12/03 Prerequisite from CSCI 2010 to 2110.<br />

Course Change Form 2/21/03<br />

Wild Course 2010 no longer required for<br />

degree.<br />

6/25/03 ABET cleanup Wolcott<br />

10/09/07 Minor Revisions/Updates Ward<br />

10/1/08 Minor Revisions/Updates, including change<br />

in prerequisite course number from CIST<br />

2110 to CIST 3100<br />

Ward<br />

-191-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3400<br />

Course Title<br />

Business Data Communications<br />

Course Coordinator<br />

Kerry Ward<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 01/22/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Learn data communications principles<br />

and service operations with computers<br />

and telecommunication systems for<br />

operational analysis and decision making.<br />

Master the basic terminology and<br />

concepts <strong>of</strong> data communications.<br />

To understand how the Internet and<br />

specific organizational networks function<br />

Analyze a specific aspect <strong>of</strong> business data<br />

communications in depth as a small<br />

group project.<br />

Carry out hands-on projects to<br />

understand data communications<br />

models.<br />

Understand network implementation,<br />

management, and use.<br />

X<br />

X<br />

X<br />

S<br />

S<br />

X X X<br />

X X X<br />

X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

-192-


1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-193-


-194-


ISQA 3420 Managing in a Digital World<br />

Department and Course Number ISQA 3420<br />

Course Title<br />

Managing in a Digital World<br />

Course Coordinator<br />

Stacie Petter<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/08/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course introduces the fundamentals <strong>of</strong> management as they apply in businesses and other<br />

organizations, particularly from an information systems/technology (IS/T) management lens. In<br />

particular, the course examines the various roles, responsibilities, and skills essential to<br />

managerial success in the context in which the IT manager operates today -- a dynamic<br />

environment <strong>of</strong> workforce diversity, a global economy, and concern for ethics and social<br />

responsibility.<br />

1.2 For whom course is intended.<br />

The course is intended for undergraduate students in Information Systems, Computer Science and<br />

related areas who are interested in learning the basics <strong>of</strong> management theory and its application<br />

to the practice <strong>of</strong> IS/T management.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

CIST 3100 or permission from the instructor<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

None<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

The goal <strong>of</strong> this course is to discuss and interpret management theory from an IS/T management lens.<br />

Students examine opportunities and challenges in a world that is increasingly connected to one another<br />

via technology. In this course, students will:<br />

-195-


2.1 Increase awareness <strong>of</strong> how a dynamic and changing information-intensive environment affects IS<br />

managers.<br />

2.2 Appreciate challenges and opportunities <strong>of</strong> IS management in context <strong>of</strong> 21st century<br />

organizations.<br />

2.3 Understand the international aspects <strong>of</strong> IS management to develop a global and multi-cultural<br />

view.<br />

2.4 Understand the importance <strong>of</strong> having a competitive advantage and the potential role <strong>of</strong> IT in<br />

developing a competitive advantage.<br />

2.5 Become familiar with environmental challenges that IS managers face in managing diversity,<br />

quality, information technology, and knowledge for competitive advantage in the 21st century.<br />

2.6 Become familiar with the foundations <strong>of</strong> ethical managerial behavior, using information ethically,<br />

and issues/challenges as it pertains to IS/T management<br />

2.7 Understand IS planning processes as basic managerial responsibilities.<br />

2.8 Understand strategy formulation and business models in a competitive IS/T environment.<br />

2.9 Understand controls and organizational systems for control for the IS/T function.<br />

2.10 Understand the challenges <strong>of</strong> attracting, developing, and maintaining a high quality IT workforce<br />

2.11 Understand ways <strong>of</strong> organizing the workplace, with special emphasis high performance work<br />

designs in IT organizations.<br />

2.12 Identify how work can be altered with the use <strong>of</strong> information system and technology.<br />

2.13 Understand the challenges <strong>of</strong> IS leadership, leadership theories and models, and the role <strong>of</strong> the<br />

Chief Information Officer.<br />

2.14 Understand issues affecting the management <strong>of</strong> global IS/T, particularly challenges <strong>of</strong> and best<br />

practices for managing teleworkers and virtual teams<br />

2.15 Appreciate the IT-enabled change process, including change strategies, resistance to change and<br />

the nature <strong>of</strong> organization development.<br />

2.16 Understand models for technology adoption and diffusion <strong>of</strong> technological innovations.<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> weeks on each).<br />

3.1 The Changing Organization and Workplace 1 week<br />

3.2 Globalization 1 week<br />

3.3 IT Management Environment and Role <strong>of</strong> IT for Competitive Advantage – 1 week<br />

3.4 Ethics in the Digital World 1 week<br />

3.5 IS/IT Planning ½ week<br />

3.6 Business and IS Strategy; Business Models 1 ½ weeks<br />

3.7 Control and Audit <strong>of</strong> Information Systems and Services ½ week<br />

3.8 Managing and Retaining IS/T Employees 1 week<br />

3.9 Motivating IS/T Employees 1 week<br />

3.10 IS Organization Structure ½ week<br />

3.11 Design <strong>of</strong> Work Using IS/IT 1 week<br />

3.12 Organizational Culture and IS 1 week<br />

3.13 IS Leadership 1 week<br />

3.14 Teams, Teamwork, Virtual Teams ½ week<br />

3.15 IT Enabled Change Management 1 week<br />

-196-


4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will include class discussion, case study, and lecture.<br />

4.1 Student role in the course.<br />

The student will attend lectures, participate in class discussion on assigned readings, complete<br />

assigned projects and papers, and complete required examinations.<br />

Each student will be assigned to a learning group to participate in a project during the course <strong>of</strong><br />

the semester. These learning groups will examine a topic in more depth outside <strong>of</strong> the classroom.<br />

Tasks that may be performed by learning groups would be the analysis <strong>of</strong> a case study or the<br />

completion <strong>of</strong> a project in a virtual context.<br />

4.2 Contact hours.<br />

5.0 Evaluation:<br />

3 hours<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will be evaluated on the following basis.<br />

Class participation: Students are expected to attend each and every class and be prepared to<br />

actively participate in the discussion. Much <strong>of</strong> the class will be conducted using an open<br />

discussion approach, and the success <strong>of</strong> the class will be dependent on students’ ability to identify<br />

and discuss relevant issues.<br />

Exams: There will be three examinations.<br />

Class Project: Each person will be assigned to a learning group to complete a case study or class<br />

project which relates to one or more topic in the course.<br />

Assignments: Students will receive assignments to be completed in class or outside <strong>of</strong> class to<br />

reinforce material discussed in the classroom or in the readings.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

The grade base for the course for undergraduate students will consist <strong>of</strong> the following:<br />

Available points<br />

-197-


Class Participation 15%<br />

Class Project 35%<br />

Exams 35%<br />

Assignments 15%<br />

5.3 Grading scale and criteria.<br />

The grading scale is as follows:<br />

GRADE POINT VALUE<br />

A 93%


6.2.6 “Mastering the Three Worlds <strong>of</strong> Information Technology.” McAfee, A. Harvard Business<br />

Review, Nov. 1, 2006.<br />

6.2.7 CASE: “Going Up Against Google.” Fitzgerald, M. Inc. Magazine, February 2006.<br />

6.2.8 “What’s Wrong with Being ‘Borderline Ethical’?” Liebowitz, B., Healthcare Financial<br />

Management, September 2003.<br />

6.2.9 CASE: “The End <strong>of</strong> Enron's Empire.” Wang, J., Chen, Q., Yao, J., and Xing, R. Idea Group<br />

Publishing, 2006.<br />

6.2.10 “Getting IT Right.” Charlie S. Feld and Donna B. Stoddard. Harvard Business Review, Vol.<br />

82 Issue 2, Feb 2004.<br />

6.2.11 “Chapter 1: The Information Systems Strategy Triangle”, Pearlson, K.E. and Saunders, C.S.<br />

Managing and Using Information Systems: A Strategic Approach, 2006.<br />

6.2.12 CASE: “MySQL Open Source Database in 2004.” Burgelman, Robert A. Graduate School <strong>of</strong><br />

Business Stanford <strong>University</strong>, 2004.<br />

6.2.13 CASE: “The True Meaning <strong>of</strong> Twitter.” Lashinksy, A. Fortune, August 7, 2008.<br />

6.2.14 “How to Hook the IT Pr<strong>of</strong>essionals you Need.” Overby, S. CIO.com, June 2007.<br />

6.2.15 “Closing the Geek Gap.” Zetlin, M. Pr<strong>of</strong>it Magazine, November 2006.<br />

6.2.16 CASE: “Lucent Technologies: Halting Information Technology Employee Turnover.”<br />

Schneberger, S.L. and Mark, K. Richard Ivey School <strong>of</strong> Business, 2001.<br />

6.2.17 CASE: “Micros<strong>of</strong>t.NET (Abridged).” MacCormack, A. and Herman, K. Harvard Business<br />

School Publishing, 2004.<br />

6.2.18 CASE: “Sealed Air Corporation: Globalization and Corporate Culture.” Paine, L.S. and<br />

Wruck, K.H. Harvard Business School Publishing, 2006.<br />

6.2.19 “Seeking Loyal, Devoted Workers? Let Them Stay Home” Coombes, A. Wall Street Journal,<br />

Sep. 11, 2007.<br />

6.2.20 “Creating and Sustaining Trust in Virtual Teams” Greenberg, P.S., Greenberg, R.H.,<br />

Lederer A.Y. Business Horizons, 2007.<br />

6.2.21 “Note on Innovation Diffusion: Rogers' Five Factors.” John T. Gourville. Harvard Business<br />

School Publishing, 2005<br />

6.2.22 “What to do when employees resist change.” Gregory J Iskat, Jay Liebowitz. SuperVision,<br />

Vol. 64, Iss. 8. Aug 2003.<br />

6.2.23 CASE: “Apple Inc., 2008.” Y<strong>of</strong>fie, D. and Slind, M. Harvard Business School Publishing;<br />

2008.<br />

6.3 Other suggested reading materials, if any.<br />

6.3.1 Schermerhorn, J. R., Jr. (2004 or current edition). Core Concepts <strong>of</strong> Management. John<br />

Wiley & Sons, Inc.<br />

6.4 Other sources <strong>of</strong> information.<br />

Guest speakers or other current articles from reputable journals, magazines, or media outlets.<br />

6.5 Current bibliography <strong>of</strong> resource for student’s information.<br />

Same as above.<br />

7.0 (Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category<br />

Content (class time in hours):<br />

-199-


CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 0 0<br />

Networking and telecommunications 0 0<br />

Modern programming language 0 0<br />

Analysis and Design 3 0<br />

Data management 0 0<br />

Role <strong>of</strong> IS in Organizations 6 30<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___7__ written reports (not including exams, tests, quizzes, or<br />

commented programs) <strong>of</strong> typically __2-3___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

Ethics is discussed as a course topic for a one week period. The first half <strong>of</strong> the week is devoted to lecture<br />

and discussion and students focus on the following learning objectives related to ethics:<br />

• Become familiar with the foundations <strong>of</strong> ethical managerial behavior and the issues/challenges<br />

that pertain to IS/T management<br />

• Define basic concepts related to ethical behavior<br />

• Become familiar with ethical codes for our pr<strong>of</strong>ession<br />

• Recognize ethical dilemmas and forces that create them<br />

• Identify different perspectives and approaches to resolve an ethical dilemma<br />

Students then apply these concepts to a case study in which ethical dilemmas are discussed in more detail<br />

and within the context <strong>of</strong> a specific situation. Students are graded based on class participation in this<br />

discussion and test questions.<br />

Social issues, as related to computing, are discussed throughout the semester. However, these topics are<br />

brought to the forefront when we discuss globalization, competitive advantage, and IS culture. Students<br />

are evaluated on their understanding <strong>of</strong> these issues via class participation, test questions, essay<br />

questions, and homework assignments.<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

-200-


Several theoretical concepts related to IS are discussed in this course, such as:<br />

10.1 The organization as a system – 1 week<br />

10.2 Ethical frameworks as they relate to IS – 1 week<br />

10.3 Business strategy frameworks – 1 ½ weeks<br />

10.4 Employee turnover and retention models – ½ week<br />

10.5 Motivational theories – 1 week<br />

10.6 Leadership theories – 1 week<br />

10.7 Change management and technology acceptance – 1 week<br />

11.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

Students read and discuss case studies throughout the semester. At least eight case studies are read and<br />

discussed in class. In these discussions, students identify problems occurring in organizations as it relates<br />

to concepts discussed in class.<br />

The class project, regardless <strong>of</strong> its format, requires students to analyze a problem using frameworks and<br />

ideas presented in class.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

Students develop solutions to problems identified from readings in case studies. These are discussed in<br />

small groups and as a class. Students are also expected to identify solutions to specific problems that<br />

occur in managing in a digital world via essay questions on exams.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

3/10/06 Syllabus created Khazanchi<br />

10/8/08 Revision <strong>of</strong> syllabus to reflect current<br />

course content. More detail<br />

provided in template to conform to<br />

ABET standards.<br />

Stacie<br />

Petter<br />

Lecture topics remained the<br />

same; however, readings<br />

reflect most current cases and<br />

articles used in the course.<br />

-201-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3420<br />

Course Title<br />

Managing in a Digital World<br />

Course Coordinator<br />

Stacie Petter<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/8/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

The goal <strong>of</strong> this course is to discuss and<br />

interpret management theory from an<br />

IS/T management lens.<br />

Increase awareness <strong>of</strong> how a dynamic<br />

and changing information-intensive<br />

environment affects IS managers.<br />

Appreciate challenges and opportunities<br />

<strong>of</strong> IS management in context <strong>of</strong> 21st<br />

century organizations.<br />

Understand the international aspects <strong>of</strong><br />

IS management to develop a global and<br />

multi-cultural view.<br />

Understand the importance <strong>of</strong> having a<br />

competitive advantage and the potential<br />

role <strong>of</strong> IT in developing a competitive<br />

advantage.<br />

Become familiar with environmental<br />

challenges that IS managers face in<br />

managing diversity, quality, information<br />

S X S X X X<br />

S X S X X X X<br />

S S X X X S<br />

S S X X X<br />

S S<br />

S X S X X X<br />

-202-


technology, and knowledge for<br />

competitive advantage in the 21st<br />

century.<br />

Become familiar with the foundations <strong>of</strong><br />

ethical managerial behavior, using<br />

information ethically, and<br />

issues/challenges as it pertains to IS/T<br />

management<br />

Understand IS planning processes as<br />

basic managerial responsibilities.<br />

Understand strategy formulation and<br />

business models in a competitive IS/T<br />

environment<br />

Understand controls and organizational<br />

systems for control for the IS/T function.<br />

Understand the challenges <strong>of</strong> attracting,<br />

developing, and maintaining a high<br />

quality IT workforce<br />

Understand ways <strong>of</strong> organizing the<br />

workplace, with special emphasis high<br />

performance work designs in IT<br />

organizations.<br />

Identify how work can be altered with the<br />

use <strong>of</strong> information system and<br />

technology.<br />

Understand the challenges <strong>of</strong> IS<br />

leadership, leadership theories and<br />

models, and the role <strong>of</strong> the Chief<br />

Information Officer.<br />

Understand issues affecting the<br />

management <strong>of</strong> global IS/T, particularly<br />

challenges <strong>of</strong> and best practices for<br />

managing teleworkers and virtual teams<br />

Appreciate the IT-enabled change<br />

process, including change strategies,<br />

resistance to change and the nature <strong>of</strong><br />

organization development.<br />

Understand models for technology<br />

adoption and diffusion <strong>of</strong> technological<br />

innovations.<br />

S S S<br />

S X X<br />

S S X X<br />

S X X X<br />

S S X<br />

S S X X<br />

S S X<br />

S S X X<br />

S S S S X X<br />

S S X X<br />

S X S X X X X<br />

-203-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-204-


ISQA 3520 Graphic User Interface Design<br />

Department and Course Number ISQA 3520<br />

Course Title<br />

Graphical User Interface Design<br />

Course Coordinator<br />

Sidney Davis<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The purpose <strong>of</strong> this course is to introduce the principles <strong>of</strong> interface design. In this course,<br />

students will learn principles that have been used successfully in the past and apply them to<br />

everyday examples from business and industry; students will become aware <strong>of</strong> the roles <strong>of</strong><br />

different disciplines (e.g., computer science, psychology, sociology, anthropology) and will<br />

understand how to begin to draw on them to create usable and useful computer s<strong>of</strong>tware;<br />

students will study formal methods <strong>of</strong> analysis that may be used to complement less structured<br />

aspects <strong>of</strong> design.<br />

1.2 For whom course is intended.<br />

This course is intended for the undergraduate MIS or CS majors who wish to study the principles<br />

<strong>of</strong> interface design. It is one <strong>of</strong> the specialization elective courses for the Bachelor <strong>of</strong> Science in<br />

Management Information Systems (<strong>BIS</strong>) degree.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 ISQA 3210 Advanced Technology for Personal Productivity (students should have at least<br />

a basic understanding <strong>of</strong> how to create Web-based applications)<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Introduction to Personal Computing<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Understand the principles <strong>of</strong> interface design.<br />

2.2 Understand that interface design requires the integration <strong>of</strong> multiple disciplines and skills and<br />

know how to draw on them to create usable and useful computer s<strong>of</strong>tware.<br />

-205-


2.3 Learn design principles and concepts that have been used successfully in the past and apply them<br />

to everyday examples from business and industry.<br />

3.0 Content and Organization:<br />

3.1 Introduction 1.5<br />

3.2 Framework for Design 7.0<br />

3.2.1 What is interaction design<br />

3.2.2 Understanding and conceptualizing interaction<br />

3.2.3 Designing for collaboration and communication<br />

3.3 Interactive System Design 9.0<br />

3.3.1 The process <strong>of</strong> interaction design<br />

3.3.2 Needs and requirements<br />

3.3.3 Design, prototyping, and construction<br />

3.4 System Evaluation 10.0<br />

3.4.1 Heuristic evaluation and walkthroughs<br />

3.4.2 Evaluation <strong>of</strong> design<br />

3.4.3 Predictive evaluation<br />

3.4.4 Requirements definition<br />

3.5 User Interface 9.0<br />

3.5.1 Interaction styles<br />

3.5.2 Affective aspects<br />

3.5.3 User’s mental model<br />

Contact Time<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures and in-class discussions.<br />

4.2 Student role in the course.<br />

The student will attend lecture, participate in discussion on assigned readings, complete quizzes,<br />

exams, the interface design project, and homework.<br />

4.3 Contact hours.<br />

Three (3) hours per week.<br />

-206-


5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will complete quizzes, homework assignments, individual interface design literature<br />

reports and presentations, team project assignments, participate in in-class discussions, and takehome<br />

exams. A team project will be assigned in 4 phases – with each phase taking from one to<br />

seven weeks to complete. Graduate students will be graded based on higher standards <strong>of</strong><br />

completeness, accuracy, and application <strong>of</strong> design principles on their design projects. Also,<br />

graduate students will be required to answer additional questions (over and above those <strong>of</strong> the<br />

undergraduates) on quizzes and exams.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Components<br />

Grading<br />

Quizzes 10%<br />

Homework 5%<br />

Class Participation 5%<br />

Exams 30%<br />

Team Project<br />

35%<br />

Assignments<br />

Interface Design<br />

5%<br />

Report and<br />

Presentation<br />

S<strong>of</strong>tware projects 10%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

95.5 – 100 A+<br />

92.5 – 95.4 A<br />

89.5 – 92.4 A-<br />

85.5 – 89.4 B+<br />

82.5 – 85.4 B<br />

79.5 – 82.4 B-<br />

75.5 – 79.4 C+<br />

72.5 – 75.4 C<br />

69.5 – 72.4 C-<br />

65.5 – 69.4 D+<br />

62.5 – 65.4 D<br />

59.5 – 62.4 D-<br />

59.4 or below F<br />

-207-


6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Sharp, H., Rogers, Y., Preece, J. (2007). Interaction Design, Second Edition, John Wiley &<br />

Sons, Ltd. (ISBN: 978-0-470-01866-8).<br />

6.2 Other suggested reading materials, if any.<br />

None<br />

6.3 Other sources <strong>of</strong> information.<br />

Web-based resources on computer interface design.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design 30<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Student teams (3-4 students each) are required to submit at least __3___ written reports (not including<br />

exams, tests, quizzes, or commented programs) to typically __8___ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __20___ minutes duration. Also, each student will write __1__ interface design<br />

literature report and will make __1__ presentation <strong>of</strong> typically __10___ minutes duration. Include only<br />

material that is graded for grammar, spelling, style, and so forth, as well as for technical content,<br />

completeness, and accuracy.<br />

Note: student teams will complete final reports and oral presentations for the interface design project.<br />

9.0 Social and Ethical Issues:<br />

No coverage.<br />

-208-


10.0 Theoretical content:<br />

This course deals mostly with the principles <strong>of</strong> interface design. It includes relevant theories and<br />

frameworks to analyze and solve problems.<br />

Hours<br />

10.1 Conceptual design models 1.5<br />

10.2 Users’ mental models 1.5<br />

10.3 Design principles for usability 1.0<br />

10.4 Design principles for user experience 1.0<br />

10.5 Evaluation framework 1.5<br />

10.6 Predictive models <strong>of</strong> usability 3.0<br />

10.7 Cognitive walkthrough 1.0<br />

10.8 Heuristic evaluation 1.0<br />

11.0 Problem analysis:<br />

Students learn to analyze and understand the problems associated with the design context. This course<br />

introduces formal methods <strong>of</strong> analysis that may be used to complement less structured aspects <strong>of</strong> design.<br />

12.0 Solution design:<br />

Students learn to apply relevant theories and frameworks to solving the problems that have been found<br />

in the process <strong>of</strong> problem analysis. This course also emphasizes the fact that interface design requires the<br />

integration <strong>of</strong> multiple disciplines and skills (from information systems analysis and design, human<br />

psychology, and computer science)<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

6/12/03 Change prerequisite from CIST 1100 and<br />

CIST 1400. Course Change Form<br />

5/15/03.<br />

Wild<br />

Prerequisites changed to match<br />

need <strong>of</strong> course content.<br />

6/25/03 ABET cleanup Wolcott<br />

10/12/08 Complete reworking <strong>of</strong> course content Davis Completely revamped course<br />

description to reflect most current<br />

content and teaching methods<br />

-209-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3520<br />

Course Title<br />

Graphical User Interface Design<br />

Course Coordinator<br />

Sidney Davis<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the principles <strong>of</strong> good<br />

interface design.<br />

Understand that interface design requires<br />

the integration <strong>of</strong> multiple disciplines and<br />

skills and know how to draw on them to<br />

create usable and useful computer<br />

s<strong>of</strong>tware.<br />

Learn to apply design principles and<br />

concepts that have been used<br />

successfully in the past to everyday<br />

examples from business and industry.<br />

X S S S S<br />

S S S S S<br />

S S S S<br />

-210-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-211-


-212-


ISQA 4010 Business Intelligence<br />

Department and Course Number ISQA 4010<br />

Course Title<br />

Business Intelligence<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/02/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course focuses on the various topics on knowledge management by utilizing both<br />

behavioral approaches and information technology tools. It includes data collection and<br />

analysis, intelligent agents, business concerns on data warehousing and data mining,<br />

customer relationship management. The course will also cover information overload,<br />

human expert systems vs. artificial intelligent systems and intelligent decision making.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to<br />

understand the advanced Quantitative Analysis. It is one <strong>of</strong> elective courses for<br />

undergraduates who wish to pursue Knowledge Management, Knowledge Engineering<br />

and Decision Support Tracks.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 1400 Introduction to Computer Programming<br />

1.3.2 CIST 2500 Introduction to Applied Statistics for IS&T<br />

1.3.3 ISQA 3150 Principles <strong>of</strong> Quantitative Analysis<br />

1.3.4 ISQA 3210 Advanced Technology for Personal Productivity<br />

1.3.5 ISQA 3250 Intermediate Quantitative Analysis<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Introduction to Visual Basic Programming,<br />

1.4.2 Program development cycle<br />

1.4.3 Training in spreadsheets and database<br />

1.4.4 Statistics in information science and technology<br />

1.4.5 A well-known computer package being used to support the problem-solving<br />

process.<br />

1.5 1.4 Unusual circumstances <strong>of</strong> the course.<br />

-213-


None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 Data, Information, and Knowledge<br />

2.2 Knowledge Management vs. Knowledge Technology<br />

2.3 Knowledge represented by Data<br />

2.4 Artificial Intelligence, Expert system vs. Data Mining<br />

2.5 Analytic Customer Management<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Introduction 3<br />

3.2 Data Collection and Information 6<br />

3.3 Information Overload 6<br />

3.4 Information and Knowledge 8<br />

3.5 Knowledge Management 6<br />

3.6 Knowledge Technology 4<br />

3.7 Business Intelligence 6<br />

3.8 Analytic Customer Relation Management 6<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures and group discussions.<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week<br />

-214-


5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Components<br />

Grading<br />

Exams 60%<br />

Class Project 25%<br />

Class Participation / Homework 15%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

96 – 100% A+<br />

90 – 95.9% A<br />

86 – 89.9% B+<br />

80 – 85.9% B<br />

76 – 79.9% C+<br />

70 – 75.9% C<br />

66 – 69.9% D+<br />

60 – 65.9% D<br />

< 60% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Amrit Tiwana, Knowledge Management Toolkit, Prentice Hall, 2002. (or more<br />

recent text)<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 T. Sowell, Knowledge and Decisions, Basic Books, 1980.<br />

6.2.2 J. W. Cortada and J. A. Woods, The Knowledge Management Yearbook,<br />

Butterworth-Heinemann, 1999.<br />

-215-


6.3 Other sources <strong>of</strong> information.<br />

6.3.1 Y. Shi, “Humancasting: A Fundamental Method to Overcome User Information<br />

Overload,” Information – International Inter-discipline Journal, Vol. 3, 127-143,<br />

2000.<br />

6.3.2 M. Zeleny, “Knowledge <strong>of</strong> Enterprise: Knowledge Mangement or Knowledge<br />

Technology,” International Journal <strong>of</strong> Information Technology and Decision<br />

Making, Vol.1, 181-208, 2002<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 4<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design 6<br />

Data management 26<br />

Role <strong>of</strong> IS in Organizations 6<br />

8.0 Oral and Written Communications<br />

Every student is required to submit at least ___3__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically ___30__ pages and to make _1____ oral<br />

presentations <strong>of</strong> typically ___10__ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

10.1 Data Mining<br />

10.2 Expert System<br />

-216-


11.0 Problem analysis:<br />

Students learn the advanced models <strong>of</strong> Quantitative Analysis, a scientific approach to decision<br />

making that involves the operations <strong>of</strong> organizational systems. They learn to solve the conflicts<br />

<strong>of</strong> interest among the components <strong>of</strong> the organization in a way that is best for the organization<br />

as a whole.<br />

12.0 Solution design:<br />

Students learn to develop a solution that yields an optimal value <strong>of</strong> the organizational system<br />

measure <strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />

desirability.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

6/12/03 Change prerequisites as needed. Wild<br />

Course change form 5/15/03.<br />

10/2/08 Review completed Shi<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4010<br />

Course Title<br />

Business Intelligence<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

-217-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Course objective<br />

Data, Information, and Knowledge S S S<br />

Knowledge Management vs. Knowledge S S X<br />

Technology<br />

Knowledge represented by Data S X S<br />

Artificial Intelligence, Expert system vs. S<br />

S<br />

Data Mining<br />

Analytic Customer Management S S S<br />

-218-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-219-


-220-


ISQA 4100 Information Systems Architecture and Organization<br />

Department and Course Number ISQA 4100<br />

Course Title<br />

Information Systems Architecture & Organization<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course examines the frameworks and tools used to develop an organization's<br />

information system architecture. It provides the analytical skills and conceptual<br />

frameworks with which to make recommendations and decisions regarding the<br />

integration <strong>of</strong> information technology components into an information system<br />

architecture.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors and graduate MIS<br />

majors who wish to study advanced topics pertaining to an organization's information<br />

system architecture.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 3100 - Organizations, Applications, and Technology<br />

1.3.2 ISQA 3310 - Managing the Database Environment<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Working knowledge <strong>of</strong> business foundations.<br />

1.4.2 Working knowledge <strong>of</strong> computer information systems.<br />

1.4.3 Working knowledge <strong>of</strong> information systems development.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Understand the issues involved in architecting the information systems infrastructure in<br />

medium- and large-sized organizations.<br />

-221-


2.2 Understand the frameworks and tools used to develop an organization's information<br />

systems architecture.<br />

2.3 Understand and apply the conceptual frameworks developed for managing information<br />

systems architectures.<br />

2.4 Understand the Unified Modeling Language (UML) as a tool for modeling the various<br />

aspects <strong>of</strong> information systems architectures.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 The Role <strong>of</strong> IS in the Enterprise & the Problems <strong>of</strong> Large/Complex IS 3.0<br />

3.2 The Concept <strong>of</strong> Information Systems Architecture 1.0<br />

3.3 Initial Attempts at IS Architecture 2.0<br />

3.4 Heuristics and Conceptual Building Blocks <strong>of</strong> ISA 2.0<br />

3.5 Technical Building Blocks <strong>of</strong> IS Architecture 2.0<br />

3.6 Builder-Architected Systems 1.0<br />

3.7 The Zachman Information Systems Architecture Framework 2.0<br />

3.8 Manufacturing Systems 1.0<br />

3.9 The Data Warehouse Architecture Framework 2.0<br />

3.10 Social Systems 1.0<br />

3.11 S<strong>of</strong>tware Systems 1.0<br />

3.12 Collaborative Systems 1.0<br />

3.13 Representation Models and System Architecting 1.0<br />

3.14 The Architecture Process 3.0<br />

3.15 Integrated Modeling Methodologies 1.0<br />

3.16 Architecture Frameworks 1.0<br />

3.17 The Political Process <strong>of</strong> Systems Architecting 2.0<br />

3.18 The pr<strong>of</strong>essionalization <strong>of</strong> Systems Architecting 2.0<br />

3.19 Architecture Management, Measurement, and Maintenance 2.0<br />

3.20 Overview <strong>of</strong> the Unified Modeling Language (UML) 1.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will include lectures, discussion, and guidance on the<br />

group project.<br />

4.2 Student role in the course.<br />

-222-


Students will attend lectures, participate in the in-class discussion, complete the<br />

individual presentation assignment, complete individual assignments, and participate in<br />

the group project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Students will participate in the in-class discussions. Students will conduct an individual<br />

presentation on a research topic related to the course; graduate students will also<br />

complete an accompanying written report. Students will participate in the completion <strong>of</strong><br />

a group project which brings together analysis, design, modeling, communications, and<br />

research skills.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

Presentation 30%<br />

Individual Assignments 30%<br />

Team Project 30%<br />

Class Participation 10%<br />

5.3 Grading scale and criteria.<br />

Points<br />

Grade<br />

96% - 100% A+<br />

92% - 95% A<br />

89% - 91% A-<br />

86% - 88% B+<br />

82% - 85% B<br />

79% - 81% B-<br />

76% - 78% C+<br />

72% - 75% C<br />

69% - 71% C-<br />

66% - 68% D+<br />

-223-


62% - 65% D<br />

59% - 61% D-<br />

< 59% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Eberhardt Rechtin & Mark W. Maier. The Art <strong>of</strong> Systems Architecting, 2nd Edition<br />

CRC Press, 2000 (or more recent text)<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 On-line: Intranet Architecture - Integrating Information Design with Business<br />

Planning (http://www.intrack.com/intranet/iarchi.shtml)<br />

6.2.2 On-line: The IntraNet Architecture: Managing information in the new paradigm<br />

(http://www.iorg.com/papers/amdahl/infra.html)<br />

6.2.3 On-line: Intranet Cost<br />

Calculator(http://www.intrack.com/intranet/costs/index.shtml)<br />

6.2.4 On-line: Complexity problems: the IRS<br />

(http://cnnfn.com/1999/03/01/economy/irs/)<br />

6.2.5 On-line: Multi-vendor problems: MCI<br />

6.2.6 (http://cnn.com/TECH/computing/9908/23/network.nono.idg/index.html)<br />

6.2.7 On-line: Definition <strong>of</strong> Architecture, as per the <strong>University</strong> <strong>of</strong> Leuven<br />

(http://www.mech.kuleuven.ac.be/pma/project/goa/extracts/architec.htm)<br />

6.2.8 On-line: How Do You Define S<strong>of</strong>tware Architecture? as per the S<strong>of</strong>tware<br />

Engineering Institute at Carnegie Mellon <strong>University</strong><br />

(http://www.sei.cmu.edu/architecture/definitions.html)<br />

6.2.9 On-line: What an Information Architect Does (PDF file)<br />

(http://www.jjg.net/ia/iadoes0700.pdf)<br />

6.2.10 On-line: The power <strong>of</strong> standardization: A Brief Overview <strong>of</strong> GSM (http://kbs.cs.tuberlin.de/~jutta/gsm/js-intro.html)<br />

6.2.11 On-line: The power <strong>of</strong> heuristics: Usability Heuristics for the Web<br />

(http://www.webreview.com/1997/10_10/strategists/10_10_97_2.shtml)<br />

6.2.12 On-line: The power <strong>of</strong> patterns: Essential Concepts and Terminology<br />

(http://www.enteract.com/~bradapp/docs/patterns-intro.html)<br />

6.2.13 On-line: Technology: Computer User's High-Tech Dictionary<br />

(http://www.computeruser.com/resources/dictionary/dictionary.html)<br />

6.2.14 On-line: Technology: Information Technology Association <strong>of</strong> America<br />

(http://www.itaa.org/)<br />

6.2.15 On-line: UML: Rational S<strong>of</strong>tware's UML site (http://www.rational.com/uml/)<br />

6.2.16 On-line: UML: UML Dictionary (http://s<strong>of</strong>tdocwiz.com/UML.htm)<br />

-224-


6.2.17 On-line: UML: A Unified Object Modeling Approach<br />

(http://www.iconixsw.com/Spec_Sheets/UnifiedOM.html)<br />

6.2.18 On-line: Explore the Zachman Architecture<br />

6.2.19 On-line: John Zachman's Homepage<br />

(http://www.ozemail.com.au/~ieinfo/zachman.htm)<br />

6.2.20 On-line: Getting Beyond the "Legacy," by John A. Zachman.<br />

(http://www.ies.aust.com/~visible/papers/zachman1.htm)<br />

6.2.21 On-line: The Challenge is Change: A Management Paper, by John A. Zachman<br />

(http://www.ies.aust.com/~visible/papers/zachman2.htm)<br />

6.2.22 On-line: Framework S<strong>of</strong>tware (http://www.frameworks<strong>of</strong>t.com/)<br />

6.2.23 On-line: The Zachman Framework: An Introduction, by David C. Hay<br />

(http://www.essentialstrategies.com/publications/methodology/zachman.htm)<br />

6.2.24 On-line: The Framework for Enterprise Architecture, by the Zachman Institute for<br />

Framework Advancement (http://www.zifa.com/zifajz02.htm)<br />

6.2.25 On-line: An overview <strong>of</strong> the Zachman Framework, by Momentum Systems, Inc.<br />

(http://www.momentumsystems.com/zframework.html)<br />

6.2.26 On-line: Pattern Based Reengineering, Michael A. Beedle Ph. D. (This article<br />

combines the topics <strong>of</strong> object-oriented s<strong>of</strong>tware engineering, patterns, the<br />

Zachman Framework, and the UML.)<br />

6.2.27 On-line: Implementing the Zachman Framework for Enterprise Architecture, by<br />

Alan Perkins. (http://www.ies.aust.com/~visible/papers/Zachman.html)<br />

6.2.28 On-line: The Zachman Framework, by Dr. John K. Sharp (By the way, note the 7th<br />

reference <strong>of</strong> this article - a reference to an earlier version <strong>of</strong> this course.)<br />

(http://www.inconcept.com/JCM/February1999/print/sharp.html)<br />

6.2.29 On-line: The Zachman Framework for the Data Administration function, as used by<br />

the Forest Service <strong>of</strong> British Columbia.<br />

(http://www.for.gov.bc.ca/isb/datadmin/framewrk.htm)<br />

6.2.30 On-line: The Zachman Framework for Healthcare Informatics Standards<br />

(http://www.ansi.org/rooms/room_41/public/documents/zach_isa.pdf)<br />

6.2.31 On-line: The Zachman Framework for Enterprise Architecture by Andrew Faulkner<br />

(http://www.datagruven.com/CIPS/Zachman.html)<br />

6.2.32 On-line: Formalization <strong>of</strong> Multi-level Zachman Frameworks by Richard Martin and<br />

Edward L. Robertson ( ftp://ftp.cs.indiana.edu/pub/techreports/TR522.pdf)<br />

6.2.33 On-line: Explore the Data Warehousing Architecture<br />

6.2.34 On-line: Data Warehousing resources on the World Wide Web<br />

(http://www.datawarehousing.com/)<br />

6.2.35 On-line: Data Warehousing Overview<br />

(http://www.sas.com/rnd/warehousing/dwo_web.html)<br />

6.2.36 On-line: Introduction to Business Modeling Using the Unified Modeling Language<br />

(UML) (http://www.therationaledge.com/content/mar_01/m_uml_jh.html)<br />

6.2.37 On-line: Use Case Modeling Introduction<br />

(http://www.zoo.co.uk/~z0001039/PracGuides/pg_use_cases.htm)<br />

-225-


6.2.38 On-line: Top Ten Use Case Mistakes<br />

(http://www.sdmagazine.com/documents/s=815/sdm0102c/)<br />

6.2.39 On-line: Use case modeling tips (http://www-<br />

106.ibm.com/developerworks/java/library/tip-uml2.html)<br />

6.2.40 On-line: Use and Abuse Cases, by Martin Fowler (PDF Format)<br />

(http://www.awl.com/cseng/titles/0-201-89542-0/articles/abuse.pdf)<br />

6.2.41 On-line: 7 tips for writing better use cases<br />

(http://www.class.com.au/newsletr/97sep/usecases.htm)<br />

6.2.42 On-line: Use Case Fundamentals, by Alistair Cockburn<br />

(http://members.aol.com/acockburn/papers/AltIntro.htm)<br />

6.2.43 On-line: Formalizing Use Cases with Message Sequence Charts, a Masters Thesis<br />

by Michael Andersson & Johan Bergstrand<br />

(http://www.efd.lth.se/~d87man/EXJOBB/ExBookTOC.doc.html)<br />

6.2.44 On-line: Why Are Use Cases So Painful?<br />

(http://www.evanetics.com/Articles/ObjectModeling/why_are_use_cases_so_pai<br />

nful.htm)<br />

6.2.45 On-line: Worldwide Institute <strong>of</strong> S<strong>of</strong>tware Architects (http://www.wwisa.org/)<br />

6.2.46 On-line: Introduction to Objects (incl. Java code examples)<br />

(http://www.comp.nus.edu.sg/~hengak/IC1101J/IC1101/content/ch8p1.html)<br />

6.2.47 On-line: Object-Oriented Computing - What's the Big Deal?<br />

(http://www.firststep.com.au/education/solid_ground/oo.html)<br />

6.2.48 On-line: The Object-Oriented Advantage<br />

(http://www.firststep.com.au/education/solid_ground/oo_dev.html)<br />

6.2.49 On-line: What is Object-Oriented<br />

S<strong>of</strong>tware?(http://catalog.com/s<strong>of</strong>tinfo/objects.html)<br />

6.2.50 On-line: A collaborative systems example: CORBA<br />

(http://www.cs.wustl.edu/~schmidt/corba.html)<br />

6.2.51 On-line: State-Transition diagram<br />

(http://cobra.csc.calpoly.edu/~gfisher/projects/work/inferno/documentation/uml<br />

/notation/notation9a.html#9.1)<br />

6.2.52 On-line: An Atlas <strong>of</strong> Cyberspaces - visual modeling at its finest<br />

(http://www.cybergeography.org/atlas/atlas.html)<br />

6.2.53 On-line: Sample Sequence Diagrams<br />

(http://web.dis.unimelb.edu.au/undergrad/1997/cuc/245Project/Sequence3.htm)<br />

6.2.54 On-line: Collaboration Diagrams<br />

(http://193.174.33.104:7776/UMT/notation_guide_ch7.html)<br />

6.2.55 On-line: Architecting for Business: An Executive Overview, by Unisys<br />

6.2.56 (http://www.corp.unisys.com/UNISYS/ACEweb.NSF/LookupView/Executive+Overv<br />

iew?OpenDocument#apoverview)<br />

6.2.57 On-line: Building Blocks and the Architecture Development Method, by The Open<br />

Group (http://www.opengroup.org/public/arch/p4/bbs/bbs_adm.htm)<br />

6.2.58 On-line: The Hatley-Pirbhai Methodology<br />

(http://www.turbocase.com/method.html)<br />

-226-


6.2.59 On-line: Quality Function Deployment Institute (http://www.qfdi.org/)<br />

6.2.60 On-line: UML Resource Center (http://www.rational.com/uml/index.jtmpl)<br />

6.2.61 On-line: The Zachman Architecture<br />

6.2.62 On-line: U.S. Department <strong>of</strong> Energy Information Systems Architecture - a vast online<br />

resource (http://cio.doe.gov/iap/)<br />

6.2.63 On-line: ZDNet's Net.Politics site<br />

(http://www.zdnet.com/products/netpolitics.html)<br />

6.2.64 On-line: HotWired News' Politics site (http://www.wired.com/news/politics/)<br />

6.2.65 On-line: INCOSE - International Council on Systems Engineering<br />

(http://www.incose.org/)<br />

6.2.66 On-line: INCOSE Systems Architecting Working Group<br />

(http://www.incose.org/cmtes/sawg.html)<br />

6.2.67 On-line: IEEE S<strong>of</strong>tware Engineering Standards Committee Architecture Working<br />

Group (http://www.pithecanthropus.com/~awg/index.html)<br />

6.2.68 On-line: TiAC - The Information Architects Cooperative<br />

(http://www.infoed.com/default.htm)<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional handouts may be used when deemed necessary by the instructor.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 12<br />

Networking and telecommunications 6<br />

Modern programming language<br />

Analysis and Design 6<br />

Data management 12<br />

Role <strong>of</strong> IS in Organizations 18<br />

8.0 Oral and Written Communications:<br />

As part <strong>of</strong> the group term project assignment, the students are required to submit 5 written<br />

reports which are typically 5-15 pages long. Individually, each student makes 1 oral presentation<br />

<strong>of</strong> typically 25 minutes duration. This presentation includes research, development <strong>of</strong> original<br />

presentation materials, and oral presentation skills.<br />

-227-


1.0 Social and Ethical Issues:<br />

Students are presented with problems that arise from poorly developed and/or managed<br />

information systems, and discuss potential solutions. A chapter on Social Systems specifically<br />

addresses the impact <strong>of</strong> information systems on social structures.<br />

9.0 Theoretical content:<br />

Zachman Framework for Information Systems/Enterprise Architecture (4 hours)<br />

10.0 Problem analysis:<br />

Students will explore the need for information system architectures in medium and large-sized<br />

organizations. Students will explore the conceptual frameworks developed for managing<br />

information systems architectures. Students will explore the Unified Modeling Language as a<br />

tool for architecture representation.<br />

11.0 Solution design:<br />

The students will develop and apply analytical skills, as well as their understanding <strong>of</strong><br />

architectural frameworks and the Unified Modeling Language. The students will combine these<br />

new skills with existing knowledge and skills in the area <strong>of</strong> information systems development in<br />

order to design an integrative architecture for a real-world organization.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

4/8/2003 Added prerequisites: CIST 2110 and<br />

ISQA 3310. Course Change Form<br />

4/22/03.<br />

Paul van<br />

Vliet<br />

Prerequisites suggested by ISQA<br />

faculty undergraduate curriculum<br />

review.<br />

6/25/03 ABET cleanup Wolcott<br />

9/13/2007 Updated syllabus contents; changed Van Vliet<br />

prerequisite from CIST 2110 to CIST<br />

3100 as this course was renumbered.<br />

10/12/2008 Updated section 5.1 to more accurately Van Vliet<br />

reflect the current term project<br />

10/12/2008 Updated section 8.0 to more accurately Van Vliet<br />

reflect course administration<br />

10/12/2008 Updated section 9.0 to reflect current Van Vliet<br />

course content<br />

10/12/2008 Updated section 10 to reflect change in Van Vliet<br />

nomenclature <strong>of</strong> theoretical model<br />

-228-


-229-


14. Local and global role <strong>of</strong> iS<br />

15. Knowledge <strong>of</strong> computing<br />

16. Analysis and design<br />

17. Communication<br />

18. Computer-based tools<br />

19. Work on a team<br />

20. Pr<strong>of</strong>essional, legal, ethical standards<br />

21. Model processes and data<br />

22. Design, implement, evaluation IS<br />

23. Manage projects<br />

24. Manage IS within application env.<br />

25. Manage change<br />

26. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4100<br />

Course Title<br />

Information Systems Architecture & Organization<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the issues involved in<br />

architecting the information systems<br />

infrastructure in medium- and large-sized<br />

organizations.<br />

Understand the frameworks and tools<br />

used to develop an organization's<br />

information systems architecture.<br />

Understand and apply the conceptual<br />

frameworks developed for managing<br />

information systems architectures.<br />

Understand the Unified Modeling<br />

Language (UML) as a tool for modeling<br />

the various aspects <strong>of</strong> information<br />

systems architectures.<br />

S S S S X S X<br />

S S S X X<br />

S S S X X<br />

S S S<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

-230-


14. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

1. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

2. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

3. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

4. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

7. understand and model organizational processes and data.<br />

8. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

9. manage projects.<br />

10. manage information systems within a specific application environment.<br />

11. manage change.<br />

12. recognize the need for continuing pr<strong>of</strong>essional development<br />

-231-


-232-


ISQA 4110 Information Systems Analysis<br />

Department and Course Number ISQA 4110<br />

Course Title<br />

Information Systems Analysis<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 05/29/2009<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course presents an overview <strong>of</strong> information systems and the system development life<br />

cycle for the systems analyst. The course emphasis focuses on tools and techniques that<br />

the analyst, designer, and programmer can use to document information systems.<br />

The classical and structured tools for describing data flow, data structures, process flow,<br />

and logical design requirements will be applied to documenting systems. Emphasis will be<br />

placed on the integrated use <strong>of</strong> the classical and structured tools, requirements<br />

definition, project management, and cost/benefit analysis.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate MIS majors who wish to study topics on<br />

systems analysis and design.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 CIST 3100 - Organizations, Applications, and Technology<br />

1.3.2 ISQA 3210 - Advanced Technology for Personal Productivity (prior or concurrent<br />

enrollment)<br />

1.3.3 ISQA 3310 - Database Management (prior or concurrent enrollment)<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Types <strong>of</strong> Processing Systems<br />

1.4.2 Essential Concepts <strong>of</strong> Networks<br />

1.4.3 Essential Concepts in DSS, Artificial Intelligence and other technologies<br />

1.4.4 Essential Concepts in Systems Analysis, Design, and Databases<br />

1.4.5 Introduction to Data Modeling – ER Diagrams<br />

1.4.6 Essential techniques in Word, Excel, Access, and PowerPoint<br />

1.4.7 Understanding <strong>of</strong> Operating Systems (Windows and Unix)<br />

-233-


1.4.8 Essential Techniques in Technical Writing<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 asdfa<br />

2.2 The students will be able to develop a better understanding <strong>of</strong> the entire information<br />

system development process: from the identification <strong>of</strong> the business problems and needs<br />

to the design <strong>of</strong> an improved system to the writing <strong>of</strong> documentation.<br />

2.3 The students will improve their technical and group communication skills. The students’<br />

ability to communicate with both technical and non-technical people should be improved<br />

through the proper use <strong>of</strong> the tools. Their writing and speaking skills may also be<br />

enhanced as they learn how to present their documentation to the instructor.<br />

2.4 The student systems analyst will learn how to utilize critical thinking skills, problem<br />

solving, change management, and project management. These essential skills will enable<br />

them to work with their clients and define the client project. This process includes ethical<br />

decision making and determine appropriate solutions for their client.<br />

2.5 The students will apply technical and theoretical knowledge to the client project.<br />

Students will be able to apply their specific strategies and methodologies such as cost<br />

benefit analysis, process modeling, use diagrams, and documentation to their project.<br />

2.6 The student will apply their technical knowledge to the client project. This knowledge<br />

applies to the selection <strong>of</strong> hardware, s<strong>of</strong>tware, operating systems, and networking<br />

solutions.<br />

2.7 The student will have a better understanding <strong>of</strong> information systems in general. Students<br />

will learn many capabilities and characteristics <strong>of</strong> good information systems. This process<br />

will help students design more effective systems, encourage additional education and<br />

certification during their careers.<br />

3.0 Content and Organization:<br />

-234-<br />

Contact hours<br />

3.1 Introduction to ISQA 4110, The Systems Development Environment<br />

& Overview <strong>of</strong> S<strong>of</strong>tware Applications 3.0<br />

3.2 The Origins <strong>of</strong> S<strong>of</strong>tware 3.0<br />

3.3 Managing the Information Systems Project<br />

& Introduction to Micros<strong>of</strong>t Project 2007 3.0<br />

3.4 Identifying and Selecting Systems Development Project 3.0<br />

3.5 Initiating and Planning Systems Development Projects 3.0<br />

3.6 Information Security 3.0<br />

3.7 Risk Analysis for Information Systems 3.0<br />

3.8 Determining Systems Requirements 3.0


3.9 Structuring Systems Requirements: Process Modeling<br />

& Structuring Systems Requirements: Logic Modeling 3.0<br />

3.10 Rapid Application Development<br />

& Object-Oriented Analysis and Design 3.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods include lectures, in-class exercises, s<strong>of</strong>tware tutorials, and<br />

guidance on the semester project.<br />

4.2 Student role in the course.<br />

Students will attend lectures, complete in-class exercises and quizzes, complete two<br />

examinations, complete and present class projects.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Students will complete in-class exercises and quizzes, take two examinations, complete<br />

and present class projects.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

In-class Exercises and Quizzes 5%<br />

Examinations 40%<br />

Class Project 50%<br />

Class Presentation 5%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97% - 100% A+<br />

90% - 96% A<br />

87% - 89% B+<br />

80% - 86% B<br />

-235-


77% - 79% C+<br />

70% - 76% C<br />

67% - 69% D+<br />

60% - 66% D<br />

0% - 59% F<br />

-236-


6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Jeffrey A. H<strong>of</strong>fer, Joey F. George, and Joseph S. Valacich. Modern Systems Analysis<br />

and Design, Fifth Edition. Addison Wesley Longman. 2008.<br />

6.1.2 Rachel Biheller Bunin. Micros<strong>of</strong>t Project 2007, Introductory. Course Technology.<br />

2008.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Systems Analysis and Design Methods by Jeffrey Whitten and Lonnie Bentley,<br />

McGraw-Hill/Irwin, 7th Edition, 2005<br />

6.2.2 Systems Analysis and Design by Allan Dennis, Barbara Wixom, and Roberta Roth,<br />

Wiley Publishing, 2008.<br />

6.2.3 Systems Analysis and Design, Seventh Edition, by Gary Shelley, Thomas Cashman,<br />

and Harry Rosenblatt, Course Technology, 2007.<br />

6.2.4 Systems Analysis and Design, 7th Edition, by Kenneth Kendall and Julie Kendall,<br />

Prentice-Hall, 2007.<br />

6.2.5 Systems Analysis and Design with UML, by Allan Dennis, Barbara Wixom, and<br />

David Tegarden, Wiley Publishing, 2007.<br />

6.2.6 Systems Anlaysis and Design in a Changing World, by John Satzinger, Robert<br />

Jackson, and Stephen Burd, Course Technology, 2008.<br />

6.2.7 Essentials <strong>of</strong> Systems Analysis and Design, 4th Edition, by Jeffrey H<strong>of</strong>fer, Joey<br />

George, and Joseph Valacich, Prentice-Hall, 2009.<br />

6.2.8 Information Systems Methodologies by Olle, Addison-Wesley Publishing<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional course content, either with pages developed especially for this course or with<br />

links to additional course materials, will be provided during the semester.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None.<br />

-237-


7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 6<br />

Networking and telecommunications 3<br />

Modern programming language<br />

Analysis and Design 21<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___4__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically _5-25____ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __20___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

The course deals with information security and risk analysis for information systems. These<br />

topics will partly be concerning social and ethical issues. Students will be graded on their<br />

understanding <strong>of</strong> these topics by in-class exercises, quizzes or exams.<br />

10.0 Theoretical content:<br />

None.<br />

11.0 Problem analysis:<br />

Students select a project in which they will analyze a real-world organization and their<br />

information systems need. Students will review systems development requirements and identify<br />

the data that is required for the systems design. The students develop alternatives and present<br />

these solutions for the client.<br />

Student will learn the definition <strong>of</strong> systems planning, systems analysis and tools and techniques<br />

that the programmer or analyst can use to document information systems. Classical and<br />

structured tools about the problem analysis include ones for describing data flow, data structure,<br />

and process flow. Time permitting, the course will survey other important skills for the systems<br />

analyst such as data gathering and reporting, project management, and cost/benefit analysis.<br />

-238-


12.0 Solution design:<br />

Students will use the theory and established practices <strong>of</strong> information systems analysis and design<br />

to develop a functional design specification document and determine information systems<br />

security requirements. The project groups develop appropriate models (process models, state<br />

transition diagrams, use case diagrams, and logic modeling) and supporting documentation<br />

through the use <strong>of</strong> the above tools.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

11/2/02 Initial ABET version created Pietron<br />

6/25/03 ABET cleanup Wolcott<br />

7/10/03 Change Prerequisite (Course Change Wild Update course prerequisites.<br />

Form – 4-22-03)<br />

10/13/08 Update to course description and Pietron<br />

prerequisites<br />

4/05/2009 Update to course objectives Pietron Updated the course objectives<br />

to be in alignment ABET<br />

outcomes<br />

5/29/2009 Updating bibliography and<br />

assignments<br />

Pietron Updating references<br />

-239-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. Course Objectives<br />

Department and Course Number ISQA 4110<br />

Course Title<br />

Information Systems Analysis<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 05/29/2009<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

The students will be able to develop a S S S<br />

better understanding <strong>of</strong> the entire<br />

information system development<br />

process: from the identification <strong>of</strong> the<br />

business problems and needs to the<br />

design <strong>of</strong> an improved system to the<br />

writing <strong>of</strong> documentation<br />

The students will improve their technical S S S S S S X S S X X<br />

and group communication skills. The<br />

students’ ability to communicate with<br />

both technical and non-technical people<br />

should be improved through the proper<br />

use <strong>of</strong> the tools. Their writing and<br />

speaking skills may also be enhanced as<br />

they learn how to present their<br />

documentation to the instructor.<br />

The student systems analyst will learn X S S S S X S S S<br />

-240-


how to utilize critical thinking skills,<br />

problem solving, change management,<br />

and project management. These<br />

essential skills will enable them to work<br />

with their clients and define the client<br />

project. This process includes ethical<br />

decision making and determine<br />

appropriate solutions for their client<br />

The students will apply technical and<br />

theoretical knowledge to<br />

the client project. Students will be able<br />

to apply their specific<br />

strategies and methodologies such as<br />

cost benefit analysis, process<br />

modeling, use diagrams, and<br />

documentation to their project<br />

The student will apply their technical<br />

knowledge to the project. This<br />

knowledge applies to the selection <strong>of</strong><br />

hardware, s<strong>of</strong>tware, operating systems<br />

and networking solutions.<br />

The student will have a better<br />

understanding <strong>of</strong> information systems in<br />

general. Students will learn many<br />

capabilities and characteristics <strong>of</strong> good<br />

information systems. This process will<br />

help students design more effective<br />

systems, encourage additional education<br />

and certification during their careers.<br />

S S S X<br />

X X S<br />

S S X X S S<br />

-241-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-242-


ISQA 4120 System Design and Implementation<br />

Department and Course Number ISQA 4120<br />

Course Title<br />

Information Systems Design & Implementation<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This is the second course in a sequence in computer information systems analysis, design,<br />

and implementation. This course extends the basic foundations <strong>of</strong> systems development<br />

started in ISQA 4110 and examines the activities comprising the design, construction and<br />

implementation <strong>of</strong> information systems.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate MIS majors who wish to study advanced topics<br />

pertaining to information systems design and implementation. It is a required course for<br />

the Bachelor <strong>of</strong> Science in MIS degree.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 ISQA 4110 Information Systems Analysis<br />

1.3.2 ISQA 3310 Managing the Database Environment<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Data modeling using the relational database model<br />

1.4.2 Systems analysis<br />

1.4.3 Database development using Micros<strong>of</strong>t Access<br />

1.4.4 Project management basics<br />

1.4.5 Technical writing<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Complete the development <strong>of</strong> the projects started in the previous semester in ISQA 4110.<br />

2.2 Be able to successfully design and construct a s<strong>of</strong>tware application.<br />

-243-


2.3 Be able to critically assess systems development alternatives.<br />

2.4 Be able to develop high quality systems documentation.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Overview <strong>of</strong> Systems Design approaches 3.0<br />

3.2 Data Model Design 3.0<br />

3.3 Database Design 3.0<br />

3.4 User Interface Design 3.0<br />

3.5 Systems Architecture Design 3.0<br />

3.6 Systems Controls Design 3.0<br />

3.7 Process Design & Code Development 3.0<br />

3.8 Documentation Development 3.0<br />

3.9 Design <strong>of</strong> Testing Procedures 3.0<br />

3.10 Systems Installation Issues 3.0<br />

3.11 Distributed Systems Design 3.0<br />

3.12 System Maintenance 3.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will include lectures, discussion, and intense guidance on<br />

the systems development project.<br />

4.2 Student role in the course.<br />

Student will attend lectures, read assignment readings, complete exams, participate in<br />

the systems development project and take part in the formal presentation <strong>of</strong> the project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Student will complete two individual exams. Students – in groups <strong>of</strong> 3 to 5 - will<br />

participate in the completion <strong>of</strong> the project milestones, the project application, the<br />

project documentation, and the presentation <strong>of</strong> the project.<br />

-244-


5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

Exams 33.3%<br />

Project milestones 33.3%<br />

Final project and presentation 33.3%<br />

5.3 Grading scale and criteria.<br />

6.0 Resource Material<br />

Points<br />

Grade<br />

96% - 100% A+<br />

92% - 95% A<br />

89% - 91% A-<br />

86% - 88% B+<br />

82% - 85% B<br />

79% - 81% B-<br />

76% - 78% C+<br />

72% - 75% C<br />

69% - 71% C-<br />

66% - 68% D+<br />

62% - 65% D<br />

59% - 61% D-<br />

00% - 58% F<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Modern Systems Analysis and Design - Fifth Edition, by Jeffrey A. H<strong>of</strong>fer, Joey F.<br />

George, and Joseph S. Valacich, Pearson/Prentice Hall, 2008.(or more recent text)<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 asdjaklsd<br />

6.2.2 On-Line: A Relational Model <strong>of</strong> Data for Large Shared Data Banks - Ed Codd's<br />

original article (http://www.acm.org/classics/nov95/)<br />

6.2.3 On-Line Tutorial: Getting Started with ERwin - A tutorial created by Dr. Wolcott<br />

(http://www.isqa.unomaha.edu/wolcott/tutorials/erwin/erwin.html)<br />

6.2.4 On-Line: Normalization Overview<br />

(http://www.troubleshooters.com/littstip/ltnorm.html)<br />

6.2.5 On-Line: Normalization beyond 3NF<br />

(http://www.utexas.edu/cc/database/datamodeling/rm/rm8.html)<br />

-245-


6.2.6 On-Line: The Interface Hall <strong>of</strong> Shame (http://www.iarchitect.com/shame.htm)<br />

6.2.7 On-Line: No<strong>of</strong>ace - in search <strong>of</strong> the post-PC interface (http://www.no<strong>of</strong>ace.net/)<br />

6.2.8 Special On-Line Reading: The Undead<br />

(http://www.wired.com/wired/archive/7.03/punchcards_pr.html)<br />

6.2.9 On-Line: Applicability <strong>of</strong> ISO 9001 to S<strong>of</strong>tware Development<br />

(http://www.tantara.ab.ca/iso90003.htm)<br />

6.2.10 On-Line: DevX - A s<strong>of</strong>tware developer resource portal (http://www.devx.com/)<br />

6.2.11 On-Line: High tech's missionaries <strong>of</strong> sloppiness - A great article on the need for<br />

s<strong>of</strong>tware quality.<br />

(http://www.salon.com/tech/feature/2000/12/06/bad_computers/index.html)<br />

6.2.12 On-Line: Implementation Pitfalls & Lessons (PDF file)<br />

(http://www.acu.ac.uk/chems/onlinepublications/930916507.pdf)<br />

6.2.13 On-Line: Mother Earth Mother Board, Neal Stephenson's lengthy chronicle <strong>of</strong> the<br />

laying <strong>of</strong> the longest wire on Earth.<br />

(http://www.wired.com/wired/archive/4.12/ffglass.html)<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional handouts may be used when deemed necessary by the instructor.<br />

6.4 Current bibliography <strong>of</strong> resources for student’s information.<br />

None.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 9<br />

Networking and telecommunications 3<br />

Modern programming language 3<br />

Analysis and Design 33<br />

Data management 1.5<br />

Role <strong>of</strong> IS in Organizations 12<br />

8.0 Oral and Written Communications:<br />

As part <strong>of</strong> the group term project, all students contribute to the submission <strong>of</strong> 5 written reports<br />

(not including exams, tests, quizzes, or commented programs) to typically 15-45 pages. In<br />

addition, all students participate in 2 oral presentations <strong>of</strong> typically 10 and 25 minutes respective<br />

duration.<br />

9.0 Social and Ethical Issues:<br />

-246-


The concept <strong>of</strong> ethical behavior in the role as system developer is discussed throughout.<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

No coverage<br />

11.0 Problem analysis:<br />

Students will continue their analysis <strong>of</strong> a real-world organization’s information system needs.<br />

Students will review systems design and development options so as to develop an appropriate<br />

systems solution for the target organization.<br />

12.0 Solution design:<br />

Students will use the theory and established practices <strong>of</strong> information systems design to develop a<br />

database design, a user interface design, a systems security and controls design, an application<br />

process design, a network design (if needed), as well as a complete set <strong>of</strong> systems and end user<br />

documentation for the real-world organization for which they undertake their systems<br />

development project.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

10/3/02 Initial ABET version van Vliet<br />

6/25/03 ABET cleanup Wolcott<br />

9/13/07 Document updated as needed Van Vliet<br />

10/12/2008 Updated Section 8.0 to more accurately Van Vliet<br />

reflect course administration<br />

-247-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4120<br />

Course Title<br />

Information Systems Design & Implementation<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Complete the development <strong>of</strong> the<br />

projects started in the previous semester<br />

in ISQA 4110.<br />

Be able to successfully design and<br />

construct a s<strong>of</strong>tware application.<br />

Be able to critically assess systems<br />

development alternatives.<br />

Be able to develop high quality systems<br />

documentation.<br />

S S S S S S S S S X<br />

S S S S X X S S S<br />

S S S S X S S X<br />

S X S S S X<br />

-248-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-249-


-250-


ISQA 4150 Advanced Statistical Methods for IS&T<br />

Department and Course Number ISQA 4150<br />

Course Title<br />

Advanced Statistical Methods for IS&T<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 03/31/09<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course emphasizes the application and interpretation <strong>of</strong> statistical methods including<br />

design <strong>of</strong> experiments, analysis <strong>of</strong> variance, multiple regression, and nonparametric<br />

procedures and the use <strong>of</strong> statistical computer packages. The intent is to develop<br />

quantitative abilities needed for quantitatively intensive jobs and for advanced study in<br />

management information systems, computer science and information technology.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to study<br />

advanced topics pertaining to the application <strong>of</strong> statistics. It is one <strong>of</strong> elective courses for<br />

undergraduates who wish to pursue Knowledge Engineering and Decision Support Track<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 CIST 2500 Introduction to Applied Statistics for IS&T<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Statistics in information science and technology including such topics as<br />

descriptive statistical measures, probability, discrete probability, sampling,<br />

estimation analysis, hypothesis testing, regression, and analysis <strong>of</strong> variance.<br />

1.4.2 A well-known computer package (e.g. SAS) will be used to support the problemsolving<br />

process.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Understand advanced statistical analysis and how to apply them in real life situation.<br />

2.2 Understand the sampling survey and how to collect the data, design the appropriate<br />

experimental design.<br />

-251-


3.0 Content and Organization:<br />

3.1 Review some topics from CIST2500 3<br />

3.2 Inferences about Population Variances 3<br />

3.3 Analysis <strong>of</strong> Variance and Experimental Design 6<br />

3.4 Simple Linear Regression 6<br />

3.5 Multiple Regression 6<br />

3.6 Regression Analysis: Model Building 3<br />

3.7 Tests <strong>of</strong> Goodness <strong>of</strong> Fit and Independence 3<br />

3.8 Nonparametric Statistics 6<br />

3.9 Sampling Survey 4<br />

3.10 Forecasting 4<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

Contact hours<br />

A combination <strong>of</strong> faculty and student lectures on textbook and journal research.<br />

4.2 Student role in the course.<br />

Students will attend the lectures, participate in discussions, complete projects and<br />

homework.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Students complete computer projects and homework.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

Projects 62.5%<br />

Homework 25.0%<br />

Attendance &Participation 12.5%<br />

-252-


5.3 Grading scale and criteria.<br />

Points Grade<br />

98 – 100% A+<br />

90 – 97% A<br />

87 – 89% A-<br />

84 – 86% B+<br />

80 – 83% B<br />

77 – 79% B-<br />

74 – 76% C+<br />

70 – 73% C<br />

67 – 69% C-<br />

64 – 66% D+<br />

60 – 63% D<br />

57 – 59% D-<br />


7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language 10<br />

Analysis and Design 6<br />

Data management 3<br />

Role <strong>of</strong> IS in Organizations 7<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___6__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically _10____ pages and to make ___1__ oral<br />

presentations <strong>of</strong> typically __15___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage.<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

Hours<br />

10.1 Simple Linear Regression 6<br />

10.2 Multiple Regression 6<br />

10.3 Regression Analysis: Model Building 3<br />

10.4 Tests <strong>of</strong> Goodness <strong>of</strong> Fit and Independence 3<br />

10.5 Nonparametric Statistics 6<br />

10.6 Forecasting. 4<br />

11.0 Problem analysis:<br />

Students as a team will study and analyze an organization, preferably their workplace. They use<br />

a sampling survey to collect the data in the areas <strong>of</strong> product quality, service quality, and<br />

information quality in order to pinpoint the areas <strong>of</strong> inefficiency.<br />

-254-


12.0 Solution design:<br />

Student design the appropriate experimental design using statistical models and a well known<br />

statistical s<strong>of</strong>tware such as SAS or MINITAB. Then the appropriate conclusions will be drawn from<br />

the results for a better decision-making.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

Spring Initial ABET version<br />

Najjar<br />

2003<br />

11/6/2002 Change <strong>of</strong> title from “Cases in Applied Najjar<br />

Statistics” to “Advanced Statistical<br />

Methods for IS&T”<br />

6/25/03 ABET cleanup Wolcott<br />

7/10/03 Change title & course description –<br />

Course Change Form – 12-6-02<br />

Wild Update course description and<br />

title to reflect focus <strong>of</strong> class<br />

03/31/09 Change title & course description –<br />

Course Change Form – 06/25/03<br />

Najjar Update course description and<br />

added bibliography<br />

-255-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4150<br />

Course Title<br />

Advanced Statistical Methods for IS&T<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand advanced statistical analysis<br />

and how to apply them in real life<br />

situation.<br />

Understand the sampling survey and how<br />

to collect the data, design the<br />

appropriate experimental design.<br />

X X X<br />

S<br />

S<br />

-256-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-257-


-258-


ISQA 4180 Electronic Commerce<br />

Department and Course Number ISQA 4180<br />

Course Title<br />

Electronic Commerce<br />

Course Coordinator<br />

Sajda Qureshi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 6/8/09<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course will <strong>of</strong>fer a critical examination <strong>of</strong> issues, technologies, standards, and business<br />

and social implications <strong>of</strong> electronic commerce in cyberspace. Some key topics will include<br />

history <strong>of</strong> the Internet, managing electronic commerce funds transfer, reinventing the future<br />

<strong>of</strong> business through electronic commerce, business opportunities in electronic commerce,<br />

electronic commerce Web site design, social, political and ethical issues associated with<br />

electronic commerce, and business plans for technology ventures. The fundamental goal <strong>of</strong><br />

this course is to educate a new generation <strong>of</strong> managers, planners, analysts, and programmers<br />

<strong>of</strong> the realities and potential for electronic commerce.<br />

1.2 For whom course is intended.<br />

This course is intended for students who wish to know the realities and potential for<br />

electronic commerce. It is one <strong>of</strong> elective courses for the Bachelor <strong>of</strong> Science in MIS degree.<br />

The fundamental goal <strong>of</strong> this course is to educate a new generation <strong>of</strong> managers, planners,<br />

analysts, and programmers <strong>of</strong> the realities and potential for electronic commerce.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 ISQA 3400 or equivalent.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 To learn about Electronic Commerce concepts and business models;<br />

2.2 To familiarize individuals with current and emerging Electronic Commerce technologies;<br />

2.3 To be able to apply electronic commerce practices by producing and presenting an e-business<br />

plan, and create a web site for a client organization.<br />

3.0 Content and Organization:<br />

Contact time<br />

-259-


3.1 Introduction to Electronic Commerce 6<br />

3.2 The Internet and the Web: infrastructure for Electronic Commerce 3<br />

3.3 Web-based tools for Electronic Commerce 3<br />

3.4 Electronic Commerce s<strong>of</strong>tware 3<br />

3.5 Security threats to Electronic Commerce 3<br />

3.6 Implementing security for Electronic Commerce 3<br />

3.7 Electronic payment systems 2<br />

3.8 Strategies for marketing, sales, and promotion 6<br />

3.9 Strategies for purchasing and support activities 6<br />

3.10 Strategies for Web auctions, virtual communities and Web portals 3<br />

3.11 International, legal, ethical and tax issues 3<br />

3.12 Implementing Electronic Commerce 3<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures and in-class discussions. A problem based<br />

learning approach is used through which students will 1) learn electronic commerce concepts<br />

and business models, 2) apply these in case study situations and 3) explain and resolve<br />

electronic commerce related issues through a problem solving process.<br />

4.2 Student role in the course.<br />

Students must complete all course requirements including, projects, discussions, and exams<br />

by their deadlines and to the satisfaction <strong>of</strong> the instructor. Students will work out several inclass<br />

and out-<strong>of</strong>-class exercises individually and in groups. Students must come prepared<br />

with the assigned readings so that students can initiate and participate in meaningful<br />

discussions.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Grades conform to the degree to which each <strong>of</strong> the requirements stressed in class is met in<br />

the various assignments and projects. To be eligible for a passing grade in the class, a student<br />

must complete all course requirements including, in-class assignments, homework, projects,<br />

discussions, and exams by their deadlines and to the satisfaction <strong>of</strong> the instructor.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

-260-


Your final grade is based on the percentage <strong>of</strong> points that you receive out <strong>of</strong> the total possible<br />

points for the course. A curve may be used to scale the entire class higher, if necessary, but<br />

scaling down will not be done.<br />

Component<br />

Grading<br />

Individual Assignments (case analysis) 40%<br />

Group Term Project (Proposal, E-business plan and commercial web site) 40%<br />

Group Project Presentation (Peer evaluation ) 10%<br />

Class Participation 10%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

98-100% A+<br />

92-97% A<br />

90-91% A-<br />

86-89% B+<br />

82-85% B<br />

80-81% B-<br />

76-79% C+<br />

72-75% C<br />

70-71% C-<br />

66-69% D+<br />

62-65% D<br />

60-61% D-<br />


6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 6<br />

Networking and telecommunications 6<br />

Modern programming language<br />

Analysis and Design 6<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 18<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __3___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __5-10___ pages and to make _1____ oral presentations <strong>of</strong> typically<br />

__15-20___ minutes duration. Include only material that is graded for grammar, spelling, style, and so<br />

forth, as well as for technical content, completeness, and accuracy.<br />

8.1 Two case analysis assignments: every student will complete a paper with 5 single-spaced pages or<br />

10 double-spaced pages (maximum).<br />

8.2 One Web site analysis project (group)<br />

8.3 One e-business plan and Web site project (group): every group will complete the business plan,<br />

the Web site implementation and the presentation lasting 20 minutes followed by a ten-minute<br />

question and answer session (All members <strong>of</strong> the group are expected to actively participate in the<br />

presentation.).<br />

9.0 Social and Ethical Issues:<br />

The course will cover international, legal, ethical and tax issues related to Electronic Commerce. Three (3)<br />

hours will be spent on the topic. The student in the course will be graded on their understanding <strong>of</strong> the<br />

topic in test questions.<br />

10.0 Theoretical content:<br />

The course deals with various concepts and terms <strong>of</strong> Electronic Commerce (12 contact hours).<br />

11.0 Problem analysis:<br />

Students learn to analyze issues, technologies, standards, and business and social implications <strong>of</strong><br />

electronic commerce in cyberspace. In topical analysis assignments, students will analyze current EC<br />

news events by applying/integrating concepts, models, and terminology learned in the chapters specified<br />

on the syllabus and related class discussion. In the case analysis assignment, students will analyze a<br />

"problem solving approach" or “educational ”case . In the Web site analysis project, students will analyze<br />

Web sites with two categories <strong>of</strong> criteria: the technical dimension and business evaluation. In the e-<br />

-262-


usiness plan and Web site project (group), every group will assess a client firm (or develop their own<br />

business) user needs, develop an e-business plan, and implement it in the form <strong>of</strong> a commercial Web site.<br />

12.0 Solution design:<br />

In the e-business plan and Web site project (group), every group will develop an e-business plan, and<br />

implement it in the form <strong>of</strong> a commercial Web site.<br />

CHANGE HISTORY<br />

Date Change By Whom Comments<br />

10/28/02 Initial ABET version Qureshi<br />

August<br />

2002<br />

Removed section on “Strategies for marketing, sales,<br />

and promotion”<br />

Sajda<br />

Qureshi<br />

Students do not have<br />

the background to be<br />

able to conduct a<br />

January<br />

2003<br />

January<br />

2003<br />

January<br />

2003<br />

Grade Weights: Class Participation weight reduced to<br />

5% and Peer evaluation made part <strong>of</strong> the Group Project<br />

grade. More weight has been given to the website<br />

analysis project. These changes are reflected in this<br />

course outline.<br />

Books: Saloner, G and A.M. Spence "Creating and<br />

Capturing Value. Perspectives and cases on Electronic<br />

Commerce". Wiley and Sons (2002) made required text<br />

along with Laudon and Travers (2002).<br />

Course outline: Changed the order <strong>of</strong> material: moved<br />

eCommerce models, technologies, infrastructure,<br />

Customer Relationship Management, Supply Chain<br />

Management, collaborative commerce, eMarkets,<br />

portals and auctions, and virtual communities to the<br />

first part <strong>of</strong> the course (weeks 1-9). Security, Electronic<br />

Payment Systems, Ethical Social and Political issues to<br />

the second part (weeks 10-15).<br />

-263-<br />

Sajda<br />

Qureshi<br />

Sajda<br />

Qureshi<br />

Sajda<br />

Qureshi<br />

6/25/03 ABET cleanup Wolcott<br />

January Pedagogy: Added hands on class exercises and incompany<br />

Qureshi<br />

2004<br />

projects<br />

August Content: Developed additional hands on class exercises Qureshi<br />

2004 and web assessment activities<br />

January<br />

2005<br />

Qureshi<br />

January<br />

2006<br />

Evaluation: Separated assignments for graduate and<br />

undergraduate component to reflect separate<br />

assessment<br />

Course Outline: Updated course content with class<br />

exercises involving eCommerce companies such as Ali<br />

Baba.<br />

Qureshi<br />

market analysis<br />

These weights more<br />

accurately reflect<br />

effort.<br />

Material from Saloner<br />

and Spence (2002) is<br />

used for assignments,<br />

exams and class<br />

discussion.<br />

Students need to<br />

understand and apply<br />

the specific material<br />

first.<br />

The groups remain<br />

comprised <strong>of</strong> graduate<br />

and undergraduate<br />

students to enhance<br />

learning.<br />

Students appear to<br />

learn better when they<br />

can see the


January<br />

2007<br />

January<br />

2008<br />

January<br />

2009<br />

Course content: Replaced SAP case with the Google<br />

case.<br />

Pedagogy: Conducted Teaching Assessment By<br />

Students. Changed format and delivery to reflect need<br />

for more hands on templates and assistance with<br />

students’ disposition.<br />

Course content: Created and used rubrics for all<br />

assignments. Made only one case compulsory for the<br />

undergraduate students. The second case and website<br />

assessment are <strong>of</strong>fered as extra credit.<br />

Qureshi<br />

Qureshi<br />

Qureshi<br />

components <strong>of</strong> the<br />

business online.<br />

The Google case also<br />

enables the legal and<br />

ethical concerns in<br />

eCommerce to be<br />

addressed.<br />

The templates<br />

increased the use <strong>of</strong><br />

class time to enhance<br />

learning.<br />

These changes were<br />

made to address the<br />

high workload that the<br />

students were facing.<br />

-264-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4180<br />

Course Title<br />

Electronic Commerce<br />

Course Coordinator<br />

Sajda Qureshi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

To learn about Electronic Commerce<br />

concepts and business models;<br />

To familiarize individuals with current and<br />

emerging Electronic Commerce<br />

technologies;<br />

To be able to apply electronic commerce<br />

practices by producing and presenting an<br />

e-business plan, and create a web site for<br />

a client organization.<br />

X<br />

X<br />

S X X S X<br />

S<br />

-265-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-266-


ISQA 4190 Process Reengineering with Information Technology<br />

Department and Course Number ISQA 8196<br />

Course Title<br />

Process Reengineering with Information Technology<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 03/31/09<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Business process reengineering issues are examined. Reengineering concepts and methods<br />

are introduced. Additional special project(s) are required. SAP will be introduced.<br />

1.2 For whom course is intended.<br />

This course is intended for students in management information systems, business or<br />

computer science who are interested in the use <strong>of</strong> technology to improve organizational<br />

efficiency and effectiveness.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 2500 Introduction to Applied Statistics for IS&T<br />

1.3.2 ISQA 4110 Information Systems Analysis or equivalent.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics):<br />

1.4.1 Introductory statistics<br />

1.4.2 principles <strong>of</strong> information systems analysis<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives:<br />

2.1 Understand the concept <strong>of</strong> cultural requirements for an organization to begin a process<br />

improvements<br />

2.2 Understand the concept <strong>of</strong> Total Quality Management<br />

2.3 Understand the concept <strong>of</strong> Benchmarking<br />

2.4 Understand the concept <strong>of</strong> Statistical Process Control<br />

2.5 Understand reengineering design<br />

2.6 Understand Process reengineering practices for IT enabled change<br />

2.7 Understand the process whereby process reengineering is accepted and supported throughout<br />

the organization<br />

2.8 Get familiar with SAP to integrate with the process improvements<br />

-267-


3.0 Content and Organization:<br />

List <strong>of</strong> topics to be covered in chronological sequence<br />

Contact Hours<br />

3.1 Quick Reference Guide to Process Redesign 1<br />

3.2 Process Management 1<br />

3.3 Leadership 1<br />

3.4 Organizational Assessment 1<br />

3.5 Define and Classify Process 1<br />

3.6 Identify Core Process 1<br />

3.7 Measure Performance 2<br />

3.8 Statistical Process Control 2<br />

3.9 Measure Efficiency 2<br />

3.10 Understanding the Customer 1<br />

3.11 Document Process 1<br />

3.12 Assesses the Process 2<br />

3.13 Planning the Improvement 1<br />

3.14 Continuous Improvement 1<br />

3.15 Understanding BPR for e-Business 1<br />

3.16 How To Redesign Enterprise Process with BPR s<strong>of</strong>tware 1<br />

3.17 Business process Modeling with BPR s<strong>of</strong>tware 1<br />

3.18 Analysis and Redesign <strong>of</strong> an Enterprise Process 1<br />

3.19 Designing Collaborative Supply Chain Processes for e-Business 1<br />

3.20 IT Integration Options for e-Business Processes 1<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used<br />

The primary teaching method will be discussion, case studies, lecture, guest speakers,<br />

using SAP, and demonstration.<br />

4.2 Student role in the course<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned projects and papers, and complete required examinations.<br />

4.3 Contact hours<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

-268-


5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Participation in class discussion:<br />

The students are required to prepare a discussion outline for the readings that has been assigned<br />

each week. The discussions outlines will be counted toward the class participation part <strong>of</strong> your<br />

grade. Please use a word processor to create your outlines.<br />

Exams:<br />

Three one-hour exams will be given covering the assigned readings, lectures, and in class<br />

discussion. The exams will not be cumulative.<br />

Presentations:<br />

Students are required to select a current journal article from the referred literature such as CAIS<br />

(online), JAIS (online), Communications <strong>of</strong> the ACM (digital library), IEEE (digital library), etc. The<br />

article must address some aspect <strong>of</strong> IT Process Reengineering. Students have to prepare a<br />

PowerPoint presentation <strong>of</strong> their articles for the class.<br />

Projects:<br />

Students are expected to select a process for reengineering. Using the tools and techniques<br />

taught in class they will describe the original process using process drawings and redesign the old<br />

processes for greater efficiency. Students will be looking for the elimination <strong>of</strong> paper, steps,<br />

useless processes, etc. They will create a reengineered process and a list <strong>of</strong> the costs savings and<br />

the productivity gains (quantified in dollars and hours) obtained from your process reengineering<br />

work.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Exam 1 100<br />

Exam 2 100<br />

Exam 3 100<br />

Assignments 100<br />

Journal Article Presentation 50<br />

Process Reengineering Project 100<br />

Class Participation 50<br />

-269-


Total 600<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

92-96% A<br />

90-91% A-<br />

86-89% B+<br />

82-85% B<br />

80-81% B-<br />

76-79% C+<br />

72-75% C<br />

70-71% C-<br />

66-69% D+<br />

62-65% D<br />

60-61% D-<br />


journals that are relevant to topics in systems analysis and design. The process<br />

is particularly important in keeping current with technology and new<br />

methodologies.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design 10<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 10<br />

8.0 Oral and Written Communication<br />

Every student is required to submit at least __3__ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically ___5__ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as<br />

well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues<br />

9.1 Emphasis on open and honest communication.<br />

9.2 Emphasis on understanding and honestly communicating and managing the impact and disruption<br />

to the organization<br />

9.3 Emphasis on the customers needs both explicit and requirements and implicit.<br />

9.4 Emphasis on accurate and consistent project tracking and reporting to management.<br />

10.0 Theoretical Content Hours<br />

10.1 Salience determination 3<br />

11.0 Problem Analysis<br />

11.1 Work flow analysis<br />

11.2 Analysis for redundancy, and unproductive and wasteful processes<br />

12.0 Solution Design<br />

Redesign organizational processes<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

11/11/02 Initial ABET version Dufner<br />

6/25/03 ABET cleanup Wolcott<br />

-271-


7/10/03 Change prerequisites – Course Change<br />

Form – 5-15-03<br />

11/22/05 Change prerequisites – Course Change<br />

Form – 7/10/03<br />

03/31/09 Change prerequisites – Course Change<br />

Form – 11/22/05<br />

Wild<br />

Najjar<br />

Najjar<br />

Update course prerequisites<br />

Update course prerequisites,<br />

Changing the text, and integration <strong>of</strong><br />

the course with SAP.<br />

Update course prerequisites and<br />

added Bibliography.<br />

-272-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4190<br />

Course Title<br />

Process Reengineering with Information Technology<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the concept <strong>of</strong> cultural<br />

requirements for an organization to begin<br />

a process improvements<br />

Understand the concept <strong>of</strong> Total Quality<br />

Management<br />

Understand the concept <strong>of</strong> Benchmarking<br />

Understand the concept <strong>of</strong> Statistical<br />

Process Control<br />

Understand reengineering design<br />

Understand Process reengineering<br />

practices for IT enabled change<br />

Understand the process whereby process<br />

reengineering is accepted and supported<br />

through out the organization<br />

Get familiar with SAP to integrate with<br />

the process improvements<br />

X<br />

X<br />

S<br />

X<br />

S<br />

S<br />

S<br />

S<br />

X X S S<br />

X S X<br />

-273-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-274-


ISQA 4200 Information and Data Quality Management<br />

Department and Course Number ISQA 4200<br />

Course Title<br />

Information and Data Quality Management<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 03/10/06<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course introduces the role and importance <strong>of</strong> data quality and information quality in<br />

databases and data warehouses. The intent <strong>of</strong> the course is to provide students with the concepts<br />

and tools necessary to effectively manage information and data quality .In particular, the course<br />

examines the various roles, responsibilities, and skills essential to manage databases and data<br />

warehouses.<br />

1.2 For whom course is intended.<br />

The course is intended for undergraduate students in Information Systems, Computer Science and<br />

related areas who are interested in managing information and data quality for better decision<br />

making.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 2500<br />

1.3.2 ISQA 3310<br />

1.4 Prerequisites <strong>of</strong> the course (Topics):<br />

1.4.1 Introductory statistics<br />

1.4.2 Managing the Data Base Environment<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives:<br />

2.1 Develop in-depth understanding <strong>of</strong> Data and Information Quality (DQ and IQ)<br />

2.2 Understand and use DQ and IQ Concepts in Information Systems projects<br />

2.3 Be able to recognize various patterns <strong>of</strong> Data and Design Deficiencies in Systems<br />

2.4 Be able to suggest appropriate DQ and IQ improvement plans in light <strong>of</strong> known deficiencies in<br />

systems<br />

-275-


2.5 Develop an understanding <strong>of</strong> the role and importance <strong>of</strong> DQ and IQ in databases and Data<br />

warehouses<br />

2.6 Be able to discuss the role and importance <strong>of</strong> DQ in DSS<br />

3.0 Content and Organization:<br />

List <strong>of</strong> topics to be covered in chronological sequence<br />

3.1 Principles <strong>of</strong> information quality improvement<br />

Contact Hours<br />

3.1.1 Supplement (TQM) 1<br />

3.1.2 The high costs <strong>of</strong> low quality data 1<br />

3.1.3 Defining information quality 2<br />

3.1.4 Applying quality management principles to information 3<br />

3.2 Processes for improving information quality<br />

3.2.1 An overview <strong>of</strong> total quality data management 4<br />

3.2.2 Assigning data definition and information architecture quality 5<br />

3.2.3 Supplement (SPC) 4<br />

3.2.4 Information quality assessment 5<br />

3.2.5 Measuring nonquality information costs 5<br />

3.2.6 Information product improvement: data reeingineering<br />

and cleansing 4<br />

3.2.7 Improving information process quality: data defect prevention 6<br />

3.2.8 Information quality tools and techniques 5<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used<br />

The primary teaching methods will include class discussion, case study, lecture, and guest<br />

speakers.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned projects and papers, and complete required examinations.<br />

4.3 Contact hours<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

-276-


5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

5.1.1 Assignments<br />

5.1.2 Team Presentations: In teams <strong>of</strong> 2-3 members students are required to research a<br />

contemporary issue facing the information quality systems<br />

5.1.3 Mid-Term Examination<br />

5.1.4 Final Examination<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable<br />

5.2.1 Assignments (20%)<br />

5.2.2 Team Presentations: In teams <strong>of</strong> 2-3 members students are required to research a<br />

contemporary issue facing the information quality systems (20%)<br />

5.2.3 Mid-Term Examination (25%)<br />

5.2.4 Final Examination (25%)<br />

5.2.5 Participation (10%)<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

92-96% A<br />

90-91% A-<br />

86-89% B+<br />

82-85% B<br />

80-81% B-<br />

76-79% C+<br />

72-75% C<br />

70-71% C-<br />

66-69% D+<br />

62-65% D<br />

60-61% D-<br />


Additional articles that have been collected for various topics are available at the UNO Library.<br />

These articles are used to supplement topics presented in various chapters.<br />

6.3 Other sources for gathering information or equivalent<br />

Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />

relevant to DQ/IQ topics.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design<br />

Data management 17<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communication<br />

Every student is required to submit at least __3__ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically ___5__ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues<br />

9.1 Emphasis on open and honest communication.<br />

9.2 Emphasis on understanding and honestly communicating and managing the impact and disruption<br />

to the organization<br />

9.3 Emphasis on the customer’s needs both explicit and requirements and implicit.<br />

9.4 Emphasis on accurate and consistent project tracking and reporting to management.<br />

10.0 Theoretical Content Hours<br />

10.1 Salience determination 3<br />

11.0 Problem Analysis<br />

11.1 Work flow analysis<br />

11.2 Analysis for redundancy, and unproductive and wasteful processes<br />

12.0 Solution Design<br />

12.1 Redesign organizational processes<br />

-278-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

03/10/06 Initial ABET version Najjar<br />

ABET cleanup<br />

Wolcott<br />

-279-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4200<br />

Course Title<br />

Information and Data Quality Management<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Develop in-depth understanding <strong>of</strong> Data<br />

and Information Quality (DQ and IQ)<br />

Understand and use DQ and IQ Concepts<br />

in Information Systems projects<br />

Be able to recognize various patterns <strong>of</strong><br />

Data and Design Deficiencies in Systems<br />

Be able to suggest appropriate DQ and IQ<br />

improvement plans in light <strong>of</strong> known<br />

deficiencies in systems<br />

Develop an understanding <strong>of</strong> the role and<br />

importance <strong>of</strong> DQ and IQ in databases<br />

and Data warehouses<br />

Be able to discuss the role and<br />

importance <strong>of</strong> DQ in DSS<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

S<br />

X X S<br />

S S S X<br />

X<br />

S<br />

X<br />

X<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

-280-


3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-281-


-282-


ISQA 4300 Database Administration<br />

Department and Course Number ISQA 4300<br />

Course Title<br />

Database Administration<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/3/07<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course is designed to give students an applied, practical introduction to database<br />

administration. Students will gain an understanding <strong>of</strong> the functioning <strong>of</strong> a database management<br />

system and its relationship to the computing environment in which it runs. They will learn the<br />

concepts, principles, and techniques necessary to carry out such functions as database object<br />

creation, storage management, capacity planning, performance tuning, backup and recovery, and<br />

security management. Each semester the course will focus on one commercial DBMS, such as<br />

Oracle.<br />

1.2 For whom course is intended.<br />

The course is intended for upper division undergraduate MIS or CS majors who wish to pursue the<br />

topic <strong>of</strong> database and data administration beyond the level <strong>of</strong> an introductory database course.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 ISQA 3300<br />

1.3.2 ISQA 3310 or CSCI 4850<br />

1.4 Prerequisites <strong>of</strong> the course (Topics)<br />

1.4.1 Relational Model<br />

1.4.2 Structured Query Language (SQL)<br />

1.4.3 Secondary storage & I/O<br />

1.4.4 Indexing<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Understand the roles, issues, and tasks associated with the database administration function.<br />

2.2 Understand computer system and DBMS architecture and how the DBMS stores and maintains<br />

data, executes queries, and performs other data management tasks.<br />

-283-


2.3 Create a variety <strong>of</strong> database objects, such as tablespaces, indexes, and user objects.<br />

2.4 Plan and implement the physical organization <strong>of</strong> a database.<br />

2.5 Understand and use the system catalog in a variety <strong>of</strong> database administration tasks.<br />

2.6 Gather, interpret, and act on database statistics to monitor database activity and tune for<br />

performance.<br />

2.7 Plan and execute backup and recovery activities.<br />

2.8 Secure the database and manage users.<br />

2.9 Develop good database management discipline<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Overview <strong>of</strong> Database Administration 1.5<br />

3.2 System architecture 4.5<br />

3.3 DBMS architecture 3.0<br />

3.4 Data Dictionary 1.0<br />

3.5 Control Files 1.0<br />

3.6 Redo log files 1.0<br />

3.7 Basic Storage Concepts 4.5<br />

3.8 Database object creation 4.5<br />

3.9 Concurrency Control and Lock management 6.0<br />

3.10 Query processing 1.5<br />

3.11 User administration and security 3.0<br />

3.12 Managing Data with exports, imports, and loading 1.5<br />

3.13 Network services 1.5<br />

3.14 Performance monitoring and tuning 3.0<br />

3.15 Backup & recovery 3.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lecture, in-class demonstrations, and in-class<br />

exercises<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstration, participate in discussion on assigned<br />

readings, complete assigned projects, and complete required examinations<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

-284-


5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will complete a sequence <strong>of</strong> assignments desired to provide hands-on exposure to<br />

the topics discussed in class, and take two examinations.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Component Grading<br />

Exams 35%<br />

Assignments 60%<br />

Participation 5%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Watson, J. 2008. OCA Oracle Database 11g: Administration I Exam Guide. McGraw-Hill.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Greenwald, R., Stackowiak, R., and Stern, J. 2008. Oracle Essentials: Oracle Database 11g.<br />

Sebastopol, CA: O'Reilly Media, Inc.<br />

6.2.2 Powell, G., and McCullough-Dieter, C. 2007. Oracle 10g Database Administrator:<br />

Implementation & Administration. Boston, MA: Thomson Course Technology.<br />

6.2.3 Loney, K. and Bryla, B. Oracle Database 10g DBA Handbook, Oracle Press, 2005.<br />

6.2.4 Whalen, E. Oracle Database 10g Linux Administration, Oracle Press, 2005.<br />

-285-


6.3 Other sources <strong>of</strong> information.<br />

6.3.1 Oracle Technet: http://technet.oracle.com<br />

6.3.2 http://pipetalk.revealnet.com/~dba<br />

6.3.3 http://www.lazydba.com/<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

6.4.1 Bryla, Bob, and Kevin Loney. Oracle Database 11g Dba Handbook: The McGraw-Hill<br />

Companies, Inc., 2008.<br />

6.4.2 Fernandez, Iggy. Beginning Oracle Database 11g Administration: From Novice to<br />

Pr<strong>of</strong>essional: Apress, 2008.<br />

6.4.3 Afyouni, H.A. Database Security and Auditing: Protecting Data Integrity and Accessibility,<br />

Thomson Course Technology, Boston, MA, 2006.<br />

6.4.4 Morris-Murphy, L.L. Oracle9i Database Administrator II: Backup/Recovery & Network<br />

Administration, Thomson Course Technology, Boston, 2004.<br />

6.4.5 Oracle Security Handbook, by Marlene Theriault & Aaron Newman, Osborne/McGraw-<br />

Hill, 2001.<br />

6.4.6 Sharma, V. Bitmap Index vs. B-tree Index: Which and When?, Oracle Corp., 2005.<br />

http://www.oracle.com/technology/pub/articles/sharma_indexes.html, Current<br />

September 27, 2005.<br />

6.4.7 Morrison, J., Morrison, M. and Conrad, R. Guide to Oracle10g, Thomson Course<br />

Technology, Boston, 2006.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission Category Content (class time in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 27<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design<br />

Data management 15<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __0___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically _____ pages and to make ___0__ oral presentations <strong>of</strong> typically _____<br />

minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as<br />

for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage.<br />

-286-


10.0 Theoretical content:<br />

This course deals mostly with physical, not logical design, and includes a number <strong>of</strong> topics included in<br />

IS’97 Information Systems Theory and Practice:<br />

10.1 Implementation and evaluation <strong>of</strong> system performance 3<br />

10.2 Theory <strong>of</strong> concurrency control 4.5<br />

11.0 Problem analysis:<br />

Students learn to analyze the state <strong>of</strong> the database in three areas in particular: storage management,<br />

user administration, and performance management. In storage management, students learn to<br />

determine the placement <strong>of</strong> database objects within data files in order to be able to detect fragmentation<br />

<strong>of</strong> files and <strong>of</strong> database objects. In user administration, students learn to identify the privileges given to<br />

users to detect potential security issues. In performance management, students learn about key<br />

performance indicators and a process for isolating and resolving performance problems.<br />

12.0 Solution design:<br />

Students learn to make and implement a variety <strong>of</strong> physical design decisions, including: creation <strong>of</strong><br />

tablespaces and files <strong>of</strong> appropriate size with appropriate storage allocation patterns, determination <strong>of</strong><br />

block structure for tables and indexes, and creation <strong>of</strong> indexes. Students also learn to determine an<br />

appropriate basket <strong>of</strong> privileges for various types <strong>of</strong> users.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

5/21/02 Initial ABET version Wolcott<br />

6/25/03 ABET cleanup Wolcott<br />

10/3/07 Updated resource material<br />

Wolcott<br />

Minor updates to content & organization<br />

9/30/08 Update <strong>of</strong> the reading list & reference list Wolcott<br />

-287-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4300<br />

Course Title<br />

Database Administration<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the roles, issues, and tasks<br />

associated with the database<br />

administration function.<br />

Understand computer system and DBMS<br />

architecture and how the DBMS stores<br />

and maintains data, executes queries,<br />

and performs other data management<br />

tasks.<br />

Create a variety <strong>of</strong> database objects, such<br />

as tablespaces, indexes, and user objects.<br />

Plan and implement the physical<br />

organization <strong>of</strong> a database.<br />

Understand and use the system catalog in<br />

a variety <strong>of</strong> database administration<br />

tasks.<br />

Gather, interpret, and act on database<br />

statistics to monitor database activity and<br />

tune for performance.<br />

Plan and execute backup and recovery<br />

X<br />

X<br />

S<br />

S S S<br />

X<br />

S<br />

X<br />

-288-


activities.<br />

Secure the database and manage users.<br />

X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-289-


-290-


ISQA 4380 Distributed Technologies and Systems<br />

Department and Course Number ISQA 4380<br />

Course Title<br />

Distributed Technologies and Systems<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/09/2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course introduces students to concepts, issues and tools needed to develop distributed<br />

computing systems. Topics include distributed systems architecture, middleware, Internet-based<br />

systems development, security and performance. Hands-on systems development using current<br />

technologies is provided.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to study topics<br />

pertaining to the client/server environment. It is the capstone course course for the I-Business<br />

Application Development & Management concentration.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 ISQA 3400 - Business Data Communications<br />

1.3.2 ISQA 3310 - Managing the Data Base Environment<br />

1.3.3 ISQA 3210 - Advanced Technology for Personal Productivity<br />

1.3.4 CSCI 2850 - Programming on the Internet or equivalent<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 OSI reference model<br />

1.4.2 TCP/IP<br />

1.4.3 HTTP<br />

1.4.4 HTML<br />

1.4.5 Database design<br />

1.4.6 SQL<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

1.1 Define the terms Distributed Computing System and Internet Technology;<br />

-291-


1.2 Understand the concept <strong>of</strong> Middleware and types <strong>of</strong> middleware s<strong>of</strong>tware;<br />

1.3 Identify distributed computing objects and how they work;<br />

1.4 Develop a modest size web application with access to a database;<br />

1.5 Integrate a web application to available open web services;<br />

1.6 Develop a web service and consume it in a web application;<br />

1.7 Understand the architecture <strong>of</strong> web based systems;<br />

1.8 Describe transaction processing and how it works on the Internet;<br />

1.9 Decribe how businesses integrate with other businesses using modern forms <strong>of</strong> B2B integration<br />

1.10 Describe how to implement a modest size web application.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Overview <strong>of</strong> Client Server and the Internet 1.5<br />

3.2 Distributed System Fundamentals 1.5<br />

3.3 Introduction to Middleware 3.0<br />

3.4 Communications Middleware 3.0<br />

3.5 Database Middleware 3.0<br />

3.6 Web technologies and XML 6.0<br />

3.7 Distributed integration technologies and models 7.0<br />

3.7.1 COM/DCOM/.NET integration models<br />

3.7.2 Java Object and integration models<br />

3.7.3 Web Services<br />

3.7.4 REST/POX and Mashup Integration<br />

3.8 Service Oriented Architecture 5<br />

3.9 PHP 9.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be in-class lectures sample integration problems done in<br />

groups and demonstrations.<br />

4.2 Student role in the course.<br />

Students will attend the class, participate in the in-class discussion, solve integration problems in<br />

class as a group and present results, complete exams, assignments, and projects<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

-292-


5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will complete exams, assignments, and projects.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Components<br />

Grading<br />

Exams 40%<br />

Assignments 35%<br />

Project 22%<br />

Participation 3%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />


6.3 Other sources <strong>of</strong> information.<br />

None<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

6.4.1 R. Gleghorn, Enterprise Application Integration: A Manager’s Perspective, IT Pr<strong>of</strong>essional.<br />

November, 2005, pp 17-23.<br />

6.4.2 F. Leyman, D. Roller and M.Schmidt, Web Services and Business Process Management.<br />

IBM Systems Journal. Vol 41, No 2, 2002. pp 198-211.<br />

6.4.3 D. Margulius, Banking on SOA. Infoworld, July 17th, 2006. Pages 27-31<br />

6.4.4 J. Kobielus, Enterprise Service Bus: Web Services Meet Message-Oriented Middleware.<br />

Business Communications Review. April, 2006. pp 30-36.<br />

6.4.5 K. Braskasan, Websphere Business Integration: An Architectural Overview. Vol 43, No 2,<br />

2005. pp 238-254.<br />

6.4.6 T. Prushman, R. Alt. Process Portals – Architecture and Integration. Proceeding <strong>of</strong> the 37th<br />

Hawaii International Conference onSystems Sciences – 2004. pp 1-10.<br />

6.4.7 Anton Fricko, SOAs Require Culture Change and Service Reuse. Business Communications<br />

Review. May 2006. pp 58-64.<br />

6.4.8 Newcomer, Eric and Lomow, Greg, “Understanding SOA and Web Services” 2007. ISBN: 0-<br />

321-18086-0.<br />

6.4.9 Margolis, Ben, “SOA for the Business Developer” 2007. ISBN: 1-58347-065-4.<br />

6.4.10 Juneja, Girish, et al, “Service Oriented Architecture Demystified” 2007. ISBN: 1-934053-<br />

02-3.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 12<br />

Networking and telecommunications 6<br />

Modern programming language 9<br />

Analysis and Design 3<br />

Data management 9<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __1__ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __4-5___ pages and to make ___1__ oral presentations (podcast) <strong>of</strong><br />

typically _10-12____ minutes duration. Include only material that is graded for grammar, spelling, style,<br />

and so forth, as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

-294-


No coverage.<br />

10.0 Theoretical content:<br />

10.1 Distributed Systems Fundamentals 3.0<br />

11.0 Problem analysis:<br />

Hours<br />

The course involves learning to use various middleware and web-development tools. The students are<br />

challenged to apply the tools and techniques to solve specified problems rather than analyze the problem<br />

itself.<br />

12.0 Solution design:<br />

The course will allow students the opportunity to learn some <strong>of</strong> the development tools available for<br />

distributed systems application development. Students will have the opportunity to gain hands-on<br />

experience with some <strong>of</strong> these tools.<br />

-295-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

4/30/02 Updated course content section to<br />

deemphasize scripting and indicate switch<br />

to PHP as an implementation platform<br />

Wolcott<br />

ISQA 3210 covers the scripting<br />

portions well.<br />

10/28/02 ISQA 3210 added as a prerequisite Wolcott Students need to have had exposure<br />

to HTML and some scripting.<br />

10/28/02 Title changed from “Managing the<br />

Client/Server Environment” to “Distributed<br />

Technologies and Systems”<br />

Wolcott “Client/Server” is a somewhat<br />

outdated term. The new title is<br />

general enough to include both<br />

Internet and non-Internet<br />

5/15/03 CSCI 2850 added as a prerequisite. Course<br />

Catalog Management System change for<br />

5/15/03<br />

Wolcott<br />

6/25/03 ABET cleanup Wolcott<br />

7/10/03 ABET cleanup - Prerequisite course titles Wild<br />

added<br />

10/14/07 Updating to include objectives on web Royce<br />

services and service oriented concepts.<br />

Also updated content and organization and<br />

bibliography<br />

10/9/2008 Updated text and references Royce<br />

technologies<br />

CSCI 2850 gives students a start with<br />

PHP, which can be built upon in<br />

ISQA 4380<br />

-296-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4380<br />

Course Title<br />

Distributed Technologies and Systems<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Define the terms Distributed Computing<br />

System and Internet Technology<br />

Understand the concept <strong>of</strong> Middleware<br />

and types <strong>of</strong> middleware s<strong>of</strong>tware<br />

Identify distributed computing objects<br />

and how they work<br />

Develop a modest size web application<br />

with access to a database<br />

Integrate a web application to available<br />

open web services<br />

Develop a web service and consume it in<br />

a web application<br />

Understand the architecture <strong>of</strong> web<br />

based systems<br />

Describe transaction processing and how<br />

it works on the Internet<br />

Decribe how businesses integrate with<br />

other businesses using modern forms <strong>of</strong><br />

B2B integration<br />

X<br />

S S X<br />

X X X<br />

S S S S<br />

S S S S<br />

S S S S<br />

X X X X<br />

X X<br />

X X X X<br />

-297-


Describe how to implement a modest size<br />

web application<br />

X<br />

X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-298-


ISQA 4590 IT Audit and Control<br />

Department and Course Number ISQA 4590/ISQA 8596<br />

Course Title<br />

IT Audit and Control<br />

Course Coordinator<br />

Deepak Khazanchi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/1/2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course explores organizational and managerial issues relevant to planning and conducting IT<br />

audit and control activities. The course covers the following conceptual areas: business risks and<br />

the management <strong>of</strong> business risk, IT risk as a component <strong>of</strong> business risk, the need to manage IT<br />

risks, and the basic type <strong>of</strong> controls required in a business system in order to control IT risks.<br />

Issues associated with new risks created by the use <strong>of</strong> the internet for business applications and<br />

electronic business are also covered.<br />

1.2 For whom course is intended.<br />

The course is intended for graduate and undergraduate students (juniors and seniors) in<br />

Information Systems or Business Administration or related areas who have an interest in IT audit<br />

and control issues.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

A solid understanding <strong>of</strong> business foundations such as accounting and introductory auditing and<br />

exposure to the IS discipline is essential for success in this course. Permission <strong>of</strong> instructor is<br />

required to enroll.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Basic Accounting<br />

1.4.2 Introduction to Auditing<br />

1.4.3 Information Security and Policy<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 Understand the concept <strong>of</strong> business risks and the management <strong>of</strong> business risk<br />

-299-


2.2 Understand IT risk as a component <strong>of</strong> business risk<br />

2.3 Gain an appreciation <strong>of</strong> the need to manage IT risks<br />

2.4 Gain an understanding <strong>of</strong> the basic type <strong>of</strong> controls required in a business system in order to<br />

control IT risks<br />

2.5 Learn concepts and applications <strong>of</strong> the following types <strong>of</strong> IT controls: top management, system<br />

development, programming, data resource management, database, security, operations<br />

management, quality assurance, boundary controls, and communications.<br />

2.6 Gain an appreciation for the difficulties in assessing systems effectiveness and efficiency.<br />

2.7 Understand the new system control risks created by the use <strong>of</strong> the internet for business<br />

applications and electronic business.<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> Contact Hours on each).<br />

Contact Hours<br />

3.1 Introduction 3<br />

3.2 Top Management Controls 3<br />

3.3 Systems Development Management Controls 3<br />

3.4 Programming Management Controls 3<br />

3.5 Data Resource Management Controls 3<br />

3.6 Security Management Controls 3<br />

3.7 Operations Management Controls 3<br />

3.8 Quality Assurance Management Controls 3<br />

3.9 Boundary Controls 3<br />

3.10 Communication Controls 3<br />

3.11 Database & ERP Controls 3<br />

3.12 Evaluating System Effectiveness & Efficiency 3<br />

3.13 Trust Services (AICPA/CICA/IIA Reports) 3<br />

3.14 B2B Assurance Framework (Khazanchi and Sutton) 3<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will include class discussion, case studies, lecture, guest speakers,<br />

and demonstration.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned projects and papers, and complete required examinations.<br />

4.3 Contact hours.<br />

3 hours<br />

-300-


5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will be evaluated on the following basis.<br />

Class participation: Students are expected to attend each and every class and be prepared to<br />

actively participate in the discussion. Much <strong>of</strong> the class will be conducted using an open<br />

discussion approach, and the success <strong>of</strong> the class will be dependent on students’ ability to identify<br />

and discuss relevant issues. Each student will choose a chapter from the text and lead the<br />

instruction <strong>of</strong> the rest <strong>of</strong> the class on that chapter. This includes a summary <strong>of</strong> key components <strong>of</strong><br />

the chapter, and facilitation <strong>of</strong> discussion <strong>of</strong> the chapter.<br />

Individual Case <strong>Study</strong>: Each student will complete three case studies which will involve reading a<br />

case study and preparing a 5-7 page evaluation <strong>of</strong> the case from the viewpoint <strong>of</strong> an IT Auditor. All<br />

cases will be graded for depth <strong>of</strong> analysis, originality, quality <strong>of</strong> writing, and pr<strong>of</strong>essional<br />

impression. Most questions will involve subjective issues for which multiple views can be<br />

defended. As in a pr<strong>of</strong>essional career, it is important to be both complete and concise.<br />

Group Case Presentation: Each person will be assigned to a learning group to complete a case<br />

study related to each topic. Students will choose one <strong>of</strong> the three required case studies and work<br />

in their team to provide a presentation to the class on that case. This 20-30 minute presentation<br />

should include a summary <strong>of</strong> the case, the challenge(s) facing the organization, and their<br />

interpretation and/or resolution <strong>of</strong> the challenges from an IT Audit perspective.<br />

Computer-aided Auditing Project (ACL Assignment): This project will provide students a chance<br />

to gain hands-on experience with computer assisted audit tools and techniques (CAATTS). The<br />

s<strong>of</strong>tware to be used in this assignment, ACL, comes with the textbook. Specifications for the<br />

project will be provided in class.<br />

Exams: There will be one comprehensive final examination.<br />

Current News Articles: Each class member will be responsible for summarizing and presenting<br />

two news articles during the course <strong>of</strong> the semester. These articles should relate in some fashion<br />

to risk and controls and should represent a current news event related to the subject to be<br />

covered in a given week. All students are required to participate on a regular basis in the<br />

discussion.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

The grade base for the course for undergraduate students will consist <strong>of</strong> the following:<br />

-301-


Available points<br />

Individual Case Studies (3) 45%<br />

Group Case <strong>Study</strong> 5%<br />

Comprehensive final exam 20%<br />

ACL project 15%<br />

Current news articles 5%<br />

Individual class participation 10%<br />

5.3 Grading scale and criteria.<br />

The grading scale is as follows:<br />

GRADE POINT VALUE<br />

A 92%


6.2.1 “To Caatch a Thief”. Paul R Brazina, Bruce A Leauby. Pennsylvania CPA Journal.<br />

Philadelphia: Spring 2004.Vol.75, Iss. 1; pg. 30, 4 pgs. To be referred to as ACL1 in<br />

syllabus.<br />

6.2.2 “Computer-assisted audit tools and techniques: analysis and perspectives.” Robert L<br />

Braun, Harold E Davis. Managerial Auditing Journal. Bradford: 2003.Vol.18, Iss. 9; pg.<br />

725, 7 pgs. Referred to as ACL2 in syllabus.<br />

6.2.3 “Trust Services Principles, Criteria and Illustrations for Security, Availability, Processing<br />

Integrity, Confidentiality, and Privacy (Including WebTrust® and SysTrust®)”. American<br />

Institute <strong>of</strong> Certified Public Accountants, Inc. and Canadian Institute <strong>of</strong> Chartered<br />

Accountants. Referred to as WebTrust in syllabus.<br />

6.2.4 “E-Commerce’s Impact on Audit Practices.” Michael D Harkness; Brian Patrick Green.<br />

Internal Auditing; Mar/Apr 2004; 19, 2; ABI/INFORM Global pg. 28. To be referred to as<br />

Harkness in syllabus.<br />

6.2.5 “The keys to effective IT auditing”. Mark Petterson. Journal <strong>of</strong> Corporate Accounting &<br />

Finance; Volume 16, Issue 5 , Pages 41 – 46. To be referred to as Petterson in syllabus.<br />

6.2.6 CobIT Generic Audit Guidelines & Process. To be provided by instructor on Blackboard. To<br />

be referred to as CobIT Guidelines & Process in syllabus.<br />

6.2.7 “Auditing in the E-Commerce Era.” Ning Zhao; David C Yen; I-Chiu Chang. Information<br />

Management & Computer Security; 2004; 12, 5; ABI/INFORM Global. pg. 389. To be<br />

referred to as Zhao in syllabus.<br />

6.2.8 “Risks, Benefits, and Challenges in Global IT Outsourcing: Perspectives and Practices.”<br />

Subhankar Dhar & Bindu Balakrishnan. Journal <strong>of</strong> Global Information Management, vol.<br />

14, issue 3. To be referred to as Dhar in syllabus.<br />

6.2.9 “Critical Risks in Outsourced IT Projects: The Intractable and the Unseen.” Hazel Taylor.<br />

Communications <strong>of</strong> the ACM; November 2006/Vol. 49, No. 11. To be referred to as Taylor<br />

in syllabus.<br />

6.2.10 “A Continuous View <strong>of</strong> Accounts” David Coderre. The Internal Auditor; Apr 2006; 63, 2;<br />

ABI/INFORM Global pg. 25. To be referred to as Coderre in syllabus.<br />

6.2.11 “Continuous Auditing: An Effective Tool For Internal Auditors.” J Donald Warren Jr; L<br />

Murphy Smith. Internal Auditing; Mar/Apr 2006; 21, 2; ABI/INFORM Global pg. 27. To be<br />

referred to as Warren in syllabus.<br />

Other references will be provided as needed. Students are also encouraged to bring related press articles<br />

to class for discussion.<br />

6.3 Other suggested reading materials, if any.<br />

6.3.1 Hollander, Denna, and Cherrington (1996). Accounting, IT and Business Solutions. Irwin.<br />

6.4 Other sources <strong>of</strong> information.<br />

6.4.1 AICPA/CICA/IIA web sites<br />

6.5 Current bibliography <strong>of</strong> resources for student’s information.<br />

6.5.1 Stoll, C. (1990). “The Cuckoo's Egg: Tracking a Spy through the Maze <strong>of</strong> Computer<br />

Espionage," New York, NY: Pocket Books.<br />

6.5.2 “Auditing Information Systems,” Jack Champlain, John Wiley & Sons, Inc., One Wiley<br />

Drive, Somerset, NJ 08875<br />

-303-


6.5.3 “An e-Risk Primer,” Xenia Ley Parker, CISA, CFSA, The Institute <strong>of</strong> Internal Auditors<br />

Research Foundation<br />

6.5.4 “Electronic Commerce, Control Issues for Securing Virtual Enterprises,” Albert J. Marcella,<br />

Jr., Ph.D., COAP, CSP, CQA, CFSA, CDP, CISA, Larry Stone, CISA, CCP; and William J.<br />

Sampias, CISA.<br />

6.5.5 “www.StopThief.net – Protecting Your Identity on the Web,” Albert J. Marcella Jr., Ph.D.,<br />

COAP, CSP, CQA, CDP, CFSA, CISA.<br />

7.0 (Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category<br />

Content (class time in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 5<br />

Networking and telecommunications 5<br />

Modern programming language<br />

Analysis and Design 5<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 15 15<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __5___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __5___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

__30___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

We will cover the standards for IT audit and control established by pr<strong>of</strong>essional associations such as ISACA<br />

and AICPA. (Time: 6 hours).<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

11.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

-304-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

10/1/2008 Minor changes to description <strong>of</strong><br />

assignments, adjustments to readings<br />

list and required texts based on an<br />

implemented version <strong>of</strong> the original<br />

formal syllabus.<br />

Deepak<br />

Khazanchi<br />

-305-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4590<br />

Course Title<br />

IT Audit and Control<br />

Course Coordinator<br />

Deepak Khazanchi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the concept <strong>of</strong> business risks<br />

and the management <strong>of</strong> business risk<br />

Understand IT risk as a component <strong>of</strong><br />

business risk<br />

Gain an appreciation <strong>of</strong> the need to<br />

manage IT risks<br />

Gain an understanding <strong>of</strong> the basic type<br />

<strong>of</strong> controls required in a business system<br />

in order to control IT risks<br />

Learn concepts and applications <strong>of</strong> the<br />

following types <strong>of</strong> IT controls: top<br />

management, system development,<br />

programming, data resource<br />

management, database, security,<br />

operations management, quality<br />

assurance, boundary controls, and<br />

communications.<br />

Gain an appreciation for the difficulties in<br />

assessing systems effectiveness and<br />

X<br />

S<br />

X X S<br />

X X X S<br />

X S S S<br />

X X X<br />

X X X X<br />

-306-


efficiency.<br />

Understand the new system control risks<br />

created by the use <strong>of</strong> the internet for<br />

business applications and electronic<br />

business.<br />

S<br />

X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-307-


-308-


ISQA 4730 Decision Support Systems<br />

Department and Course Number ISQA 4730<br />

Course Title<br />

Decision Support Systems<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course examines a set <strong>of</strong> information systems which specifically support managerial<br />

decision makers: Decision Support Systems, Group Decision Support Systems, Executive<br />

Information Systems, Data Warehouses, Expert Systems, and Neural Networks. This<br />

course explores the development, implementation, and application <strong>of</strong> these systems,<br />

how these systems can be applied to current business problems, as well as how<br />

organizational issues impact the implementation and usage <strong>of</strong> these systems.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors and graduate MIS<br />

majors who wish to understand a set <strong>of</strong> information systems which specifically support<br />

managerial decision.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 3100 or equivalent<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Working knowledge <strong>of</strong> business foundations.<br />

1.4.2 Working knowledge <strong>of</strong> computer information systems.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Understand the nature <strong>of</strong> decision making and <strong>of</strong> decision makers, as well as the need for decision<br />

support.<br />

-309-


2.2 Investigate the application Decision Support Systems, Business Intelligence, Group Decision<br />

Support Systems, Executive Information Systems, Data Warehouses, Expert Systems, and Neural<br />

Networks to both common and unique organizational decision problems.<br />

2.3 Understand how organizational issues impact the implementation and usage <strong>of</strong> these systems.<br />

2.4 Apply course concepts in hands-on assignments with a strong real-world orientation.<br />

3.0 Content and Organization:<br />

Contact Hours<br />

3.1 Decision Support Systems and Business Intelligence 3.0<br />

3.2 Decision Making Systems, Modeling, and Support 3.0<br />

3.3 Modeling and Analysis 3.0<br />

3.4 Decision Support Systems Concepts, Methodologies and<br />

Technologies: An Overview 3.0<br />

3.5 System Development and Acquisition 3.0<br />

3.6 The Essentials <strong>of</strong> Business Intelligence 3.0<br />

3.7 Business Analytics and Data Visualization 3.0<br />

3.8 Data Warehousing 3.0<br />

3.9 Data, Text, and Web Mining 3.0<br />

3.10 Collaborative Computer-Supported Technologies and 3.0<br />

3.11 Group Support Systems<br />

3.12 Knowledge Management 3.0<br />

3.13 Business Performance Management 3.0<br />

3.14 Enterprise Systems 3.0<br />

3.15 Artificial Intelligence and Expert Systems 3.0<br />

3.16 Knowledge Acquisition, Representation and Reasoning 3.0<br />

3.17 Advanced Intelligent Systems 3.0<br />

3.18 Neural Networks for Data Mining 3.0<br />

3.19 Intelligent Systems over the Internet 3.0<br />

3.20 Integration, Impacts, and the Future <strong>of</strong> Management<br />

Support Systems 3.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures and the in-class discussion.<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in the discussion on assigned readings,<br />

complete the individual assignments and exams, and participate in a group project.<br />

4.3 Contact hours.<br />

Three (3) hours per week.<br />

-310-


5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The student will participate in the discussion on assigned readings. The student will<br />

complete a set <strong>of</strong> individual assignments as well as two individual exams. Students – in<br />

groups <strong>of</strong> 2 or 3 - will participate in the completion <strong>of</strong> a group project. Undergraduate<br />

students will construct a small decision support system to solve an actual decision<br />

problem. Graduate students will research a decision support implementation project and<br />

write a formal research paper on this topic.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component Grading<br />

Exams 33.3%<br />

Assignments 33.3%<br />

Team Project 33.3%<br />

5.3 Grading scale and criteria.<br />

Points<br />

Grade<br />

96% - 100% A+<br />

92% - 95% A<br />

89% - 91% A-<br />

86% - 88% B+<br />

82% - 85% B<br />

79% - 81% B-<br />

76% - 78% C+<br />

72% - 75% C<br />

69% - 71% C-<br />

66% - 68% D+<br />

62% - 65% D<br />

59% - 61% D-<br />

00% - 58% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

-311-


6.1.1 Turban, E., Aronson, J.E., Liang, T.P., & Sharda, R. (2007) Decision Support and<br />

Business Intelligence Systems, 8 th Edition, Upper Saddle River, NJ, Pearson-<br />

Prentice Hall.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 On-line: Different Drummers by David Keirsey<br />

(http://keirsey.com/Drummers.html)<br />

6.2.2 On-line: Keirsey Temperament Sorter<br />

(http://www.advisorteam.com/user/ktsintro1.asp)<br />

6.2.3 On-line: Decision Making overview (http://cognet.mit.edu/MITECS/Entry/shafir3)<br />

6.2.4 On-line: Problem Solving and Decision Making: Consideration <strong>of</strong> Individual<br />

Differences Using the Myers-Briggs Type Indicator<br />

(http://teach.valdosta.edu/whuitt/files/prbsmbti.html)<br />

6.2.5 On-line: Decision Making and Problem Solving, by Herbert A. Simon and Associates<br />

(http://www.die<strong>of</strong>f.org/page163.htm)<br />

6.2.6 On-line: Data Warehousing Technology, a White Paper by Ken Orr<br />

6.2.7 On-line: Linear Programming thwarts the Soviet Blockage <strong>of</strong> Berlin<br />

(http://members.fortunecity.com/jonhays/linear.htm)<br />

6.2.8 On-line: A primer on Linear Programming<br />

6.2.9 On-line: "As We May Think", a pivotal article by Vannevar Bush. The basic ideas<br />

which underly Hypertext and the World Wide Web as foretold in 1945.<br />

(http://www.theatlantic.com/unbound/flashbks/computer/bushf.htm)<br />

6.2.10 On-line: An Atlas <strong>of</strong> Cyberspaces - fine examples <strong>of</strong> data visualization.<br />

(http://www.cybergeography.org/atlas/atlas.html)<br />

6.2.11 On-line: Computer-Supported Cooperative Work<br />

(http://pespmc1.vub.ac.be/CSCW.html)<br />

6.2.12 On-line: Group Think, an article on groupware by Anne Field<br />

(http://www.inc.com/incmagazine/article/0,,ART1995,00.html)<br />

6.2.13 On-line: CSCW & Groupware index<br />

(http://www.usabilityfirst.com/groupware/cscw.txl)<br />

6.2.14 On-line: CIO Magazine(http://64.28.79.79/resources/)<br />

6.2.15 On-line: Knowledge Roles: The CKO and Beyond<br />

(http://www.cio.com/archive/040196_davenport_content.html)<br />

6.2.16 On-line: The Value Chain (http://www.informationweek.com/700/00iuer4.htm)<br />

6.2.17 On-line: Feds ponder CKO role<br />

(http://www.fcw.com/fcw/articles/1999/FCW_062899_694.asp)<br />

6.2.18 On-line: The CKO -- vision, strategy, ambassadorial skills, and a certain je ne sais<br />

quoi ( http://www.ktic.com/topic6/13_CKO.HTM)<br />

6.2.19 On-line: PC AI - Expert Systems<br />

(http://www.pcai.com/web/ai_info/expert_systems.html)<br />

6.2.20 On-line: Legal Liability for Expert System S<strong>of</strong>tware<br />

(http://www.daiglehancock.com/Strict.liability.htm)<br />

-312-


6.2.21 On-line: AI Timeline<br />

(http://www2.kenyon.edu/depts/biology/slonc/bio3/AI/timeline/timeline.html)<br />

6.2.22 On-line: JESS - a Java-based Expert System Shell<br />

(http://herzberg.ca.sandia.gov/jess/)<br />

6.2.23 On-line: WebGrid: Knowledge Modeling and Inference through the World Wide<br />

Web (http://ksi.cpsc.ucalgary.ca/KAW/KAW96/gaines/KMD.html)<br />

6.2.24 On-line: A list <strong>of</strong> Knowledge Representation resources<br />

(http://www.cs.man.ac.uk/~franconi/kr.html)<br />

6.2.25 On-line: A Manager's Guide to Neural Networks<br />

(http://www.zsolutions.com/amanager.htm)<br />

6.2.26 On-line: A short Introduction to Neural Networks<br />

6.2.27 On-line: Travelling Salesman Problem Using Genetic Algorithms<br />

(http://www.lalena.com/ai/tsp/)<br />

6.2.28 On-line: Genetic Algorithm: Maze Solver - Java-based<br />

(http://home.online.no/~bergar/mazega.htm)<br />

6.2.29 On-line: "Intelligent Agents" Make a Comeback<br />

(http://abcnews.go.com/sections/tech/CNET/cnet_intagents991028.html)<br />

6.2.30 On-line: Agents at your service (http://www.infoworld.com/cgibin/displayStory.pl?/features/980216agents.htm)<br />

6.2.31 On-line: Organizational Learning and Memory<br />

(http://trochim.human.cornell.edu/gallery/cho/cho.htm)<br />

6.2.32 On-line: Electronic Privacy Information Center (http://www.epic.org/)<br />

6.2.33 On-line: What Company Spies Really Want<br />

(http://www.wired.com/news/infostructure/0,1377,32672,00.html)<br />

6.2.34 On-line: Why the future doesn't need us, by Bill Joy<br />

(http://www.wired.com/wired/archive/8.04/joy_pr.html)<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional handouts may be used when deemed necessary by the instructor.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

1.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 12<br />

Networking and telecommunications<br />

Modern programming language 3<br />

Analysis and Design 9<br />

Data management 9<br />

-313-


Role <strong>of</strong> IS in Organizations 9<br />

7.0 Oral and Written Communications:<br />

Every student is required to submit at least 3 written reports (not including exams, tests, quizzes,<br />

or commented programs) to typically 4-20 pages. Due to time-constraints students do not make<br />

presentations in class. Students’ oral and other pr<strong>of</strong>essional communication skills are an<br />

important aspect <strong>of</strong> the group projects in which the students participate.<br />

8.0 Social and Ethical Issues:<br />

The course explores the impact <strong>of</strong> Decision Support Systems and Management Support Systems<br />

on the decisions in the organization. Among other issues, this course explores the ethical issue<br />

<strong>of</strong> the use <strong>of</strong> artificial intelligence and computer-based reasoning in decisions which affect<br />

individuals.<br />

9.0 Theoretical content:<br />

Hours<br />

9.1 Decision Theory 3<br />

9.2 Quantitative Analysis, basic statistics, linear programming. 3<br />

9.3 Principles <strong>of</strong> artificial intelligence 3<br />

10.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

Students will examine case problems for the application <strong>of</strong> decision support methods. Students<br />

will investigate a specific decision problem in a real-world organization for the purpose <strong>of</strong><br />

designing a computer-based solution.<br />

11.0 Solution design:<br />

Student will gain practical experience with several s<strong>of</strong>tware packages for decision support system<br />

and expert system development. Students will develop a small decision support system for<br />

application to a specific decision problem in a real-world organization.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

10/10/02 Initial ABET version Van Vliet<br />

6/25/03 ABET cleanup Wolcott<br />

9/13/2007 Updated syllabus contents; changed Van Vliet<br />

-314-


prerequisite from CIST 2110 to CIST<br />

3100 as this course was renumbered.<br />

10/12/2008 Instructor reorganized course content<br />

for improved presentation to students;<br />

this reorganization is reflected in<br />

section 3.0<br />

10/12/2008 Updated section 8.0 to reflect current<br />

course more accurately<br />

Van Vliet<br />

Van Vliet<br />

-315-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4730<br />

Course Title<br />

Decision Support Systems<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the nature <strong>of</strong> decision<br />

making and <strong>of</strong> decision makers, as well as<br />

the need for decision support.<br />

Investigate the application Decision<br />

Support Systems, Business Intelligence,<br />

Group Decision Support Systems,<br />

Executive Information Systems, Data<br />

Warehouses, Expert Systems, and Neural<br />

Networks to both common and unique<br />

organizational decision problems.<br />

Understand how organizational issues<br />

impact the implementation and usage <strong>of</strong><br />

these systems<br />

Apply course concepts in hands-on<br />

assignments with a strong real-world<br />

orientation.<br />

S X S<br />

S<br />

X<br />

S<br />

X<br />

X S S X X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

-316-


1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-317-


-318-


ISQA 4880 Systems Simulation and Modeling<br />

Department and Course Number ISQA 4880<br />

Course Title<br />

System Simulation and Modeling<br />

Course Coordinator<br />

Yong Shi and Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/09/07<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Simulation modeling <strong>of</strong> manufacturing and service operations through the use <strong>of</strong> computer<br />

s<strong>of</strong>tware for operational analysis and decision making. This course is designed to provide the<br />

future engineers with an understanding <strong>of</strong> the analytical models <strong>of</strong> simulation. The underlying<br />

assumptions <strong>of</strong> these models are emphasized in order to critically ascertain their limitations and<br />

applicability. How models behave in practice under variety <strong>of</strong> manufacturing and service<br />

environments will also be examined.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to understand the<br />

analytical models <strong>of</strong> simulation. It is one <strong>of</strong> elective courses for undergraduates who wish to<br />

pursue Knowledge Engineering and Decision Support Track<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 CIST 1400<br />

1.3.2 ISQA 3400<br />

1.3.3 CIST 2500 or equivalent<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Basic computer programming<br />

1.4.2 Basic applied statistics for IS&T<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Recognize situations where simulation can be used as a an analysis tool<br />

2.2 Answer questions by simulation analysis<br />

2.3 Analyze, design and develop appropriate and effective simulation models<br />

2.4 Design, develop and run efficient simulation experiments<br />

-319-


2.5 Evaluate and draw conclusions from a simulation output<br />

2.6 Formulate constructive opinions, and present the results in a practical manner<br />

2.7 Present the results clearly.<br />

3.0 Content and Organization:<br />

-320-<br />

Contact Hours<br />

3.1 Introduction to Locations, Entities, Arrivals, Processing,<br />

Output Editor, and Menus 3<br />

3.2 What is Simulation? 3<br />

3.3 Why Simulation? 6<br />

3.4 How Does Simulation Work? 6<br />

3.5 An Introduction to Promodel 3<br />

3.6 The Simulation Project 3<br />

3.7 Understanding Probability Distributions 3<br />

3.8 Finding the Right Distribution 3<br />

3.9 Extracting Values From Probability Distributions 3<br />

3.10 Output Analysis 3<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The teaching methods include lectures, discussions, and actual cases.<br />

4.2 Student role in the course.<br />

Students will attend the lectures, participate in in-class discussions, complete exams and projects.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will complete two regular take-home exams, class projects and reports.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

Exams 25.0%<br />

Class Projects 37.5%


Class Participation 12.5%<br />

Class Project Report 25.0%<br />

5.3 Grading scale and criteria<br />

Points Grade<br />

98 – 100% A+<br />

90 – 97% A<br />

87 – 89% A-<br />

84 – 86% B+<br />

80 – 83% B<br />

77 – 79% B-<br />

74 – 76% C+<br />

70 – 73% C<br />

67 – 69% C-<br />

64 – 66% D+<br />

60 – 63% D<br />

57 – 59% D-<br />


CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design 36<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___1_ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __10___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

Hours<br />

10.1 Simulation principles 15<br />

10.2 Probability Distributions 3<br />

11.0 Problem analysis:<br />

Students learn and understand simulation modeling <strong>of</strong> manufacturing and service operations through the<br />

use <strong>of</strong> computer s<strong>of</strong>tware for operational analysis and decision making. Student also examine the<br />

assumptions underlying these analytical models and how models behave in practice under a variety <strong>of</strong><br />

manufacturing and service environments.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

Spring 2002 Initial ABET version Ghahramani<br />

6/25/03 ABET cleanup Wolcott<br />

10/9/07 Update <strong>of</strong> resource material and course<br />

coordinator<br />

Shi<br />

-322-


-323-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4880<br />

Course Title<br />

System Simulation and Modeling<br />

Course Coordinator<br />

Yong Shi and Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Recognize situations where simulation<br />

S X<br />

can be used as a an analysis tool<br />

Answer questions by simulation analysis S X<br />

Analyze, design and develop appropriate<br />

S<br />

S<br />

and effective simulation models<br />

Design, develop and run efficient<br />

S X S<br />

simulation experiments<br />

Evaluate and draw conclusions from a<br />

X<br />

X<br />

simulation output<br />

Formulate constructive opinions, and<br />

S<br />

present the results in a practical manner<br />

Present the results clearly.<br />

S<br />

-324-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-325-


-326-


ISQA 4890 Data Warehousing and Data Mining<br />

Department and Course Number ISQA/CSCI 4890<br />

Course Title<br />

Data Warehousing and Data Mining<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/02/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course provides students theoretical issues as well as practical methods for designing<br />

and constructing data warehouse and implementing data mining. After covering the<br />

essential concepts, issues, techniques to build an effective data warehouse, this course<br />

emphasizes the various techniques <strong>of</strong> data mining, such as association, classification,<br />

clustering and prediction for on-line analyses within the framework <strong>of</strong> data warehouse<br />

architectures. This course also promotes students to conduct a real-life data analyzing<br />

project.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate management information systems (MIS) and<br />

computer science (CS) majors who choose Data Mining and Business Intelligence<br />

concentration. It is also recommended to a senior undergraduate level in MIS or CS.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 ISQA 3310 or CSCI 4850<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 The conceptual and practical foundation to database management systems<br />

1.4.2 Relational Database Systems<br />

1.4.3 The hierarchical models<br />

1.4.4 The network models<br />

1.4.5 Basic SQL<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

-327-


2.0 Objectives:<br />

2.1 Understand the fundamental principles <strong>of</strong> data warehousing and data mining<br />

2.2 Describe the difference between transactional databases and data warehouses<br />

2.3 Describe the relationship between OLAP and Data Warehousing<br />

2.4 Use SQL to manage data in data warehousing and data mining<br />

2.5 Build a data mart<br />

2.6 Design and implement a data warehouse<br />

2.7 Carry out data integration and transformation<br />

2.8 Use and create simple data mining algorithms<br />

2.9 Apply some commercial tools to conduct data mining<br />

2.10 Interpret <strong>of</strong> data mining results<br />

3.0 Content and Organization:<br />

3.1 Introduction to Data Warehousing and Data Mining 3<br />

3.2 Data Warehouse and OLAP 3<br />

3.3 Data Preprocessing 3<br />

3.4 Data Mining Basis 3<br />

3.5 Data Characterization and Comparison 4<br />

3.6 Mining Association Rules 4<br />

3.7 Classification and Prediction 6<br />

3.8 Cluster Analysis 4<br />

3.9 Integrated Methods <strong>of</strong> Data Mining 3<br />

3.10 Advances <strong>of</strong> Data Warehousing and Data Mining 3<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

Hours<br />

The basic teaching method will be lectures, discussion, real-life cases, guest speakers. The<br />

existing s<strong>of</strong>tware from the literature or produced by the instructor and commercial products<br />

will be used in the class.<br />

4.2 Student role in the course<br />

The students will attend lectures, participate in discussion in the class, complete<br />

assignments and projects, and complete all exams. The projects can be either individual<br />

or group work depending on the situation <strong>of</strong> each class.<br />

4.3 Contact hours.<br />

Three (3) hours per week.<br />

-328-


5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The student products will be the assignments, group discussion, projects, examinations,<br />

and project presentations.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Components Grading<br />

Participation 5%<br />

Homework 10%<br />

Projects 35%<br />

Exams 50%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

98-100 A+<br />

95-97 A<br />

90-94 A-<br />

88-89 B+<br />

85-87 B<br />

80-84 B-<br />

78-79 C+<br />

75-77 C<br />

70-74 C-<br />

68-69 D+<br />

65-67 D<br />

60-64 D-<br />


6.1.1 David Olson and Yong Shi, Introduction to Business Data Mining, McGraw-Hill,<br />

2007.<br />

6.1.2 J. Han and M. Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann,<br />

2001.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Agrawal, R., Imielinski, T. and Swami, A. (1993) ‘Data mining: A performance<br />

perspective’, IEEE Transactions on Knowledge and Data Engineering, Vol. 5, 914-<br />

925.<br />

6.2.2 Bajgier, S. M. and Hill, A. V. (1982) ‘An experimental comparison <strong>of</strong> statistical and<br />

linear programming approaches to the discriminant problems’, Decision Sciences,<br />

Vol.13, 604-618.<br />

6.2.3 Breiman, L., Friedman, J., Olshen, R. and Stone, C. (1984), Classification and<br />

Regression Trees, Wadswroth, Belmont.<br />

6.2.4 Carpenter, G.A., Grossberg, S., Reynolds, J.H., Markuzon, N., and Rosen, D.B.<br />

(1992) ‘Fuzzy ARTMAP: A Neural Network Architecture for Incremental<br />

Supervised Learning <strong>of</strong> Analog Multidimensional Maps’, IEEE Transactions on<br />

Neural Networks, 3, 698-713.<br />

6.2.5 Carpenter, G.A., Grossberg, S., and Rosen, D.B. (1991) ‘Fuzzy ART: Fast stable<br />

learning and categorization <strong>of</strong> analog patterns by an adaptive resonance system’,<br />

Neural Networks, 4, 759-771.<br />

6.2.6 Chen, M., Han, J. and Yu, P. (1996) ‘Data mining: An overview from a database<br />

perspective’, IEEE Transactions on Knowledge and Data Engineering, Vol. 8, 866-<br />

883.<br />

6.2.7 Freed, N. and Glover, F. (1981) ‘Simple but powerful goal programming models for<br />

discriminant problems’, European Journal <strong>of</strong> Operational Research, Vol. 7, 44-60.<br />

6.2.8 Freed, N. and Glover, F. (1986) ‘Evaluating alternative linear programming models<br />

to solve the two-group discriminant problem’, Decision Science, Vol. 17, 151-162.<br />

6.2.9 Glover, F. (1990) ‘Improve linear programming models for discriminant analysis’,<br />

Decision Sciences, Vol. 21, 771-785.<br />

6.2.10 Guo, H. and Gelfand, S.B. (1992) ‘Classification trees with neural network feature<br />

extraction’, IEEE Transactions on Neural Netwroks, Vol. 3, 923-933.<br />

6.2.11 Jang, J.-S. R., Sun, C.-T. and Mizutani, E. (1997), Neuro-Fuzzy and S<strong>of</strong>t Computing,<br />

Prentice Hall, Upper Saddle River, New Jersey.<br />

6.2.12 Joachimsthaler, E.A. and Stam, A. (1988) ‘Four approaches to the classification<br />

problem in discriminant analysis: An experimental study’, Decision Sciences,<br />

Vol.19, 322-333.<br />

6.2.13 Koehler, G. J. and Erenguc, S. S. (1990) ‘Minimizing misclassifications in linear<br />

discriminant analysis’, Decision Science, Vol. 21, 63-85.<br />

6.2.14 Kosko, B. (1992), Neural Networks And Fuzzy Systems: A Dynamical Systems<br />

Approach To Machine Intelligence, Prentice Hall, Englewood Cliffs, New Jersey.<br />

-330-


6.2.15 Markowski, E. P. and Markowski, C. A. (1985) ‘Some difficulties and improvements<br />

in applying linear programming formulations to the discriminant problem’,<br />

Decision Science, Vol. 16, 237-247.<br />

6.2.16 Pass, S. (1997) ‘Discovering in a value mountain <strong>of</strong> data’, ORMS Today, October,<br />

24-28.<br />

6.2.17 Quinlan, J. (1986) ‘Induction <strong>of</strong> decision trees’, Machine Learning, Vol. 1, 81-106.<br />

6.2.18 Rymon, R. (1993), Search through systematic set enumeration, Proceedings <strong>of</strong> the<br />

third international conference on principle <strong>of</strong> knowledge representation and<br />

reasoning. Cambridge, MA, 539-550.<br />

6.2.19 Shi, Y, Peng, Y., Xu, X and Tang, X. (2002) ‘Data mining via multiple criteria linear<br />

programming: Applications in credit card portfolio management’, International<br />

Journal <strong>of</strong> Information Technology and Decision Making, Vol. 1, 145-166.<br />

6.2.20 Shi, Y., Wise, M., Luo, M. and Lin, Y. (2001) ‘Data mining in credit card portfolio<br />

management: a multiple criteria decision making approach’, in M. Koksalan and S.<br />

Zionts, eds., Multiple Criteria Decision Making in the New Millennium, Springer,<br />

Berlin, 427-436.<br />

6.2.21 Shi, Y. (1999) ‘Data Mining’, in IEBM Handbook <strong>of</strong> Information Technology in<br />

Business, Edited by M. Zeleny, International Thomson Publishing Europe.<br />

6.3 Other sources <strong>of</strong> information.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language 3<br />

Analysis and Design<br />

Data management 36<br />

Role <strong>of</strong> IS in Organizations 3<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___9__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically ___5__ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __10___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

-331-


No coverage<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

This course provides students theoretical issues for designing and constructing data warehouse<br />

and implementing data mining.<br />

Hours<br />

10.1 The fundamental principles <strong>of</strong> Data Warehousing and Data Mining 5<br />

11.0 Problem analysis:<br />

Students learn theoretical and practical methods to design and construct data warehouse and<br />

implementing data mining. After covering the essential concepts, issues, techniques to build an<br />

effective data warehouse, this course emphasizes the various techniques <strong>of</strong> data mining, such as<br />

association, classification, clustering and prediction for on-line analyses within the framework <strong>of</strong><br />

a data warehouse architectures. This course also promotes students to conduct a real-life data<br />

analyzing project.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

10/7/03 Initial ABET version Shi<br />

6/25/03 ABET cleanup Wolcott<br />

10/09/07 Update <strong>of</strong> resource material Shi<br />

10/2/08 Review completed Shi<br />

-332-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4890/ CSCI 4890<br />

Course Title<br />

Data Warehousing and Data Mining<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the fundamental principles <strong>of</strong> X<br />

data warehousing and data mining<br />

Describe the difference between<br />

X<br />

transactional databases and data<br />

warehouses<br />

Describe the relationship between OLAP<br />

and Data Warehousing<br />

Use SQL to manage data in data<br />

X<br />

X<br />

warehousing and data mining<br />

Build a data mart<br />

S<br />

Design and implement a data warehouse X S<br />

Carry out data integration and<br />

X<br />

transformation<br />

Use and create simple data mining<br />

X<br />

algorithms<br />

Apply some commercial tools to conduct<br />

X<br />

data mining<br />

Interpret <strong>of</strong> data mining results X X<br />

-333-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-334-


ISQA 4900 Internet Systems Development<br />

Department and Course Number ISQA-4900/CSCI-4900<br />

Course Title<br />

Internet Systems Development<br />

Course Coordinator<br />

Matt Payne<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/13/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course focuses on contemporary techniques and technologies in the design,<br />

development, and integration <strong>of</strong> web-enabled information systems. Topics include:<br />

Multi-tiered systems architecture; rapid application development; object-oriented<br />

analysis and design; prototyping; testing, verification, and validation; lifecycle models;<br />

and component-based development. This is a rapidly moving, hands-on course that<br />

mirrors real-world development.<br />

1.2 For whom course is intended.<br />

Students pursing either a <strong>BIS</strong> or BCS degree with the Internet Technologies (iT)<br />

concentration who have achieved junior or senior standing.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CSCI 2850 Programming on the Internet<br />

1.3.2 CSCI 2830 Java I<br />

1.3.3 Completion <strong>of</strong> two additional courses within the iT concentration<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 The equivalent <strong>of</strong> one semester’s exposure to Java programming<br />

1.4.2 Introductory experience creating simple web-based applications using server-side<br />

technologies such as PHP, CGI, ASP, or Cold Fusion<br />

1.4.3 General understanding <strong>of</strong> networking concepts such as OSI reference model and<br />

TCP/IP.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

-335-


2.1 Manage change in the context <strong>of</strong> distributed systems development & maintenance;<br />

2.2 Define appropriate architectures for distributed applications systems and the<br />

infrastructure supporting them;<br />

2.3 Apply appropriate methodologies for distributed systems development;<br />

2.4 Conduct analysis, design, and implementation using an object-oriented paradigm; and<br />

2.5 Create Internet-based, distributed systems.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Introduction 6<br />

3.1.1 Introduction : Speed, change, and integration:<br />

the impact <strong>of</strong> current trends on systems development.<br />

3.1.2 Technical Architectures<br />

3.1.3 Multi-tiered Architecture<br />

3.1.4 Client-server systems<br />

3.1.5 Internet-based architecture<br />

3.1.6 Object-based architecture<br />

3.2 Middleware 9<br />

3.2.1 Distributed Services<br />

3.2.2 Integration<br />

3.2.3 Web services<br />

3.3 Methodology 9<br />

3.3.1 Extreme Programming<br />

3.3.2 Other agile methodologies<br />

3.4 Object-oriented technologies 6<br />

3.4.1 Analysis<br />

3.4.2 Design<br />

3.4.3 Unified Modeling Language<br />

3.4.4 Use cases<br />

3.5 Modern Enabling Technologies 14<br />

3.5.1 Java<br />

3.5.2 J2EE<br />

3.5.3 Web Services & Service Oriented Architectures<br />

3.5.4 Wireless<br />

3.5.5 Component Models & Components<br />

3.5.6 Application Servers<br />

-336-


4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The course will employ a variety <strong>of</strong> teaching methods including lectures and hands-on<br />

guided projects. Assignments will include a combination <strong>of</strong> individual and group<br />

components. The course may be team taught by two or more pr<strong>of</strong>essors.<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in discussions, complete programming<br />

assignments, evaluate a web programming framework (e.g. struts, spring, etc) and<br />

complete both individual and group elements <strong>of</strong> a semester project.<br />

4.3 4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Students will work on a capstone systems development project throughout the semester.<br />

The project will be broken down into a number <strong>of</strong> modules that reflect the topics covered<br />

in the course, but will also draw on material learned in the prerequisite courses.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component Grading<br />

Exams 20%<br />

Homework 30%<br />

Final Exam 20%<br />

Project 30%<br />

5.3 Grading scale and criteria.<br />

-337-


Points Grade<br />

97-100% A+<br />

92-96% A<br />

89-91% A-<br />

86-88% B+<br />

82-85% B<br />

79-81% B-<br />

76-78% C+<br />

72-75% C<br />

69-71% C-<br />

66-68% D+<br />

62-65% D<br />

59-61% D-<br />


Affect Engineering Practice?” Internet Computing, IEEE, Piscataway: NJ. Vol. 1, No.<br />

1; January-February, pp. 30-38.<br />

6.4.4 Britton, C. (2001) “IT Architectures and Middleware: Strategies for Building Large,<br />

Integrated Systems,” Addison-Wesley, Upper Saddle River: NJ<br />

6.4.5 Christensen, M.J. and Thayer, R.H. (2002) The Project Manager's Guide to<br />

S<strong>of</strong>tware Engineering's Best Practices, IEEE, Piscataway: NJ.<br />

6.4.6 Cusumano, M. and Y<strong>of</strong>fie. D. (1998) Competing on Internet Time: Lessons from<br />

Netscape and Its Battle with Micros<strong>of</strong>t. Free Press/Simon & Schuster, New York.<br />

6.4.7 Cusumano, M. and Y<strong>of</strong>fie. D. (1999) “S<strong>of</strong>tware Development on Internet Time,”<br />

Internet Computing, IEEE, Piscataway: NJ. Vol. 32, No. 10; OCTOBER 1999, pp. 60-<br />

69<br />

6.4.8 Goldmann S. & Kötting, B. (July-August 1999) “Collaborative Work S<strong>of</strong>tware<br />

Engineering over the Internet” Internet Computing, IEEE, Piscataway: NJ. Vol. 3,<br />

No. 4; pp. 93-94.<br />

6.4.9 Guide to the S<strong>of</strong>tware Engineering Body <strong>of</strong> Knowledge SWEBOK (December 2001),<br />

Executive Editors: Alain Abran and James W. Moore, Editors: Pierre Bourque and<br />

Robert Dupuis. IEEE, Piscataway: NJ.<br />

6.4.10 Harmon, P, Rosen M, & Guttman, M. (2001) “Developing E-Business Systems and<br />

Architectures,” Morgan Kaufmann, San Francisco: CA.<br />

6.4.11 Ince, D. (2002), “Developing Distributed and E-Commerce Applications,” Addison-<br />

Wesley, Upper Saddle River: NJ.<br />

6.4.12 “Internet Watch: The Network Maturity Model for Internet Development<br />

Network Maturity Model Development Team,” (October 1999) Ed. Ron Vetter,<br />

Computer , IEEE, Piscataway: NJ Vol. 32, No. 10; pp. 117-118.<br />

6.4.13 Knoernschild, K. (2002). Java Design: Objects, UML, & Process. Addison Wesley.<br />

6.4.14 Linthicum, D. (2000), “Enterprise Application Integration,” Addison Wesley, Upper<br />

Saddle River: NJ.<br />

6.4.15 Matena, V & Stearns, B (2001) “Applying Enterprise JavaBeans(TM): Component-<br />

Based Development for the J2EE(TM) Platform,” Sun Microsystems.<br />

6.4.16 Szyperski, C (1999) “Component S<strong>of</strong>tware: Beyond Object-Oriented<br />

Programming,” Addison-Wesley, Harlow: England.<br />

6.4.17 Wampler, B.E. (2002). The essence <strong>of</strong> object-oriented programming with Java and<br />

UML. Addison-Wesley.<br />

6.4.18 Läufer, Konstantin“A Hike through Post-EJB J2EE Web Application Architecture”<br />

Computing in Science & Engineering Sept/Oct 2005. On 10/13/08 online at<br />

http://tinyurl.com/5xyo6y (which redirects to computer.org)<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 14<br />

Networking and telecommunications<br />

Modern programming language 6<br />

-339-


Analysis and Design 6<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __1___ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically _____ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __15___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage.<br />

10.0 Theoretical content:<br />

Concepts <strong>of</strong> applications and infrastructure architecture, including physical and logical<br />

architecture, and component-based construction <strong>of</strong> s<strong>of</strong>tware systems (6 hours)<br />

11.0 Problem analysis:<br />

Students will learn to conduct analysis using an object-oriented paradigm.<br />

12.0 Solution design:<br />

Students will learn contemporary techniques and technologies in the design, development, and<br />

integration <strong>of</strong> web-enabled information systems. Specifically, students will learn to define<br />

appropriate architectures for distributed applications systems and the infrastructure supporting<br />

them, conduct design, and implementation using an object-oriented paradigm; and they will<br />

create Internet-based, distributed systems.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

4/30/2003 In the methodologies unit, replace<br />

JAD, RAD, prototyping, and system<br />

life-cycle with agile methodologies,<br />

particularly extreme programming.<br />

Wolcott JAD, RAD, prototyping, and<br />

system life-cycle are covered<br />

adequately in ISQA 4110 and<br />

ISQA 4120.<br />

6/25/03 ABET clean-up Wolcott<br />

10/13/08 Added homework, presentation, and Matt<br />

textbook. Replaced ORBs with SOA. Payne<br />

-340-<br />

Currently, web services and<br />

SOA are more common than<br />

ORBs in the field.


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA-4900/CSCI-4900<br />

Course Title<br />

Internet Systems Development<br />

Course Coordinator<br />

Matt Payne<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Manage change in the context <strong>of</strong><br />

distributed systems development &<br />

maintenance;<br />

Define appropriate architectures for<br />

distributed applications systems and the<br />

infrastructure supporting them;<br />

Apply appropriate methodologies for<br />

distributed systems development;<br />

Conduct analysis, design, and<br />

implementation using an object-oriented<br />

paradigm; and<br />

Create Internet-based, distributed<br />

systems.<br />

X<br />

X<br />

S<br />

S<br />

S<br />

S<br />

S<br />

S<br />

-341-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-342-


ISQA 4910 Introduction to Project Management<br />

Department and Course Number ISQA 4910<br />

Course Title<br />

Introduction to Project Management<br />

Course Coordinator<br />

Donna Dufner<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/13/08<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course<br />

This course will cover the basics <strong>of</strong> project planning, scheduling and control. Earned value<br />

management techniques and project quality will be covered. Risk management will also be<br />

covered. The student will be introduced to the IEEE Standards for Project Management. The<br />

purpose <strong>of</strong> the course is to provide students with an introduction to the tools and techniques<br />

used to manage projects to achieve successful completion. The project management methods<br />

taught are suitable for a wide variety <strong>of</strong> project types such as s<strong>of</strong>tware development or<br />

engineering projects (e.g. construction).<br />

1.2 For whom course is intended<br />

The course is intended for undergraduate students in the schools <strong>of</strong> IS&T, Business Administration<br />

and Engineering who need to learn the fundamentals <strong>of</strong> project management.<br />

1.3 Prerequisites <strong>of</strong> the course<br />

1.3.1 CIST 2500 Introduction to Applied Statistics for IS&T<br />

1.3.2 CIST 2110 Organizations, Applications, and Technology<br />

1.3.3 Or equivalent<br />

1.4 Unusual circumstances <strong>of</strong> the course<br />

2.0 Objectives<br />

None<br />

2.1 Understand the fundamentals <strong>of</strong> project planning, project scheduling, and project control,<br />

2.2 Understand earned value project management,<br />

2.3 Understand quality issues for project management,<br />

2.4 Understand the fundamentals <strong>of</strong> the management <strong>of</strong> risk<br />

2.5 Apply the fundamentals earned value project management tools and techniques,<br />

-343-


2.6 Create Work break down structures,<br />

2.7 Manage projects using the Critical Path Methodology,<br />

2.8 Manage projects using the Cost performance index (CPI) as a performance and forecasting metric,<br />

2.9 Manage projects using the Schedule performance index (SPI) as a performance and forecasting<br />

metric, and<br />

2.10 Calculate and evaluate the actual performance against baseline metrics for project management<br />

and control.<br />

3.0 Content and Organization<br />

List <strong>of</strong> topics to be covered in chronological sequence<br />

Contact Hours<br />

3.1 Fundamentals <strong>of</strong> project planning, scheduling and control<br />

3.1.1 Introduction to Project Management 2<br />

3.1.2 The role <strong>of</strong> the project manager 2<br />

3.1.3 Project Definition 1.5<br />

3.1.4 Project Planning 3<br />

3.1.5 Developing the Implementation Plan 2<br />

3.1.6 Managing Project Risk 3<br />

3.1.7 Project Scheduling 5<br />

3.1.8 Project Control 3<br />

3.1.9 Managing people and teams 3<br />

3.2 Introduction and overview <strong>of</strong> earned value project management 3<br />

3.3 The genesis and evolution <strong>of</strong> earned value and the earned value<br />

body <strong>of</strong> knowledge 3<br />

3.4 Project management as performed in a major <strong>Omaha</strong> corporation<br />

(guest Speaker) 2<br />

3.5 Establishing the earned value baseline 2<br />

3.6 Earned value baseline preparation and evaluation 2<br />

3.7 Performance Monitoring using the project baseline 2<br />

3.8 Forecasting final cost and schedule results 2<br />

3.9 Customer requirements and planning for quality 1<br />

3.10 Achieving project quality. 1<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used<br />

The primary teaching method will be discussion, case studies, lecture, guest speakers, and<br />

demonstration.<br />

4.2 Student role in the course<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned projects and papers, and complete required examinations<br />

4.3 Contact hours<br />

Three (3) hours per week.<br />

-344-


5.0 Evaluation<br />

5.1 Types <strong>of</strong> student products<br />

The student products will be: two examinations (a midterm and final), a ten-page research paper,<br />

and an oral presentation.<br />

5.2 Basis for determining the final grade<br />

Grades will be determined on the basis <strong>of</strong> the student’s participation in class (10%) development<br />

<strong>of</strong> a ten page research paper based on readings from the trade and the empirical, peer reviewed<br />

literature (30%), and achievement on examinations (60 % <strong>of</strong> final grade). The specific weights<br />

shall be specified in the outline for the particular class.<br />

Component Grading<br />

Examinations 50%<br />

Research Report 30%<br />

Participation 10%<br />

Presentation 10%<br />

5.3 Grading Scale and Criteria<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />


6.1.3 Guide to the Project Management Body <strong>of</strong> Knowledge (PMBOK Guide) by the Project<br />

Management Institute Standards Committee, Newton Square, PA. 2004.<br />

6.2 Other suggested reading materials or equivalent<br />

Additional articles that have been collected for various topics are available at the UNO Library.<br />

These articles are used to supplement topics presented in various chapters.<br />

6.3 Other sources for gathering information or equivalent<br />

Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />

relevant to topics in systems analysis and design. The process is particularly important in keeping<br />

current with technology and new methodologies.<br />

6.4 Current bibliography or equivalent.<br />

6.4.1 Adams, John, R., Principles <strong>of</strong> Project Management. Newtown Square, PA: Project<br />

Management Institute, 1997.<br />

6.4.2 Bicknill, D. The Politics <strong>of</strong> Failure. Computer Weekly. (July 6, 1995): 28-30.<br />

6.4.3 Garner, R. “Captain <strong>of</strong> Crunch.” Computerworld. 31, 40 (Oct. 6, 1997): 81-83.<br />

6.4.4 Gautschi, T. Three keys to successful design products. Design News. Aug. 11, 1997 v52<br />

n15 p188 (1).<br />

6.4.5 Hebert B., “Tracking progress: More companies are recognizing the value <strong>of</strong> project<br />

management as part <strong>of</strong> their overall strategy – particularly in times <strong>of</strong> changes”, CMA<br />

management, Feb. 2002, v75, i10, p. 24-27.<br />

6.4.6 Hillier F., Hillier M., Lieberman G., Introduction to management science, Chapter 7,<br />

McGraw Hill, Primis Online, 2000.<br />

6.4.7 Meyer A., Loch C., Pich M., “Managing project uncertainty: from variation to chaos;<br />

project managers can’t predict the future, but accurately gauging the degree <strong>of</strong><br />

uncertainty inherent in their projects can help them quickly adapt to it”, MIT Sloan<br />

Management Review, Winter 2002, v43, i2, p. 60-67.<br />

6.4.8 Mourier P., Smith M., “Restarting a stalled project”, Security Management, Oct. 2001,<br />

v45, i10, p. 32-35.<br />

6.4.9 O’Connell, E., & Saiedian, H. “Can You Trust S<strong>of</strong>tware Capability Evaluations.”<br />

Perspectives. Feb. 2000.<br />

6.4.10 Organizing projects for success. Project Management Institute, Inc., Newton Square, PA.<br />

2000.<br />

6.4.11 Pinto, J. and Kharbanda, O. “How to fail in project management.” Business Horizons. 39,<br />

4 (July-Aug. 1996): 45-54.<br />

6.4.12 PMI Standards Committee, Guide to the PMBOK. Newtown Square, PA: Project<br />

Management Institute, 2004.<br />

6.4.13 Robert, R.W. “Creating an Environment for Project Success.” Project Management. 1997.<br />

6.4.14 Verma, V., Organizing Projects for Success. Newtown Square, PA: Project Management<br />

Institute, 1995.<br />

6.4.15 Verma, V. Human Resource Skills for the Project Manager. Newtown Square, PA: Project<br />

Management Institute, 1996.<br />

6.4.16 Wideman, R. (ed.) Project & Program Risk Management. Newtown Square, PA: Project<br />

Management Institute, 1992.<br />

-346-


7.0 (IS Program) Estimate Computing Accreditation (CAC) Category<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design 15<br />

Data Management<br />

Role <strong>of</strong> IS in Organizations 3<br />

8.0 Oral and Written Communication<br />

Every student is required to submit at least __1___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __10+___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues<br />

9.1 Emphasis on open and honest communication with all project stakeholders.<br />

9.2 Emphasis on the customer’s needs both explicit and requirements and implicit.<br />

9.3 Emphasis on accurate and consistent project tracking and reporting to management.<br />

10.0 Theoretical Content<br />

Hours<br />

10.1 Earned Value Analysis 2<br />

11.0 Problem Analysis<br />

11.1 Critical Path<br />

11.2 Earned Value Analysis<br />

12.0 Solution Design<br />

12.1 Project Plan<br />

12.2 Risk Assessment and control<br />

12.3 Project schedule control through earned value analysis<br />

12.4 Lifecycle development<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

5/1/2003 Textbook added Dufner<br />

6/10/2003 Added CIST 2500 and CIST 2110 as<br />

prerequisites<br />

Wolcott These two courses were listed as<br />

prerequisites in the catalog, but not<br />

on the formal syllabus.<br />

-347-


7/10/03 Change course description – Course Change<br />

form 10-15-02<br />

10/16/08 Changed description, objectives. Updated<br />

reference list<br />

Wild<br />

Dufner<br />

-348-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4910<br />

Course Title<br />

Introduction to Project Management<br />

Course Coordinator<br />

Donna Dufner<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the fundamentals <strong>of</strong> project<br />

X X S S<br />

planning, project scheduling, and project<br />

control<br />

Understand earned value project<br />

S S S<br />

management<br />

Understand quality issues for project<br />

X S S<br />

management<br />

Understand the fundamentals <strong>of</strong> the<br />

X X S S<br />

management <strong>of</strong> risk<br />

Apply the fundamentals earned value<br />

S S X<br />

project management tools and<br />

techniques<br />

Create Work break down structures X S S X<br />

Manage projects using the Critical Path<br />

S S S X S<br />

Methodology<br />

Manage projects using the Cost S S X S<br />

-349-


performance index (CPI) as a<br />

performance and forecasting metric<br />

Manage projects using the Schedule<br />

performance index (SPI) as a<br />

performance and forecasting metric<br />

Calculate and evaluate the actual<br />

performance against baseline metrics for<br />

project management and control<br />

S S X S<br />

S S X S<br />

-350-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-351-


-352-


APPENDIX 3 – FACULTY VITAE<br />

On separate pages, please furnish the following information for all faculty members who teach courses allowed<br />

for the major, including those who have administrative positions in the department (chair, associate chair, etc.).<br />

Use the form given below as guidance. This form need not be followed exactly, but all requested information<br />

should be supplied. Use a common format for all faculty members. Limit information to no more than three<br />

pages per person, providing only the most recent information if needed to limit space. Place the form(s) for<br />

administrators first, followed by the others in alphabetical order.<br />

If you are having more than one program evaluated, particularly if the programs are on separate campuses,<br />

indicate clearly the program(s) and/or campus(es) to which an individual is assigned, and the percentage <strong>of</strong> time<br />

to each, if more than one.<br />

-353-


-354-


Hesham Ali, Dean<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Hesham H. Ali<br />

Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Associate Dean for<br />

Academic Affairs,<br />

College <strong>of</strong> Information<br />

Science and Technology<br />

Pr<strong>of</strong>essor, Department<br />

<strong>of</strong> Computer Science<br />

Associate Pr<strong>of</strong>essor,<br />

Department <strong>of</strong><br />

Computer Science<br />

Assistant Pr<strong>of</strong>essor,<br />

Department <strong>of</strong><br />

Computer Science<br />

Dates Held<br />

January 2000 – July 2006<br />

August 2000 – Present.<br />

August 1994 – August 2000.<br />

August 1988 – August 1994<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph. D Computer Science <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-Lincoln 1988<br />

M. Sc Computer Science Alexandria <strong>University</strong>, Egypt 1985<br />

B. Sc Computer Science Alexandria <strong>University</strong>, Egypt 1982<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

-355-


Dates Where Duties<br />

June 2000 –<br />

Present<br />

October 2001 –<br />

Present<br />

Department <strong>of</strong> Pathology and<br />

Microbiology, <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> Medical Center<br />

<strong>Nebraska</strong> Informatics Center<br />

for Life Sciences (NICLS)<br />

2002 – Present <strong>Nebraska</strong> Center for Biosecurity<br />

(NCB), <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong><br />

August 1996 -<br />

August 1997<br />

Department <strong>of</strong> Computer<br />

Science, SQU, Muscat, Oman<br />

Associate Pr<strong>of</strong>essor (courtesy)<br />

Deputy Director for Computational sciences<br />

Member<br />

Visiting Associate Pr<strong>of</strong>essor (Acting Department<br />

Head January 1997 – August 1997).<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Lee D. and Willa Seemann Distinguished Dean, College <strong>of</strong> Information Science and Technology,<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong><br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

-356-


P. Ciborowski and H. Ali, Bioinformatics In: Proteomics for Undergraduates. Book Chapter in A. Kraj and<br />

J. Silberring (eds.), Wiley Inc., 2008.<br />

H. Ali and N. Sherwani, Introduction to Graph Algorithms, to be published by Wiley & Sons, 2008.<br />

X. Deng , H. Geng and H. Ali, “A Hidden Markov Model Approach to Predicting Yeast Gene Function from<br />

Sequential Gene Expression Data,” The International Journal <strong>of</strong> Bioinformatics Research and<br />

Applications, 2008.<br />

X. Deng , H. Geng and H. Ali, “Cross-platform Analysis <strong>of</strong> Cancer Biomarkers: A Bayesian Network<br />

Approach to Incorporating Mass Spectrometry and Microarray Data,” Journal <strong>of</strong> Cancer Informatics,<br />

2007.<br />

A. Sadanandam, M. Varney, L. Kinarsky, H. Ali, R. Lee Mosley, R. Singh, “Identification <strong>of</strong> Functional Cell<br />

Adhesion Molecules with a Potential Role in Metastasis by a Combination <strong>of</strong> in vivo Phage Display and in<br />

silico Analysis,” OMICS: A Journal <strong>of</strong> Integrative Biology, Mar 2007, Vol. 11, No. 1: 41-57.<br />

X. Huang and H. Ali, “High Sensitivity RNA Pseudoknot Prediction,” Nucleic Acid Research, 2007.<br />

H. Geng, X. Deng and H. Ali, “MPC: a Knowledge-based Framework for Clustering under Biological<br />

Constraints,” Int. J. Data Mining and Bioinformatics, Volume 2, Number 2, 2007.<br />

A. Abdelaal, H. Ali and H. Sharif, A Coarse-Grain Analysis for the Performance <strong>of</strong> Measurement-based<br />

Admission Control Algorithms. Journal <strong>of</strong> Computational Methods in Science and Engineerning, Volume<br />

6, Number 5-6, pp. S349-S358, 2006.<br />

X. Deng, H. Geng, D. Bastola and H. Ali, “Link Test — A Statistical Method for Finding Prostate Cancer<br />

Biomarkers," Journal <strong>of</strong> Computational Biology and Chemistry, 2006.<br />

A. Churbanov, I. Rogozine, J. Deogun, and H. Ali, “Method <strong>of</strong> Predicting Splice Sites Based on Signal<br />

Interactions,” Biology Direct, 2006.<br />

X. Deng, H. Geng, and H. Ali, “Joint Learning <strong>of</strong> Gene Functions--A Bayesian Network Model Approach".<br />

Journal <strong>of</strong> Bioinformatics and Computational Biology, Vol. 4, No. 2, pp. 217-239, 2006.<br />

X. Deng and H. Ali, EXAMINE, “A Computational Approach to Reconstructing Gene Regulatory<br />

Networks,” Journal <strong>of</strong> BioSystems, 81:125-136, 2005.<br />

A. Churbanov, M. Pauley, D. Quest and H. Ali, “A method <strong>of</strong> precise mRNA/DNA homology-based gene<br />

structure prediction,” BMC Bioinformatics, 6:261, 2005.<br />

A. Mohamed, D. Kuyper, P. Iwen, H. Ali, D. Bastola and S. Hinrichs, “Computational approach for the<br />

identification <strong>of</strong> Mycobacterium species using the internal transcribed spacer-1 region,” Journal <strong>of</strong><br />

Clinical Microbiology, Vol. 43, No. 8: 3811-3817, 2005.<br />

-357-


A. Churbanov, I. Rogozin, V. Babenko, H. Ali and E. Koonin, Evolutionary conservation suggests a<br />

regulatory function <strong>of</strong> AUG triplets in 5'UTRs <strong>of</strong> eukaryotic genes, Nucleic Acid Research, 33(17), pp.<br />

5512-20, Sep 2005.<br />

D. Plum and H. Ali, An Evolutionary Approach to Vehicle Routing Problem with dynamic time and<br />

Precedence Relationships. Journal <strong>of</strong> Computational Methods in Science and Engineerning, Volume 5,<br />

Number1, pp. S57-S66, 2005.<br />

N. Sharma, J. Youn, N. Shrestha and H. Ali, “Direction Finding Signage System using RFID for Healthcare<br />

Applications,” Proceedings <strong>of</strong> The International Conference on BioMedical Engineering and Informatics<br />

(BMEI2008), Sanya, Hainan, China, May 27-30, 2008.<br />

J. Uher, D. Sad<strong>of</strong>sky, J. Youn, H. Ali, H. Sharif, J. Deogun, and S. Hinrichs, “I2MeDS: Intelligent Integrated<br />

Medical Data System,” Proceedings <strong>of</strong> The International Conference on BioMedical Engineering and<br />

Informatics (BMEI2008), Sanya, Hainan, China, May 27-30, 2008.<br />

H. Geng, H. Ali and J. Chan, “A Hidden Markov Model Approach for Prediction <strong>of</strong> Genomic Alterations from<br />

Gene Expression Pr<strong>of</strong>iling,” Proceedings <strong>of</strong> the fourth International Symposium on Bioinformatics Research<br />

and Applications (ISBRA), Atlanta, Georgia, May 6-9, 2008.<br />

D. Qwest, K. Dempsey, D. Bastola and H. Ali, “A Parallel Architecture for Regulatory Motif Algorithm<br />

Assessment,” Proceedings <strong>of</strong> the Seventh IEEE International Workshop on High Performance Computational<br />

Biology (HiCOMP 2008), in conjunction with IPDPS 2008. Miami, Florida, April 24-30, 2008.<br />

S. Pawaskar and H. Ali, “Dynamic Energy Aware Task Scheduling for Periodic Tasks using Expected<br />

Execution Time Feedback,” Proceedings <strong>of</strong> the International Conference on Parallel Computing and<br />

Networks (PDCN 2008), Innsbruck, Austria, Feb 12-14, 2008.<br />

Y. Mohsenin and H. Ali, “A New Genetic Algorithm for Resource Constrained Project Scheduling,”<br />

Proceedings <strong>of</strong> the International Conference on Artificial Intelligence and Applications (AIA 2008),<br />

Innsbruck, Austria, Feb 11-13, 2008.<br />

D. Bastola, S. Chandio, P. Iwen, S. Hinrichs and H. Ali, “RFLP-WAVE Analysis for Rapid Identification <strong>of</strong><br />

Medically Important Fungi,” Proceedings <strong>of</strong> the 2008 Hawaii International Conference on System Sciences<br />

(HICSS-41), Kona, January 7-10, 2008.<br />

S. Kanapuram and H. Ali, “On the Impact <strong>of</strong> configuration <strong>of</strong> Access Points on the Performance <strong>of</strong> Wireless<br />

Networks,” Proceedings <strong>of</strong> the International Conference on Parallel and Distributed Computing and Systems<br />

(PDCS 2007), Cambridge, November 19-21, 2007.<br />

X. Huang and H. Ali, “Reducing Folding Scenario Candidates in Pseudoknots Detection Using Highly<br />

Sensitive PLMM_DPSS Algorithm Integrated With Energy Filters,” Proceedings <strong>of</strong> the 7th IEEE<br />

International Conf on Bio-Informatics and Bio-Engineering (BIBE 2007), pp. 1299 -1303, Boston, October<br />

14-17, 2007.<br />

J. Youn, H. Ali, H. Sharif, J. Deogun, J. Uher and S. Hinrichs, “WLAN-based Real-time Tracking System in<br />

Healthcare,” Proceedings <strong>of</strong> IEEE Wireless and Mobile Computing, Networking and Communications<br />

(WiMob 2007), White Plain, New York, October 8-10, 2007.<br />

S. Mudundi and H. Ali, “A Robust Scalable Cluster-Based Multihop Routing Protocol for Wireless Sensor<br />

Networks,” Proceedings <strong>of</strong> the Fifth International Symposium on Parallel and Distributed Processing and<br />

Applications (ISPA07), Niagara Falls, Canada, August 29-31, 2007.<br />

D. Quest, W. Tapprich and H. Ali, “A Grammar Based Methodology for Structural Motif Finding in ncRNA<br />

Database Search, Proceedings <strong>of</strong> the 2007,” IEEE Computer Society Bioinformatics Conference (CSB 2007),<br />

-358-


<strong>University</strong> <strong>of</strong> California, San Diego, USA, August 13-17, 2007.<br />

A. Abdelaal and H. Ali, “A Typology for Community Wireless Networks Business Models,” Proceedings <strong>of</strong><br />

2007 Americas Conference on Information Systems (AMCIS-13 2007), Keystone, Colorado, August 9-12,<br />

2007.<br />

S. Mudundi and H. Ali, “A New Robust Genetic Algorithm for Dynamic Cluster Formation in Wireless<br />

Sensor Networks,” Proceedings <strong>of</strong> the International Conference on Wireless and Optical Communication<br />

(WOC 2007), Montréal, Canada, May 30- June 01, 2007.<br />

S. Pawaskar and H. Ali, “Dynamic Energy Aware Task Scheduling using Run-Queue Peek,” Proceedings <strong>of</strong><br />

the International Conference on Parallel Computing and Networks (PDCN 2007), Innsbruck, Austria, Feb 13-<br />

15, 2007.<br />

H. Geng, J. Iqbal, X. Deng, W. Chan and H. Ali, “Virtual CGH: Prediction <strong>of</strong> Novel Regions <strong>of</strong><br />

Chromosomal Alterations in Natural Killer Cell Lymphoma from Gene Expression Pr<strong>of</strong>iling,” Proceedings <strong>of</strong><br />

the 2007 Hawaii International Conference on System Sciences (HICSS-40), Kona, January 3-6, 2007.<br />

S. Kanapuram, H. Ali and G. de Vreede, “On Effective Utilization <strong>of</strong> Wireless Networks in Collaborative<br />

Applications,” Proceedings <strong>of</strong> the Second International Conference on Collaborative Computing<br />

(CollaborateCom 2006), Atlanta, Georgia, November 17-20, 2006.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

“CCLI: Integrating Bioinformatics into the Life Sciences,” Co-PI, National Science Foundation (NSF), total<br />

Award at UNO: $149,807, January 15, 2008 – December 31, 2009.<br />

“Design and Development <strong>of</strong> Secure and Robust Network Infrastructure for Critical Medical<br />

Applications,” PI, <strong>Nebraska</strong> Research Initiative (NRI), total Award at UNO: $367,671, July 1, 2006 – June<br />

30, 2008.<br />

“Center for Mobile Computing,” PI, NSF EPSCoR, total Award at UNO: $500,000, February 1, 2004 –<br />

January 31, 2007.<br />

“<strong>Nebraska</strong> High Performance Wireless Research and Education Network,” PI, <strong>Nebraska</strong> Research<br />

Initiative (NRI), total Award at UNO: $681,232, July 1, 2004 – June 30, 2006.<br />

“IDeA Networks for Biomedical Research Excellence,” Co-I: (PI <strong>of</strong> UNO component), NIH INBRE, total<br />

Award at UNO: $1,382,586, June 1, 2004 – May 31, 2009.<br />

“Center for Mobile Computing,” PI, Supplement Grant, NSF EPSCoR, total Award at UNO: $35,000,<br />

February 1, 2005 – January 31, 2006.<br />

“The Development <strong>of</strong> Med-IT Cancer Data Management System,” MaCallie & Associates, PI, $44,000,<br />

March 1, 2005 – May 5, 2006.<br />

“<strong>Study</strong> <strong>of</strong> Innovative Approaches for Efficient Satellite Communications,” Co-PI, A Joint IST and CET (PKI)<br />

-359-


Project, L-3 Compcept, $300,000, March 25, 2005 – March 25, 2006.<br />

“<strong>Nebraska</strong> Research Network in Functional Genomics,” Co-I (PI <strong>of</strong> UNO Component), Supplement Grant,<br />

NIH, total Award at UNO: $195,190, June 1, 2005 – April 30, 2006.<br />

“High-Technology Workforce Support for Baccalaureate Degree Seeking Students,” Co-PI, NSF STEP,<br />

total Award at UNO: $1,999,416, June 1, 2004 – May 31, 2009.<br />

“Construction <strong>of</strong> a Targeted Rhesus Macaque Microarray,” Co-PI (PI <strong>of</strong> UNO Component), NIH, total<br />

Award at UNO: $239,282, June 18, 2003 – April 30, 2006.<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number<br />

Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009<br />

Fall 2008<br />

CSCI<br />

4150/8156<br />

MATH<br />

4150/8156<br />

BIO<br />

4860/8866<br />

Graph Theory and Applications 3 17<br />

Graph Theory and Applications 3 4<br />

Bioinformatics Algorithms 3 11<br />

Summer 2008 CSCI 8325 Data Structures 3 1<br />

Spring 2008<br />

CSCI<br />

4150/8156<br />

MATH<br />

4150/8156<br />

Graph Theory and Applications 3 23<br />

Graph Theory and Applications 3 13<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

-360-


14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-361-


-362-


Deepak Khazanchi, Associate Dean<br />

Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Deepak Khazanchi<br />

Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Associate Pr<strong>of</strong>essor <strong>of</strong> Information Systems and Quantitative Analysis 7/2000 - 7/2001<br />

Full Pr<strong>of</strong>essor <strong>of</strong> Information Systems and Quantitative Analysis<br />

8/2001 - till date<br />

Associate Pr<strong>of</strong>essor <strong>of</strong> Information Systems and Quantitative Analysis 7/2000 – 7/ 2001<br />

Interim Department Chair, Information Systems and Quantitative Analysis 6/2001 - 4/2002<br />

Peter Kiewit Distinguished Pr<strong>of</strong>essor (Discontinued due to the move to an<br />

8/2005 - 11/ 2006<br />

administrative position)<br />

Department Chair, Information Systems and Quantitative Analysis 4/2002 -11/2006<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. Management Information Systems Texas Tech <strong>University</strong>, Lubbock 1991<br />

M.B.A Southern Illinois <strong>University</strong>- Carbondale, Carbondale 1988<br />

B. Tech<br />

(Honors)<br />

Civil Engineering Indian Institute <strong>of</strong> Technology, Kharagpur, India 1981<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

N/A<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Abdelaal, A., Ali, H. and Khazanchi, D. (2009, Jan 5-8). “The Role <strong>of</strong> Social Capital in the Creation <strong>of</strong><br />

Community Wireless Networks.” Proceedings <strong>of</strong> the forty-second Annual Hawaii International<br />

Conference on Systems Sciences (HICSS-42). [PDF]<br />

Davis, A. and Khazanchi, D. (2008, June 9-11). An exploratory investigation <strong>of</strong> the development <strong>of</strong><br />

mutual knowledge in global virtual project teams. Proceedings <strong>of</strong> the 16th European Conference on<br />

Information Systems (ECIS-16), Galway, Ireland.<br />

Khazanchi, D., Murphy, John and Petter, S. (2008, May 23-24). "Guidelines for Evaluating Patterns in<br />

-363-


the IS Domain", Proceedings <strong>of</strong> the 2nd Midwest United States Association for Information Systems<br />

Conference (MWAIS08), Eau Claire, Wisconsin.<br />

Petter, S., Khazanchi, D. and Murphy, J. (2008, May 7-9). "A Design Science Based Evaluation<br />

Framework for Patterns", In: V. Vaishnavi & R. Baskerville (Eds). Proceedings <strong>of</strong> the Third<br />

International Conference on Design Science Research in Information Systems and Technology<br />

(DESRIT 2008), May 7- 9, 2008, Atlanta, Georgia: Georgia State <strong>University</strong>.<br />

Davis, A. and Khazanchi, D. (2007, August 9-12). The influence <strong>of</strong> online word <strong>of</strong> mouth on product<br />

sales in retail e-commerce: An empirical investigation . Proceedings <strong>of</strong> the 13th Annual Americas<br />

Conference on Information Systems (AMCIS-13), Keystone, Colorado.<br />

Murphy, J. D. and Khazanchi, D. (2007, May 18-19th). "The Effects <strong>of</strong> Pairing Participants in<br />

Facilitated Group Support Systems Sessions." Proceedings <strong>of</strong> the 2nd Midwest United States<br />

Association for Information Systems Conference (MWAIS07), Springfield, Illinois. Awarded 2nd Best<br />

Paper.<br />

Davis, A. and Khazanchi, D. (2007, May 18-19th). "The Influence <strong>of</strong> Transactive Memory on Mutual<br />

Knowledge in Virtual Teams: A Theoretical Proposal." Proceedings <strong>of</strong> the 2nd Midwest United States<br />

Association for Information Systems Conference (MWAIS07), Springfield, Illinois.<br />

Zigurs, I. and Khazanchi, D. (2007, May 18-19, 2007). Panel on “Transforming education in<br />

information systems and technology,” the 2nd Midwest United States Association for Information<br />

Systems Conference (MWAIS 2007), Springfield, Illinois. Also participated as a panelist.<br />

Peng, Y., Kou, G., Sabatka, A., Matza, J., Chen, Z., Khazanchi, D. and Shi, Y. (2007, May 27-30).<br />

"Application <strong>of</strong> Classification Methods to Individual Disability Income Insurance Fraud Detection".<br />

International Conference on Computational Science (ICCS 2007), Beijing, China.<br />

Yan, Nian and Khazanchi, D. (2007, May 27-30). "Concept Level Web Search via Semantic<br />

Clustering". International Conference on Computational Science (ICCS 2007), Beijing, China.<br />

Khazanchi, D. and Zigurs, I. (2007, January 3-7). "An Assessment Framework for Developing and<br />

Using Patterns for the Effective Management <strong>of</strong> Virtual Projects." Proceedings <strong>of</strong> the Hawaii<br />

International Conference on System Sciences (HICSS-40).<br />

Arnold, V., Hampton, C., Khazanchi, D. and Sutton, S. (2006; September 7-8th). "Risk Analysis in<br />

Extended Enterprise Environments: Identification <strong>of</strong> Critical Risk Factors in B2b E-Commerce<br />

Relationships". Proceedings <strong>of</strong> the Fourth Annual CABIT (Center for Advancing Business through<br />

Information Technology) Symposium, Phoenix, AZ, http://symposium.cabit.wpcarey.asu.edu.<br />

Ni, Jinlan and Khazanchi, D. (2006; November 18-21). "Asymmetric Information and New IT<br />

Investment", Proceedings <strong>of</strong> the Decision Sciences Institute's 37th Annual Meeting, San Antonio, TX.<br />

Peng, Y., Kou, G., Sabatka, A., Chen, Z., Khazanchi, D. and Shi, Y. (2006, October 25-27th).<br />

"Application <strong>of</strong> Clustering Methods to Health Insurance Fraud Detection", Proceedings <strong>of</strong> the IEEE<br />

International Conference on Services Systems and Services Management (ICSSSM06), Université de<br />

Technologie de Troyes, France (http://www.utt.fr/icsssm06/).<br />

Martin, A. and Khazanchi, D. (2006, August 4-6th). "Information Availability and Security Policy".<br />

Proceedings <strong>of</strong> the Americas Conference on Information Systems (AMCIS 2006), Acapulco, Mexico.<br />

Tarmizi, H., Khazanchi, D. and Noteboom, C. (2006, May 5-6th). "Electronic Medical Records:<br />

Barriers to Adoption and Diffusion." Proceedings <strong>of</strong> the 1st Midwest United States Association for<br />

Information Systems Conference (MWAIS06), Grand Rapids, Michigan.<br />

Davis, A. and Khazanchi, D. (2006, May 5-6th). "Mutual Knowledge and its Impact on Virtual Team<br />

Performance." Proceedings <strong>of</strong> the 1st Midwest United States Association for Information Systems<br />

Conference (MWAIS06), Grand Rapids, Michigan.<br />

Attended AMCIS 2004 NYC as a delegate and AMCIS 2005 conference co-chair<br />

-364-


Khazanchi, D. and Zigurs, I. (2005, May 21st, 2005). "Patterns <strong>of</strong> Virtual Projects", PMI Project<br />

Management Research Programme Working Session", Edinburgh, Scotland, UK (part <strong>of</strong> the PMI<br />

Global Congress-EMEA).<br />

V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton (2005, August 7-10th). "B2B E-Commerce<br />

Assurance: The Influence <strong>of</strong> Partner Risk on Assurance Desirability & Relationship Satisfaction."<br />

American Accounting Association (AAA) Annual Meeting, San Francisco, California.<br />

V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton. (2004, August 8-11th). "Risk Analysis in an<br />

Extended Enterprise Environment: Identification <strong>of</strong> Key Risk Factors in B2B E-Commerce<br />

Relationships." Proceedings <strong>of</strong> the American Accounting Association (AAA) Annual Meeting,<br />

Orlando, Florida.<br />

V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton (2004, November 5-6th). "B2B E-Commerce<br />

Assurance: The Influence <strong>of</strong> Partner Risks On Continuous Assurance Desirability & Relationship<br />

Satisfaction." The Eighth Rutgers Continuous Auditing & Reporting Symposium<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

N/A<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

N/A<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Committee membership – 5 hours/week<br />

Advising – 3 hours/week<br />

Associate Dean for Academic Affairs – 20 hours/week (carries an additional stipend)<br />

Grant Administration, Writing and Development – 5 hours/week<br />

Supervision <strong>of</strong> Graduate students (including MS and PhD)– 3 hours/week<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

UNMC Interoperability Standards Task Force (2009-).<br />

Chair, IS&T Scholarship Committee (2009-).<br />

Chair, IA Faculty Search Committee (2009-)<br />

Peter Kiewit Institute (PKI) Executive Director Search Committee (2008-09).<br />

UNMC Clinical Data Standards (CDR) Committee (2007-08)<br />

Chancellor Search Committee (2006-07)<br />

-365-


IS&T ABET Steering Committee (2003-till date)<br />

General Education Think Tank (2006-till date)<br />

College <strong>of</strong> IST Grant Writer Search Committee, 2006<br />

General Education Review Task Force (2006-till date)<br />

Scott Scholarship Selection Committee (2003-until date)<br />

Academy <strong>of</strong> Excellence Selection Committee (2004-till date)<br />

Walter Scott Entrepreneurship Award Committee (2005-2007; Committee Chair, 2006)<br />

Peter Kiewit Institute Student Entrepreneurship Award Committee (2005-2007; Committee Chair, 2006)<br />

PKI Chairs Committee (2001-2005)<br />

IS&T Academic Prioritization Report Task Force, (2005)<br />

IS&T IT Steering Committee (2005-2006)<br />

IS&T Dean's Expanded Executive Committee (2001-till date)<br />

Academy <strong>of</strong> Excellence (AOE) Committee (2005-till date)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Owens, D., Davis, A., Murphy, J., Khazanchi, D. and Zigurs, I. (2009, March-April). "Moving First Life into<br />

Second Life: Real World Opportunities for Virtual Teams and Virtual World Project Management." IT<br />

Pr<strong>of</strong>essional (a IEEE Publication), Volume 11, Issue 2, pp. 34-41.<br />

Davis, A., Owens, D., Murphy, J., Khazanchi, D. and Zigurs, I. (2009, February). "Avatars, People, and Virtual<br />

Worlds: Foundations for Research in Metaverses." Journal <strong>of</strong> the Association for Information Systems, Volume<br />

10, Issue 2 , Article 2, pp. 90-117.<br />

Ni, J. and Khazanchi, D. (2009, March, Forthcoming). "Information Technology (IT) Investment Decisions<br />

Under Asymmetric Information: A Modified Rational Expectation Model." International Journal <strong>of</strong> Information<br />

Technology and Decision Making (IT&DM), Volume 8, Issue 1. [Pre-Print Draft PDF].<br />

Murphy, J. and Khazanchi, D. (2008, Fall). "Synergistic Ideation through Pairing Participants in Facilitated<br />

Group Support Systems Sessions." American Journal <strong>of</strong> Business, Volume 23, No. 2, pp. 27-35. [PDF].<br />

Davis, A. and Khazanchi, D. (2008, May). "An Empirical <strong>Study</strong> <strong>of</strong> Online Word <strong>of</strong> Mouth as a Predictor for<br />

Multi-product Category E-commerce Sales", Electronic Markets, Volume18, Issue 2, pp. 130-141. [PDF]<br />

Zigurs, I. and Khazanchi, D. (2008, Spring). "From Pr<strong>of</strong>iles to Patterns: A New View <strong>of</strong> Task-Technology Fit."<br />

Information Systems Management, Volume 25 Issue 1, pp. 8 –13. [PDF].<br />

Sutton, S., Khazanchi, D., Hampton, C. and Arnold, V. (2008, Special Issue). "Risk Analysis in Extended<br />

Enterprise Environments: Identification <strong>of</strong> Critical Risk Factors in B2B E-Commerce Relationships." Journal <strong>of</strong><br />

the Association <strong>of</strong> Information Systems (JAIS), Volume 9, Issue 3/4, Article 4, pp. 151-174. [PDF].<br />

Davis, A. and Khazanchi, D. (2007, Fall). "Does Mutual Knowledge Affect Virtual Team Performance?<br />

Theoretical Analysis and Anecdotal Evidence." American Journal <strong>of</strong> Business (AJB), Volume 22, No. 2, pp. 57-<br />

65. [PDF].<br />

Khazanchi, D. and Zigurs, I. (2006, July-September). "Patterns for Effective Management <strong>of</strong> Virtual Projects:<br />

Theory and Evidence." International Journal <strong>of</strong> electronic Collaboration (IJeC) -- Special Issue on Collaborative<br />

Project Management, Volume 2, No. 3, pp. 25-49. [PDF].<br />

Dasgupta, P. and Khazanchi, D. (2005). "An Adaptive Decision Support System for Academic Course<br />

Scheduling Using S<strong>of</strong>tware Agents." International Journal <strong>of</strong> Technology in Teaching and Learning (IJTTL),<br />

Volume 1, Issue 2, 63-78. [PDF].<br />

Khazanchi, D. (2005, Spring). "Information Technology (IT) Appropriateness: The Contingency Theory <strong>of</strong> “Fit”<br />

-366-


and IT Implementation in Small and Medium Enterprises". Journal <strong>of</strong> Computer Information Systems, Volume<br />

XLV, No. 3, pp. 88-95.<br />

Owens, D. and Khazanchi, D. (2009; Forthcoming). "S<strong>of</strong>tware Quality Assurance." In: Kidd, T.T. (2009),<br />

Handbook <strong>of</strong> Research on Technology Project Management, Planning and Operations, Hershey, PA:<br />

Information Science Reference (an imprint <strong>of</strong> IGI Global).<br />

Khazanchi, D. and Martin, A. (2009). "Information Availability." In: Gupta, J.D. and Sharma, S. Editors (2009),<br />

Handbook <strong>of</strong> Research on Information Security and Assurance, Hershey, PA: IGI Global, Chapter XIX, pp. 230-<br />

239.<br />

Zigurs, I. and Khazanchi, D. (2008). "Applying Pattern Theory in the Effective Management <strong>of</strong> Virtual Projects."<br />

In: Kock, N., Editor (2008), E-Collaboration in Modern Organizations: Initiating and Managing Distributed<br />

Projects, Advances in e-Collaboration Series, Volume 2, Hershey, PA: IGI Global, Chapter VII, pp. 93-112.<br />

Zigurs, I., Khazanchi, D. and Mametjanov, A. (2007). "The Practice and Promise <strong>of</strong> Virtual Project<br />

Management." In: Kock, N., Editor (2007, December), Encyclopedia <strong>of</strong> E-Collaboration, Hershey, PA:<br />

Information Science Reference (an imprint <strong>of</strong> IGI Global), ISBN: 978-1-59904-000-4, Chapter 116, pp. 1-7.<br />

[PDF]. Also published in Kisielnicki, J., Editor (2008, June), Virtual Technologies: Concepts, Methodologies,<br />

Tools, and Applications, Hershey, PA: Information Science Reference (an imprint <strong>of</strong> IGI Global), ISBN: 978-1-<br />

59904-955-7, Chapter 1.13, pp. 177-184.<br />

Khazanchi, D. and Zigurs, I. (2008). "Patterns for Effective Management <strong>of</strong> Virtual Projects: Theory and<br />

Evidence." Also published in Kisielnicki, J., Editor (2008, June), Virtual Technologies: Concepts, Methodologies,<br />

Tools, and Applications, Hershey, PA: Information Science Reference (an imprint <strong>of</strong> IGI Global), ISBN: 978-1-<br />

59904-955-7, Chapter 7.2, pp. 1368-1389.<br />

Khazanchi, D. & Zigurs, I. (2005). Patterns <strong>of</strong> effective management <strong>of</strong> virtual projects: An exploratory study.<br />

Newtown Square, PA: Project Management Institute. ISBN: 1930699832.<br />

V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton. (2004). Enterprise Risk Management: Identifying Risk in<br />

B2B E-Commerce Relationships. Altamonte Springs, Fl: The Institute <strong>of</strong> Internal Auditors (IIA) Research<br />

Foundation. ISBN: 0-89413-554-6. [To purchase this book, please visit the IIA book store]. 102 pages.<br />

Khazanchi, D. and Reich, B.H. (2008, October). "Achieving IT project success through control, measurement,<br />

managing expectations, and top management support," (Guest Editorial), International Journal <strong>of</strong> Project<br />

Management (IJPM). Volume 26, Issue 7 , pp. 699.<br />

Davis, A. , Khazanchi, D., Murphy, J., Owens, D., & Zigurs, I. (2008). "Challenges and lessons learned from<br />

virtual world research," Midwest Association for Information System (MWAIS) Newsletter, 2 (2), pp. 3.<br />

Khazanchi, D. and Petter, S. (2006; Fall). "The Need for Improved IT Project Manegemnet in e-Service Projects<br />

and Beyond" (Guest Editors' Column), e-Service Journal (e-SJ), 5:1, pp. 1-3.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

Gouttierre, T. (PI) and Khazanchi, D. (IT-coordinator) (1/1/2009-12/31/2010; In progress). "US-Russia Partnership<br />

for Technology, Language, and Cultural Exchange", $398,103 grant from the US Department <strong>of</strong> Education.<br />

Khazanchi, D. and Zigurs, I. (2008). "Metaverse Research Lab", funded by the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Foundation<br />

for $20,000.<br />

Khazanchi, D., Najjar, L. and Wolcott, P. (1/1/2008-3/2009). "Business Database Competitive Audit Project".<br />

Awarded a grant <strong>of</strong> $17,603 for conducting a comparative business database audit for InfoUSA.<br />

Munkvold, B.E., Moe, C.E, Khazanchi, D. and Zigurs, I. (2008-2011; In progress). " Partnerships in Higher Education<br />

Norway - North America 2008-2011". <strong>University</strong> <strong>of</strong> Agder (UiA), Kristiansand, Norway and UNO's IS&T<br />

-367-


collaborated to obtain a grant <strong>of</strong> nearly $100,000 per year for 3.5 years from the Norwegian Centre for<br />

International Cooperation in Higher Education (an agency under the Ministry <strong>of</strong> Education and Research) to<br />

continue and extend the partnership between UiA and UNO. Khazanchi will serve as the Project Director for<br />

administering the grant on the UNO campus. The grant will fund large student exchanges between the two<br />

universities (35 students each way) and allow faculty and researchers to visit each campus for workshops and to<br />

establish and expand research collaborations.<br />

Davis, A., Zigurs, I., Khazanchi, D. and Munkvold, B. (June – August 2007). "Teaching and learning virtual<br />

collaboration across cultures and technologies,” funded by <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> Institute for<br />

Collaboration Science (ICS) Summer Seed Grant, $1000.<br />

Khazanchi, D. (3/2007). "infoUSA: Spring Break in India " Awarded $45,000 by infoUSA for UNO/UNL students visit<br />

to India to learn about Indian businesses, culture and educational workshops at UNO's sibling university, IIT<br />

Kharagpur.<br />

Buchanan, L. (PI; 2007) and Khazanchi, D. (Consultant). "Follow-up Relationships Intended to END Smoking<br />

(Portable Electronic Device <strong>Study</strong>)". $40,000 award from <strong>Nebraska</strong> Dept <strong>of</strong> Health and Human Services Cancer and<br />

Smoking Grants (LB 506).<br />

Khazanchi, D. (2006). UNMC (<strong>University</strong> Medical Center - College <strong>of</strong> Nursing) sub-grant for $3000 to develop a<br />

"Portable Electronic Device Application" for Buchanan, L. (2006) for her "Follow-up Relationships Intended to END<br />

Smoking (Portable Electronic Device <strong>Study</strong>)" research initiative.<br />

Khazanchi, D., Chen, Z. and Shi, Y. (6/26/2006 to 7/26/2006; Completed). "Mutual <strong>of</strong> <strong>Omaha</strong> Special Investigation<br />

Department (SID) Data Mining Project – Individual Disability Income Product". Awarded $23,900 by Mutual <strong>of</strong><br />

<strong>Omaha</strong>.<br />

de Vreede, Gert-Jan, Jones, E., Khazanchi, D., Rilett, L. and Zigurs, I. (2005; Completed). "Applying Patterns <strong>of</strong><br />

Technology-Enabled Distributed Collaboration: Improving Multi-Actor Decision-Making in Traffic Systems."<br />

Awarded $10,000 by the PKI Coordinating Council, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>.<br />

Khazanchi, D. and Shi, Y. (7/1/2005 to 8/31/2005; Completed). "SID-Data Classification for Disability Income<br />

Product". Awarded $22,500 by Mutual <strong>of</strong> <strong>Omaha</strong>.<br />

Khazanchi, D. (7/1/2005-7/12006). "infoUSA: PKI-IIT-VGSOM Student/Faculty Exchange Grant." Awarded $35,000<br />

by infoUSA.<br />

Najjar, L., Khazanchi, D., and Wolcott, P. (1/1/2005 to 3/1/2005; Completed). "Business Database Competitive<br />

Audit Project". Awarded a grant <strong>of</strong> $14,575 for conducting a business database audit for InfoUSA. This project is<br />

being conducted under the auspices <strong>of</strong> the PKI Technology Development Corp (PKITDC).<br />

Harvey, D. and Khazanchi, D. (11/2004 to 7/2005; Completed). “Union Pacific -- Engineering Management Group<br />

Systems Project.” Awarded a grant <strong>of</strong> $94,655 for the systems analysis for EMG's information systems needs. This<br />

project was conducted with the assistance <strong>of</strong> a Scott incubator partner, DOCenter Inc. under the auspices <strong>of</strong> the<br />

PKI Technology Development Corp (PKITDC).<br />

Khazanchi, D. and Zigurs I. (October 1st-April 15th, 2005; Completed). "Mutual <strong>of</strong> <strong>Omaha</strong> Simulation Project --<br />

Phase II." Awarded $16,100 by Mutual <strong>of</strong> <strong>Omaha</strong>.<br />

Khazanchi, D. (9/1/2004-8/2007). "Web-based Reentry Case Management System." Award for $70,910 as a as a<br />

part (sub-grant) <strong>of</strong> the <strong>Nebraska</strong> Department <strong>of</strong> Corrections grant to Sample, L and Spohn, C. (2004), "<strong>Nebraska</strong>'s<br />

Serious and Violent Offender Reentry Program".<br />

Khazanchi, D. (7/1/2004; Completed). "infoUSA: PKI-IIT-VGOSM Student/Faculty Exchange Grant." Awarded<br />

$30,000 by infoUSA.<br />

Khazanchi, D. and Zigurs, I. (1/2004-12/2004; Completed). “Patterns <strong>of</strong> Virtual Projects: Identifying Effective<br />

Blueprints for Virtual Project Management”. Report submitted in fulfillment <strong>of</strong> a grant sponsored by the Project<br />

Management Institute’s (PMI) Project Management Research Program. The total grant was for $63,000 ($30,000<br />

from PMI and the remainder in matching funds in the form <strong>of</strong> computing resources and faculty time from the<br />

-368-


College <strong>of</strong> IS&T, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>).<br />

Harvey, D. and Khazanchi, D. (3/2004 to 7/2004; Completed). “Union Pacific -- Medical Systems Project.” Awarded<br />

a grant <strong>of</strong> $75,240 for the systems analysis <strong>of</strong> medical systems integration with HR at Union Pacific. This project<br />

was conducted with the assistance <strong>of</strong> a Scott incubator partner, DOCenter Inc. under the auspices <strong>of</strong> the PKI<br />

Technology Development Corp (PKITDC).<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number<br />

Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall/2007 ISQA 9900 Advanced Research in Virtual Project Management 3 4<br />

(Doctoral Seminar)<br />

Spring/2008 ISQA 9010 Foundations <strong>of</strong> IS Research (Doctoral Seminar) 3 5<br />

Fall/2008 ISQA 9020 Technical and Process Issues in IS Research (Doctoral 3 5<br />

Seminar)<br />

Spring/2009 ISQA 9010 Foundations <strong>of</strong> IS Research (Doctoral Seminar) 3 1<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __33___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Business to Business (B2B) Electronic Commerce & Risk Management<br />

o EDI Impacts on Small and Medium Sized Enterprises (SMEs)<br />

o B2B Risk Management<br />

o B2B Assurance<br />

o Risk Management in the Extended Enterprise Environment<br />

IT Project Management<br />

o Virtual Project Management/Virtual World Project Management<br />

o Best Practices in Project Management<br />

o Project Management Training<br />

o Project Management Assurance<br />

Application <strong>of</strong> Philosophy Science to IS/T Research<br />

o Relevance <strong>of</strong> IS Research<br />

o Scientific Realism in IS Research<br />

o Truth in IS Research<br />

o Patterns Theory and Design Science<br />

o Validation <strong>of</strong> Concepts<br />

Mutual Knowledge in Virtual Teams<br />

Metaverses, Virtual Worlds and Other Reality Environments<br />

-369-


14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-370-


Ilze Zigurs, ISQA Department Chair<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Ilze Zigurs<br />

Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Pr<strong>of</strong>essor<br />

Dates Held<br />

August 2001 - Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. Business<br />

<strong>University</strong> <strong>of</strong> Minnesota 1987<br />

Administration/ MIS<br />

M.B.A. <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> 1981<br />

B.A. English Literature <strong>University</strong> <strong>of</strong> Washington, Seattle 1971<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Teaching Circles, "Chairs & Directors Teaching Circle", UNO, <strong>Omaha</strong>, NE, USA. (October 2008 - May<br />

2009). Served as coordinator <strong>of</strong> teaching circle.<br />

Teaching Circles Participant, "Web Collaboration", UNO, <strong>Omaha</strong>, NE, USA. (October 2008 - May 2009).<br />

Workshop Attended, "The Pedagogical Potential <strong>of</strong> Second Life for Higher Education", UNO Faculty<br />

Development, <strong>Omaha</strong>, NE, USA. (September 25, 2008).<br />

Conference Attendance, "International Conference on Information Systems". (December 2008).<br />

Conference Attendance, "<strong>Nebraska</strong> Research and Innovation Conference", EPSCoR, Lincoln, NE, USA.<br />

(October 28, 2008).<br />

Conference Attendance, "CRIWG 2008", <strong>Omaha</strong>, NE, USA. (September 14, 2008 - September 18, 2008).<br />

-371-


Seminar, "XBRL: Opportunities and Challenges", Creighton <strong>University</strong>, <strong>Omaha</strong>, NE, USA. (September 8,<br />

2008).<br />

Conference Attendance, "Americas Conference on Information Systems". (August 2008).<br />

Conference Attendance, "MWAIS Third Annual Conference", Eau-Claire, Wisconsin, USA. (May 2008).<br />

Attended ICAN Women's Leadership Conference, Qwest Center, April 2006<br />

Attended Americas Conference on Information Systems (AMCIS), August 2006<br />

Attended International Conference on Information Systems (ICIS), December 2006<br />

Attended Special Interest Group in Project Management, all-day workshop prior to ICIS Conference,<br />

December 2006<br />

Attended sessions at 11 th Annual Americas Conference on Information Systems, <strong>Omaha</strong>, <strong>Nebraska</strong>,<br />

August 11-14, 2005<br />

Attended sessions at International Conference on Information Systems, Las Vegas, Nevada, December 9-<br />

13, 2006<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

PKI Executive Director Search Committee, Committee Member, 1 hour<br />

College Representatives Committee, Center for Collaboration Science, Committee Chair, 1 hour<br />

Statewide EPSCoR Committee, Committee Member, 1 hour<br />

Adobe Connect Pilot Project, Program Coordinator, 1 hour<br />

Selection Committee for IDEA award, Committee Chair, 0.5 hours<br />

Twelve-Month Operational Plan Task Force Committee, Committee Member, 0.5 hours<br />

ABET Steering Committee, Committee Member, 2 hours<br />

Distance Education Steering Committee, Ex-<strong>of</strong>ficio member, 1. hour<br />

Women in IT, Faculty Mentor, 1 hour<br />

CIST Roundtable, Co-coordinator <strong>of</strong> CIST Roundtable series, 1 hour<br />

Workshop on Partnership Opportunities, UiA/UNO, Co-Coordinator <strong>of</strong> workshop, 1 hour<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Chair, ISQA Pr<strong>of</strong>essional Development and Concerns Committee, Spring 2006<br />

-372-


<strong>Nebraska</strong> EPSCoR Committee, appointed by Governor <strong>of</strong> State <strong>of</strong> <strong>Nebraska</strong>, through November 2007<br />

College Representatives Committee, Institute for Collaboration Science, 2006 - present<br />

Search Committee for Dean <strong>of</strong> College <strong>of</strong> IS&T, 2006<br />

Selection Committee for Award for Distinguished Research or Creative Activity, 2006 - 2007<br />

<strong>University</strong> Pr<strong>of</strong>essorship Committee, 2005-2006<br />

College Personnel Committee, 2005-2006<br />

ISQA Graduate Program Committee through December 2005<br />

ISQA Recruiting Committee, Summer and Fall 2005<br />

Department personnel committee, 2005-2006<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Davis, A., & Zigurs, I. (forthcoming). Trust in virtual teams: Solved or still a mystery? Database for<br />

Advances in Information Systems.<br />

Owens, D., Davis, A., Murphy, J., Khazanchi, D., & Zigurs, I. (2009). Moving first life into Second Life: Real<br />

world opportunities for virtual teams and virtual world project management, IT Pr<strong>of</strong>essional, May/June,<br />

27-34.<br />

Davis, A., Murphy, J., Owens, D., Khazanchi, D., & Zigurs, I. (February 2009). Avatars, people, and<br />

metaverses: Foundations for research in virtual worlds, Journal <strong>of</strong> the Association for Information<br />

Systems, 10(2), Article 2, 90-117.<br />

Germonprez, M., & Zigurs, I. (January 2009). Task, technology, and tailoring in communicative action: An<br />

in-depth analysis <strong>of</strong> group communication, Information and Organization, 19(1), 22-46.<br />

DeSanctis, G., Poole, M.S., Zigurs, I., DeSharnais, G., D’On<strong>of</strong>rio, M., Gallupe, B., Holmes, M., Jackson, B.,<br />

Jackson, M., Lewis, H., Limayem, M., Lee-Partridge, J., Niederman, F., Sambamurthy, V., Vician, C.,<br />

Watson, R., Billingsley, J., Kirsch, L., Lind, R., and Shannon, D., (Special Issue 2008). The Minnesota GDSS<br />

research project: Group support systems, group processes, and outcomes, Journal <strong>of</strong> the Association for<br />

Information Systems, 9(10/11), 551-608.<br />

Zigurs, I., and Khazanchi, D. (2008). From pr<strong>of</strong>iles to patterns: A new view <strong>of</strong> task-technology fit.<br />

Information Systems Management, 25(1), 8-13.<br />

Cousins, K., Robey, D., & Zigurs, I. (2007). Managing strategic contradictions in hybrid teams, European<br />

Journal <strong>of</strong> Information Systems, 16(4), 460-478.<br />

Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., de Vreede, G.-J., & Zigurs, I. (2007).<br />

Collaboration engineering in distributed environments, e-Service Journal, 6(1), 76-97.<br />

Munkvold, B.E., & Zigurs, I. (2007). Process and technology challenges in swift-starting virtual teams,<br />

Information & Management, 44, 287-299.<br />

Tarmizi, H., de Vreede, G-J., & Zigurs, I. (January-March, 2007). Leadership challenges in communities <strong>of</strong><br />

practice: Supporting facilitators via design and technology, International Journal <strong>of</strong> e-Collaboration, 3(1),<br />

18-39.<br />

Khazanchi, D. & Zigurs, I. (July-Sept 2006). Patterns for effective management <strong>of</strong> virtual projects: Theory<br />

and evidence, International Journal <strong>of</strong> e-Collaboration, 2(3), 25-48.<br />

Munkvold, B. E. & Zigurs, I. (April-June 2005). Integration <strong>of</strong> e-collaboration technologies: Research<br />

opportunities and challenges, International Journal <strong>of</strong> e-Collaboration, 1(2), 1-24 (invited paper,<br />

-373-


editorially reviewed).<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

“Applying Patterns <strong>of</strong> Technology-Enabled Distributed Collaboration: Improving Multi-Actor Decision-<br />

Making in Traffic Systems,” funded by <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, Research Collaboration Seed Grant,<br />

$10,000, April – December, 2005.<br />

“Mutual <strong>of</strong> <strong>Omaha</strong> Simulation Project – Phase Two,” funded by Mutual <strong>of</strong> <strong>Omaha</strong> Corporation through<br />

The Peter Kiewit Institute Technology Development Corporation, $16,160, September 27 – December<br />

20, 2004 (with D. Khazanchi).<br />

“Patterns <strong>of</strong> Virtual Projects: Identifying Effective Blueprints for Virtual Project Management,” funded by<br />

Project Management Institute, $30,000, January – December, 2004 (with D. Khazanchi).<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Course<br />

Term/year number<br />

Fall 2008 CIST 1010-<br />

001<br />

Fall 2008 CIST 1010-<br />

002<br />

Spring ISQA<br />

2008 9030-001<br />

Fall 2007 ISQA<br />

9900-001<br />

Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Foundations <strong>of</strong> Information Science and<br />

1 35<br />

Technology<br />

Foundations <strong>of</strong> Information Science and<br />

1 29<br />

Technology<br />

Behavioral/Organizational Issues 3 2<br />

Advanced Research in Information Systems 3 3<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

-374-


40%<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _n/a___%.<br />

-375-


-376-


John Clark<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

John W. Clark<br />

Instructor<br />

n/a<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Instructor<br />

Dates Held<br />

January 1999-Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

B.S.<br />

Computer<br />

Science<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> September 1994 -<br />

May 1998<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

-377-


5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

December<br />

1994-present<br />

Clark S<strong>of</strong>tware Solutions <strong>Self</strong> employed as a s<strong>of</strong>tware consultant / programmer<br />

Designing and writing s<strong>of</strong>tware mostly for the<br />

Department <strong>of</strong> Defense, and the Department <strong>of</strong> the<br />

Army, as well as NASA. This has ranged from large scale<br />

Java database applications to embedded C and C++ for<br />

handheld devices. This work has included several<br />

applications <strong>of</strong> graph theory as well as image and video<br />

processing in real-time. This business grew from doing<br />

desktop support, networking and troubleshooting for<br />

individuals and small business.<br />

August 1997 -<br />

December<br />

1998<br />

July 1995-<br />

August 1997<br />

Technical Support Inc.<br />

HKS Medical Information<br />

Systems<br />

S<strong>of</strong>tware Engineer<br />

Duties included consultant programming to customer<br />

specifications, design and recommendation on custom<br />

s<strong>of</strong>tware, project management, and customer relations.<br />

Part-time programmer<br />

Duties include writing data-feed parsers, web pages used<br />

for remote patient tracking, dynamically generated<br />

patient reports, Unix system administration, database<br />

management, on site and remote technical support for<br />

several hospitals, and Intel based hardware repair and<br />

construction.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

See Item #6 above.<br />

-378-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Course<br />

Semester Class<br />

Term/year number<br />

Course title<br />

hrs size<br />

Spring 2009 CSCI 1620- Introduction to Computer Science II 3 11<br />

001<br />

CSCI 1620- Introduction to Computer Science II 3 18<br />

002<br />

CSCI 2840 C++ & Object Oriented Programming 3 6<br />

CSCI 3320 Data Structures 3 20<br />

Fall 2008 CSCI 1620- Introduction to Computer Science II 3 26<br />

001<br />

CSCI 1620- Introduction to Computer Science II 3 29<br />

002<br />

CSCI 1840 Advanced Topics in C 3 32<br />

-379-


CSCI 3320 Data Structures 3 29<br />

Summer 2008 CSCI 1620 Introduction to Computer Science II 3 15<br />

CSCI 3320 Data Structures 3 22<br />

Spring 2008 CSCI 1620- Introduction to Computer Science II 3 23<br />

001<br />

CSCI 1620- Introduction to Computer Science II 3 28<br />

002<br />

CSCI 1620- Introduction to Computer Science II 3 14<br />

003<br />

CSCI 2840 C++ & Object Oriented Programming 3 13<br />

Fall 2007 CSCI 1620- Introduction to Computer Science II 3 22<br />

001<br />

CSCI 1620- Introduction to Computer Science II 3 30<br />

002<br />

CSCI 1840 Advanced Topics in C 3 25<br />

CSCI 3320 Data Structures 3 24<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __0___%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: 50% CIST core; 50% CS.<br />

-380-


Sidney Davis<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Sidney Davis<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Assistant Pr<strong>of</strong>essor August 2000 – March 2003<br />

Associate Pr<strong>of</strong>essor March 2003 -- present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

B.M. Music Indiana <strong>University</strong> 1974<br />

MBA Business Southern Illinois <strong>University</strong> -- Carbondale 1983<br />

Ph.D. MIS Indiana <strong>University</strong> 1989<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

December 2005, HCI Research in MIS Workshop, Las Vegas Nevada<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

-381-


7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Committee member Undergraduate Program Committee 1.5 hours every 2 weeks<br />

Thesis committee for Thomas Bronieki, Master’s student, 3-4 hours prior to defense (Spring 2009)<br />

Senior editor, eService Journal, 3-4 hours for each paper that I receive for review<br />

Editorial Review Board member, Journal <strong>of</strong> Database Mgt., 2-3 hours for each review<br />

Ad hoc reviewer for Behaviour and Information Technology, 2-3 hours for each review<br />

Associate Editor for HCI track <strong>of</strong> ICIS 2009 (10-12 hours total)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Graduate Council 2003-2004 (Committee B, Courses, Programs, and Evaluations)<br />

Writing Across the Curriculum Committee (WAC, Fall 2007 – Fall 2008)<br />

College <strong>of</strong> IS&T RP&T Committee, 2005-2008<br />

College <strong>of</strong> IS&T Technology Committee, 2006 - 2007<br />

ISQA Dept. PD&C Committee, 2005-2008<br />

Undergraduate Program Committee, 2005-2008<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

-382-


12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall 2007 ISQA 3520 User Interface Design 3 11<br />

Fall 2007 ISQA 8525 User Interface Design 3 5<br />

Fall 2007 CIST 2910 Multimedia Systems 3 6<br />

Spring 2008 ISQA 3400 Data Communications 3 11<br />

Spring 2008 ISQA 3520 User Interface Design 3 11<br />

Spring 2008 ISQA 8525 User Interface Design 3 5<br />

Fall 2008 ISQA 3520 User Interface Design 3 16<br />

Fall 2008 ISQA 8525 User Interface Design 3 2<br />

Fall 2008 CIST 3100 Organizations, Applications, and Technology 3 24<br />

Spring 2009 ISQA 3400 Data Communications 3 23<br />

Spring 2009 ISQA 3520 User Interface Design 3 10<br />

Spring 2009 ISQA 8525 User Interface Design 3 3<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __15___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Editor and reviewer for 3 journals. Ad hoc reviewer for some journals. Served as committee chair for<br />

Master’s student.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-383-


-384-


G J de Vreede<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Gert-Jan de Vreede<br />

Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Pr<strong>of</strong>essor<br />

Dates Held<br />

2002-Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

PhD Delft <strong>University</strong> <strong>of</strong> Technology 1991-1995<br />

MSc Information Delft <strong>University</strong> <strong>of</strong> Technology 1986-1991<br />

Systems<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Program chair <strong>of</strong> GDN2010 (2008-2009)<br />

Co-chair <strong>of</strong> ECIS2010, Research in Progress track (2008-2009)<br />

Co-chair <strong>of</strong> Center for Collaboration Science’s 3rd Research Seminar, <strong>Omaha</strong>, NE. (2008-2009)<br />

Co-chair <strong>of</strong> HICSS09 & HICSS10 minitrack on Designing Collaboration Processes and Systems.<br />

Co-chair <strong>of</strong> GDN09 sessions on Collaborative Requirements Engineering in Group Decision Making &<br />

Negotiation (2008-2009)<br />

Co-chair <strong>of</strong> EuroPLOP’s 2008 Thematic track on Patterns<br />

Program committee member <strong>of</strong> ISD2008, CRIWG08-09, GDN2009<br />

Organization committee chair for CRIWG 2008, <strong>Omaha</strong>, NE<br />

Co-chair <strong>of</strong> ICS 2nd Research Seminar, <strong>Omaha</strong>, NE. (2007-2008)<br />

Co-chair <strong>of</strong> HICSS08 & HICSS09 minitrack on Designing Collaboration Processes and Systems.<br />

-385-


Co-chair <strong>of</strong> GDN08 sessions on Facilitation in Group Decision Making & Negotiation<br />

Co-chair <strong>of</strong> EuroPLOP’s Thematic track on Patterns (2007-2008)<br />

Program committee member <strong>of</strong> ISD2007-2008, CRIWG07-08, Group Decision & Negotiation (GDN2007-<br />

2008), ICGSE 2007 workshop on “Tools for Globally Distributed S<strong>of</strong>tware Development”<br />

Organization committee chair for CRIWG 2008, <strong>Omaha</strong>, NE.<br />

Co-chair <strong>of</strong> HICSS06 & HICSS07 minitrack on Designing Collaboration Processes and Systems.<br />

Co-chair <strong>of</strong> AMCIS06 & AMCIS07 minitrack on Collaboration Engineering.<br />

Co-chair <strong>of</strong> GDN06 sessions on Facilitation and Collaboration Engineering <strong>of</strong> Group Decision Making &<br />

Negotiation<br />

Co-chair <strong>of</strong> GDN07 sessions on Facilitation in Group Decision Making & Negotiation<br />

Program committee member <strong>of</strong> ISD2006-2007, CRIWG06-07, Group Decision & Negotiation (GDN2006-<br />

2007),<br />

Member <strong>of</strong> International Association <strong>of</strong> Science and Technology for Development (IASTED) Technical<br />

Committee on Information Systems (2006-2007)<br />

Co-chair <strong>of</strong> HICSS05 & HICSS06 minitrack on Designing Collaboration Processes and Systems.<br />

Co-chair <strong>of</strong> AMCIS05 & AMCIS06 minitrack on Collaboration Engineering.<br />

Co-chair <strong>of</strong> GDN05 sessions on Facilitation Support in GSS<br />

Co-chair <strong>of</strong> GDN06 sessions on Facilitation and Collaboration Engineering <strong>of</strong> Group Decision Making &<br />

Negotiation<br />

Program committee member <strong>of</strong> ISD2006, CRIWG05-06, Context2005, International Conference on<br />

Knowledge Sharing and Collaborative Engineering (KSCE 2004), Group Decision & Negotiation<br />

(GDN2005-2006), ISCRAM2006, 1st International Conference on “Future Challenges And Current Issues<br />

In Business Information, Organisation And Process Management”.<br />

Member <strong>of</strong> International Association <strong>of</strong> Science and Technology for Development (IASTED) Technical<br />

Committee on Information Systems (2005-2006)<br />

Program co-chair <strong>of</strong> CRIWG2004 conference, Costa Rica, September 2004.<br />

Co-chair <strong>of</strong> HICSS05 minitrack on Research Methods and Approaches in Organizational Systems<br />

Research.<br />

Co-chair <strong>of</strong> HICSS05 & HICSS06 minitrack on Designing Collaboration Processes and Systems.<br />

Co-chair <strong>of</strong> AMCIS05 minitrack on Collaboration Engineering.<br />

Co-chair <strong>of</strong> GDN05 sessions on Facilitation Support in GSS<br />

Program committee member <strong>of</strong> International Conference on Electronic Commerce (ICEC2004), ISD2005,<br />

CRIWG05, Context2005, International Conference on Knowledge Sharing and Collaborative Engineering<br />

(KSCE 2004), Group Decision & Negotiation (GDN2005).<br />

Member <strong>of</strong> International Association <strong>of</strong> Science and Technology for Development (IASTED) Technical<br />

Committee on Information Systems (2004-2005)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

2006- Director, Center for<br />

Collaboration Science<br />

2006 <strong>University</strong> <strong>of</strong> Pretoria Visiting Pr<strong>of</strong>essor<br />

-386-


7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

1997-1999 Multimedia Skills Part time senior consultant<br />

1991 Hoogovens Simulation study to evaluate the maintenance process in<br />

the Oxy-2 factory <strong>of</strong> the Hoogovens steel mill factory<br />

1991 Sint Franciscus Gasthuis Analysis <strong>of</strong> the design, development, and<br />

implementation <strong>of</strong> a maintenance information system at<br />

a Rotterdam hospital<br />

1991 Heineken Bierbrouwerijen Analysis <strong>of</strong> the design, development, and<br />

implementation <strong>of</strong> a maintenance information system at<br />

Heineken Breweries in Zoeterwoude<br />

1991 Hoogovens Analysis <strong>of</strong> the design, development, and<br />

implementation <strong>of</strong> a maintenance information system at<br />

the Hoogovens steel mill factory<br />

1989 Rijnconsult Design, development, and implementation <strong>of</strong> an<br />

information system for analyzing the organization <strong>of</strong><br />

maintenance departments<br />

1989 Van Nelle Evaluation <strong>of</strong> the maintenance processes at Van Nelle<br />

Rotterdam, a c<strong>of</strong>fee, tea, and tabacco factory<br />

1987 Dr. Neher Laboratories <strong>of</strong><br />

the PTT<br />

Design and implementation <strong>of</strong> an information system for<br />

managing book orders in a library<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Director <strong>of</strong> UNO’s Center for Collaboration Science, a multi-college, multi-disciplinary effort involving<br />

about 40 researchers across all UNO’s colleges.<br />

Member <strong>of</strong> the CBA Recruiting Committee for Marketing & Management.<br />

Facilitator for Vice Chancellor Hynes’ Budget Task Force<br />

Member <strong>of</strong> the IS&T Executive Committee<br />

Coordinated the re-design <strong>of</strong> PKI279 (ongoing)<br />

Facilitator for IS&T Advisory Board Strategic Planning<br />

Member <strong>of</strong> the ISQA Graduate Program Committee<br />

Member <strong>of</strong> the ISQA Pr<strong>of</strong>essional Development Committee<br />

-387-


9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Director <strong>of</strong> UNO’s Institute for Collaboration Science, a multi-college, multi-disciplinary efforts involving<br />

faculty across all UNO’s colleges. (2006-)<br />

Member <strong>of</strong> the ISQA Pr<strong>of</strong>essional Development Committee (2006-)<br />

Coordinated the re-design <strong>of</strong> PKI279 (2006-)<br />

Member and secretary <strong>of</strong> the IS&T Doctoral Program Committee (2003-)<br />

Member <strong>of</strong> the ISQA Graduate Program Committee (2003-)<br />

Member <strong>of</strong> the IS&T Executive Committee (2002-)<br />

Director <strong>of</strong> the Peter Kiewit Institute’s Program on Collaboration Engineering (2002-)<br />

Designed collaborative grant writing workshop for the College <strong>of</strong> Public Health (2007-2008)<br />

General Education Task Force: Designed and executed various workshops for the General Education<br />

task force. Point <strong>of</strong> contact: Associate Vice Chancellor Smith-Howell. (2006-2008)<br />

Facilitator for strategic discussions <strong>of</strong> Grad Council A. (2007-2008)<br />

Member <strong>of</strong> the ISQA Recruiting Committee (2006-2007)<br />

Designed and facilitated workshop for the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Federal Team to identify and discuss<br />

ways to achieve their priority goals concerning federal funding, 1 September 2005<br />

Designed and facilitated workshop for the School <strong>of</strong> Communication to prepare their self-study report,<br />

6 October 2005<br />

Honors Program contact for the ISQA Department (2005-2006)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Agres, A., Vreede, G.J. de, Briggs, R.O. (2005), A Tale <strong>of</strong> Two Cities – Case Studies on GSS Transition in<br />

Two Organizations, Group Decision & Negotiation, 14(4), 267-284.<br />

Briggs, R.O., Reinig, B., Vreede, G.J. de (2006), Meeting Satisfaction for Technology Supported Groups:<br />

An Empirical Validation <strong>of</strong> a Goal-Attainment Model, Small Group Research, 37(6), 1-26.<br />

Briggs, R.O., Reinig, B., Vreede, G.J. de (2008), The Yield Shift Theory <strong>of</strong> Satisfaction and its Application to<br />

IS/IT Domain, Journal <strong>of</strong> the Association for Information Systems, 9(5), 267-293.<br />

Davison, R., Vreede, G.J. de, Briggs, R.O. (2005), On Peer Review Standards for the Information Systems<br />

Literature, Communications <strong>of</strong> the AIS, 16(49), 967-980.<br />

Deokar, A., Kolfschoten, G.L., Vreede, G.J. de (2008), Prescriptive Workflow Design for Collaborationintensive<br />

Processes using the Collaboration Engineering Approach, Global Journal <strong>of</strong> Flexible Systems<br />

Management, 9(4), 13-24.<br />

Fruhling, A.L., Vreede, G.J. de (2006), Field Experiences with eXtreme Programming: Developing an<br />

Emergency Response System, Journal <strong>of</strong> Management Information Systems, 22(4), 39-68.<br />

Giaglis, G.M., Hlupic, V., Vreede, G.J. de, Verbraeck, A. (2005), Synchronous Design <strong>of</strong> Business Processes<br />

and Information Systems Using Dynamic Process Modelling, Business Process Management Journal,<br />

11(5), 488-500.<br />

Hengst, M. den, Vreede, G.J. de (2004), Collaborative Business Engineering: A Decade <strong>of</strong> Lessons from<br />

the Field, Journal <strong>of</strong> Management Information Systems, 20, 4, 87-115.<br />

Hengst, M. den, Vreede, G.J. de, Maghnouji (2007), R., Using S<strong>of</strong>t OR Principles for Collaborative<br />

-388-


Simulation: A Case <strong>Study</strong> in the Dutch Airline Industry, Journal <strong>of</strong> the OR Society advance online<br />

publication, 7 February 2007, (DOI 10.1057/palgrave.jors.2602353).<br />

Hlupic, V., Vreede, G.J. de (2005), Business Process Modelling using Discrete-Event Simulation: Current<br />

Opportunities and Future Trends, International Journal <strong>of</strong> Simulation and Process Modelling, 1(1/2), 72-<br />

81.<br />

Hlupic, V., Vreede, G.J. de, Orsoni, A. (2006), Modelling and Simulation Techniques for Business Process<br />

Analysis and Re-Engineering, International Journal <strong>of</strong> Simulation Systems, Science & Technology, 7(4-5),<br />

1-8.<br />

Kolfschoten, G.L., Briggs, R.O., Vreede, G.J., de, Jacobs, P.H.M., and Appelman, J.H. (2006). Conceptual<br />

Foundation <strong>of</strong> the ThinkLet Concept for Collaboration Engineering, International Journal <strong>of</strong> Human<br />

Computer Science 64, 611-621.<br />

Kolfschoten, G.L., Hengst, M. den, Vreede, G.J. de (2007), Issues in the Design <strong>of</strong> Facilitated<br />

Collaboration Processes, Group Decision & Negotiation, 16, 347-361.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), A social simulation game to explore future network<br />

coordination at the Amsterdam Police Force, Journal <strong>of</strong> Production, Planning, and Control, 17(6), 558-<br />

568.<br />

Niederman, F., Briggs, R.O., Vreede, G.J. de, Kolfschoten, G.L. (2008), Purposive Adaptive Structuration:<br />

The role <strong>of</strong> conscious agents in creating and utilizing new structures in collaboration, Journal <strong>of</strong> the<br />

Association for Information Systems, 9(10).<br />

Reinig, B., Briggs, R.O., Vreede, G.J. de (2009), A Cross-cultural study <strong>of</strong> the Relationship between<br />

Perceived Changes in Likelihood <strong>of</strong> Goal Attainment and Satisfaction with Technology Supported<br />

Collaboration, International Journal for e-Collaboration, 5(2), 61-74.<br />

Santanen, E., Briggs, R.O., Vreede, G.J. de (2004), Causal Relationships in Creative Problem Solving: The<br />

role <strong>of</strong> active facilitation in EBS, Journal <strong>of</strong> Management Information Systems, 20, 4 169-200.<br />

Smith, P.W., Anderson, A.O., Christopher, G.W., Cieslak, T.J., De Vreede, G.J., Fosdick, G.A., Greiner, C.B.,<br />

Hauser, J.M., Hinrichs, S.H., Huebner, K.D., Iwen, P.C., Jourdan, D.R., Kortepeter, M.G., Landon, V.P.,<br />

Lenaghan, P.A., Leopold, R.E., Marklund, A., Martin, J.W., Medcalf, S.J., Mussack, R.J., Neal, R.H., Ribner,<br />

B.S., Richmond, J.Y., Rogge, C., Roselle, G.A., Rupp, M.E., Sambol, A.R., Schaefer, J.E., Sibley, J., Streifel,<br />

A.J., Von Essen, S.G., Warfield, K.L. (2006), Designing a Biocontainment Unit to Care for Patients with<br />

Serious Communicable Diseases: A Consensus Statement, Biosecurity and Bioterrorism: Biodefense<br />

Strategy, Practice and Science, 4(4), 351-365.<br />

Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2007), Leadership Challenges In Communities Of Practice:<br />

Supporting Facilitators Via Design And Technology, International Journal <strong>of</strong> e-Collaboration, 3(1), 18-39.<br />

Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.J. de, Zigurs, I. (2007),<br />

Collaboration Engineering in Virtual Teams, e-Services Journal, 76-97.<br />

Topi, H., Valacich, J.S., Kaiser, K., Nunamaker, J.F. Jr., Sipior, J.C., Vreede, G.J. de, Wright, R.T. (2007),<br />

Revising the IS Model Curriculum: Rethinking the Approach and the Process, Communications <strong>of</strong> the AIS,<br />

(20), 728-740.<br />

Topi, H., Valacich, J.S., Wright, R.T., Kaiser, K., Nunamaker, J.F. Jr., Sipior, J.C., Vreede, G.J. de (2008),<br />

Revising Undergraduate IS Model Curriculum: New Outcome Expectations, Communications <strong>of</strong> the<br />

Association for Information Systems, 23, 591- 602.<br />

Vreede, G.J. de, Kolfschoten, G.L., Briggs, R.O. (2006), ThinkLets: A Collaboration Engineering Pattern<br />

Language, International Journal <strong>of</strong> Computer Applications in Technology, 25(2/3), 140-154.<br />

Vreede, G.J. de, Koneri, P.G., Dean, D.L., Fruhling, A.L., Wolcott, P. (2006), Collaborative S<strong>of</strong>tware Code<br />

Inspection: The Design and Evaluation <strong>of</strong> a Repeatable Collaborative Process in the Field, International<br />

Journal <strong>of</strong> Cooperative Information Systems, 15(2), 205-228.<br />

-389-


Vreede, G.J. de, Mgaya, R.J.S. (2006), Technology Supported Collaborative Learning for Higher<br />

Education: Comparative Case Studies in Tanzania, Information Technology for Development, 12(2), 113-<br />

130.<br />

Vreede, G.J. de, Mgaya, R.J.S., Qureshi, S. (2004), Field Experiences with Collaboration Technology: A<br />

Comparative <strong>Study</strong> in Tanzania and South Africa, Information Technology for Development, 10(3), 201-<br />

219.<br />

Agres, A., Vreede, G.J. de, Briggs, R.O. (2004), A Tale <strong>of</strong> Two Cities –Case Studies on GSS Transition in<br />

Two Organizations, Proceedings <strong>of</strong> the 37th Hawaiian International Conference on System Sciences, Los<br />

Alamitos: IEEE Computer Society Press. (Best paper finalist)<br />

Ali, H., Vreede, G.J. de, Ramachandra, K., Sidahmed, E., Sreenivas, H. (2004), Evaluating Wireless<br />

Architectures for GDS Applications, Proceedings <strong>of</strong> the 37th Hawaiian International Conference on<br />

System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Briggs, R.O., Kolfschoten, G.L, Vreede, G.J. de (2005), Toward a Theoretical Model <strong>of</strong> Consensus Building,<br />

Proceedings <strong>of</strong> AMCIS 2005, <strong>Omaha</strong>, NE.<br />

Briggs, R.O., Kolfschoten, G.L., Vreede, G.J. de, Dean, D.L. (2006), Defining Key Concepts for<br />

Collaboration Engineering, in: Irma Garcia, Raúl Trejo (eds.), Proceedings <strong>of</strong> the 12th Americas<br />

Conference on Information Systems, Acapulco, Mexico, August 4th-6th 2006, 121-128.<br />

Briggs, R.O., Reinig, B.R., Vreede, G.J. de (2006), Satisfaction with groupware-supported work practices,<br />

in: Bongsik Shin (ed.), Proceedings <strong>of</strong> the San Diego International Systems Conference, San Diego, July<br />

14-16, 2006.<br />

Dao, V., Chidambaram, L., Vreede, G.J. de (2006), The Invisible Pilot in Virtual Teams: An Investigation <strong>of</strong><br />

the Impact <strong>of</strong> Facilitation on Virtual Teams, Proceedings <strong>of</strong> AMCIS2006, Acapulco, Mexico, August 2006.<br />

Davis, A., Kamal, M., Schoonover, T., Nabukenya, J., Pietron, L.R., Vreede, G.J. de, Incident Response<br />

Planning Using Collaboration Engineering Process Development and Validation, WISA: SIGSEC Workshop<br />

2006, Milwaukee, WI, 10 December 2006.<br />

Davis, A., Badura, V., Vreede, G.J. de (2008), Understanding Methodological Differences to <strong>Study</strong><br />

Convergence in Group Support System Sessions, CRIWG 2008, September 14-18, <strong>Omaha</strong>, <strong>Nebraska</strong>.<br />

Fruhling, A.L., Sambol, A., Hinrichs, S., Vreede, G.J. de (2006), Designing An Emergency Response System<br />

for Electronic Laboratory Diagnostics Consultation, Proceedings <strong>of</strong> the 39th Hawaiian International<br />

Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Fruhling, A., Tyser, K., Vreede, G.J. de (2005), Experiences with Extreme Programming in Telehealth:<br />

Developing and Implementing a Biosecurity Health Care Application, Proceedings <strong>of</strong> the 38th Hawaiian<br />

International Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Hlupic, V., Vreede, G.J. de, Orsoni, A. (2006), The Role <strong>of</strong> Discrete Event Simulation in Business Process<br />

Analysis and Re-Engineering, Proceedings <strong>of</strong> the 9th International Conference on Computer Modelling<br />

and Simulation (UKSim06), Oxford, April 2006.<br />

Kamal, M., Davis, A.J., Nabukenya, J., Schoonover, T.V., Pietron, L.R., Vreede, G.J. de, (2007),<br />

Collaboration Engineering for Incident Response Planning: Process Development and Validation,<br />

Proceedings <strong>of</strong> the 40th Hawaiian International Conference on System Sciences, Los Alamitos: IEEE<br />

Computer Society Press.<br />

Kanapuram, S., Ali, H.H., Vreede, G.J. de (2006), On Effective Utilization <strong>of</strong> Wireless Networks in<br />

Collaborative Applications, Proceedings <strong>of</strong> the 2nd International Conference on Collaborative<br />

Computing: Networking, Applications and Worksharing, Atlanta, November 2006.<br />

Kolfschoten, G.L., Appelman, J.H., Briggs, R.O., Vreede, G.J. de (2004), Recurring Patterns <strong>of</strong> Facilitation<br />

Interventions in GSS Sessions, Proceedings <strong>of</strong> the 37th Hawaiian International Conference on System<br />

Sciences, Los Alamitos: IEEE Computer Society Press.<br />

-390-


Kolfschoten, G.L, Briggs, R.O., Appelman, J.H., Vreede, G.J. de (2004), ThinkLets as Building Blocks for<br />

Collaboration Processes: A Further Conceptualization, Lecture Notes in Computer Science, Berlin,<br />

Springer Verlag, 2004.<br />

Kolfschoten, G.L., Duivenvoorde, G., Briggs, R.O., Vreede, G.J. de (2009), Towards an instrument to<br />

measure Successfulness <strong>of</strong> collaborative effort from a participant perspective, Proceedings <strong>of</strong> the 42nd<br />

Hawaiian International Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Kolfschoten, G.L., Duivenvoorde, G., Briggs, R.O., Vreede, G.J. de (2009), Practitioners vs Facilitators a<br />

comparison <strong>of</strong> participant perceptions on success, Proceedings <strong>of</strong> the 42nd Hawaiian International<br />

Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Kolfschoten, G.L., Niederman, F., Briggs, R.O., Vreede, G.J. de (2006), Understanding the Job<br />

Requirements for Collaboration Technology Support through a Hybrid IT-End User Job Classification<br />

Model: The Case <strong>of</strong> Collaboration Engineering and Facilitation, SIGCPR Conference.<br />

Kolfschoten, G.L., Niederman, F., Briggs, R.O., Vreede, G.J. de (2008), Role Separation in Strategies for<br />

Collaboration Support, Proceedings <strong>of</strong> the 41st Hawaiian International Conference on System Sciences,<br />

Los Alamitos: IEEE Computer Society Press.<br />

Kolfschoten, G.L., Valentin, E., Verbraeck, A., Vreede, G.J. de (2006), Cognitive load reduction through<br />

the use <strong>of</strong> building blocks in the design <strong>of</strong> decision support systems, Proceedings <strong>of</strong> AMCIS2006,<br />

Acapulco, Mexico, August 2006.<br />

Kolfschoten, G.L., Hengst, M. den, Vreede, G.J. de (2005), Issues in the Design <strong>of</strong> Facilitated<br />

Collaboration Processes, Proceedings <strong>of</strong> Group Decision & Negotiation 2005, Vienna, Austria, July 10-13,<br />

1-17.<br />

Kolfschoten, G.L., Vreede, G.J. de, Pietron, L.R. (2006), A training approach for the transition <strong>of</strong><br />

repeatable collaboration processes to practitioners, Proceedings <strong>of</strong> Group Decision & Negotiation 2006,<br />

Karlsruhe, June 2006.<br />

Kolfschoten, G.L., Vreede, G.J. de, The Collaboration Engineering Approach for Designing Collaboration<br />

Processes, Proceedings <strong>of</strong> CRIWG 2007, Bariloche, Argentina, September 16-20.<br />

Kolfschoten, G.L., Vreede, G.J. de, Briggs, R.O., Computer Aided Pattern-Based Collaboration Process<br />

Design: A Computer Aided Collaboration Engineering Tool, Proceedings <strong>of</strong> CRIWG 2007, Bariloche,<br />

Argentina, September 16-20.<br />

Koneri, P.G., Vreede, G.J. de, Dean, D.L., Fruhling, A.L., Wolcott, P. (2005), The Design and Field<br />

Evaluation <strong>of</strong> a Repeatable Collaborative S<strong>of</strong>tware Code Inspection Process, in: Fuks, H., Lukosch, S.,<br />

Salgado, A.C. (eds.), Proceedings <strong>of</strong> CRIWG 2005, LNCS3706, pp. 325-340, Springer Verlag Berlin<br />

Heidelberg.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2004), Exploring new coordination scenarios for workflows in the<br />

Amsterdam Police Force: Simulation-games as organizational change instruments, Proceedings <strong>of</strong> IFIP<br />

WG 5.7 8th workshop on Experiential learning in chains and networks', Wageningen, the Netherlands,<br />

24-27 May 2004.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2005), A Coordination Framework for Analysis and Improvement<br />

<strong>of</strong> ICT Supported Distributed Work, Proceedings <strong>of</strong> the IRIS28, Kristiansand, Norway, August 6-9.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), Designing simulation-games for organizational<br />

prototyping, in: A.G. Nilsson et al (eds), Advances in information systems development – Bridging the<br />

gap between academia and practice, Proceedings <strong>of</strong> ISD 2005 (the fourteenth international conference<br />

on Information Systems Development), August 15-17, Karlstad, Sweden, 373-385.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2005). Dealing with Paradox in business engineering, simulationgames<br />

as learning environments. In Backlund, P., Carlsson S. and Söderstrom S. (eds.), Proceedings <strong>of</strong><br />

the forum poster session in conjunction with Business Informatics Research (BIR) 2005, Skövde, 3-4<br />

-391-


October, 2005, pp. 59-68.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), Developing paradoxical guidelines for communities <strong>of</strong><br />

practice in organizations, Proceedings <strong>of</strong> the European Conference on Information Systems, Göteborg,<br />

Sweden, 2006.<br />

Noteboom, C., Zhang, C., Tarmizi, H., Steinhauser, L., Payne, M., Vreede, G.J. de, Zigurs, I. (2006),<br />

Research as Teaching and Teaching as Research: Reflections on a Virtual Team Project, Mid-West<br />

Association <strong>of</strong> Information Systems Conference.<br />

Read, A.S., Renger, D.R.M., Briggs, R.O., Vreede, G.J. de (2009), Fundamental Topics <strong>of</strong> Organizing: A<br />

Research Agenda, Proceedings <strong>of</strong> the 42nd Hawaiian International Conference on System Sciences, Los<br />

Alamitos: IEEE Computer Society Press.<br />

Reinig, B., Briggs, R.O., Vreede, G.J. de (2008), A cross-cultural investigation <strong>of</strong> the goal-attainmentlikelihood<br />

construct and its effect on satisfaction with technology supported collaboration, Proceedings<br />

<strong>of</strong> the 41st Hawaiian International Conference on System Sciences, Los Alamitos: IEEE Computer Society<br />

Press.<br />

Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Patterns in Collaborative Modeling: A Literature<br />

Review, in: Costa, J. (ed.), Proceedings <strong>of</strong> Group Decision & Negotiation 2008, Coimbra, Portugal.<br />

Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Challenges with Collaborative Modeling: A<br />

Literature Review, in: Jan L.G. Dietz, Antonia Albani, Joseph Barjis, Peter Rittgen (eds), Advanced<br />

Enterprise Engineering, Lecture Notes in Business Information Processing, Berlin: Springer-Verlag (AIS<br />

SIGMAS Best Paper Award).<br />

Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Using Interactive Whiteboard Technology to<br />

Support Collaborative Modeling, CRIWG 2008, September 14-18, <strong>Omaha</strong>, <strong>Nebraska</strong>.<br />

Santanen, E., Vreede, G.J. de, (2004) Creative Approaches to Measuring Creativity: Comparing the<br />

Effectiveness <strong>of</strong> Four Divergence thinkLets, Proceedings <strong>of</strong> the 37th Hawaiian International Conference<br />

on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Steinhauser, L., Read, A., Vreede, G.J. de (2008), <strong>Study</strong>ing the Adoption <strong>of</strong> Collaborative Work Practices<br />

Using the Value Frequency Model, in: Germonprez, M., Iversen, J. (eds), Proceedings <strong>of</strong> the Midwest<br />

United States Association for Information Systems 3rd Annual Conference, Eau Claire, Wisconsin, May<br />

2008.<br />

Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.J. de, Zigurs, I. (2006),<br />

Technical and Environmental Challenges <strong>of</strong> Collaboration Engineering in Distributed Environments,<br />

Proceedings <strong>of</strong> CRIWG 2006, Medina del Campo, Spain, September 2006, 38-53.<br />

Tarmizi, H., Vreede, G.J. de (2005), A Facilitation Task Taxonomy for Communities <strong>of</strong> Practice,<br />

Proceedings <strong>of</strong> AMCIS 2005, <strong>Omaha</strong>, NE.<br />

Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2006), Identifying Challenges in communities <strong>of</strong> practice<br />

facilitation, Proceedings <strong>of</strong> the 39th Hawaiian International Conference on System Sciences, Los<br />

Alamitos: IEEE Computer Society Press.<br />

Tarmizi, H., Zigurs, I., Vreede, G.J. de (2006), Understanding E-Leadership In Distributed Crisis Response<br />

Teams, Gallup Leadership Institute Summit, Washington DC, October.<br />

Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2007). A Facilitators’ Perspective on Successful Virtual<br />

Communities <strong>of</strong> Practice. The thirteenth Americas Conference on Information Systems, August 9-12,<br />

Keystone, Colorado.<br />

Vreede, G.J. de, Briggs, R.O. (2005), Collaboration Engineering: Designing Repeatable Processes for High-<br />

Value Collaborative Tasks, Proceedings <strong>of</strong> the 38th Hawaiian International Conference on System<br />

Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Vreede, G.J. de, Briggs, R.O. Reinig, B. (2008), e-Collaboration Satisfaction: Empirical Field Studies <strong>of</strong><br />

-392-


Disconfirmation Theory Across Two Countries, Proceedings <strong>of</strong> AMCIS.<br />

Vreede, G.J. de, Fruhling, A., Chakrapani, A. (2005), A Repeatable Collaboration Process for Usability<br />

Testing, Proceedings <strong>of</strong> the 38th Hawaiian International Conference on System Sciences, Los Alamitos:<br />

IEEE Computer Society Press.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 8950 Capstone MIS 3 12<br />

ISQA 9900 Advanced Research in Collaboration Science 3 3<br />

Fall 2008 ISQA8080 Facilitation <strong>of</strong> Collaborative Problem Solving 3 6<br />

with Groupware<br />

ISQA9900 Facilitation <strong>of</strong> Collaborative Problem Solving 3 3<br />

with Groupware<br />

Spring 2008 ISQA 8220 Advanced System Analysis & Design 3 18<br />

ISQA 8950 Capstone MIS 3 10<br />

Fall 2007 ISQA 8080 Seminar: Facilitation <strong>of</strong> Collaboration 3 7<br />

ISQA 8220 Advanced System Analysis & Design 3 25<br />

ISQA 9900 Facilitation <strong>of</strong> Collaborative Problem Solving<br />

with Groupware<br />

3 4<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-393-


-394-


Ken Dick<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Kenneth L. Dick<br />

Senior Research Fellow<br />

Not tenure track<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Bachelor <strong>of</strong><br />

Science<br />

Master <strong>of</strong><br />

Science<br />

Doctor <strong>of</strong><br />

Philosophy<br />

Mathematics <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Lincoln 1972<br />

Guidance and<br />

Counseling<br />

Administration,<br />

Curriculum and<br />

Instruction<br />

Creighton <strong>University</strong> 1975<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Lincoln 1983<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

-395-


Dates Where Duties<br />

1998-Present <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Senior Research Fellow in Telecommunications<br />

<strong>Omaha</strong><br />

1994-1998 PKS / MFS / WorldCom, <strong>Omaha</strong>,<br />

NE<br />

Director,-Strategic Enterprise Direction /<br />

Architecture & Standards<br />

1989-1994 First Data Corp, <strong>Omaha</strong>, NE Director-Management Information Systems<br />

1979-1984 Creighton <strong>University</strong> Adjunct Pr<strong>of</strong>essor<br />

1979-1989 USWest, <strong>Omaha</strong>, NE Systems Manager<br />

1975-1979 Papillion Public Schools Director-Alternative School<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

David City Hospital<br />

communications<br />

City Stream<br />

CLEC / DLEC IP networking<br />

Odin Capital<br />

MCIWorldcom<br />

IT Architecture for local deployment<br />

Orillion<br />

IT Architecture for next generation OSS<br />

Alvine & Associates<br />

telecommunications practice<br />

Engineering<br />

Union Pacific Railroad<br />

Communications<br />

Odin Financial<br />

Due Diligence<br />

Telesuite<br />

Technical Architecture<br />

Quantum Dynamics<br />

IT Architectural Review<br />

<strong>Omaha</strong> Police Department System & Communications Review<br />

<strong>Omaha</strong> Public Schools<br />

Network Infrastructure<br />

Relapoint<br />

System Standards<br />

DiscoverWhy<br />

Operational Standards<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

IS & T, Executive Committee<br />

IST & E, New Building Committee<br />

IST & E, Joint Chair Committee<br />

IS&T / Metropolitan Community College Collaboration<br />

-396-


9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

IS & T, Executive Committee (1998-Present)<br />

IST & E, New Building Committee, (1998-Present)<br />

IST & E, Joint Chair Committee, (1999-Present)<br />

IS&T / Metropolitan Community College Collaboration, (2000-Present)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

UNMC Smoking Cessation PDA program. (2006-2007)<br />

Teaching American History, DOE grant for Web site development. $50,000 over three years. (2004-2007)<br />

National Park Service, Lewis and Clark Bicentennial Web site, $1,000,000 over four years plus an<br />

additional $3-5M in hardware & services donations. (2002-2007)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 CSCI 3550 Communication Networks 3 23<br />

CSCI 8220 Telecommunications Management 3 9<br />

CSCI 8555 Communication Networks 3 8<br />

ISQA 8310 Data Communications 3 17<br />

Fall 2008 CSCI 8210 Advanced Communication Networks 3 9<br />

ISQA 8310 Data Communications 3 28<br />

Summer 2008 CSCI 3550 Communication Networks 3 11<br />

CSCI 8555 Communication Networks 3 1<br />

ISQA 3400 Business Data Communications 3 3<br />

-397-


Spring 2008 CSCI 8220 Telecommunications Management 3 6<br />

CSCI 8410 Distributed Systems and Network Security 1.5 8<br />

ISQA 8230 Telecommunications Management 3 7<br />

Fall 2007 CSCI 8210 Advanced Communication Networks 3 16<br />

ISQA 8310 Data Communications 3 25<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-398-


Donna Dufner<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Donna Dufner<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Assistant Pr<strong>of</strong>essor Jan. 2000 – Aug. 2003<br />

Associate Pr<strong>of</strong>essor Aug 2003 - present<br />

Distinguished Teacher<br />

Ad Perpetuum<br />

Pr<strong>of</strong>essional Project<br />

Manager (PMP® )<br />

Senior Member IEEE Advanced 2007<br />

Title is given in perpetuity to recipients <strong>of</strong><br />

the <strong>University</strong>-wide Outstanding Teaching<br />

and Instructional Creativity Award (OTICA)<br />

2008<br />

2004 – current<br />

2007 – Completed recertification<br />

successfully1<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. Computer and Information Science Rutgers <strong>University</strong>,<br />

1995<br />

Management<br />

M.S. Computer and Information Science The New Jersey Institute <strong>of</strong> 1995<br />

Technology<br />

M.B.A. Market Research The <strong>University</strong> <strong>of</strong> Chicago, 1977<br />

Graduate School <strong>of</strong> Business<br />

B.A. Sociology DePaul <strong>University</strong> 1975<br />

1 To maintain PMP certification each certified PMP must go through a recertification process. The objective is maintain and<br />

improve skills through learning about new and changing best practices in the field <strong>of</strong> project management.<br />

-399-


5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Pr<strong>of</strong>essional Development in Chronoligical Order:<br />

2005 - present: Volunteer Training at the Douglas County Department <strong>of</strong> Corrections<br />

Attend Volunteer Training at the Douglas County Department <strong>of</strong> Corrections each semester with my<br />

students in preparation for the Service-Learning Course I teach at the Douglas County Department <strong>of</strong><br />

Correction, Teaching Computer Basics to Inmates. I attend the training each semester to refresh and<br />

reinforce my preparation to work with inmates and my UNO students in the jail environment. I also<br />

want to begin the course by demonstrating that I will be available to my UNO students at all times<br />

during this very intensive, demanding, and extremely rewarding growth experience. The training is<br />

conducted once per semester on the Saturday morning before the semester begins.<br />

2009 - Conference: American Jail Association JA's 28th Annual Training Conference & Jail Expo, April 26 -<br />

29, Louisville, Kentucky.<br />

2008 - Teaching Circle: to evaluate and adopt advanced educational techniques.<br />

2007 - Conference: CUMU Conference, Florida International <strong>University</strong>, Miami FL, October 21-24.<br />

2007 - Project Management Pr<strong>of</strong>essional (PMP®) Re-certification: successfully completed as required by<br />

the Project Management Institute.<br />

2004 - Project Management Pr<strong>of</strong>essional (PMP®) Certification: “The PMP Certification is the project<br />

management pr<strong>of</strong>ession’s most recognized and respected global credential. To obtain PMP certification,<br />

an individual must satisfy education and experience requirements, agree to adhere to a Pr<strong>of</strong>essional<br />

Code <strong>of</strong> Conduct and pass the PMP Certification Examination. The Project Management Institute (PMI)<br />

Certification Department is the first pr<strong>of</strong>essional certification program <strong>of</strong> its kind in the world to receive<br />

the ISO 9001 certification, a globally recognized mark <strong>of</strong> a quality management system (Project<br />

Management Institute).”<br />

2004-2005 - Leadership <strong>Omaha</strong>: One person from the <strong>University</strong> is nominated by the chancellor and a<br />

team <strong>of</strong> community leaders selects those who will constitute that year’s class. Leadership <strong>Omaha</strong>, then<br />

in its 27th year, is one <strong>of</strong> the oldest and most respected community leadership programs in the nation.<br />

The program consisted <strong>of</strong> once per month meetings from 7:30 AM to 7:30 PM during which,<br />

economic, social, educational, health, etc. issues were covered. We learned about <strong>Omaha</strong> and <strong>Nebraska</strong><br />

and the cultural and community service opportunities available. The program also exposed the class to<br />

the services made available such as homeless shelters, dental clinics, nursing home facilities for those<br />

with disabilities; and, to the need for additional services for those in need in <strong>Omaha</strong> and <strong>Nebraska</strong>. In<br />

addition we were taught about the political promise, the inequities and political issues, and the<br />

economic and political challenges in <strong>Nebraska</strong>.<br />

As a part <strong>of</strong> the program I also served on a team with other members <strong>of</strong> the Leadership <strong>Omaha</strong><br />

Class. We were charged with performing a project that would contribute to the health <strong>of</strong> <strong>Omaha</strong>. The<br />

team elected to perform a sustainable project and develop a Web based service to enable citizens,<br />

visitors and individuals who might relocate to <strong>Omaha</strong> to easily find entertainment and cultural<br />

opportunities at a glance. The objective <strong>of</strong> our project is demonstrate that <strong>Nebraska</strong> can be fun and<br />

<strong>of</strong>fers wonderful cultural opportunities. KETV sponsored the project and IN-The-O continues to benefit<br />

<strong>Nebraska</strong>. The project was launched at the Peter Kiewit Institute in the Atrium in the spring <strong>of</strong> 2005 (I<br />

served as the hostess). Several hundred people attended. You can view KETV.com –In-the-O located at<br />

the following URL: http://www.ketv.com/intheo/index.html<br />

Summer 2005 - Leadership <strong>Omaha</strong> –Gazing and Grazing Program<br />

-400-


Participated in the Gazing and Grazing Program with my class from Leadership <strong>Omaha</strong>. We traveled all<br />

over <strong>Nebraska</strong> by bus. The program is designed to teach about the economic drivers, educational,<br />

political, cultural, etc. issues confronting <strong>Nebraska</strong>ns. We also we shown and given the opportunity to<br />

enjoy the immense beauty and amazing natural resources <strong>of</strong> <strong>Nebraska</strong>. As the bus traveled throughout<br />

the state over a period <strong>of</strong> several days, speakers would board and give lectures and answer questions.<br />

We visited ranches, natural resources, and schools to mention a few.<br />

2004-2005 - Women’s Leadership Institute: Selected by the chancellor to participate in the Women’s<br />

Leadership Institute at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> (UNO). Candidates from various educational<br />

institutions are nominated for participation by the Deans <strong>of</strong> their schools and selected by the Chancellor<br />

from the pool <strong>of</strong> nominees. The Institute gave me the opportunity to learn about the <strong>University</strong>. Since I<br />

spent approximately 15 years <strong>of</strong> my career in the business world at major corporations such as AT&T,<br />

Chemical Bank Corp., ARDIS (a joint venture <strong>of</strong> IBM and Motorola), Bell Atlantic Nynex, before coming to<br />

academia; learning about inner workings <strong>of</strong> the <strong>University</strong> was especially important for me.<br />

2005 - Research Triangle: “UNO Government Information Systems Management,” <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> at <strong>Omaha</strong>, <strong>Omaha</strong>, NE.<br />

2005 - Conference: XVII Asian Pacific Conference on International Accounting Issues, Wellington, New<br />

Zealand, November 20-23.<br />

2005-Conference: 38th Annual Hawaii International Conference on System Sciences.<br />

2004-Conference: Human Factors in Computing Systems, Special Interest Groups (SIGs), SIGCHI ACM,<br />

April 24-29, Vienna, Austria.<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

2009-on-going Project<br />

Management for the Douglas<br />

County Department <strong>of</strong><br />

Corrections<br />

community outreach<br />

Serve as the Project Manager<br />

<strong>of</strong> a multi-million dollar<br />

project for the Douglas<br />

County Department <strong>of</strong><br />

Corrections with the support<br />

<strong>of</strong> student interns.<br />

2008 – present<br />

Prospect Hills Cemetery<br />

Board<br />

Board Member<br />

community outreach<br />

The project is an Enterprise-wide Information<br />

Technology development and implementation for<br />

the Douglas County Department <strong>of</strong> Corrections.<br />

My work is Pro Bono2. Field work provides an<br />

opportunity for me to keep my practical skills up to<br />

date and for students to work in the field with a<br />

seasoned project manager on a system <strong>of</strong><br />

substantial impact and importance.<br />

Prospect Hills Cemetery is one <strong>of</strong> the oldest and<br />

most historic cemeteries in the nation.<br />

Provide technical support and advice as a board<br />

member.<br />

The project is<br />

providing<br />

funding <strong>of</strong><br />

approximately<br />

$59,364 for<br />

student<br />

internships. One<br />

summer intern<br />

and two fall and<br />

spring 2009-<br />

2010.<br />

2007 South Korea<br />

Invited Expert in Project<br />

Title <strong>of</strong> my talk: “Practical Applications in Project<br />

Management: Knowing What Questions to Ask.”,<br />

Only nine<br />

individuals were<br />

-401-


Management<br />

Conference all Korean Universities Hosted by the<br />

Government <strong>of</strong> South Korea, Nov. 2. (All travel<br />

expenses paid by the host).<br />

invited from all<br />

over the world<br />

to present at<br />

this event. I was<br />

the only woman<br />

and the only<br />

American.<br />

2005 Mutual <strong>of</strong> <strong>Omaha</strong><br />

community outreach<br />

2007 Booz, Allen and<br />

Hamilton<br />

community outreach<br />

Teaching at Mutual <strong>of</strong> <strong>Omaha</strong><br />

Taught a session for the PMP <strong>Study</strong> Group at<br />

Mutual <strong>of</strong> <strong>Omaha</strong>, <strong>Omaha</strong>, NE. Project<br />

Communications Management and Human<br />

Resource Management<br />

Intensive Project Management Course)<br />

Developed and taught a four day (8 hours per day)<br />

intensive project management course for<br />

managers working on contracts at USSTRATCOM.<br />

Contractors will be expected to use the Project<br />

Management Institute best practices and be<br />

certified. The Department <strong>of</strong> Defense uses the IEEE<br />

Standards coupled with the PMI best practices<br />

embodied in the Project Management Body <strong>of</strong><br />

Knowledge (PMBOK) for s<strong>of</strong>tware engineering. In<br />

all <strong>of</strong> my courses I teach Best Practices using the<br />

PMBOK, the IEEE Standards, and the mathematical<br />

foundation <strong>of</strong> project management based on<br />

Management Science using Hillier, Hillier and<br />

Lieberman, Introduction to OR/MS.<br />

-402-<br />

Taught PMP<br />

study group<br />

hosted by<br />

Mutual but<br />

open to the<br />

community <strong>of</strong><br />

<strong>Omaha</strong> Pro<br />

Bono<br />

The course was<br />

provided Pro<br />

Bono as out<br />

reach to the<br />

business<br />

community.<br />

"Rave Reviews”<br />

were received<br />

from the<br />

students.<br />

Assistant Pr<strong>of</strong>essor, MIS <strong>University</strong> <strong>of</strong> Illinois at Springfield 07/96-01/00<br />

Taught twenty-four Management Information Systems, Systems Analysis and Design, CASE,<br />

Telecommunications and COBOL at the graduate and undergraduate level.<br />

Supervised approximately 10 graduate projects, served on the project committees <strong>of</strong> 6 students,<br />

served as the sole academic advisor for approximately 40 students.<br />

Assistant Pr<strong>of</strong>essor, MIS Polytechnic <strong>University</strong> 01/95-07/96<br />

Taught Information Technology (IT), IT Strategy, Telecommunications, MIS, DSS, at the graduate and<br />

Executive Program level.<br />

Project Manager<br />

ARDIS, (a joint venture <strong>of</strong> IBM and Motorola 07/91-11/93<br />

specializing in wireless data transmission)<br />

Project manager responsible for determining economic, technical, and organizational feasibility <strong>of</strong><br />

wireless access to production systems data in a diversity <strong>of</strong> hardware, s<strong>of</strong>tware, and<br />

telecommunications environments. Managed all stages <strong>of</strong> systems design, development, and<br />

implementation for customers such as UNISYS and Bell Atlantic Business Systems.<br />

Assistant Vice President,<br />

Information and Technology<br />

Chemical New York Corporation 03/85-12/88


Management Division<br />

Responsible for: providing financial systems support for the controller <strong>of</strong> the Information and<br />

Technology Management Division; and providing on-site <strong>of</strong>fice systems support to all senior<br />

executives, their staffs, and executive support groups (training, programming, hardware and<br />

operations support, etc.).<br />

Project Manager/Systems AT&T 01/79-11/83<br />

Analyst<br />

Responsible for: applications s<strong>of</strong>tware development, selection <strong>of</strong> s<strong>of</strong>tware packages and computer<br />

hardware, and installation <strong>of</strong> hardware and s<strong>of</strong>tware. Held both line and staff positions in various<br />

subsidiaries within the company.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Honors Coordinator including, Honors advising and honors colloquia planning for the college: 10 hrs<br />

Thesis advising: 10 hrs per week<br />

Independent studies: 10 hrs per week<br />

Committee work: Graduate Committee, Graduate Committee A, Honors Committee work: 4 hours per<br />

week.<br />

Course Coordination for ISQA 4910, ISQA 8820 and ISQA 8810: 3 hour per week<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

2004-2005: Chair <strong>of</strong> the Faculty Search Committee<br />

2004-2007: Serve on the Undergraduate Program Committee for ISQA:<br />

2004- present: Honors Committee –<br />

2003-2007: Faculty Senate Pr<strong>of</strong>essional Conduct Committee<br />

2006-2009: Graduate Council<br />

2006-2009: Graduate Council Committee B<br />

2007: Chancellor’s Commission on Multi-cultural Affairs<br />

2004 – present: Honor’s Coordinator for the College<br />

2007- present: AAUP Executive Board<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

-403-


Book Chapters<br />

Dufner, D. Alavi, M. and Caroline Howard (2009) “Evolving Technologies Supportive <strong>of</strong> Collaborative<br />

Learning”, (Eds) Caroline Howard, Judith V. Boettecher, Lorraine Justice, Karen D. Schenk, Gary A. Berg,<br />

Patricia L. Rogers, Encyclopedia <strong>of</strong> Distance Learning, Hershey, PA: Idea Group Publishing.<br />

Reed, B.J., Holley, L. and Dufner, D. (2007) “The Performance Challenge: Integrating Uncoupled<br />

Government Information Technology”, In Government Performance Project Findings, Jessica M.<br />

Crawford, Ed, Baltimore, MD: Johns Hopkins <strong>University</strong> Press.<br />

Alavi, M., D. Dufner, and C. Howard, (2005) "Collaborative Learning Technologies". (Eds) Caroline<br />

Howard, Judith V. Boettecher, Lorraine Justice, Karen D. Schenk, Gary A. Berg, Patricia L. Rogers,<br />

Encyclopedia <strong>of</strong> Distance Learning, Hershey, PA: Idea Group Publishing.<br />

Alavi, M. and Dufner, D. (2004) “Technology-Mediated Collaborative Learning: A Research Perspective”,<br />

S. R. Hiltz and R. Goldman, Eds. In Learning Together Online: Research on Asynchronous Learning<br />

Networks. Mahwah, NJ: Lawrence Erlbaum Associates, Inc., 191-213.<br />

Refereed Journal Articles:<br />

Holley, L., Dufner, D., and Reed, B.J. (2004) “Strategic Information Systems Planning (SISP) in US County<br />

Governments”, Public Performance and Management Review. March, 27 (3): 102-126.<br />

Presentations:<br />

Foxall, Mark and Dufner, Donna (2009) “Building Strategic Opportunities through <strong>University</strong> Service-<br />

Learning Programs and Volunteerism”, American Jail Association JA's 28th Annual Training Conference &<br />

Jail Expo, April 26 - 29, Louisville, Kentucky. Presentation and panel discussion.<br />

Dufner, D. (2008) “Play Ball! - Hitting Home Runs Using Project Management Techniques”, ProDev, A<br />

Conference for Project Pr<strong>of</strong>essionals, September 22, Scott Conference Center, <strong>Omaha</strong>, NE.<br />

Dufner, D. (2007) “Practical Applications in Project Management: Knowing What Questions to Ask.”,<br />

Conference Hosted by the Government <strong>of</strong> South Korea, Nov. 2. (All expenses paid by the host).<br />

Dufner, D. (2007) “Service-Learning: Catching the Attention <strong>of</strong> the IPod Generation”, Midwest<br />

Consortium for Service-Learning in Higher Education, Fourth Annual Conference, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong><br />

at Kearney, Sept. 27-29.<br />

Dufner, D. (2007) “Service-Learning in Jail: Bridging the Digital Divide”, Institute for Metropolitan Affairs,<br />

Roosevelt <strong>University</strong>, 430 S. Michigan Avenue, Chicago, IL. (Oct. 18).<br />

Dufner, D. and Kelsey, J. (2006) Service Learning: IT Projects for Micro Businesses in South <strong>Omaha</strong>, South<br />

<strong>Omaha</strong> Seminar, <strong>Omaha</strong>, NE , May 8-12.<br />

Dufner, D. (2005) “Risk Management: Looking Back at the Challenger Disaster, Enron’s Collapse, and the<br />

Anthrax Clean-up at the State Department”, Graduate School <strong>of</strong> Business, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> –<br />

<strong>Omaha</strong>, <strong>Omaha</strong>, NE. October.<br />

Schwer, A., Dufner, D., Morcous G., (2005) Project Management Informatics, Conference proceedings <strong>of</strong><br />

the Midwest Section <strong>of</strong> the American Society for Engineering Education, Fayetteville, AR. Sept.<br />

Dufner, D. Holley, L., and Reed, B.J. (2005) “Using Strategic Information Systems Planning (SISP) to<br />

Bridge the Gap between State Resources and the Needs <strong>of</strong> Aging Americans”, In Proceedings <strong>of</strong> the 38th<br />

Annual Hawaii International Conference on System Sciences, IEEE Computer Society Press: Los Alamitos,<br />

California.<br />

Shah, P., Peters, J. and Dufner, D. (2005): “The Mayor’s Hotline”, Poster Session, The Spring Strategic<br />

Planning Advance, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> – <strong>Omaha</strong>, April. (Attendees included Lt. Gov. Sheehy,<br />

President Milliken, Mayor Fahey, and other dignitaries).<br />

Dufner, D. (2005) “Risk Management: Looking Back at the Challenger Disaster, Enron’s Collapse, and the<br />

Anthrax Clean-up at the State Department”, Graduate School <strong>of</strong> Business, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> –<br />

<strong>Omaha</strong>, <strong>Omaha</strong>, NE. October.<br />

-404-


Hiltz, S.R., Alavi, M. and Dufner, D. (2004) Asynchronous Learning Networks (“ALN’s”) for E-Learning:<br />

Priorities for Future S<strong>of</strong>tware Development, Panel Discussion, Conference on Human Factors in<br />

Computing Systems, Special Interest Groups (SIGs), SIGCHI ACM, April 24-29, Vienna, Austria.<br />

Dufner, D. (2004) “Information Systems Tips for Social Workers”, School <strong>of</strong> Social Work, <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> at <strong>Omaha</strong>, Nov. 2.<br />

Other<br />

Dufner, D. (2007) “Teaching Computer Basics at the Jail: Outcomes”, Presentation to the Douglas<br />

County Board <strong>of</strong> Corrections, City-County Building, <strong>Omaha</strong>, NE,. (Invited, January 9).<br />

http://www.co.douglas.ne.us/boardmeetings.php<br />

Dufner, D. (2006) “Teaching Computer Basics at the Jail”, Presentation to the Douglas County Board <strong>of</strong><br />

Corrections, City-County Building <strong>Omaha</strong>, NE,. (Invited, October 17).<br />

http://www.co.douglas.ne.us/boardmeetings.php<br />

KFAB Radio Interview Spring 2007<br />

Dufner, D. with M. Foxall. Interviewed on KFAB, Husker Radio, (Invited to speak about “Community<br />

Outreach – UNO Students Teaching Computer Basics at the Douglas County Jail”. KFAB Radio reaches all<br />

<strong>of</strong> <strong>Nebraska</strong> and on Husker game day most people in <strong>Nebraska</strong> are listening. Also, invited to the NU<br />

President Milliken’s Tailgate Party and given Husker Tickets for the community out reach performed for<br />

the Douglas Couny Department <strong>of</strong> Corrections.<br />

Interviewed on KETV 5 PM News, Students, Inmates Are Improving Futures 1 Keystroke At A Time : A<br />

program helping to rehabilitate inmates at the Douglas County Correctional Facility puts students inside<br />

the jail to do some teaching <strong>of</strong> their own.<br />

http://www.ketv.com/news/10121088/detail.html, Oct. 20, 2006.<br />

Dufner, D. (January 2007) “PKI Students Debunk Myth that Technical People are not People, People”, PKI<br />

Newsletter, Peter Kiewit Institute, <strong>Omaha</strong>, NE.<br />

Dufner, D. (January 2007) “UNO Students Teach Computer Basics at the Douglas County Department <strong>of</strong><br />

Corrections”, Honors Program Newsletter, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, <strong>Omaha</strong>, NE.<br />

2007 Developed an external research lab at the Douglas County Department <strong>of</strong> Corrections<br />

Editorial Work<br />

Served on the Editorial Board <strong>of</strong> Communications <strong>of</strong> the Association <strong>of</strong> Information Systems (CAIS) and<br />

as an Associate Editor (Ranked 18th <strong>of</strong> the top 50 IS Journals by CACM) Sept. 2001 to 2005<br />

Pr<strong>of</strong>essional Memberships<br />

IEEE, PMI<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

2009 Information Technology Development and Implementation Douglas County Department <strong>of</strong><br />

Corrections Enterprise-wide Information Technology Development and Implementation, Graduate<br />

Student Internships for 2009-2010 $ $59,364<br />

2009 Information Technology Development and Implementation Douglas County Department <strong>of</strong><br />

Corrections Enterprise-wide Information Technology Development and Implementation, Graduate<br />

Student Summer Internship $9,000<br />

Dufner, D., Morcous, M., and Schwer, A. (2005) “Project Management Informatics for Engineering,” PKI-<br />

UNL-UNO Collaborative Research Grants, $5,000.<br />

Dufner, D. (2005) “Cross-cultural Collaboration: Extending the Reach and Scope <strong>of</strong> Immigrant Owned<br />

-405-


Businesses in South <strong>Omaha</strong> through Web and Computer Based Technologies,” Faculty Course<br />

Development Sub-grant, Midwest Consortium for Service-Learning in Higher Education, A Learn & Serve<br />

America Grant from the Corporation for National Service, $2,000.<br />

Holley, L.M., Reed, B.J., and Dufner, D., (2005) “UNO Government Information Systems Management<br />

Research Triangle,” <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, <strong>Omaha</strong>, NE. $300.<br />

2004-2005 Obtained funding from the Mayor’s <strong>of</strong>fice for a graduate internship to develop and<br />

implement the Mayor’s Hotline System Hotline system. The Hotline System enables citizens <strong>of</strong> <strong>Omaha</strong> to<br />

have fast and easy Web based access to the Mayor and city departments for problem resolution. At the<br />

invitation <strong>of</strong> the Mayor attended with graduate intern, Piyush Shah, a press conference where the new<br />

Hotline was presented by the Mayor and Piyush. $16,442<br />

2005 Learn & Serve America Grant entitled Cross-cultural Collaboration: Extending the Reach and Scope<br />

<strong>of</strong> Immigrant Owned Businesses through Web and Computer Based Technologies, to the Midwest<br />

Consortium for Service-Learning in Higher Education for funds to assist in developing a service learning<br />

course over the summer. $2,000<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Spring<br />

2007<br />

Spring<br />

2007<br />

Course<br />

Semester Class<br />

number Course title<br />

hrs size<br />

ISQA 8820 Project Risk Management 3 8<br />

ISQA 4000-<br />

001<br />

002<br />

098<br />

099<br />

Teaching Computer Basics at the Douglas<br />

County Department <strong>of</strong> Corrections3<br />

3 12<br />

Fall 2007 ISQA 8810 Introduction to Project Management 3 11<br />

Fall<br />

3 10<br />

2007<br />

ISQA 4000-<br />

001<br />

002<br />

098<br />

099<br />

Teaching Computer Basics at the Douglas<br />

County Department <strong>of</strong> Corrections (see<br />

footnote 3)<br />

Spring ISQA 8810 Introduction to Project Management 3 15<br />

3 Teach two sections at the Douglas County Department <strong>of</strong> Corrections (DCDC), one for the males and the other for the<br />

females. Each semester the classes are taught from 8:00 AM- 9:30 Monday and Wednesday and from 10:00 – 11:30.<br />

Students are assigned to the early class or the later class. I teach at the DCDC from 8 -11:30 Monday and 8 -11:30 Wednesday<br />

approximately 6 hours every week in order to be in class with my students and to be able to <strong>of</strong>fer the class to both male and<br />

female inmates.<br />

-406-


2008<br />

Spring<br />

2008<br />

Fall 2008<br />

ISQA<br />

4000-001<br />

and 099<br />

Service<br />

Learning<br />

ISQA 4000-<br />

99<br />

Honors<br />

Colloquium<br />

Teaching Computer Basics at the Douglas<br />

County Department <strong>of</strong> Corrections (see<br />

footnote 3)<br />

Teaching Computer Basics at the Douglas<br />

County Department <strong>of</strong> Corrections (see<br />

footnote 3)<br />

3<br />

3<br />

3<br />

3<br />

5<br />

4<br />

Service-<br />

Learning<br />

Fall 2008 ISQA 8820 Project Risk Management 3 6<br />

Spring ISQA 8810 Introduction to Project Management 3 18<br />

2009<br />

Spring<br />

3<br />

8<br />

ISQA<br />

2009<br />

3<br />

4000-001<br />

and 099<br />

Service<br />

Learning<br />

Teaching Computer Basics at the Douglas<br />

County Department <strong>of</strong> Corrections (see<br />

footnote 3)<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __25%___%. Please<br />

give a brief description <strong>of</strong> your major research and scholarly activities:<br />

Project Management (domain <strong>of</strong> expertise ― S<strong>of</strong>tware Engineering and Telecommunications), Service-<br />

Learning; and Private and Public Sector Information Technology.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: __IS 100_%.<br />

-407-


-408-


Robert Fulkerson<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Robert A. Fulkerson<br />

Assistant Instructor<br />

Not Applicable<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Assistant Instructor 8/1995<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

BS CompSci Creighton <strong>University</strong> 5/1993<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

Additional work toward MS in Computer Science at Creighton <strong>University</strong>, 1993 - 1995. All coursework<br />

completed except for 6 hours.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Learn Perl for CGI Programming / O’Reilly School <strong>of</strong> Technology / July 2006<br />

Learn SQL for Database Programming / O’Reilly School <strong>of</strong> Technology / July 2006<br />

Learn PHP / O’Reilly School <strong>of</strong> Technology / July 2006<br />

Linux/Unix 1 : The Unix File System / O’Reilly School <strong>of</strong> Technology / July 2006<br />

-409-


6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Course Coordinator : CIST 1400, Introduction to Computer Programming (5 hours/week)<br />

Course Coordinator : CIST 1300, Introduction to Web Programming (2 hours/week)<br />

Course Coordinator : CIST 1404, Introduction to Computer Programming Lab (1 hour/week)<br />

Course Coordination for CIST 1400 and CIST 1404 carries additional compensation<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Computer Science Undergraduate Programming Committee, Fall 2004 – Spring 2008<br />

Computer Science Merit Raise Committee, Spring 2008<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

Maintenance and development <strong>of</strong> websites at http://morpo.com/ and http://morpo.com/movies/.<br />

Research and development <strong>of</strong> distance learning course, CIST 1400, for delivery in Spring 2009.<br />

-410-


12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall 2007 CIST 1300 Intro to Web Development 3 25<br />

Fall 2007 CIST 1400 Intro to Computer Programming 3 56<br />

Fall 2007 CSCI 2850 Programming on the Internet 3 19<br />

Spring 2008 CIST 1300 Intro to Web Development 3 27<br />

Spring 2008 CIST 1400 Intro to Computer Programming 3 47<br />

Spring 2008 CSCI 2850 Programming on the Internet 3 21<br />

Fall 2008 CIST 1300 Intro to Web Development 3 27<br />

Fall 2008 CIST 1400 Intro to Computer Programming 3 56<br />

Fall 2008 CSCI 2850 Programming on the Internet 3 32<br />

Spring 2009 CIST 1300 Intro to Web Development 3 14<br />

Spring 2009 CIST 1400 Intro to Computer Programming 3 24<br />

Spring 2009 CSCI 2850 Programming on the Internet 3 37<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _10__%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

I am working with Drs. Wolcott, Haworth and Pietron researching the use <strong>of</strong> rubrics in grading CIST 1400<br />

programs.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-411-


-412-


Ann Fruhling<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Ann L. Fruhling<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Instuctor Fall, 1998<br />

Assistant Pr<strong>of</strong>essor Fall, 2003<br />

Associate Pr<strong>of</strong>essor Fall, 2008<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph. D., Major: MIS Minors: <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> – Lincoln, 2003<br />

Computer Science,<br />

Marketing, Strategy<br />

M.B.A. Thesis: “Comprehensive <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<strong>Omaha</strong> 1991<br />

Business <strong>Study</strong> and<br />

Strategic Plan for a Rural<br />

Dentist Practice”<br />

B.S. BUS. ADMIN Colorado State <strong>University</strong> 1983<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Hawaiian International Conference for System Sciences – 2003-2009<br />

-413-


America Conferences for Information Systems – 2002 – 2009<br />

International Conference for Information Systems 2006, 2008<br />

American Medical Informatics Association conference 2005<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

1983-1986 Texas Instruments Programmer Analyst<br />

1986-1987 Mutual <strong>of</strong> <strong>Omaha</strong> Programmer Analyst<br />

1987-1988 Commercial Federal Bank Sr. Programmer Analyst<br />

1988-1990 AT&T Member Technical Staff<br />

1990-1998 College <strong>of</strong> Saint Mary Director, Computer Information Management and<br />

Telecommunications Systems Management programs,<br />

Associate Pr<strong>of</strong>essor<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

2004-2008 Northrup Grumman USSTRATCom C2SES – Innovation Team – Research<br />

Scholar<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Undergraduate Program Committee<br />

Doctoral Program Committee<br />

Chair, First IS&T Graduation Honors Ceremony<br />

Academic Committee<br />

Technology Committee<br />

RPT Committee<br />

ADROCA, ORTICA<br />

-414-


9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Undergraduate Program Committee<br />

Doctoral Program Committee<br />

Academic Committee<br />

UCAT<br />

<strong>University</strong> – wide Gender Equity committee<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Fruhling, A, Siau, K. (2007) Assessing Organizational Innovation Capability and Its Effect on E-Commerce<br />

Initiatives, Journal <strong>of</strong> Computer Information Systems, 47(4), pp. 91-104.<br />

Fruhling, A. (2006). Examining the Critical Requirements, Design Approaches and Evaluation Methods for<br />

a Public Health Emergency Response System, Communications <strong>of</strong> the Association for Information<br />

Systems, 18, pp. 431-450.<br />

Fruhling, A., Vreede, G. J., de. (2006). Field Experiences with eXtreme Programming: Developing an<br />

Emergency Response System, Journal <strong>of</strong> Management Information Systems, 22(4).<br />

Fruhling, A., Lee, S. (2006).The Influence <strong>of</strong> User Interface Usability on Rural Consumers’ Trust <strong>of</strong> e-<br />

Health Services, International Journal <strong>of</strong> Electronic Health Care, 2(4), pp.305-321, ISSN Print: 1741-8453,<br />

ISSN: 1741-8461.<br />

Vreede, G.J. de, Koneri, P.G., Dean, D.L., Fruhling, A.L., Wolcott, P. (2006). A Collaborative S<strong>of</strong>tware Code<br />

Inspection: The Design and Evaluation <strong>of</strong> a Repeatable Collaboration Process in the Field, International<br />

Journal <strong>of</strong> Cooperative information Systems, 15(2), pp. 205-228.<br />

http://www.worldscinet.com/ijcis/ijcis.shtml.<br />

Fruhling, A., McDonald, P., Dunbar, C. (2008). A Case <strong>Study</strong>: Introducing eXtreme Programming in a<br />

Command and Control System for the US Military, Fortieth-first Hawaii International Conference System<br />

Sciences (85% contribution).<br />

Fruhling, A., Zhang, D. (2007). An Empirical <strong>Study</strong> Examining the Usage and Perceived Importance <strong>of</strong> XP<br />

Practices, Proceedings <strong>of</strong> the Twelfth Americas Conference on Information Systems, AMCIS (85%<br />

contribution).<br />

Fruhling, A., Steinhauser, L., H<strong>of</strong>f, G. (2007). Designing and Evaluating Collaborative Processes for<br />

Requirements Elicitation and Validation, Fortieth Hawaii International Conference System Sciences.<br />

(85% contribution).<br />

Johnson, N., Fruhling, A., Sambol, A., Hinrichs, S. (2006). Towards an Evaluation <strong>of</strong> a Microbiology<br />

Laboratory Electronic Diagnostic System for Public Health, Proceedings <strong>of</strong> the Twelfth Americas<br />

Conference on Information Systems. (40% contribution).<br />

Johnson, N., Fruhling, A. (2006). Development and Assessment <strong>of</strong> the STATPack Emergency Response<br />

System, International Conference Information Systems for Crisis Response and Management (ISCRAM),<br />

-415-


Newark, New Jersey, NJIT (50% contribution).<br />

Fruhling, A., Sambol, A., Hinrichs, S., Vreede, G.J. de. (2006). Designing an Emergency Response System<br />

for Electronic Laboratory Diagnostics Consultation, Thirty-ninth Hawaii International Conference System<br />

Sciences (95% contribution).<br />

Koneri, P.G., Vreede, G.J. de, Dean, D.L., Fruhling, A.L., Wolcott, P. (2005). “The Design and Field<br />

Evaluation <strong>of</strong> a Repeatable Collaborative S<strong>of</strong>tware Code Inspection Process” in Fuks, H., Lukosch, S.,<br />

Salgado, A.C. (eds.), Proceedings <strong>of</strong> CRIWG 2005, LNCS3706, pp. 325-340, Springer Verlag Berlin<br />

Heidelberg, (20% contribution).<br />

Press, L., Qureshi, S., Wolcott, P., Fruhling, A. (2005). A Grand Challenge: Connecting the World’s Rural<br />

Villages (panel), Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems, AMCIS (25%<br />

contribution).<br />

Fruhling, A., Lee, S. (2005). Assessing the Reliability, Validity, and Adaptability <strong>of</strong> PSSUQ, Proceedings <strong>of</strong><br />

the Eleventh Americas Conference on Information Systems, AMCIS (95% contribution).<br />

Fruhling, A, Tyser, K, Vreede, G.J. de. (2005). Experiences with Extreme Programming in Telehealth:<br />

Developing and Implementing a Biosecurity Health Care Application, Thirty-eighth Hawaii International<br />

Conference System Sciences (88% contribution).<br />

deVreede, G.J., Fruhling, A., Chakrapani, A. (2005). A Repeatable Collaboration Process for Usability<br />

Testing, Thirty-eighth Hawaii International Conference System Sciences (40% contribution).<br />

Fruhling, A., and Lee, S. M. (2004). Designing Trustworthy e-Health Services for Rural Consumers,<br />

American Medical Informatics Association Proceedings (95% contribution).<br />

Fruhling, A., deVreede, G.J., Chakrapani, A. (2004). A Repeatable Collaboration Process for Usability<br />

Testing, CORS/INFORMS International Joint Meeting Proceedings (40% contribution).<br />

Fruhling, A., and Lee, S. M. (2004). Examining HCI Usability Factors Affecting Consumers’ Trust in E-<br />

health Services, Hawaii International Conferences on Computer Sciences Proceedings (95%<br />

contribution).<br />

Fruhling, A., Vreede, G.J. de. (2005). Collaborative Usability Testing to Facilitate Stakeholder<br />

Involvement in S. Biffle, A. Aurum, B. Boehm, H. Erdogmus, P. Gruenbacher (eds), Value Based S<strong>of</strong>tware<br />

Engineering, Berlin: Springer-Verlag (in press) (50% contribution).<br />

Fruhling, A. (2007). “Best Practices in Implementing and Managing Agile Information System<br />

Development Processes for Command and Control Operations”, IBM Center for the Business <strong>of</strong><br />

Government (proposal accepted), paper in-progress.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

3.5.1 Internal to UNO<br />

PI Co-PIs Title <strong>of</strong> Grant Amount <strong>of</strong><br />

Grant<br />

X<br />

Improving System<br />

Requirement<br />

Elicitation and<br />

Traceability <strong>of</strong><br />

System Test Plan<br />

Development –<br />

-416-<br />

Funding Entity<br />

Your<br />

Contribution<br />

(%)<br />

Outcomes from the<br />

Award<br />

$9,800 NASA Research 100% 1 Graduate Student,<br />

Research Paper


2006<br />

3.5.2 External to UNO<br />

PI<br />

X<br />

Co-<br />

PIs<br />

Title <strong>of</strong> Grant<br />

Amount <strong>of</strong><br />

Grant<br />

Funding Entity<br />

Oklahoma, STATPack, Laboratory $23,000 Oklahoma<br />

Response<br />

Health and<br />

Project continuation -2007<br />

Human Services<br />

Your<br />

Contribution<br />

(%)<br />

100%<br />

Outcomes from the<br />

Award<br />

X<br />

X<br />

KSU STATPack,<br />

Laboratory Response<br />

project – 2006<br />

Kansas STATPack,<br />

Laboratory Response<br />

project - 2006<br />

$25,700 KSU Veterinary 100%<br />

$211,907 Kansas Health<br />

and Human<br />

Services<br />

100%<br />

X<br />

X<br />

Oklahoma STATPack, Laboratory $185,000 Oklahoma<br />

Response<br />

Health and<br />

project - 2006<br />

Human Services<br />

<strong>Nebraska</strong> STATPack, Laboratory $37,500 <strong>Nebraska</strong> Health<br />

Response<br />

and Human<br />

project -2006<br />

Services<br />

100% 5 students and two FTE I<br />

IT pr<strong>of</strong>essionals,<br />

100% STATPack, Laboratory<br />

Response project<br />

X<br />

Northrup Gruman C2SES<br />

DoD Research – 4 years<br />

(Fruhling & Zhu) – 2005<br />

$555,466 Northrup<br />

Gruman<br />

50% 2 graduate/PhD<br />

students for 4 years,<br />

stipend and tuition<br />

2 Research Papers<br />

completed<br />

X<br />

X<br />

STATPack Laboratory<br />

Response project – 2005<br />

continuation<br />

STATPack Laboratory<br />

Response project –<br />

Expansion. - 2005<br />

$82,500 <strong>Nebraska</strong> Health<br />

and Human<br />

Services<br />

$3,700 <strong>Nebraska</strong> Health<br />

and Human<br />

Services<br />

2 Research Studies<br />

presented to<br />

STRATCOM Colonels<br />

100% STATPack Laboratory<br />

Response project – 2006<br />

continuation<br />

100% STATPack Laboratory<br />

-417-


X<br />

X<br />

X<br />

X Research Proposal –<br />

(Fruhling, deVreede,<br />

Henninger) “Collaborative<br />

Test Plan Creation to<br />

Accomodate Stakeholders’<br />

Value Propositions in Value-<br />

Based S<strong>of</strong>tware Engineering”<br />

– Spring, 2005<br />

STATPack Laboratory<br />

Response project – Aug 2004<br />

STATPack Laboratory<br />

Response project – Sept<br />

2004<br />

Information Technology in<br />

Sustaining Rural Health<br />

Delivery Systems - 2002<br />

$25,000 UNO/UNL<br />

Research<br />

Collaboration<br />

Proposal<br />

Request from<br />

UNL Vice<br />

Chancellor Prem<br />

Paul<br />

$132,250 <strong>Nebraska</strong> Health<br />

and Human<br />

Services<br />

$36,200 Association<br />

Public Health<br />

Labs grant<br />

$412,538 <strong>Nebraska</strong><br />

Research<br />

Initiative<br />

50% Supported research<br />

funding for two<br />

graduate students<br />

100%<br />

100%<br />

100% 39 proposals were<br />

submitted, 12 proposals<br />

were selected.<br />

2 years funding – year 1<br />

funding for 8<br />

undergraduate and<br />

graduate students each<br />

year.<br />

Provided a prototype to<br />

continue to get grant<br />

funding.<br />

See portfolio<br />

Funded dissertation<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 8080 Seminar: Public Health Informatics 3 6<br />

ISQA 8950 Capstone Management Information Systems 12<br />

Fall 2008 ISQA 8950 Capstone Management Information Systems 7<br />

Spring 2008 ISQA 8040 An Overview <strong>of</strong> System Development 3 8<br />

ISQA 8950 Capstone Management Information Systems 10<br />

-418-


Fall 2007 CIST 3100 Organizations, Applications, and Technology 3 22<br />

ISQA 8040 An Overview <strong>of</strong> System Development 3 16<br />

Supervise – 6 to 8 research students every year<br />

through my grants.<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __50___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Grant, NPHL STATPack - Ongoing Research and System Support, UNMC, Fruhling, A., $98,837, Funded,<br />

(October 1, 2008 - September 30, 2009).<br />

Contract, Kansas STATPack - Research, Development and Support, Kansas Department <strong>of</strong> Health and<br />

Environment, Fruhling, A., $25,000, Funded, (August 8, 2008 - August 8, 2009).<br />

Grant, Empirical Research on the Transition to an Agile System Development Environment, NASA,<br />

Fruhling, A., $7,500, Funded, (October 2008 - July 31, 2009).<br />

Financial support is requested to support a half-time graduate student to work on a research study to<br />

explore and examine the best practices the transition to agile system development methods namely,<br />

eXtreme Programming (XP) and SCRUM. This research is important because it will help practitioners<br />

successfully introduce and implement the principles and practices <strong>of</strong> Agile methods into traditional<br />

s<strong>of</strong>tware development environments.<br />

Grant, Public/Private Laboratory Integration Oklahoma STATPack, Oklahoma, State <strong>of</strong>, Fruhling, A.,<br />

$24,150, Funded, (April 1, 2008 - May 31, 2009).<br />

Grant, Center for Public Health Informatics, NU Foundation, Fruhling, A., $136,000, Funded, (July 2008 -<br />

July 2009).<br />

The Center will create a <strong>Nebraska</strong>-focused information portal designed to provide real time, interactive<br />

access to public health data. This publicly available web site and database will be designed in accordance<br />

with the needs <strong>of</strong> a wide array <strong>of</strong> potential users including public health policy makers, public health<br />

workers, academics, and the general public. Members <strong>of</strong> the UNMC CoPH have developed a number <strong>of</strong><br />

important relationships with public health data holders, both in state government and private industry.<br />

Those relationships will allow UNMC to negotiate the appropriate access to information in forms that<br />

would meet the needs <strong>of</strong> the user community while continuing to satisfy the security and confidentiality<br />

requirements <strong>of</strong> the original data stewards.<br />

CPHI will conduct a formalized information analysis and data availability assessment to support<br />

current/emerging public health issues. This will include a needs analysis, cataloging existing data<br />

sources, identifying gaps therein, and developing proposals to address those gaps. Focus groups<br />

comprised <strong>of</strong> stakeholders and potential users will be conducted to determine the level <strong>of</strong> interest,<br />

-419-


technical ability, and desired scope <strong>of</strong> content. This will be a critical step to the design <strong>of</strong> a useful<br />

system. In addition, the CPHI will research appropriate tools, including data formats, and visualization<br />

and reporting tools, to maximize the flexibility and utility <strong>of</strong> the information portal. The Center will then<br />

pursue national grants (e.g. NIH, NSF, etc.) to gain assistance in addressing both data and technology<br />

voids.<br />

The Center will provide access to a think tank <strong>of</strong> UNO/UNMC IT, GIS and Public Health researchers and<br />

experts. This human infrastructure will provide assistance on how IT and GIS capabilities can be used to<br />

integrate, visualize, analyze, and disseminate public health information and further research. Both, UNO<br />

and UNMC strategic plans have major outreach components that can be easily incorporated into these<br />

activities.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%. Not applicable<br />

-420-


Martina Greiner<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Martina E. Greiner<br />

Assistant Pr<strong>of</strong>essor<br />

Non-tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Assistant Pr<strong>of</strong>essor<br />

Dates Held<br />

8/18/2008 - Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

PhD<br />

Dipl.<br />

Oec<br />

Business<br />

Administration<br />

Business<br />

Administration<br />

and Economics<br />

The <strong>University</strong> <strong>of</strong> Georgia 2008<br />

The <strong>University</strong> <strong>of</strong> Hohenheim, Germany 2000<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Joined Clicker-Circle, UNO Academic Year 2008-2009<br />

Evaluating and Learning Adobe Connect for use in the Classroom/ Virtual Office Hours<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

-421-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

ISQA Pr<strong>of</strong>essional Development Committee (2009)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

“The Business <strong>of</strong> Open Source”, Richard T. Watson, Marie-Claude Boudreau, Donald Wynn, Martina<br />

Greiner, Paul York; Communications <strong>of</strong> the ACM, 51 (4), 2008, 41-46<br />

“Opening the Classroom”, Richard T. Watson, Marie-Claude Boudreau, Paul York, Martina Greiner,<br />

Donald Wynn; Journal <strong>of</strong> IS Education, 19 (1), 2008, 75-85<br />

“A Strategy for Knowledge Management”, Martina Greiner, Thilo Böhmann, Helmut Krcmar; Journal <strong>of</strong><br />

Knowledge Management, 11 (6), 2007, 3-15<br />

“A Research Agenda for <strong>Study</strong>ing Open Source I: A Multi-Level Framework”, Fred Niederman, Ashley<br />

Davis, Martina E. Greiner, Donald Wynn, Paul T. York; Communications <strong>of</strong> the AIS, 18, 2006, 129-149<br />

“A Research Agenda for <strong>Study</strong>ing Open Source II: View Through the Lens <strong>of</strong> Referent Discipline<br />

Theories”, Fred Niederman, Ashley Davis, Martina E. Greiner, Donald Wynn, Paul T. York;<br />

Communications <strong>of</strong> the AIS, 18, 2006, 150-175<br />

“Governance and Global Communities”, Richard T. Watson, Marie-Claude Boudreau, Martina Greiner,<br />

Donald Wynn, Paul York, Rusen Gul; Journal <strong>of</strong> International Management, 11, 2005, 125-142<br />

“Understanding Music Sharing Behavior in China: Development <strong>of</strong> an Instrument”, Donald Amoroso;<br />

Pamila Dembla; Hui Wang; Martina Greiner; Pengpeng Liu; Americas Conference on Information<br />

Systems (AMCIS) 2008<br />

“Building Consumer-to-Consumer Trust in e-Finance Marketplaces”, Martina Greiner, Hui Wang;<br />

Americas Conference on Information Systems (AMCIS) 2007<br />

“The Benefits <strong>of</strong> Transaction Cost Economics: The Beginning <strong>of</strong> a New Direction”, Marie-Claude<br />

Boudreau, Richard T. Watson, Adela J.W. Chen, Martina Greiner, and Peter Sclavos; European<br />

Conference on Information Systems (ECIS) June 07-09, 2007<br />

“Make-or-Buy in the Age <strong>of</strong> Open Source: A Transaction Cost Analysis”, Martina Greiner, Dale Goodhue;<br />

International Conference on Information Systems (ICIS) Dec 11-14, 2005<br />

“Governance and Global Communities”, Richard T. Watson, Marie-Claude Boudreau, Martina Greiner,<br />

Donald Wynn, Paul York, Rusen Gul; The fifth Annual International Business Research Forum, March 27,<br />

2004<br />

“Governance, Leadership, And Management In Adaptive And Inventive Digital Communities: A Research<br />

Agenda To Reduce Waste In Graduate Education”, Richard T. Watson, Marie-Claude Boudreau, Martina<br />

Greiner, Donald Wynn, Paul York, Rusen Gul; Seventh Bled Conference, June 21-23, 2004<br />

“Leadership Behavior in Virtual Communities”, Martina Greiner; Seventh Annual Conference <strong>of</strong> the<br />

-422-


Southern Association for Information Systems (SAIS) Feb 27-28, 2004<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 8220 Advanced Systems Analysis and Design 3 27<br />

Fall 2008 ISQA 3310 Managing the Database Environment 3 18<br />

ISQA 8220 Advanced Systems Analysis and Design 3 28<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __60___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

I am currently working on two research streams. The first research stream includes applying<br />

organizational theories to IS issues. In particularly, I am refining Transaction Cost Theory to gain insights<br />

into s<strong>of</strong>tware procurement decisions. The second research stream is concerned about people-to-people<br />

lending marketplaces and the unique IS and management challenges <strong>of</strong> these marketplaces.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-423-


-424-


Dwight Haworth<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Dwight A. Haworth<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Associate Pr<strong>of</strong>essor<br />

Dates Held<br />

1990-Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. MIS Texas Tech <strong>University</strong> 1990<br />

B.S. General United States Air Force Academy, Colorado 1963<br />

Science<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Eighth Annual IBER & TLC Conference, 2008<br />

Distance-Education Workshop, Fall 2007<br />

Teaching and Learning Conference, Oahu, Hawaii, January 2-6<br />

Teaching and Learning Conference, Cancun, Mexico, March 20-25, 2006<br />

Teaching and Learning Conference, Puerto Vallarta, Mexico, March 12-19, 2005<br />

-425-


6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

1986-1990 College <strong>of</strong> Business<br />

Administration, Texas Tech<br />

<strong>University</strong><br />

1984-1986 College <strong>of</strong> Business<br />

Administration, Texas Tech<br />

<strong>University</strong><br />

1982-1984 Central Texas College<br />

Overseas, Yongsan Garrison,<br />

Korea<br />

1982-1984 Far East District, Corps <strong>of</strong><br />

Engineers, Seoul, Korea<br />

Teaching assistant. Taught business communication,<br />

introductory management science, and file structures<br />

courses.<br />

Teaching assistant. Assisted faculty with grading,<br />

proctoring, and preparation for audio-visual materials<br />

for undergraduate business communication.<br />

Instructor. Instructed in computer programming,<br />

systems analysis and design, and computer operating<br />

systems.<br />

Programmer-analyst. Automated the preparation and<br />

update <strong>of</strong> Current Working Estimates for major and<br />

minor military construction projects throughout Korea.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

1981-1982 Gyeong-Gi, Seoul, Korea<br />

Technical Education<br />

Research Center<br />

Curriculum Consultant. Designed and assisted with<br />

implementation <strong>of</strong> undergraduate computer information<br />

systems curriculum.<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Member <strong>of</strong> Faculty Senate<br />

Member <strong>of</strong> Faculty Senate Pr<strong>of</strong>essional Development Committee<br />

Member <strong>of</strong> Faculty Academic Policy Committee <strong>of</strong> the division <strong>of</strong> Continuing Studies<br />

Working Member <strong>of</strong> NUCIA<br />

Member <strong>of</strong> Distance Education Steering Committee<br />

Member <strong>of</strong> the Academic Committee<br />

Member <strong>of</strong> the ABET Steering Committee<br />

Chairman <strong>of</strong> UPC for Bachelors in MIS<br />

-426-


Library Representative for Department<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Library Representative for Department (2004- )<br />

Member <strong>of</strong> Distance Education Steering Committee (2007- )<br />

Member <strong>of</strong> the ABET Steering Committee (2007- )<br />

IA Undergraduate Program Committee (2007-2008)<br />

NDU MOU (2007-2008)<br />

Faculty Academic Policy Committee (2004-2008)<br />

ISQA Undergraduate Program Committee (2004-2008)<br />

Library and Learning Resources Committee (2005-2007)<br />

<strong>University</strong> Committee on Research (2004-2007)<br />

Recruiting Committee Member (2004-2005)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Haworth, D.A. and Pietron, L.R. Sarbanes-Oxley: Achieving compliance by starting with ISO 17799.<br />

Information Systems Management, 23 (2006), 1, 73-87<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 3300 File Structures for Information Systems 3 25<br />

ISQA 8546 Computer Security Management 3 8<br />

-427-


ISQA 8560 Information Warfare & Security 3 3<br />

CIST 4540 Computer Security Management 3 6<br />

Fall 2008 ISQA 3300 File Structures for Information Systems 3 13<br />

ISQA 8546 Computer Security Management 3 13<br />

ISQA 8560 Information Warfare & Security 3 12<br />

CIST 4540 Computer Security Management 3 5<br />

Summer CIST 2500 Intro to Appliet Stats for IS & T 3 11<br />

2008<br />

Spring 2008 ISQA 3300 File Structures for Information Systems 3 4<br />

ISQA 8546 Computer Security Management 3 4<br />

ISQA 8560 Information Warfare & Security 3 10<br />

CIST 4540 Computer Security Management 3 10<br />

Fall 2007 ISQA 3300 File Structures for Information Systems 3 7<br />

ISQA 8546 Computer Security Management 3 7<br />

ISQA 8560 Information Warfare & Security 3 12<br />

CIST 4540 Computer Security Management 3 9<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-428-


Mary Levesque<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Mary L. Levesque<br />

Assistant Instructor<br />

NA<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Temporary Assistant<br />

Instructor<br />

Assistant Instructor<br />

Dates Held<br />

01/01/2000 – 08/31/2002<br />

09/01/2002 – present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

BA Music Duchesne College <strong>of</strong> the Sacred Heart, <strong>Omaha</strong> Aug. 1968<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

15 years <strong>of</strong> programming and instruction at Mutual <strong>of</strong> <strong>Omaha</strong><br />

Completed CIST 1100 (C++ version) at UNO<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

None<br />

-429-


6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

1972-1973 Mutual <strong>of</strong> <strong>Omaha</strong> S<strong>of</strong>tware Development<br />

1974-1978 Mutual <strong>of</strong> <strong>Omaha</strong> Teaching; developing custom courses related to<br />

mainframe programming – use <strong>of</strong> utilities, JCL,<br />

debugging<br />

1983-1985 Various for-pr<strong>of</strong>it schools Taught COBOL<br />

1985-1994 Mutual <strong>of</strong> <strong>Omaha</strong> Developed and taught PC courses<br />

1994-1996 Mutual <strong>of</strong> <strong>Omaha</strong> Production support<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

Act as informal consultant for colleagues regarding Excel<br />

and Word formatting problems, as well as for an<br />

occasional outside person who calls UNO for help.<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Course Coordinator for CIST 1100<br />

Course Coordinator for CSCI 1000<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

-430-


None<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

None, although I authored one article for a genealogy magazine and assisted with another.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

None<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year Course number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall 2007 CIST 1100 001 Introduction to Computing 3 22<br />

Fall 2007 CIST 1100 002 Introduction to Computing 3 39<br />

Fall 2007 CIST 1100 003 Introduction to Computing 3 16<br />

Fall 2007 CSCI 1000 004 Computer Literacy with Applications 3 14<br />

Spring 08 CIST 1100 001 Introduction to Computing 3 18<br />

Spring 08 CIST 1100 850 Introduction to Computing 3 14<br />

Spring 08 CSCI 1000 004 Computer Literacy with Applications 3 15<br />

Spring 08 CSCI 1000 005 Computer Literacy with Applications 3 19<br />

Fall 2008 CIST 1100 001 Introduction to Computing 3 24<br />

Fall 2008 CIST 1100 002 Introduction to Computing 3 21<br />

Fall 2008 CIST 1100 850 Introduction to Computing 3 13<br />

Fall 2008 CSCI 1000 006 Computer Literacy with Applications 3 30<br />

Spring 09 CIST 1100 001 Introduction to Computing 3 14<br />

Spring 09 CIST 1100 850 Introduction to Computing 3 9<br />

Spring 09 CSCI 1000 004 Computer Literacy with Applications 3 7<br />

Spring 09 CSCI 1000 005 Computer Literacy with Applications 3 10<br />

Spring 09 CSCI 1000 850 Computer Literacy with Applications 3 15<br />

-431-


13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 10%. Please give a brief<br />

description <strong>of</strong> your major research and scholarly activities:<br />

I use my computer skills to help others research their genealogy. Most <strong>of</strong> this is done after hours,<br />

however.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-432-


Lotfollah Najjar<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Lotfollah Najjar<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Instructor 8/89-8/99<br />

Lecturer 8/99-8/01<br />

Assistant Pr<strong>of</strong>essor 08/01 – 08/07<br />

Associate Pr<strong>of</strong>essor 08/07- Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D.<br />

Major: Industrial Engineering and<br />

Management Systems<br />

Minor: MIS and Operation<br />

Management<br />

Statistics and Mathematics<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />

Lincoln<br />

Ph.D.<br />

Student<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />

Lincoln<br />

MS Statistics and Mathematics <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />

Lincoln<br />

BS Industrial Engineering and Management <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />

Systems<br />

Lincoln<br />

08/2002<br />

01/1988-<br />

5/1992<br />

05/1987<br />

05/1984<br />

-433-


4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

PhD. with major in Industrial Engineering and Management Systems and minor in MIS (took 7 courses in<br />

MIS field) Have taken 21 hours MIS courses: System Analysis and Design, Database, Decision Support<br />

Systems, Data Communications, Management Information Systems, Seminar in MIS, and Artificial<br />

Intelligence.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Kamal, M., Qureshi, S. , and Najjar, L. (2008).“ a Global Analysis <strong>of</strong> the Effect <strong>of</strong> IT Capacity on<br />

Development-Undrestanding Sourcing <strong>of</strong> Skills.” International Conference on Information Resources<br />

Management (Conf-IRM) May 18-20, 2008 .Niagara Falls, Ontario, Canada.<br />

Tarmizi H. and Najjar, L. (2007). “Rethinking E-Comerce Research by Connecting IT to Activities on Line<br />

Community”. MWAIS, May 18-19, Springfield, IL.<br />

Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. (2007). “Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support.” Second Annual Midwest United States<br />

Association for Information Systems Conference (MWAIS-02), May 18-19, Springfield, Illinois.<br />

Kamal M., Zhang C., Najjar, L. and Qureshi S. (2007). “Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support”. MWAIS, May 18-19, Springfield, IL.<br />

Tarmizi H. and Najjar, L. (2006). “Empirical study on Communities <strong>of</strong> Practice and E-commerce: influence<br />

<strong>of</strong> community <strong>of</strong> practice on pricing on eBay”. (AMCIS 2006), August 10-13, Acapulco, Mexico.<br />

Uttamchandani, R, Najjar, L, and Bishu, R.R. (2005) “Alternate Training Methods for an Optically<br />

Measuring Inspection Device: A Comparative <strong>Study</strong>.” In the Proceedings <strong>of</strong> the 10th Annual International<br />

Conference on Industrial Engineering – Theory, Applications and Practice Clearwater, Florida, USA.<br />

December 7-9. pp. 474-478.<br />

Najjar, L.and Bishu, R. (2005).” Information Quality in the Banking Industries”. Proceedings <strong>of</strong> the<br />

Eleventh American Conference on Information Systems (AMCIS), August 10-13. <strong>Omaha</strong>, <strong>Nebraska</strong>, pp.<br />

3190-3198.<br />

Najjar, L. Eftekari, H. (2005). “Consumers’ Perception <strong>of</strong> the Quality Internet Banking”. Midwest<br />

Economics Association Meetings, 69th Annual Meetings, Milwaukee, WI. March 14-17.<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

-434-


08/96-08/02 Department <strong>of</strong> Industrial Engineering<br />

and Management Systems, <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong>-Lincoln<br />

2/95-6/95 Department <strong>of</strong> Biometry, <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong>-Lincoln<br />

2/89-8/89 Veterinary Diagnostic Center,<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>- Lincoln<br />

Guest Lecturer:<br />

Courses taught have included Quality Control<br />

(821), and Applied Statistics (822).<br />

SAS Programmer:<br />

Performed SAS programs for statistical<br />

analysis for faculty and client research.<br />

Involved in many projects for the College <strong>of</strong><br />

Dentistry and College <strong>of</strong> Agriculture.<br />

Consulted on and performed projects<br />

(statistical analysis and SAS programming)<br />

for private industry in conjunction with<br />

faculty <strong>of</strong> Biometry Department.<br />

Analyst III:<br />

Performed statistical analysis in<br />

toxicology lab using Experimental<br />

design, regression analysis (linear and<br />

nonlinear) and non-parametric analysis<br />

to test and validate the specific effects<br />

<strong>of</strong> different substances on cattle.<br />

Involved in many projects in<br />

conjunction with Pharmaceutical<br />

College at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong><br />

Medical Center.<br />

January 2005 Baton Rouge, LA Attending 6-day class (SAP s<strong>of</strong>tware on<br />

Business Process Reengineering). LSU<br />

June 2004<br />

Scott Center Hall, PKI<br />

Project Management Institute (PMI).<br />

Project Management Institute (PMI).<br />

Work Shop on :<br />

“Business Process Reengineering with IT”<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

1996 and<br />

2000<br />

<strong>Nebraska</strong> Printing and<br />

Lithography. Fremont <strong>Nebraska</strong><br />

Quality improvement and data analysis.<br />

-435-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Course Coordinator for :<br />

CIST 2500 and ISQA 4150/8206<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Committee Position Date<br />

Library Dean Search Committee Member 2004-2007<br />

Technology Committee Member 2003-2007<br />

UNO Judicial Committee Member 2002-2006<br />

IS&T Academic Committee Member 2002-2005<br />

ISQA Undergraduate Program Committee Member 2002-2006<br />

UNO Pr<strong>of</strong>essional Development & Concerns Committee Member Chair 2002-2005<br />

2006-2008<br />

ISQA Undergraduate Program Committee Member 2009-present<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

10.1 Refereed Journals<br />

Aghazadeh M., Najjar L., and Huq, Z. “Environment and Resolutions to Avoid Discontinuity in Supply<br />

Chain Management” International Journal <strong>of</strong> Risk Assessment and Management. Forthcoming, 2008.<br />

Azadmanesh A., A. Farahani, L. Najjar, “Fault Tolerant Weighted Voting Algorithms”, Int’l Journal <strong>of</strong><br />

Network Security, Forthcoming, 2008.<br />

Luo, Mingchu , Najjar, L and Huang, Wenmin. “The Impact <strong>of</strong> Chinese Student School Performanceon<br />

their Perceptions <strong>of</strong> School Ethical Climate”. Journal <strong>of</strong> Moral Education. Accepted with minor revision.<br />

(August 2006).<br />

Najjar, L., Schniederjans, Marc. J. (2006). “Information Quality Benchmarking: A Banking Industry Case<br />

<strong>Study</strong> in the Product and Service Performance.” Quality and Quantity, International Journal <strong>of</strong><br />

Methodology. Vol. 40, No. 3, pp. 419-434.<br />

-436-


Luo, Mingchu , Najjar, L (2006). “The Chinese Principal Leadership Capacities as Perceived by Master<br />

Teachers.” The Academic Leadership Journal, 4(3). Summer 2006.<br />

Najjar, L.and Bishu, R. (2005). “Service Quality in Banking Industries”. Quality Management Journal.<br />

Volume 12(3), pp 35-44.<br />

Liu, L., Bishu, R., and Najjar, L. (2005). “Using the Analytical Hierarchy Process as a Tool for Assessing<br />

Service Quality.” International Journal <strong>of</strong> Industrial Engineering and Management Systems. Vol. 4(2),<br />

pp.129-135.<br />

10.2 Refereed Proceedings:<br />

Kamal, M., Qureshi, S. , and Najjar, L. (2008).“ a Global Analysis <strong>of</strong> the Effect <strong>of</strong> IT Capacity on<br />

Development-Undrestanding Sourcing <strong>of</strong> Skills.” International Conference on Information Resources<br />

Management (Conf-IRM) May 18-20, 2008 .Niagara Falls, Ontario, Canada.<br />

Tarmizi H. and Najjar, L. (2007). “Rethinking E-Comerce Research by Connecting IT to Activities on Line<br />

Community”. MWAIS, May 18-19, Springfield, IL.<br />

Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. (2007). “Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support.” Second Annual Midwest United States<br />

Association for Information Systems Conference (MWAIS-02), May 18-19, Springfield, Illinois.<br />

Kamal M., Zhang C., Najjar, L. and Qureshi S. (2007). “Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support”. MWAIS, May 18-19, Springfield, IL.<br />

Tarmizi H. and Najjar, L. (2006). “Empirical study on Communities <strong>of</strong> Practice and E-commerce: influence<br />

<strong>of</strong> community <strong>of</strong> practice on pricing on eBay”. (AMCIS 2006), August 10-13, Acapulco, Mexico.<br />

Uttamchandani, R, Najjar, L, and Bishu, R.R. (2005) “Alternate Training Methods for an Optically<br />

Measuring Inspection Device: A Comparative <strong>Study</strong>.” In the Proceedings <strong>of</strong> the 10th Annual International<br />

Conference on Industrial Engineering – Theory, Applications and Practice Clearwater, Florida, USA.<br />

December 7-9. pp. 474-478.<br />

Najjar, L.and Bishu, R. (2005).” Information Quality in the Banking Industries”. Proceedings <strong>of</strong> the<br />

Eleventh American Conference on Information Systems (AMCIS), August 10-13. <strong>Omaha</strong>, <strong>Nebraska</strong>, pp.<br />

3190-3198.<br />

Najjar, L. Eftekari, H. (2005). “Consumers’ Perception <strong>of</strong> the Quality Internet Banking”. Midwest<br />

Economics Association Meetings, 69th Annual Meetings, Milwaukee, WI. March 14-17.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

11.1 Sabbatical:<br />

Fall 2008-Present: <strong>University</strong> <strong>of</strong> Jibail, Saudi Arabia. Department <strong>of</strong> Business Administration. Teaching<br />

courses in MIS.<br />

-437-


11.2 Manuscript Reviewer<br />

Year Journal’s (or Conference) Name Topic <strong>of</strong> the articles<br />

March 2009<br />

March 2009<br />

March 2009<br />

July 2007<br />

May 2007<br />

May 2007<br />

May 2007<br />

March 2006<br />

March 2006<br />

June 2005<br />

July 2004<br />

June 2004<br />

2009 International Conference on<br />

Information Resources Management (Conf-<br />

IRM)<br />

2009 International Conference on<br />

Information Resources Management (Conf-<br />

IRM)<br />

2009 International Conference on<br />

Information Resources Management (Conf-<br />

IRM)<br />

Journal <strong>of</strong> Management Information<br />

Systems (JMIS)<br />

International Conferences On Information<br />

Systems (ICIS 2007)<br />

American Conferences On Information<br />

Systems (AMCIS 2007)<br />

American Conferences On Information<br />

Systems (AMCIS 2007)<br />

American Conferences On Information<br />

Systems (AMCIS 2006)<br />

American Conferences On Information<br />

Systems (AMCIS 2006)<br />

IEEE Transactions on Engineering<br />

Management<br />

International Journal <strong>of</strong> Information<br />

Technology and Decision Making<br />

IEEE Transactions on Engineering<br />

Management<br />

Affect and Aesthetics in ICT Design and Use.<br />

Inter Process Communication & Prioritization to Enable Deskt<br />

Advertisement Mechanism.<br />

The Challenges in Establishing a Government Interoperability<br />

Framework: The e-PING Brazilian Case<br />

A Principal Component Analysis Approach to Web Page<br />

Categorization.<br />

Participants’ Repeat-Visiting Behavior in an Online Community<br />

<strong>of</strong> Practice.<br />

Reliability Generalization <strong>of</strong> Perceived Ease <strong>of</strong> use, Usefulness<br />

and Behavioral Intentions.<br />

Context, Process and Outcomes <strong>of</strong> ISD: An Allegorical Tale.<br />

The News: Examining perceptions <strong>of</strong> information product<br />

quality (IPQ).<br />

Paradox <strong>of</strong> Information Quality: Do Consumers Pay More for<br />

Premium Information on Products on E-commerce Sites?<br />

Information-Centric Assessment <strong>of</strong> S<strong>of</strong>tware Metrics Practices<br />

(second revision).<br />

SFTIS: A Decision Support System for Tourism Demand Analys<br />

and Forecasting.<br />

Information-Centric Assessment <strong>of</strong> S<strong>of</strong>tware Metrics Practices<br />

May 2004 2004 DSI Annual Meeting 1. An Implication <strong>of</strong> using Open S<strong>of</strong>tware (OSS): an<br />

overview <strong>of</strong> OSS, and users’ and developers’<br />

benefits and challenges.<br />

2. Effect <strong>of</strong> Interface Style on User Perception and<br />

Behavioral Intention.<br />

3. Electronic Payment Systems: Foundations,<br />

Taxonomies and Implementation Issues.<br />

4. Personal Web Usage at the workplace: Can<br />

it improve job satisfaction?<br />

5. Two approaches to extract related information<br />

from Web pages.<br />

11.3 Research and Development Grants funded and/or completed:<br />

-438-


Najjar, L., Khazanchi, D., and Wolcott, P. (3/1/2008 to 3/20/2009; Completed) ."Business Database<br />

Competitive Audit Project". Awarded a grant <strong>of</strong> $20,000 for conducting a business database audit for<br />

InfoUSA. This project is being conducted under the auspices <strong>of</strong> the PKI Technology Development Corp<br />

(PKITDC).<br />

Najjar, L., Khazanchi, D., and Wolcott, P. (1/1/2005 to 3/1/2005; Completed) "Business Database<br />

Competitive Audit Project". Awarded a grant <strong>of</strong> $14,575 for conducting a business database audit for<br />

InfoUSA. This project is being conducted under the auspices <strong>of</strong> the PKI Technology Development Corp<br />

(PKITDC).<br />

11.4 Research Grants submitted and under review:<br />

Azad Azadmanesh, Computer Science, College <strong>of</strong> IST, UNO, Lotfollah Najjar, Information Systems &<br />

Quantitative Analysis (ISQA), College <strong>of</strong> IST, UNO. “Electronic Student Companion.” (<strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> Foundation and Student Technol;ogy Fees). February, 2007.<br />

Azad Azadmanesh, Computer Science, College <strong>of</strong> IST, UNO, Lotfollah Najjar, Information Systems &<br />

Quantitative Analysis (ISQA), College <strong>of</strong> IST, UNO , and Krings , director <strong>of</strong> the Survivability Laboratory<br />

Testing at <strong>University</strong> <strong>of</strong> Idaho . “Consensus in Wireless Networks.” (NSF). March, 2006.<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Year/term Course number Course title<br />

Credit<br />

s<br />

2006/Fall ISQA 9130 Multivariate Data Analysis 3 9<br />

2007/ Spring ISQA 8196 Process Reengineering with IT 3 7<br />

2007/Spring ISQA 4190 // 3 4<br />

2007/Spring ISQA 8340 Advanced Regression Analysis 3 3<br />

2007/Spring ISQA 8206 Information Quality and data 3 2<br />

management<br />

2007/Spring ISQA 4200 // 3 5<br />

2007/Spring ISQA 9080 Research Directions in<br />

3 8<br />

Information Technology<br />

2007/Summer ISQA 9120 Application Of Design <strong>of</strong><br />

Experiment<br />

3 3<br />

No. <strong>of</strong><br />

students<br />

-439-


2007/Fall ISQA 9130 Multivariate Data Analysis 3 4<br />

2007/Fall Cist 2500 Introduction to Applies Statistics 3 21<br />

for IS&T<br />

2008/Spring CIST 2500 // (Distancd Education) 3 6<br />

2008/Spring ISQA 9080 Research Directions in<br />

3 15<br />

Information Technology<br />

2008/Spring ISQA 8196 Process Reengineering with IT 3 10<br />

2008/Spring ISQA 4190 // 3 3<br />

2008/Summer ISQA 9120 Application Of Design <strong>of</strong><br />

Experiment<br />

3 3<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: ____50_%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Information Quality, Quality Management, Data Mining, and Process Reengineering.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-440-


Stacie Petter<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Stacie Petter<br />

Assistant Pr<strong>of</strong>essor<br />

Untenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Assistant Pr<strong>of</strong>essor<br />

Dates Held<br />

2006 – Current<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D.<br />

M.B.A.<br />

B.S.<br />

Computer<br />

Information<br />

Systems<br />

Computer<br />

Information<br />

Systems<br />

Computer<br />

Science<br />

Georgia State <strong>University</strong> 5/2006<br />

Georgia State <strong>University</strong> 8/2002<br />

Berry College 12/1999<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Americas Conference on Information Systems (8/2004)<br />

Americas Conference on Information Systems (8/2005)<br />

Seattle Innovation Symposium (10/2005)<br />

-441-


International Conference on Information Systems (12/2005)<br />

International Conference on Information Systems (12/2006)<br />

International Research Workshop on IT Project Management (12/2006)<br />

Clicker Teaching Circle (AY 2007-2008)<br />

Americas Conference on Information Systems (8/2007)<br />

Project Management Institute Heartland Chapter ProDev (9/2007)<br />

International Research Workshop on IT Project Management (12/2007)<br />

International Conference on Information Systems (12/2007)<br />

Clicker Teaching Circle (AY 2008-2009)<br />

International Conference on Design Science and Information Systems & Technology (5/2008)<br />

Midwest Conference for the Association <strong>of</strong> Information Systems (5/2008)<br />

International Research Workshop on IT Project Management (12/2008)<br />

International Conference on Information Systems (12/2008)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

6/2003 – Georgia State <strong>University</strong> Graduate Teaching Assistant – responsible for teaching<br />

3/2006<br />

undergraduate and graduate courses; teaching assistant<br />

8/2002 –<br />

5/2006<br />

6/2000 –<br />

4/2002<br />

11/1999 –<br />

5/2000<br />

1/1999 –<br />

10/1999<br />

Georgia State <strong>University</strong><br />

Vista IT<br />

Network One<br />

Berry College<br />

for graduate and executive MBA course<br />

Graduate Research Assistant – responsible for<br />

conducting research, performing literature reviews, and<br />

writing papers with various pr<strong>of</strong>essors in the area <strong>of</strong><br />

computer information systems<br />

Senior Consultant – developed applications for clients,<br />

performed requirements analysis and system design<br />

Application Developer – developed and maintained<br />

applications for internal use, performed requirements<br />

analysis and system design<br />

Help Desk Coordinator – managed a help desk for<br />

centralized IT department, developed applications and<br />

processes to support help desk<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

-442-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

ISQA Graduate Program Committee (0.5 hours/week)<br />

Graduate Council (0.5 hours/week)<br />

Graduate Council Committee B (0.5 hours/week)<br />

Graduate Council Scholarship Committee (0.5 hours/week)<br />

ISQA Reappointment, Promotion, and Tenure Committee (0.1 hours/week)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

ISQA Graduate Program Committee (2008 – Current)<br />

ISQA Reappointment, Promotion, and Tenure Committee (2006 – 2008)<br />

ISQA Faculty Recruitment Committee (2007-2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Petter, S. (2008) Managing User Expectations on S<strong>of</strong>tware Projects: Lessons from the Trenches,<br />

International Journal <strong>of</strong> Project Management, 26(7).<br />

Petter, S., DeLone, W. and McLean, E. (2008) Measuring Information Systems Success: Models,<br />

Dimensions, Measures, and Interrelationships, European Journal <strong>of</strong> Information Systems, 17(3).<br />

Petter, S. and Vaishnavi, V. (2008) Facilitating Experience Reuse among S<strong>of</strong>tware Project Managers,<br />

Information Sciences. 178(7).<br />

Khazanchi, D., Murphy, J.D., and Petter,S. (2008) Guidelines for Evaluating Patterns in the IS Domain,<br />

Midwest Association for Information Systems Conference, Eau Claire, WI.<br />

Murphy, J.D., Petter, S., Cheng, K., and Briggs, R.O. (2008) Hitting the Collaboration Target: Computer-<br />

Guided thinkLet Selection, International Conference on Design Science Research in Information Systems<br />

and Technology, Atlanta, GA.<br />

Petter, S. Khazanchi, D., and Murphy, J.D. (2008) A Design Science Based Evaluation Framework for<br />

Patterns, International Conference on Design Science Research in Information Systems and Technology,<br />

Atlanta, GA.<br />

Randolph, A. and Petter, S. (2008) Is it Who You Know or What You Know: Social Capital Theory in IT<br />

Project Management, International Research Workshop on IT Project Management, Paris, France.<br />

Petter, S., Straub, D., and Rai, A. (2007) Specifying Formative Constructs in Information Systems<br />

Research, MIS Quarterly, 31(4).<br />

Petter, S., Mathiassen, L, and Vaishnavi, V. (2007) Five Keys to Project Knowledge Sharing, IT<br />

-443-


Pr<strong>of</strong>essional, May/June.<br />

Petter, S. (2007) Managing User Expectations on S<strong>of</strong>tware Projects: Lessons from the Trenches,<br />

International Research Workshop on IT Project Management, Montreal, Quebec, Canada.<br />

Petter, S. (2007). A Process to Reuse Experiences via Written Narratives among S<strong>of</strong>tware Project<br />

Managers, A Design Science Research Proposal Improving and Innovating Information & Communication<br />

Technology: Design Science Research Methods and Patterns, V. Vaishnavi and W. Kuechler (Eds.), Taylor<br />

and Francis.<br />

Petter, S. and Vaishnavi, V. (2007) A Generic Process for Individual Knowledge Reuse: Potential<br />

Problems and Solutions, Americas Conference on Information Systems, Keystone, CO.<br />

Khazanchi, D. and Petter, S. (2006). “The Need for Improved IT Project Management in e-Service<br />

Projects and Beyond,” e-Service Journal, (5:1).<br />

DeLone, W., McLean, E., and Petter, S. (2005). Success <strong>of</strong> Information Systems: Measuring the<br />

Effectiveness <strong>of</strong> Information Systems, Blackwell Encyclopedia <strong>of</strong> Management, 2nd edition, G.B. Davis<br />

(Ed.), Blackwell Publishing.<br />

Kuechler, W., Vaishnavi, V. and Petter, S. (2005). The Aggregate General Design Cycle as a Perspective<br />

on the Evolution <strong>of</strong> Computing Communities <strong>of</strong> Interest, Computing Letters, 1(3).<br />

Petter, S., Sevcik, G. and Straub, D. (2005). Transferring Technology to the Developing World,<br />

Encyclopedia <strong>of</strong> Information Science and Technology, M. Khosrow-Pour (Ed.), Idea Group Publishing.<br />

Petter, S. and Gallivan, M. (2004). Toward a Framework for Classifying and Guiding Mixed Method<br />

Research in Information Systems, Hawai'i International Conference on System Sciences, Waikoloa, HI.<br />

Petter, S. and Vaishnavi, V. (2004) Towards a Model to Support Knowledge Transfer among S<strong>of</strong>tware<br />

Project Managers, Americas Conference on Information Systems, New York, NY.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

Managing in a Digital World STEM Grant for $4500 (2007)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall/2007 ISQA 3420 Managing in a Digital World 3 17<br />

Fall/2007 ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 21<br />

Spring/ ISQA 3420 Managing in a Digital World 3 26<br />

2007<br />

Spring/ ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 24<br />

2007<br />

Fall/2008 ISQA 3420 Managing in a Digital World 3 19<br />

Fall/2008 ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 27<br />

-444-


Spring/<br />

2009<br />

Spring/<br />

2009<br />

ISQA 3420 Managing in a Digital World 3 22<br />

ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 26<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __45___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Conducting research related to sharing experiences related to s<strong>of</strong>tware project management.<br />

Examining measures and predictors <strong>of</strong> information system success.<br />

Developing approaches and guidelines for research methods.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: ___IS - 100__%.<br />

-445-


-446-


Leah Pietron<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Leah R. Pietron<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Associate Pr<strong>of</strong>essor Fall 1991 to Present<br />

Assistant Pr<strong>of</strong>essor Fall 1985 to Fall 1991<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

PhD<br />

MBA<br />

MS<br />

BS<br />

Business Education/<br />

Information Systems<br />

Business Administration/<br />

Economics<br />

Business Education/<br />

Vocational Education<br />

Comprehensive Business<br />

Education/ Physical<br />

Education<br />

<strong>University</strong> <strong>of</strong> North Dakota<br />

August<br />

1979<br />

Northwest Missouri State <strong>University</strong> August<br />

1985<br />

<strong>University</strong> <strong>of</strong> North Dakota May 1977<br />

Mayville State College May 1972<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

Advanced Information Systems Faculty Development Institute, Indiana <strong>University</strong>, Bloomington, IN. July<br />

7-July 31, 1989. Certificate <strong>of</strong> Attendance. Sponsored by the American Assembly <strong>of</strong> Collegiate Schools<br />

<strong>of</strong> Business (AACSB).<br />

Information Systems Faculty Development Institute, St. Paul, MN. July 6-August 7, 1987. Certificate <strong>of</strong><br />

Attendance. Sponsored by the American Assembly <strong>of</strong> Collegiate Schools <strong>of</strong> Business (AACSB).<br />

Continuous enrollment in courses at UNO, SANs Security Training, Seminars, etc<br />

-447-


5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Teaching Circles, "Web Collaboration". (2008 - 2009).<br />

Rubrics Research Triangle (2008 to Current)<br />

Completed the CISSP Certification Examination on November 18, 2006<br />

Attempting the CISA Certification Examination on December 10, 2006<br />

Attended CISSP Certification Session at PKI, Summer 2006<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

Summer<br />

2007<br />

Lockheed Martin<br />

Worked on a Service-Oriented Architecture project. My<br />

focus was on IT Goverance and SOA Policy.<br />

May 2006 StatPak, UNO Conducting a vulnerability assessment with Dwight<br />

Haworth on the application.<br />

Summer/Fall Union Pacific Railroad Sarbanes-Oxley Compliance Review – worked with<br />

2004<br />

Company<br />

Dwight Haworth on evaluation <strong>of</strong> the ISO/IEC<br />

17799 evaluation and identifying deficiencies in their<br />

documentation and controls for Sarbanes-Oxley<br />

compliance.<br />

Summer<br />

2002<br />

City <strong>of</strong> <strong>Omaha</strong><br />

Created the Geographical Information Systems Strategic<br />

Plan for <strong>Omaha</strong> Police Department<br />

Fall 2001 Pamida and ShopKo PeopleS<strong>of</strong>t Security Tree Manager - Faculty Internship<br />

December<br />

2000<br />

MSI Systems Integrators Consultant – worked on the PeopleS<strong>of</strong>t installation –<br />

focused on Human Resources application<br />

Summer<br />

2003<br />

Fall and<br />

Spring 2000<br />

Fall 1999 and<br />

Spring 2000<br />

College <strong>of</strong> IS & T<br />

Faculty Internship with Steve Stock developing Security<br />

Policies and Procedures for the<br />

CASE Training for PMIC – user training for analysts on<br />

the use <strong>of</strong> Excelerator<br />

Created and delivered faculty development workshops<br />

on the use <strong>of</strong> media in classrooms for the College <strong>of</strong><br />

Business Administration<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

Summer-Fall Union Pacific<br />

Completed Sarbanes-Oxley Compliance Asssessment<br />

2005<br />

Spring 2004 Werner Trucking Company Conducted a Physical Security Review<br />

-448-


Spring 2002-<br />

Fall 2002<br />

Fall 2000-<br />

Spring 2001<br />

Fall 2000-<br />

Spring 2001<br />

<strong>Omaha</strong> Police Department Developed Strategic Plan for the Geographical<br />

Information Systems<br />

Developed a Security Model for PeopleS<strong>of</strong>t<br />

Pamida and ShopKo<br />

Worked a faculty internship and created the security<br />

tree<br />

PeoplePlus<br />

PeopleS<strong>of</strong>t Consulting – created documentation for the<br />

Project Management<br />

City <strong>of</strong> <strong>Omaha</strong><br />

Worked with Peter Wolcott, Donna Dufner, and Ilze<br />

Zigurs defining the project for the City <strong>of</strong> <strong>Omaha</strong>’s<br />

Mayor’s Hotline – this project became a service learning<br />

project<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Online Worldwide Instructional Designers and Faculty Steering Committee<br />

<strong>University</strong> Committee on the Advancement <strong>of</strong> Teaching<br />

MIS Graduate Program Committee<br />

Undergraduate Program Committee<br />

Academic Program Committee<br />

Proposed MS in Information Assurance<br />

Distance Education Steering Committee<br />

Information Assurance Undergraduate Program Committee<br />

Information Assurance Undergraduate Program Committee<br />

IS&T ABET Committee<br />

Information Assurance Recruitment Committee<br />

ISQA Assistant Pr<strong>of</strong>essor Recruitment Committee<br />

UNO ISACA Education Advocate<br />

Educational Policy Advisory Committee<br />

Distance Education Advisory Committee<br />

Academic Planning Council<br />

Academic Program Review for the Computer Science Department<br />

Distance Education Director's Forum<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

IS & T Technology Committee (2003-Present)<br />

Dean’s Expanded Executive Committee (2002-Present)<br />

<strong>University</strong> Committee on the Excellence Teaching Award (2005-2007)<br />

-449-


Computer Usage and Technology Committee (2002-2005)<br />

UNO Athletic Committee (2002-2005)<br />

Academic Subcommittee <strong>of</strong> the Computer Usage Committee (2002-2005)<br />

Strategic Planning Committee (2005-2008)<br />

Accreditation and Program Committee (2005-Current)<br />

IS & T Dean’s Search Committee (2005-2008)<br />

ISQA Undergraduate Program Committee (2002-2007)<br />

ISQA Graduate Program Committee (2004-2008)<br />

ISQA Faculty Recruitment Committee (2005-2008)<br />

Member, Colloquium for Integrative Media (2004-2005)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

"Synchronous Collaboration in Systems Development Education – Issues and Recommendations for the<br />

Virtual Classroom.", Van Vliet, P., Pietron, L., Decision Sciences Institute.<br />

Structured Systems Analysis, Information Warfare Journal, March 2006, by Dwight A. Haworth and Leah<br />

R. Pietron.<br />

Sarbanes-Oxley: Achieving Compliance by Starting with ISO 17799 by Dwight A. Haworth and Leah R.<br />

Pietron, Published in Information Systems Management, Vol.23, No. 1, pp. 73-87. Refereed.<br />

Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan<br />

de Vreede, Collaboration Engineering For Incident Response Planning: Process Development and<br />

Validation, HICCS Conference, Refereed publication, January 2007.<br />

Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan<br />

de Vreede, Incident Response Planning Using Collaboration Engineering Process Development and<br />

Validation, ICIS Conference, WISA 2006 Workshop, Refereed publication December 2006.<br />

Gwendolyn Kolfschoten, Gert-Jan de Vreede, and Leah Pietron, "A Training Approach for the Transition<br />

<strong>of</strong> RepeatableCollaboration Processes to Practitioners", Refereed Proceedings for the Conference, GDN<br />

Conference, Karlsruhe, Germany, June 2006.<br />

Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan<br />

de Vreede, Collaboration Engineering For Incident Response Planning: Process Development and<br />

Validation, Journal <strong>of</strong> Information Security, Refereed publication, January 2008.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

Grant, UNO Technology Grant, Development <strong>of</strong> a HDTV Classroom, $50,000, College <strong>of</strong> Information<br />

Technology & Science, Funded ($25,000)<br />

Grant, Distance Education Development Grant, College <strong>of</strong> Information Technology & Science, Pietron, L.,<br />

$1,000.00, Funded, (January 11, 2009 - May 9, 2009).<br />

Grant, Distance Education Development Grant, College <strong>of</strong> Information Technology & Science, Pietron, L.,<br />

$1,000.00, Funded, (January 11, 2009 - May 9, 2009).<br />

-450-


12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 CIST 3600 Information Security and Policy 3 24<br />

ISQA 8570 Info Security, Policy, and Ethics 3 11<br />

ISQA 8580 Security Risk Management and Assessment 3 10<br />

Fall 2008 ISQA 4110- Information System Analysis 3 20<br />

001<br />

ISQA 4110- Information System Analysis 3 26<br />

002<br />

ISQA 8040 An Overview <strong>of</strong> System Development 3 14<br />

Summer 2008 ISQA 4110 Information System Analysis 3 10<br />

Spring 2008 CIST 3600 Information Security and Policy 3 17<br />

ISQA 8570 Info Security, Policy, and Ethics 3 12<br />

ISQA 8580 Security Risk Management and Assessment 3 10<br />

Fall 2007 CIST 3600 Information Security and Policy 3 13<br />

ISQA 4110- Information System Analysis 3 18<br />

001<br />

ISQA 4110-<br />

002<br />

Information System Analysis 3 30<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 25__%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

My research focus is on pedagogical issues in systems development and information security. I have<br />

been working on two distance education articles, one virtual communities for information security, and<br />

use <strong>of</strong> rubrics in programming classes.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%<br />

-451-


-452-


Sajda Qureshi<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Sajda Qureshi<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Associate Pr<strong>of</strong>essor<br />

Dates Held<br />

2002-Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D London School <strong>of</strong> Economics and Political Science 1991-95<br />

M.S Analysis, Design London School <strong>of</strong> Economics and Political Science 1989-91<br />

and<br />

Management <strong>of</strong><br />

Information<br />

Systems<br />

Postgrad MIS London School <strong>of</strong> Economics and Political Science 1988-89<br />

uate<br />

Diploma<br />

MBA Business John Cabot <strong>University</strong> 1985-88<br />

Administration<br />

GCE Ordinary<br />

Level (10<br />

Subjects),<br />

GCE Advanced<br />

Level (3<br />

Subjects).<br />

St. Georges English School 1980-85<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

-453-


5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Teaching Assessment By Students, Spring 2008<br />

Teaching Circle: Continuous Improvement in Teaching Fall 2007<br />

HICSS 2008<br />

HICSS 2006-2007<br />

HICSS 2005-2006<br />

WSIS 2005<br />

HICSS 2004-2005<br />

AMCIS 2005<br />

ICIS 2005<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

2009 <strong>University</strong> <strong>of</strong> Washington Visiting Scholar, the Information School<br />

2005 Westminster Business<br />

School<br />

Visiting Scholar, Department <strong>of</strong> Business Information<br />

Management and Operations<br />

1997-2004 Erasmus <strong>University</strong>.<br />

Rotterdam School <strong>of</strong><br />

Management<br />

Assistant Pr<strong>of</strong>essor, Department <strong>of</strong> Information and<br />

Decision Sciences. Taught MSc Information Management<br />

and PhD courses, research and thesis supervision.<br />

Visiting Pr<strong>of</strong>essor, Rotterdam School <strong>of</strong> Management.<br />

Taught MIS related courses for the MBA/MBI program.<br />

Fellow, Erasmus Research in Management (ERIM).<br />

1996 <strong>University</strong> <strong>of</strong> Arizona, School<br />

<strong>of</strong> Business and Public<br />

Administration<br />

1996 Erasmus <strong>University</strong>.<br />

Rotterdam School <strong>of</strong><br />

Responsibility for research and publication.<br />

Visiting Pr<strong>of</strong>essor<br />

Research Fellow<br />

Management<br />

1992-1995 Commonwealth Secretariat Supported electronic communication, supervised and<br />

managed projects implementing computer networks,<br />

and the development and application <strong>of</strong> electronic group<br />

support.<br />

1990-1992 London School <strong>of</strong> Economics<br />

and Political Science<br />

1988-1989 F.S. Tyabji Chartered<br />

Accountants<br />

Research Assistant, LSE Research and Consultancy.<br />

Worked on an MRC-EEC project developing an<br />

organisational modelling tool using Coloured Petri-nets.<br />

Information Technology Consultant. Designed<br />

accounting system<br />

-454-


1986-1987 John Cabot <strong>University</strong> Manager, <strong>University</strong> Library. Supervised and trained<br />

library assistants. General administration and<br />

accounting. Developed library computer system.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

2001-2007 V.O.F. Innovative Group Director. Collaborative work consulting<br />

Support<br />

1988 ITALSTAT Consultant, Finance Department. Implemented Monte<br />

Carlo simulation as a method <strong>of</strong> risk analysis on the<br />

capital budgeting system <strong>of</strong> an investment project.<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Dean's Executive Committee<br />

Doctoral Program Committee<br />

College Personnel Committee<br />

Reappointment and Tenure Committee<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Graduate Council Committee B, 2005-2008<br />

Dean's Executive Committee, 2007-2008<br />

Doctoral Program Committee, 2007-2008<br />

College Personnel Committee, 2006-2008<br />

Reappointment and Tenure Committee, 2005-2008<br />

Member Pr<strong>of</strong>essional Development Committee, 2002-2005<br />

Member Chancellor’s Strategic Planning Committee, 2004-2005<br />

Chair Academic Excellence Sub-Committee, 2004-2005<br />

Facilitator and Presenter Strategic Planning Advance, 2004-2005<br />

Member <strong>University</strong> Committee on Research , 2004-2005<br />

-455-


10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Qureshi, S., Kamal, M., and P. Wolcott “Information Technology Therapy for Competitiveness in Micro-<br />

Enterprises.” International Journal <strong>of</strong> E-Business Research. Idea Group International. Vol. 5, Issue 1.<br />

January 2009.<br />

Wolcott, P., Kamal, M. and S. Qureshi ”Meeting the Challenges <strong>of</strong> ICT Adoption by Micro-enterprises“.<br />

Journal <strong>of</strong> Enterprise Information Management. Emerald. Volume 21, Issue 6. 2008.<br />

Qureshi, S., Briggs, B. and V. Hlupic. “Value Creation from Intellectual Capital: Convergence <strong>of</strong><br />

Knowledge Management and Collaboration in the Intellectual Bandwidth Model”. Group Decision and<br />

Negotiation. Vol 15, No 3. Pp:197-220. 2006.<br />

Qureshi, S., Liu, M. and D. Vogel, "The Effects <strong>of</strong> Electronic Collaboration in Distributed Project<br />

Management". Group Decision and Negotiation. Vol 15, No1. Pp55-75 2006.<br />

Qureshi, S. and P. Keen. “Activating Knowledge through Electronic Collaboration: Vanquishing the<br />

Knowledge Paradox”. IEEE Transactions in Pr<strong>of</strong>essional Communication. Vol 48, Issue 1. Pp: 40- 54 2005.<br />

de Vreede, G.J., Mgaya, R. and S. Qureshi. “Field Experiences with Collaboration Technology: A<br />

Comparative <strong>Study</strong> in Tanzania and South Africa” Journal <strong>of</strong> Information Technology for Development.<br />

Vol 10, no 3. 2004.<br />

Qureshi, S. “Social and Economic Perspectives on the role <strong>of</strong> Information and Communication<br />

Technology on Development.” Journal <strong>of</strong> Information Technology for Development. Vol 15, No 1. 2009.<br />

Qureshi, S. “Assessing the Effects <strong>of</strong> Information and Communication Technologies on Development.”<br />

Journal <strong>of</strong> Information Technology for Development. Vol 14, No 4. 2008.<br />

Qureshi, S. " Information technology innovations for development" Journal <strong>of</strong> Information Technology<br />

for Development. Vol 13, No 4. (p 311-313) 2007.<br />

Qureshi, S. "Information Technology Application in Emerging Economies" Journal <strong>of</strong> Information<br />

Technology for Development. Vol 13, No 2. 2007.<br />

Qureshi, S. "Collaboration for knowledge networking in development." Journal <strong>of</strong> Information<br />

Technology for Development. Vol 12, No 2. (p 87-89) 2006.<br />

Qureshi, S. "Why is the information society important to us? The World Summit on the Information<br />

Society in Tunis." Journal <strong>of</strong> Information Technology for Development. Vol 12, No 1. 2006.<br />

Qureshi, S. “Off-Shore Outsourcing Across the Digital Divide”. Journal <strong>of</strong> Information Technology for<br />

Development. Vol 11, No 1. 2005.<br />

Qureshi, S. “E-Government and IT Policy: Choices for government outreach and policy making”. Journal<br />

<strong>of</strong> Information Technology for Development. Vol 11, No 2. 2005.<br />

Qureshi, S. “Movement in the Information Technology for Development Debate: How can it meet the<br />

challenges <strong>of</strong> global competition?”. Journal <strong>of</strong> Information Technology for Development. Vol 10, No 3.<br />

2004.<br />

Qureshi, S., Kamal, S., and P. Keen “Knowledge Networking to overcome the Digital Divide” in King, B.<br />

“Knowledge Management and Organizational Learning” Series on Annals <strong>of</strong> Information System<br />

Springer. Forthcoming.<br />

Qureshi, Sajda, and Vogel, Doug, Information Technology Application in Emerging Economies: A<br />

Monograph <strong>of</strong> a Symposium at HICSS-40, January 2007, 72 pp ISBN TBA.<br />

http://www.hicss.hawaii.edu/reports.htm<br />

Qureshi, S. and P. Keen "Organizational Transformation by Activating Knowledge: The Mediating Role <strong>of</strong><br />

Collaboration Technologies" in Handbook <strong>of</strong> Information Technology in A. Salazar and S. Sawyer (Eds)<br />

Organizations and Electronic Markets. World Scientific Press. Accepted for publication. 2006.<br />

-456-


Qureshi, S. "The Role <strong>of</strong> Information Technology for Development: Global Development Through Local<br />

Empowerment" in Networking the Commonwealth for Development: Moving from Digital Divide to<br />

Digital Opportunity. NDD New Media. November 2005. Pp49-52.<br />

Davison, R.M., Harris, R.H., Qureshi, S., Vogel, D.R. and Vreede, G.J. de (Eds) Information Systems in<br />

Developing Countries: Theory and Practice, City <strong>University</strong> <strong>of</strong> Hong Kong Press. 2005.<br />

Qureshi, S., “Information Technology Infrastructures for Developing Countries: Key Concepts and Cases”<br />

in Davison, R.M., Harris, R.H., Qureshi, S., Vogel, D.R. and Vreede, G.J. de (Eds) Information Systems in<br />

Developing Countries: Theory and Practice, City <strong>University</strong> <strong>of</strong> Hong Kong Press. 2005.<br />

Qureshi, S., Hlupic, V. and B. Briggs, “On the Convergence <strong>of</strong> Knowledge Management and Groupware”.<br />

In: Vreede, de. G.J., Guerrero, L.A. and G.M. Raventos (Eds). Groupware: Design, Implementation, and<br />

Use. Springer. 2004. pp25-34.<br />

Kamal, M., Good, T.G., & Qureshi, S. Development Outcomes from IT adoption in Micro-Enterprises.<br />

Proceedings <strong>of</strong> the 42nd Annual Hawaii International Conference on System Sciences (HICSS-42),<br />

Waikoloa, Hawaii. January 5 – 8. 2009.<br />

Qureshi, S., Kamal, M., and Good, T.G.. Adoption <strong>of</strong> Information Technology by Micro-enterprises:<br />

Insights from a rural community. Proceedings <strong>of</strong> the 14th Annual Americas Conference on Information<br />

Systems (AMCIS-14), Toronto, Canada. August 14-17, 2008.<br />

Kamal, M., Qureshi, S. and L. Najjar “A Global Analysis <strong>of</strong> the Effect <strong>of</strong> IT Capacity on Development –<br />

Understanding Sourcing <strong>of</strong> Skills”. 2008 International Conference on Information Resources<br />

Management (Conf-IRM). May 18-20, 2008. Niagara Falls, Ontario, Canada.<br />

Qureshi, S., Wolcott, P. and M. Kamal “Information Technology Therapy for Micro-enterprise Success:<br />

Directions for Sustainable Development”. 41th Annual Hawaii International Conference on System<br />

Sciences (HICSS'08), 2008.<br />

Qureshi, S. and A. York, “IT Adoption by Small Businesses in Underserved Communities”. 41th Annual<br />

Hawaii International Conference on System Sciences (HICSS'08), 2008.<br />

Qureshi, S. and T. Lamsam-Trumbly, “Transcending the Digital Divide in Native America: A Framing<br />

Analysis <strong>of</strong> the Effects <strong>of</strong> Information and Communication Technologies and Media on Empowerment<br />

and Development”. 41th Annual Hawaii International Conference on System Sciences (HICSS'08), 2008.<br />

Qureshi, S. and A. Laure-Fayard, “Virtual Teams and Development: A Language Games Perspective”.<br />

41th Annual Hawaii International Conference on System Sciences (HICSS'08), 2008.<br />

Qureshi, S., Keen, P. and M. Kamal." Knowledge Networking across the Social Divide: A Model for<br />

Distributed Decision Making " Proceedings <strong>of</strong> the Thirteenth Americas Conference on Information<br />

Systems, Keystone, USA August 9th-12th 2007.<br />

Wolcott, P., Qureshi, S. and M. Kamal " An Information Technology Therapy Approach to Microenterprise<br />

Adoption <strong>of</strong> ICTs". Proceedings <strong>of</strong> the Thirteenth Americas Conference on Information<br />

Systems, Keystone, USA August 9th-12th 2007. Nominated for Best Paper Award.<br />

Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support. Paper presented at the Second Annual<br />

Midwest United States Association for Information Systems Conference (MWAIS-02), Springfield, Illinois.<br />

May 18-19. 2007.<br />

Qureshi, S. and A. Davis, "Managing Resistance to Organizational Change: How GSS Can Reveal Role<br />

Related Resistance Behaviors," hicss, p. 248b, 40th Annual Hawaii International Conference on System<br />

Sciences (HICSS'07), 2007. Nominated for Best Paper Award.<br />

Qureshi, S., and A. Davis, " Overcoming the Digital Divide through Electronic Commerce: Harnessing<br />

opportunities in IT for Development" 40th Annual Hawaii International Conference on System Sciences<br />

(HICSS'07), 2007.<br />

-457-


Qureshi, S., Keen, P. and M. Kamal. "Knowledge Networking for Development: Building Bridges across<br />

the Digital Divide" hicss, p. 226c In (eds) R. Sprague and J. Nunamaker The Fortieth Annual Hawaii<br />

International Conference on Systems Sciences. IEEE Computer Society Press.2007.<br />

Qureshi, S. and A. Davis. "The Effect <strong>of</strong> e-Commerce Development". Proceedings <strong>of</strong> the Twelfth<br />

Americas Conference on Information Systems, Acapulco, Mexico, August 4th-6th 2006.<br />

Qureshi, S. and A. Davis. "Assessing Resistance to Change in a Multinational Organization Using a GSS<br />

Game". Proceedings <strong>of</strong> the Twelfth Americas Conference on Information Systems, Acapulco, Mexico,<br />

August 4th-6th 2006.<br />

Qureshi, S. and A. de Leeuwe., "Mobilizing Intellectual Bandwidth in a Distributed Virtual Organization:<br />

The Missing Links." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii International<br />

Conference on Systems Sciences. IEEE Computer Society Press. 2006.<br />

Keen, P. and S. Qureshi, "Organizational Transformation through Business Models: A Framework for<br />

Business Model Design." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii<br />

International Conference on Systems Sciences. IEEE Computer Society Press. Best Paper Award. 2006.<br />

Qureshi, S. and C. "Noteboom. Adaptation in Distributed Projects: Collaborative Processes in Digital<br />

Natives and Digital Immigrants." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii<br />

International Conference on Systems Sciences. IEEE Computer Society Press. 2006.<br />

Qureshi, S. and C. Noteboom. "An Investigation <strong>of</strong> Episodes <strong>of</strong> Global Interactivity: What Collaborative<br />

Processes Effect the Success <strong>of</strong> Distributed Projects?." Proceedings <strong>of</strong> the Eleventh Americas Conference<br />

on Information Systems, <strong>Omaha</strong>, NE, USA August 11th-14th 2005.<br />

Qureshi, S. "How does Information Technology Effect Development? Integrating Theory and Practice<br />

into a Process Model." Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems,<br />

<strong>Omaha</strong>, NE, USA August 11th-14th 2005.<br />

Qureshi, S. and P. Keen, “How to Overcome the Knowledge Paradox: Activate Knowledge Identity, Not<br />

Just Organize Information.” In (eds) R. Sprague and J. Nunamaker The Thirty Eight Annual Hawaii<br />

International Conference on Systems Sciences. IEEE Computer Society Press. 2005.<br />

Qureshi, S., Liu, M. and D. Vogel, “A Grounded Theory Analysis <strong>of</strong> E-Collaboration Effects for Distributed<br />

Project Management ”. In (eds) R. Sprague and J. Nunamaker The Thirty Eight Annual Hawaii<br />

International Conference on Systems Sciences. IEEE Computer Society Press. 2005.<br />

Verhoef, R. and S. Qureshi, “Collaborative Infrastructures for Mobilizing Intellectual Resources:<br />

Assessing Intellectual Bandwidth in a Knowledge Intensive Organization.”In (eds) R. Sprague and J.<br />

Nunamaker The Thirty Eigth Annual Hawaii International Conference on Systems Sciences. IEEE<br />

Computer Society Press. 2005.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year Course Course title Semester Class<br />

-458-


number hrs size<br />

Spring 2009 ISQA Electronic Commerce 3 20<br />

4180/8186<br />

ISQA 8420 Managing the IS Function 3 24<br />

Fall 2008 ISQA 4000 Information Technology for Development 3 5<br />

ISQA 8080 Independent <strong>Study</strong><br />

ISQA 8420 Managing the IS Function 3 8<br />

Spring 2008 ISQA 8060 Research Methods in MIS 3 20<br />

ISQA Electronic Commerce 3 19<br />

4180/8186<br />

Fall 2007 ISQA 8060 Research Methods in MIS 3 22<br />

ISQA 8080 Independent <strong>Study</strong><br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-459-


-460-


Maury Scho<strong>of</strong><br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Maury Scho<strong>of</strong>f<br />

Lecturer<br />

n/a<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Instructor 1996 - 2002<br />

Lecturer<br />

2002 - present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

MS Operations Naval Postgraduate School 1970<br />

Research and<br />

Systems<br />

Analysis<br />

BS Chemistry Utah State <strong>University</strong> 1959<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

Fifteen <strong>of</strong> twenty-five years <strong>of</strong> Army career using and teaching the use <strong>of</strong> computers<br />

Eleven years as a manager in a corporate information systems department<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

-461-


6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

1995 - 1996 Bellevue <strong>University</strong> Adjunct Faculty<br />

1993 - 1995 Embry-Riddle Aeronautical Instructor<br />

<strong>University</strong>, Offutt Air Force<br />

Base Campus<br />

1978 - 1982 Kansas City Community Instructor<br />

College, Fort Leavenworth<br />

Campus<br />

1977 - 1978 <strong>University</strong> <strong>of</strong> Maryland, Adjunct Faculty<br />

Korea Campus<br />

1985 – 1996 Fortune 50 company,<br />

<strong>Omaha</strong><br />

Senior operations research analyst / Director <strong>of</strong><br />

Operations Analysis /<br />

Internal consultant /<br />

1960 -1985 Army Command and<br />

General Staff<br />

College<br />

Director <strong>of</strong> Strategic Information and Financial Systems<br />

Career Army Officer<br />

Division Finance Officer<br />

Installation Finance and<br />

Accounting Officer<br />

Deputy Director <strong>of</strong><br />

War Games and Analysis<br />

Chairman, Management Committee<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

11 years <strong>of</strong> consulting in applications <strong>of</strong> information<br />

systems to real world business problems including<br />

s<strong>of</strong>tware design, systems integration, installation <strong>of</strong><br />

systems, selection <strong>of</strong> hardware, selection <strong>of</strong> commercial<br />

s<strong>of</strong>tware. Consulting was done both domestically and<br />

internationally<br />

-462-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Course<br />

Term/year number<br />

Spring 2009 CIST 3100-<br />

001<br />

CIST 3110-<br />

001<br />

CIST 3110-<br />

002<br />

CIST 3110-<br />

850<br />

Fall 2008 CIST 3110-<br />

001<br />

CIST 3110-<br />

002<br />

CIST 3110-<br />

003<br />

Spring 2008 CIST 3100-<br />

850<br />

CIST 3110-<br />

001<br />

CIST 3110-<br />

002<br />

Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Organizations, Applications, and Technology 3 20<br />

Information Technology Ethics 3 27<br />

Information Technology Ethics 3 28<br />

Information Technology Ethics 3 11<br />

Information Technology Ethics 3 29<br />

Information Technology Ethics 3 22<br />

Information Technology Ethics 3 22<br />

Organizations, Applications, and Technology 3 26<br />

Information Technology Ethics 3 25<br />

Information Technology Ethics 3 31<br />

-463-


ISQA 8420 Managing the I.S. Function 3 26<br />

Fall 2007 CIST 1010- Foundation <strong>of</strong> IS & T 1 24<br />

001<br />

CIST 1010- Foundation <strong>of</strong> IS & T 1 11<br />

002<br />

CIST 3100- Organizations, Applications, and Technology 3 22<br />

002<br />

CIST 3100-<br />

003<br />

Organizations, Applications, and Technology 3 25<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-464-


Yong Shi<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Yong Shi<br />

Charles W. and Margre H. Durham Distinguished<br />

Pr<strong>of</strong>essor <strong>of</strong> Information Technology<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Charles W. and Margre H. Durham Distinguished August 1999<br />

Pr<strong>of</strong>essor <strong>of</strong> Information Technology<br />

Pr<strong>of</strong>essor August 1998<br />

Associate Pr<strong>of</strong>essor August 1996<br />

Assistant Pr<strong>of</strong>essor August 1991<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. Management Science <strong>University</strong> <strong>of</strong> Kansas 1991<br />

with minor in Computer<br />

and Production System<br />

Design<br />

B.S. Mathematics Southwest Petroleum Institute,<br />

Sichuan, China<br />

1982<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

May 27-30, 2007, organized and co-chaired the 7th International Conference on Computational Science,<br />

-465-


Beijing, where more than 600 scholars have participated from 48 different countries.<br />

Oct. 28-31, 2007, organized and co-chaired the 2007 IEEE International Conference on Data Mining<br />

(ICDM 2007), <strong>Omaha</strong>, NE, USA, where more than 350 scholars have participated from 47 different<br />

countries.<br />

May 24-26, 2009, organized and co-chaired the International Conference on Linear Programming<br />

Algorithms and Extensions, Haikou, Hainan, where more than 25 international leading scholars in the<br />

field will participate.<br />

June 21-26, 2009, organized and co-chaired the 20th International Conference on Multiple Criteria<br />

Decision Making, where more than 250 scholars participants<br />

Chaired Workshop on “Optimization-based Data Mining Techniques and Applications” at IEEE<br />

International Conference on Data Mining, 2005, 2006, 2007.<br />

Chaired Workshop on “Computational Finance and Business Intelligence” at International Conference on<br />

Computational Science, 2004, 2005, 2006, 2007, 2008.<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

September 2003- Consulting Northrop Information Intrusion and detection<br />

Oct. 2005 Grumman Corporation<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Committee <strong>of</strong> Doctoral Program in IT<br />

Organized 14 committee meetings<br />

Admitted 2 new Ph.D. students<br />

Managed the Comps Exams<br />

Organized committee meeting to revise the Plan <strong>of</strong> <strong>Study</strong> for the program. (Spring 2009)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

-466-


Doctoral Program Committee (2003-present)<br />

Graduate Program Committee (2006-2007)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Zhang, W. R., J. H. Zhang, Y. Shi and S. S. Chen, “Bipolar Linear Algebra and YinYang-N-Element Cellular<br />

Networks for Equilibrium-Based Biosystem Simulation and Regulation”, Journal <strong>of</strong> Biological Systems,<br />

(Forthcoming) 2009. Refereed Journal. 33% contribution.<br />

Yan, N., Z. Chen, Y. Shi and R. Liu “An Optimization-Based Classification Approach with the Non-additive<br />

Measure”, International Journal <strong>of</strong> Operations and Quantitative Management, (Forthcoming) 2009.<br />

Refereed Journal. 33% contribution.<br />

Zhang, Z., P. Zhang and Y. Shi “A Rough Set-based Multiple Criteria Linear Programming Approach for<br />

Improving Classification Performance”, International Journal <strong>of</strong> Operations and Quantitative<br />

Management, (Forthcoming) 2009. Refereed Journal. 33% contribution.<br />

Zhang, P., Y. Tian, Z. Zhang, X. Li and Y. Shi “Supportive instances for Regularized Multiple Criteria Linear<br />

Programming Classification”, International Journal <strong>of</strong> Operations and Quantitative Management,<br />

(Forthcoming) 2009. Refereed Journal. 33% contribution.<br />

Zhang P., Z. Zhang, A. Li, Y. Shi, “Global and Local (Glocal) Bagging Approach for Classifying Noisy<br />

Dataset”, International Journal <strong>of</strong> S<strong>of</strong>tware and Informatics, Vol.2, No.2, 181-197, 2008. Refereed<br />

Journal. 33% contribution.<br />

Zheng, X., L. Zhang, G. Nie and Y. Shi, “A Way to Accelerate Knowledge Management: from the<br />

Perspective <strong>of</strong> Knowledge Potential,” Journal <strong>of</strong> Service Science and Management (Forthcoming) 2008.<br />

Refereed Journal. 33% contribution.<br />

Peng, Y., Kou, G., Shi, Y., and Chen, Z.,A Descriptive Framework for the Field <strong>of</strong> Data Mining and<br />

Knowledge Discovery , International Journal <strong>of</strong> Information Technology and Decision Making, Vol. 7,<br />

No.4, 639-682, 2008. Refereed Journal. 33% contribution.<br />

Kou, G., Y. Peng, Z. Chen and Y. Shi “Multiple Criteria Mathematical Programming for Multi-Class<br />

Classification and Application in Network Intrusion Detection,” Information Sciences, Vol. 179, 371–<br />

381, 2009. Refereed Journal. 33% contribution.<br />

Li., X., L. Zhang, P. Zhang and Y. Shi “Problems and Systematic Solutions in Data Quality,” International<br />

Journal <strong>of</strong> Services Sciences, (Forthcoming) 2008. Refereed Journal. 33% contribution.<br />

Peng, Y., G. Kou, Y. Shi, and Z. Chen “A Multi-Criteria Convex Quadratic Programming Model for Credit<br />

Data Analysis,” Decision Support Systems, Vol. 44, 1016-1030, 2008. Refereed Journal. 33% contribution.<br />

Zhang, Y., L. Chen, Z. Zhou and Y. Shi, “A Geometrical Method on Multidimensional Dynamic Credit<br />

Evaluation”, International Journal <strong>of</strong> Information Technology and Decision Making, Vol. 7, No. 1, 103-<br />

114, 2008. Refereed Journal. 33% contribution.<br />

Liu, G., Z. Zhou and Y. Shi, “A Multi-Dimensional Forward Selection Method for Firms’ Credit Sale,”<br />

Computers & Mathematics with Applications, Vol. 54, 1228-1233, 2007. Refereed Journal. 33%<br />

contribution.<br />

Shi, Y., X. Zhang, J. Wan, G. Kou, Y. Peng, and Y. Guo, “Comparison study <strong>of</strong> two kernel-based learning<br />

algorithms for predicting the distance range between antibody interface residues and antigen surface”,<br />

-467-


International Journal <strong>of</strong> Computer Mathematics, Vol.84, 690-707,2007. Refereed Journal. 33%<br />

contribution.<br />

Shi, Y., X. Zhang, J. Wan, Y. Wang, W. Ying, Z. Cao, Y. Guo, “Predicting the Distance between Antibody’s<br />

Interface Residue And Antigen To Recognize Antigen Types By Support Vector Machine”, Neural<br />

Computing & Applications, Vol.16, 481-490, 2007. Refereed Journal. 33% contribution.<br />

Zhang, L., Y. Shi, and X. Yang, “Association-Rule Knowledge Discovery by Using A Fuzzy Mining<br />

Approach,” International Journal <strong>of</strong> Data Mining and Business Intelligence, (Forthcoming), Refereed<br />

Journal. 33% contribution.<br />

Kwak, W., Y. Shi, S. Eldridge and G Kou, “Bankruptcy Prediction for Japanese Firms: Using Multiple<br />

Criteria Linear Programming Data Mining Approach,” International Journal <strong>of</strong> Data Mining and Business<br />

Intelligence, (Forthcoming), Refereed Journal. 33% contribution.<br />

Shi, Y, Y. Peng, G. Kou and Z. Chen, “Classifying Credit Card Accounts for Business Intelligence and<br />

Decision Making: A Multiple-Criteria Quadratic Programming Approach,” International Journal <strong>of</strong><br />

Information Technology and Decision Making, Vol. 4, 581-600, 2005, Refereed Journal (SCI). 33%<br />

contribution.<br />

Zhou, Z., T. Mou and Y. Shi, “The Mathematical Structure <strong>of</strong> Credit Evaluation,” Far East Journal <strong>of</strong><br />

Applied Mathematics, Vol. 20, 113-119, 2005, Refereed Journal. 33% contribution.<br />

Shi, Y., H. Yang and L. Zhang, “Promoting China’s National Competitiveness by Using Knowledge<br />

Management and Data Mining,” China S<strong>of</strong>t Science, Vol. 176, 46-51, 2005 (in Chinese), Refereed Journal.<br />

33% contribution.<br />

Shi, Y., J. He, L. Wang and W. Fan, “Computer-based Algorithms for Multiple Criteria and Multiple<br />

Constraint Levels Integer Linear Programming,” Computers & Mathematics with Applications, Vol. 49,<br />

903-921, 2005, Major Refereed Journal (SCI). 50% contribution.<br />

Kou, G., Y. Peng, Y. Shi, M. Wise and W. Xu, "Discovering Credit Cardholders’ Behavior by Multiple<br />

Criteria Linear Programming", Annals <strong>of</strong> Operations Research, Vol.135, 261-274, 2005, Major Refereed<br />

Journal (SCI). 30% contribution.<br />

Shi, Y., R. Liu, N. Yan, and Z. Chen, “A Family <strong>of</strong> Optimization Based Data Mining Methods,” Zhang, Y<br />

(eds.), ApWeb 2008, Progress in WWW Research and Development, LNCS 4976, pp. 26-38, 2008.<br />

Shi, Y., R. Liu, N. Yan, and Z. Chen, “Multiple Criteria Mathematical Programming and Data Mining,” ICCS<br />

2008, Part I: 7-17. (EI, ISTP)<br />

Zhang, P., Y. Tian, X. Li, Z. Zhang, and Y. Shi, “Select Representative Samples for Regularized Multiple-<br />

Criteria Linear Programming Classification,” ICCS 2008, Part II: 436-440. (EI, ISTP).<br />

Yan, N., Z. Chen, R. Liu, and Y. Shi, “An Optimization-Based Classification Approach with the Non-additive<br />

Measure,” ICCS 2008, Part II: 450-458. (EI, ISTP).<br />

Zhang, Y., Z. Zhou, and Y. Shi, “A Selection Method <strong>of</strong> ETF’s Credit Risk Evaluation Indicators ,” ICCS 2008,<br />

Part II: 459-465. (EI, ISTP).<br />

Zhang, Z., Y. Shi, P. Zhang, and G. Gao, “A Rough Set-Based Multiple Criteria Linear Programming<br />

Approach for Classification,” ICCS 2008, Part II: 476-485. (EI, ISTP).<br />

Zhang, J. and Y. Shi “A Framework <strong>of</strong> Optimization Method for Classification,” Lecture Notes in OR: The<br />

First International Symposium on Optimization and Systems Biology (OSB’07), Beijing, China, August 8–<br />

10, 2007, 391–396. (ISPT).<br />

Liu, R. and Y. Shi “Succinct Matrix Approximation and Efficient k-NN Classification,” IEEE ICDM 2007<br />

Proceedings, 213-222. (EI).<br />

Zhu, X., P. Zhang, X. Lin and Y. Shi “Active Learning from Data Streams,” IEEE ICDM 2007 Proceedings,<br />

757-762. (EI).<br />

He, J., G. Huang, Y. Zhang and Y. Shi “Cluster Analysis and Optimization in Color-Based Clustering for<br />

-468-


Image,” Workshop on Knowledge Discovery and Data Mining from Multimedia Data and Multimedia<br />

Applications, Workshop at IEEE ICDM 2007, 213-218. (EI).<br />

Gang, K., Y.Peng, Y. Shi, and Z. Chen, “Epsilon-Support Vector and Large-Scale Data Mining Problems”,<br />

ICCS 2007, Part III: 874-881. (EI, ISTP)<br />

Zhou, L., Y. Liu, J. Wang and Y. Shi “Utility-based Web Path Traversal Pattern Mining,” Workshop at IEEE<br />

ICDM 2007, 373-378. (EI).<br />

He, J., Y. Zhang, Y Shi, G. Huang “A Multi-criteria Decision Support System <strong>of</strong> Water Resource Allocation<br />

Scenarios, KSEM2007. (Accepted) (LNAI) (EI, ISTP, DBLP)<br />

He, J., G. Huang, Y. Zhang and Y. Shi “Cluster Analysis and Optimization in Color-Based Clustering for<br />

Image,” Workshop on Knowledge Discovery and Data Mining from Multimedia Data and Multimedia<br />

Applications, ICDM 2007. (IEEE conference)<br />

He, J., Y. Zhang, G. Huang, Y. Shi, “Network Lifetime <strong>of</strong> Application-Specific Randomly Deployed Wireless<br />

Sensor Networks in Arbitrary Sensor Density,” ACIS-ICIS 2007: 352-357. (EI, ISTP, DBLP)<br />

Shi, Y., Y. Tian, X. Chen and P. Zhang “A Regularized Multiple Criteria Linear Program for Classification,”<br />

Workshop at IEEE ICDM 2007, 253-258. (EI).<br />

Shi, Y. and X. Li "Knowledge Management Plantforms and Intelligence Knowledge beyond Data Mining,"<br />

in Y. Shi, D. Olson and A. Stam, eds., Advance in Multiple Criteria Decision Making and Human Systems<br />

Management, IOS Press, Amsterdam, 272-288, 2007.<br />

Peng, Z., Zhang , J., and Y. Shi, “A New Multi-Criteria Quadratic-Programming Linear Classification Model<br />

for VIP E-Mail Analysis”, ICCS 2007, Part II: 499-502. (EI, ISTP)<br />

Meihong ,Z., Y. Shi, A. Li and J. He, “A Dynamic Committee Sheme on Multiple-Criteria Linear<br />

Programming Classification Method”, ICCS 2007, Part II: 401-480. (EI, ISTP)<br />

Yaohui, C., A. Li, Y. Shi, “Kimberlites Identification by Classification Methods”, ICCS 2007, Part II: 409-414.<br />

(EI, ISTP)<br />

Zhiwang, Z., Y. Shi, “The Characteristic Analysis <strong>of</strong> Web User Clusters based on Frequent Browsing<br />

Patterns”, ICCS 2007, Part II: 490-493. (EI, ISTP)<br />

Jing W., Y. Liu, L. Zhou, Y. Shi, “Pushing Frequency Constraint to Utility Mining Model”. ICCS 2007, Part<br />

III: 689-692. (EI, ISTP)<br />

Zhan, Z., Y.Tian and Y. Shi, “Feature Selection for VIP E-Mail Accounts Analysis”, ICCS 2007, Part III: 493-<br />

700. (EI, ISTP)<br />

Peng,Y., G. Kou, J. Matza, Z. Chen, D. Khazanchi and Yong Shi, “Application <strong>of</strong> Classification Methods to<br />

Individual Disability Income Insurance Fraud Detection”, ICCS 2007, Part III: 852-858. (EI, ISTP)<br />

Li., X, L.Zhang, M. Ding, Y. Shi, J. Li, “A Combined Web Mining Model and Its Application in Crisis<br />

Management”, ICCS 2007, Part III: 906-910. (EI, ISTP)<br />

Li., G., Z. Zhou, X. Song, and Y. Shi, “A Fuzzy Comprehensive Evaluation Method on Firms' Credit Sale<br />

Risk”, ICCS 2007, Part III:1062-1068. (EI, ISTP)<br />

Zhang, L., J. Li and Y. Shi “<strong>Study</strong> on Improving Efficiency <strong>of</strong> Knowledge Sharing in Knowledge-Intensive<br />

Organization,” WINE 2005: 816-825. 30% contribution.<br />

Li, A. and Y. Shi “An Integrated Classification Method: Combination <strong>of</strong> LP and LDA,” WINE 2005: 758-767.<br />

50% contribution.<br />

Kou, G., N. Yan, Y. Peng, N. Yan, Y. Shi and Z. Chen "Network Surveillance and Multi-Group Intrusion<br />

Classification," in J. Chen, ed., IEEE Service Systems and Service Management, International Academic<br />

Publishers, Beijing, 841-848, 2005. 20% contribution.<br />

Li, J. , W. Xu and Y. Shi "Credit Scoring via PCALWM" in V. S. Sunderam et al, eds., ICCS 2005, LNCS 3516,<br />

Springer, Berlin, 531-538, 2005. 30% contribution.<br />

Peng, Y. , G. Kou, Y. Shi, and Z. Chen "Improving Clustering Analysis for Credit Card Accounts<br />

-469-


Classification" in V. S. Sunderam et al, eds., ICCS 2005, LNCS 3516, Springer, Berlin, 548-553, 2005. 30%<br />

contribution.<br />

Peng, Y., G. Kou, Y. Shi, Z. Chen and H. Yang, ``A Comparison <strong>Study</strong> <strong>of</strong> Multiclass Classification between<br />

Multiple Criteria Mathematical Programming and Hierarchical Method for Support Vector Machines,"<br />

2005 ICDM Workshop: Optimization-based Data Mining Techniques with Applications, pp. 30-36, U.S.A.,<br />

2005.<br />

He, J., W. Yue and Y. Shi, ``Pattern Recognition for Multimedia Communication Networks Using New<br />

Connection Models," 2005 ICDM Workshop: Optimization-based Data Mining Techniques with<br />

Applications, pp. 37-42, U.S.A., 2005.<br />

He, J., W. Yue and Y. Shi, ``Identification Mining <strong>of</strong> Unusual Patterns for Multimedia Communication<br />

Networks," Abstract Proc. <strong>of</strong> Autumn Conference 2005 <strong>of</strong> Operations Research Society <strong>of</strong> Japan, pp.<br />

262-263, 2005.<br />

He, J., W.Yue and Y. Shi, ``A Double Helix Architecture <strong>of</strong> Knowledge Discovery System Based on Data<br />

Grid and Knowledge Grid for Multimedia Communication Networks," Proc. <strong>of</strong> 1st Intel. Cong. <strong>of</strong> the<br />

Intel. Federation for Systems Research, pp. 123-124, Japan, 2005<br />

He, J., W. Yue and Y. Shi, ``Data Mining Systems <strong>of</strong> QoS Integrated Evaluation for Multimedia<br />

Communication Networks," Proc. <strong>of</strong> IICT Symposium, Konan <strong>University</strong>, pp. 14-pp. 21, 2005.<br />

Wang, M., J. Zheng, Z. Chen, and Y. Shi, “Classification Methods for HIV-1 Medicated Neuronal Damage,”<br />

IEEE CSB 2005 Workshops and Poster Abstracts, Aug. 8-11, 2005, Stanford <strong>University</strong>, California, 31-32.<br />

Pi, J., Y. Shi and Z. Chen, “Similarity and Cluster Analysis Algorithms for Microarrays Using R*-Trees,”<br />

IEEE CSB 2005 Workshops and Poster Abstracts, Aug. 8-11, 2005, Stanford <strong>University</strong>, California, 91-92.<br />

Peng, Y, N. Yan, G. Kou, Z. Chen and Y. Shi “Document Clustering in Antimicrobial Peptides Research,”<br />

Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems, <strong>Omaha</strong>, NE, USA August<br />

11th-14th 2005, 878-887.<br />

Peng, Y, G. Kou, Y. Shi and Z. Chen “Using Optimization-Based Classification Method for Massive<br />

Datasets,” Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems, <strong>Omaha</strong>, NE, USA<br />

August 11th-14th 2005, 1446-1452.<br />

Zhang, L., Y. Shi and X. Yang “A Fuzzy Mining Algorithm for Association-Rule Knowledge Discovery,”<br />

Proceedings <strong>of</strong> the Eleventh America Conference on Information Systems, <strong>Omaha</strong>, NE, USA August 11th-<br />

14th 2005, 1487-1496.<br />

Shi, Y., W. Xu and Z. Chen, Chinese Academy <strong>of</strong> Sciences Symposium on Data Mining and Knowledge<br />

Management (CASDMKM 2004), LNAI 3327, Springer-Verlag, 2004, 263 pages. 33% contribution.<br />

Shi, Y., J. He, L. Wang and W. Fan, “Computer-based Algorithms for Multiple Criteria and Multiple<br />

Constraint Levels Integer Linear Programming,” Computers & Mathematics with Applications<br />

(forthcoming). Major Refereed Journal (SCI). 50% contribution.<br />

Kou, G., Y. Peng, Y. Shi, M. Wise and W. Xu, "Discovering Credit Cardholders’ Behavior by Multiple<br />

Criteria Linear Programming", Annals <strong>of</strong> Operations Research (forthcoming). Major Refereed Journal<br />

(SCI). 40% contribution.<br />

He, J., X. Liu, Y. Shi, W. Xu and N. Yan "Classifications <strong>of</strong> Credit Cardholder Behavior by using Fuzzy Linear<br />

Programming", International Journal <strong>of</strong> Information Technology and Decision Making, Vol. 3, No. 4, 633-<br />

650, 2004. Refereed Journal (SCI). 40% contribution.<br />

Zheng, J., W. Zhuang, N. Yan, G. Kou, D. Erichsen, C. McNally, H. Peng, A. Cheloha, C.Shi, and Y. Shi,<br />

"Classification <strong>of</strong> HIV-1 Mediated Neuronal Dendritic and Synaptic Damage Using Multiple Criteria Linear<br />

Programming," Neuroinformatics, Vol. 2, 303-326, 2004. Major Refereed Journal (SCI). 30%<br />

contribution.<br />

Tang, X., Z. Zhou, C. Zhang and Y. Shi, "Multi-Objective Constrained Nonlinear Optimization: An ODE<br />

-470-


Approach," Information – International Inter-discipline Journal, Vol. 7, 487-495, 2004. Refereed Journal.<br />

30% contribution.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

“Data Mining for Petroleum Exploration-Phase II,” $300,000, by BHP Billiton Co., Australia, 2008-2010.<br />

“The attributes Structure and Measurements in the Process <strong>of</strong> Building Trust-worth S<strong>of</strong>tware” $100,000,<br />

by National Science Foundation <strong>of</strong> China, Key Project,#73662243, 2008-2010.<br />

“Revolving Charge Accounts Receivable Retrospective Analysis,” $64,959, by <strong>Nebraska</strong> Furniture Market<br />

- a unit <strong>of</strong> Berkshire Hathaway Investment Co., <strong>Omaha</strong>, <strong>Nebraska</strong> 2008-2009.<br />

“Data Mining for Petroleum Exploration-Phase II,” $300,000, by BHP Billiton Co., Australia, 2008-2010.<br />

“Data Mining and Intelligent Knowledge Management: Theory and Applications,” $1,423,077, by<br />

National Science Foundation <strong>of</strong> China, Innovative Grant,#70621001, 2007-2015.<br />

“Data Mining and Optimization,” $150,000, by National Science Foundation <strong>of</strong> China, Key Project,<br />

#70531040, 2006-2009.<br />

“Data Mining for Petroleum Exploration-Phase I,” $54,500, by BHP Billiton Co., Australia, 2005-2007.<br />

“Multiple Criteria Non-linear based Data Mining Methods and Applications,” $25,000, by National<br />

Science Foundation <strong>of</strong> China, #70472074, 2005-2007.<br />

“Bio-informatics <strong>Study</strong> in the Process and Changes <strong>of</strong> Antigen and Antibody,” (with Z. Cao et al.)<br />

$316,000, by 973 Project, Chinese Department <strong>of</strong> Science and Technology, #2004CB720103, 2005-2009.<br />

"Proactive and Predictive Information Assurance for Next Generation Systems (P2INGS),"(with J. Huff, Z.<br />

Chen and Q. Zhu) $800,000, US Air Force Research Laboratory, Contract # F30602-03-C-0247, October<br />

2003-April 2005.<br />

“Data Mining and Data Warehousing: Theory and Applications in Financial Fields”, $158,536 (1.3 million<br />

Chinese Yuan) by Chinese Department <strong>of</strong> Science and Technology, #01C26225120981, 2002-2004.<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 CIST 9990 Dissertation 1 13<br />

ISQA 8700 Data Warehousing: Theory and Practice 3 22<br />

Fall 2008 CIST 9040 Colloquium on IT Pr<strong>of</strong>ession 1 5<br />

CIST 9050 Colloquium on IT Pr<strong>of</strong>ession 1 5<br />

CIST 9060 Colloquium on IT Pr<strong>of</strong>ession 1 5<br />

CIST 9990 Dissertation 1 13<br />

ISQA 4890 Data Warehousing and Data Mining 3 11<br />

-471-


Spring 2008 ISQA 8700 Data Warehousing: Theory and Practice 3 6<br />

Fall 2007 ISQA 4010 Business Intelligence 3 12<br />

ISQA 4890 Data Warehousing and Data Mining 3 6<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __50___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-472-


Paul van Vliet<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Paul J.A. van Vliet<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Associate Pr<strong>of</strong>essor (8/01 – present)<br />

Assistant Pr<strong>of</strong>essor (1/95 – 8/01)<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. MIS Oklahoma State <strong>University</strong> 1994<br />

M.B.A. Business Moorhead State <strong>University</strong>, Moorhead 1990<br />

Administration<br />

B.BI. Business<br />

Informatics<br />

Gelders Instituut voor HEAO, Arnhem, The<br />

Netherlands<br />

June 1987<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Van Vliet, P.J.A. & Pietron, L.R. (2008) Synchronous Collaboration in Systems Development Education –<br />

Issues and Recommendations for the Virtual Classroom. 39th Annual Meeting <strong>of</strong> the Decision Sciences<br />

Institute, Baltimore, November 22-25, 2008.<br />

October 31, 2008: Presented at the CIST Roundtable "Using Adobe Connect for Distance and Hybrid<br />

Courses" with Ilze Zigurs and Leah Pietron.<br />

-473-


August 23, 2008: Taught guest lecture titled “Overview <strong>of</strong> Decision Support Systems” to graduate<br />

students enrolled in the Executive MBA program. Contact: Dr. Birud Sindhav, Assistant Pr<strong>of</strong>essor <strong>of</strong><br />

marketing, Department <strong>of</strong> Marketing & Management, College <strong>of</strong> Business Administration.<br />

October 22, 2008: Taught guest lecture titled “Student Groupwork: Building, Nurturing and Managing<br />

Team Projects” to doctoral students enrolled in CIST 9050 - Colloquium on IT Teaching.<br />

Pietron, L.R. & Van Vliet, P.J.A. (2008) Converting A Project-Based Class to An Online Class: The Dilemma<br />

<strong>of</strong> Systems Analysis and Design. Clute Institute For Academic Research - College Teaching & Learning<br />

Conference, Orlando, Florida, January 2-5, 2008.<br />

Van Vliet, P.J.A. (2007) Zachman in the Classroom - Incorporating the Zachman Framework into<br />

Information Systems Education. 38th Annual Meeting <strong>of</strong> the Decision Sciences Institute, Phoenix,<br />

November 17-20, 2007.<br />

March 16, 2007: Presented "Distance Education in Practice - Teaching CIST 3100" at distance education<br />

workshop sponsored by IS&T Distance Education Steering Committee.<br />

December 7, 2007: Presented "Succeeding (in Distance Education) with Blackboard" with Dwight<br />

Haworth at distance education workshop sponsored by IS&T Distance Education Steering Committee.<br />

June 20, 2007 – Guest lecturer in PSCI 8926 Advanced Topics in Political Science, Pr<strong>of</strong> Steve Bullock.<br />

Presented “The History <strong>of</strong> the Internet.”<br />

Van Vliet, P.J.A. (2006) The Benefits <strong>of</strong> Using Real-World Projects for Systems Development Courses -<br />

Experience & Assessment. 37th Annual Meeting <strong>of</strong> the Decision Sciences Institute, San Antonio,<br />

November 18-21, 2006.<br />

On April 15, 2006, in collaboration with Dr. Leah Pietron, presented a workshop on Student Groupwork<br />

to IS&T and CBA faculty.<br />

Van Vliet, P.J.A. (2005) Information Systems Development Courses as Preparation for the Workplace -<br />

An Assessment. 36th Annual Meeting <strong>of</strong> the Decision Sciences Institute, San Francisco, November 19-22,<br />

2005.<br />

On November 8, 2005, presented “Student Groupwork: Building, Nurturing, and Managing Team<br />

Projects” to IS&T doctoral students.<br />

Paul J.A. van Vliet (2004) Maintaining the Relevance <strong>of</strong> Information Systems Development Education.<br />

35th Annual Meeting <strong>of</strong> the Decision Sciences Institute, Boston, MA, November 20-23, 2004.<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

(8/91-12/94) Oklahoma State <strong>University</strong> Teaching Assistant<br />

(1/91-12/93) Oklahoma State <strong>University</strong> Research Assistant<br />

(8/86-6/87) KLM - Royal Dutch Airlines,<br />

Amsterdam<br />

Data Management Intern<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

-474-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Laboratory Director, PKI Group Decision Support Laboratory, located in PKI 279<br />

Invited by Lanyce Keel to serve on UNO Distance Education Mini-Grant Evaluation Committee.<br />

Member and Chair, IS&T Academic Committee. Re-elected as Chair, Spring 2009.<br />

Member, IS&T Distance Education Steering Committee.<br />

Participated in the Peter Kiewit Institute open house in February 21, 2009 by representing ISQA faculty<br />

and programs and MIS Student Organization.<br />

Participated in the Peter Kiewit Institute open house in October 26, 2008, by representing ISQA faculty<br />

and programs and MIS Student Organization.<br />

Website Administrator, ISQA Department<br />

Coordinator for the comprehensive exams for the Masters <strong>of</strong> Science in Management Information<br />

Systems program<br />

Faculty advisor for the Management Information Systems Students Organization<br />

Member, ISQA Annual Review Committee.<br />

Member, ISQA Pr<strong>of</strong>essional Development Committee<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Website Administrator, ISQA Department ( 2004- present)<br />

Member, ISQA Pr<strong>of</strong>essional Development Committee (2004-present)<br />

Member and Chair, IS&T Academic Committee. (2005-present)<br />

Member, IS&T Distance Education Steering Committee. (2006-present)<br />

Laboratory Director, PKI Group Decision Support Laboratory, located in PKI 279 (2004-present)<br />

Faculty advisor for the Management Information Systems Students Organization (2004-present)<br />

Coordinator for the comprehensive exams for the Masters <strong>of</strong> Science in Management Information<br />

Systems program (2004-present)<br />

Member, ISQA Annual Review Committee (2004-present)<br />

Member, ISQA Departmental Teaching Award Committee. (2004-2008)<br />

Participated in the Peter Kiewit Institute open house on February 23, 2008, by representing ISQA faculty<br />

and programs in the Group Decision Support Laboratory.<br />

Participated in the Peter Kiewit Institute open house in February 24, 2007 and October 27, 2007, by<br />

demonstrating the Group Decision Support Laboratory to visitors<br />

Interviewed candidates for ISQA position at Decision Sciences Institute annual conference. (Fall 2007)<br />

Participated in the Peter Kiewit Institute open house in October 29, 2006, by staffing the MISSO table in<br />

the PKI atrium.<br />

Participated in the Peter Kiewit Institute open house in February 25, 2006, by demonstrating the Group<br />

-475-


Decision Support Laboratory to visitors.<br />

February 20-23, 2006; participated in IS&T shadow week, meeting with potential IS&T students.<br />

Participated in the Peter Kiewit Institute open house in October 30, 2005, by staffing the MISSO table in<br />

the PKI atrium.<br />

Participated in the Peter Kiewit Institute open house in February 28, 2005, by demonstrating the Group<br />

Decision Support Laboratory to visitors.<br />

February 22-24, 2005; participated in IS&T shadow week, providing a tour <strong>of</strong> the PKI facility for three<br />

potential IS&T students.<br />

Member, ISQA Recruiting Committee. Participated extensively in interviewing 28 candidates at the<br />

AMCIS Conference in <strong>Omaha</strong>, NE (Summer and Fall 2005)<br />

Member, Advisory Committee for the graduate specialty track in the field <strong>of</strong> Bioinformatics <strong>of</strong> the<br />

Pathology and Microbiology department at UNMC (2004-2005 year)<br />

Website administrator, UNMC & UNO Bioinformatics program (2004-2005 year)<br />

Member, ISQA Undergraduate Program Committee (Fall 2004)<br />

Member, ISQA Graduate Program Committee (Fall 2004)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Van Vliet, P.J.A. & Leah R. Pietron (2006). Information Systems Development Education in the Real<br />

World - A project Methodology and Assessment. Journal <strong>of</strong> Information Systems Education. Vol. 17, Nr.<br />

3.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, Information Technology Services, E-learning Course/Project Minigrant,<br />

May 2006. Awarded $2,500 for the 2006-07 fiscal year<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 4120- System Design and Implementation 3 25<br />

001<br />

ISQA 4120- System Design and Implementation 3 18<br />

002<br />

Fall 2008 CIST 3100 Organizations, Application, and Technology 3 25<br />

ISQA<br />

4100/8106<br />

Information Systems Architecture and<br />

Organization<br />

3 11<br />

-476-


ISQA Decision Support Systems 3 19<br />

4730/8736<br />

Summer 2008 ISQA 4120 System Design and Implementation 3 10<br />

Spring 2008 ISQA 4120- System Design and Implementation 3 27<br />

001<br />

ISQA 4120- System Design and Implementation 3 16<br />

002<br />

Fall 2007 CIST 3100 Organizations, Application, and Technology 3 23<br />

ISQA Information Systems Architecture and 3 10<br />

4100/8106 Organization<br />

ISQA<br />

4730/8736<br />

Decision Support Systems 3 14<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 25 %. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

My research activities focus on systems development education, the assessment <strong>of</strong> its quality, its best<br />

practices, the development methodologies, and – lately – the transition into online education.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-477-


-478-


Sandy Vlasnik<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Sandra Vlasnik<br />

Lecturer<br />

n/a<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Adjunct Instructor January 1998 – May 1999<br />

Adjunct Instructor August 2001 – July 2005<br />

Lecturer<br />

August 2005 - Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

BS CS <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> Dec. 1988<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

Masters in Computer Science in progress at <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>.<br />

Coursework completed includes:<br />

Advanced Operating Systems<br />

S<strong>of</strong>tware Specification and Design<br />

Design and Analysis <strong>of</strong> Algorithms<br />

Human Computer Interaction<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Workshops Attended: Reflection, Adobe Connect, Distance Learning and Rubrics<br />

Participated in the Adobe Connect/Web Collaboration Teaching Circle (2008-2009)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

-479-


Dates Where Duties<br />

2/1999 –<br />

11/2001 and<br />

6/2003 –<br />

11/2003 and<br />

1/2004 –<br />

11/2005<br />

Bellevue <strong>University</strong>,<br />

Bellevue <strong>Nebraska</strong><br />

Instructed undergraduate introduction to programming<br />

courses using C, C++, Java and Visual Basic.Net.<br />

Instructed an online introduction to programming course<br />

in Java.<br />

Developed lesson plans, examinations, and student<br />

projects and evaluate course work.<br />

1/2007-<br />

2/2007<br />

STATPack Project, <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong><br />

Utilized C++, MySQL and GTK to upgrade the STATPack<br />

s<strong>of</strong>tware package for use in the digital image acquisition<br />

<strong>of</strong> lab specimens for transfer from remote sites to<br />

central evaluation laboratories.<br />

1989 - 1996 Harris Corporation, Bellevue<br />

<strong>Nebraska</strong><br />

Employed as a Senior S<strong>of</strong>tware Engineer (promoted from<br />

S<strong>of</strong>tware Engineer)<br />

Analyzes, designed, implemented, tested and<br />

maintained complex systems for the support <strong>of</strong><br />

electronic intelligence gathering, flight planning and<br />

weather forecasting tasks.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

ISQA – UPC – committee member<br />

Committee meets approximately twice monthly during the academic year<br />

Evaluate issues related to the undergraduate program in MIS as needed<br />

IS & T Technology - committee member<br />

Committee meets once per year at a minimum<br />

IS & T Scholarship Committee – member<br />

Committee meets periodically to evaluate available scholarships and scholarship applicants as<br />

needed by the college<br />

Committee meets as needed – up to four times per month during the Spring semester<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

-480-


ISQA UPC – January, 2008 to present<br />

IS & T Technology Committee – January, 2007 – Present<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

none<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

none<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall/ 2007 CSCI 1620 Introduction to Programming II 3 31<br />

Fall 2007 ISQA 3300 File Structures 3 22<br />

Fall 2007 ISQA 3310 Managing the Database Environment 3 22<br />

Fall 2007 ISQA 8050 Data Organization and Storage 3 7<br />

Spring CSCI 1620 Introduction to Programming II 3 18<br />

2008<br />

Spring CSCI 1620 Introduction to Programming II 3 15<br />

2008<br />

Spring ISQA 3310 Managing the Database Environment 3 20<br />

2008<br />

Spring ISQA 8050 Data Organization and Storage 3 11<br />

2008<br />

Summer ISQA 3310 Managing the Database Environment 3 10<br />

2008<br />

Fall 2008 CSCI 1620 Introduction to Programming II 3 30<br />

Fall 2008 CSCI 1620 Introduction to Programming II 3 15<br />

Fall 2008 ISQA 3300 File Structures 3 14<br />

Fall 2008 ISQA 8050 Data Organization and Storage 3 11<br />

Spring CSCI 1620 Introduction to Programming II 3 41<br />

2009<br />

Spring CSCI 1620 Introduction to Programming II 3 32<br />

-481-


2009<br />

Spring<br />

2009<br />

Spring<br />

2009<br />

ISQA 3310 Managing the Database Environment 3 20<br />

ISQA 8050 Data Organization and Storage 3 5<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __0___%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

N/A<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-482-


Gerald Wagner<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

G. R. WAGNER<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Distinguished Research<br />

Fellow<br />

Dates Held<br />

September 2001 to date.<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Bachelor <strong>of</strong><br />

Science<br />

Pre-Veterinary<br />

Medicine<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, Lincoln, <strong>Nebraska</strong> 1958<br />

Master <strong>of</strong><br />

Science<br />

Doctor <strong>of</strong><br />

Philosophy<br />

with Honors<br />

Nutrition and<br />

Biochemistry<br />

Statistics,<br />

Nutrition, and<br />

Physiology<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, Lincoln, <strong>Nebraska</strong> 1960<br />

Iowa State <strong>University</strong>, Ames, Iowa, 1964 1964<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area:<br />

Founded the International Academy for Advanced Decision Support (IAADS), organized IAADS Thought<br />

Leaders Conferences, keynote speaker at, presentations at the Decision Sciences Institute.<br />

Systemics, Cybertics and Informatics conference, Keynote Speaker, 2007 and 2009.<br />

-483-


<strong>Nebraska</strong> Educational Technology Conference, speaker, 2009.<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

July 1964 to July 1966 Swift and Company<br />

(Esmark), Chicago,<br />

Illinois<br />

Head, Experimental Statistics, R&D Laboratories<br />

Experimental design <strong>of</strong> research laboratory<br />

experiments.<br />

Analysis <strong>of</strong> research data.<br />

Documentation and presentation <strong>of</strong> research<br />

results.<br />

Recommended new products based upon<br />

scientific research results.<br />

August 1966 to July<br />

1968<br />

August 1968 to August<br />

1969<br />

August 1969 to June<br />

1978<br />

Swift and Company<br />

(Esmark), Chicago,<br />

Illinois<br />

MRI Systems, Austin, TX<br />

College <strong>of</strong> Engineering,<br />

<strong>University</strong> <strong>of</strong> Texas<br />

Managed staff <strong>of</strong> 5 research statisticians.<br />

Manager, Corporate Operations Research<br />

Department<br />

Started corporate Operations<br />

Research/Management Sciences Department.<br />

One <strong>of</strong> the first corporate OR departments in the<br />

world.<br />

Recruited and managed staff <strong>of</strong> 7 pr<strong>of</strong>essional<br />

staff members.<br />

Initiated and implemented several large-scale<br />

corporate modeling projects.<br />

Vice President Consulting Services<br />

In charge <strong>of</strong> consulting and training services for<br />

s<strong>of</strong>tware start-up.<br />

Education support for enterprise database<br />

management s<strong>of</strong>tware product.<br />

Developed and taught executive workshops on<br />

Computer Based Computer Decision Making.<br />

Head, Operations Research<br />

Managed all departmental activities for staff <strong>of</strong> 6<br />

Pr<strong>of</strong>essors and administrative staff.<br />

Taught graduate level Statistics courses.<br />

Received several teaching honors.<br />

Awarded several research grants.<br />

Pioneer research on:<br />

Computer based education.<br />

Expert Systems.<br />

Artificial Intelligence.<br />

Electronic “War Rooms”.<br />

English-like modeling systems.<br />

-484-


July 1978 to June 1984<br />

Spring Semester, 1987<br />

January 1989 to August<br />

1991<br />

Spring Semester 1990<br />

September 1992 to July<br />

1996<br />

Execucom Systems, Inc.,<br />

Austin, TX<br />

<strong>University</strong> <strong>of</strong> Texas,<br />

Management Science<br />

and Information<br />

Systems, Austin, TX<br />

Collaborative<br />

Technologies, Inc.,<br />

Austin TX<br />

Texas A&M <strong>University</strong>,<br />

College Station, TX<br />

Milagro Systems, Inc.,<br />

Santa Fe, New Mexico<br />

July 1999 to November WebIQ, Inc., Austin, Founder and CEO<br />

Founder and CEO<br />

Designed and developed the Interactive Financial<br />

Planning System (IFPS).<br />

Built and managed company from start up to 275<br />

employees and $22 million in sales.<br />

Worldwide sales channels.<br />

Twelve hundred corporate customers in the<br />

Fortune 1500.<br />

Fifteen hundred academic customers worldwide.<br />

First <strong>University</strong> Support Program for a s<strong>of</strong>tware<br />

company.<br />

Venture capital investments after achieving $10<br />

million in revenue.<br />

Legendary success in innovative products,<br />

recruiting and retaining exceptional people and<br />

customer satisfaction.<br />

Original prototypes <strong>of</strong> “electronic war rooms”<br />

and Group Decision Support Systems.<br />

Company acquired by GTE in 1984.<br />

Distinguished Visiting Pr<strong>of</strong>essor<br />

Developed and taught graduate course on Group<br />

Decision Support Systems.<br />

Founder and CEO<br />

Designed and built one <strong>of</strong> the first<br />

groupware/group collaboration s<strong>of</strong>tware<br />

products (VisionQuest for real time electronic<br />

meetings).<br />

Built corporate infrastructure including direct<br />

sales organization.<br />

Venture capital backed.<br />

Acquired by leading competitor.<br />

Distinguished Visiting Pr<strong>of</strong>essor<br />

Developed and taught graduate course on Group<br />

Decision Support Systems.<br />

Obtained research grant to build Group Decision<br />

Support Facility.<br />

Supervisor and committee member on PhD<br />

dissertation.<br />

Faculty and student seminar series on s<strong>of</strong>tware<br />

entrepreneurship.<br />

Founder and CEO<br />

Designed s<strong>of</strong>tware for novice computer users to<br />

create multi-media books.<br />

Web development tools and the Internet caused<br />

the product to be non competitive.<br />

-485-


2000 Texas Designed and developed Web based group<br />

decision support s<strong>of</strong>tware.<br />

Recruited employees and built infrastructure.<br />

Delivered highly regarded product in 6 months.<br />

Built selling partner channel that produced<br />

$100,000 in revenue 3 months after start up <strong>of</strong><br />

marketing strategy.<br />

Fulfilled all roles <strong>of</strong> President, CEO, VP <strong>of</strong> Sales<br />

and VP <strong>of</strong> Marketing.<br />

Venture capital backed.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

2005 STRATCOM Advanced Decision Support Systems Workshop<br />

2005 Union Pacific Train Scheduling Simulator<br />

2006 Northrop Grumman Homeland Security Proposal<br />

2007 Gallup Design and Develop Visualization Lab<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

Developed the proposal for the new Bachelor <strong>of</strong> Science degree in IT Innovation.<br />

Developed the Entrepreneurs Track for Infotec ’09.<br />

Developed and <strong>of</strong>fered the Gallup/AIM Institute/CIS&T seminars and workshops on Web 2.0.<br />

Developed and <strong>of</strong>fered the Gallup/AIM Institute/CIS&T seminars and workshops on Data Visualization.<br />

Formed and lead the Heartland Student Entrepreneurs group.<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.:<br />

Developed simulation and visualization s<strong>of</strong>tware that is being used by several Universities in many<br />

countries.<br />

Wrote chapter for book on Decision Support Systems and Business Intelligence to be published by<br />

Prentice Hall in 2010.<br />

Wrote chapter for book on Intelligent Systems published b Springer, 2007.<br />

-486-


12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

Course<br />

Term/year number<br />

Spring 2009 ISQA 4000<br />

ISQA 8080<br />

MGMT 4000<br />

ECON 8916<br />

Fall 2008 ISQA 4000<br />

ISQA 8080<br />

MGMT 4000<br />

ECON 8916<br />

Spring 2008 ISQA 4000<br />

ISQA 8080<br />

MGMT 4000<br />

ECON 8916<br />

Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Applied Consulting and Model Visualization 3 20<br />

Applied Simulation and Visualization 3 20<br />

Business Simulation Application 3 20<br />

Fall 2007 ISQA 4000 Adv in Data Visualization 3 17<br />

ISQA 8080 Adv in Data Visualization 3 3<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 65%. Please give a brief<br />

description <strong>of</strong> your major research and scholarly activities:<br />

Mentor the One Innovation Place student intern program; Financial planning s<strong>of</strong>tware targeted at<br />

become the de facto standard for financial literacy training and counseling <strong>of</strong>fered by nonpr<strong>of</strong>its;<br />

Simulation modeling and visualization s<strong>of</strong>tware for use <strong>of</strong> Universities; International Academy for<br />

Advanced Decision Support; Business Strategy Visioning.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the IS program: 90 % for academic year and<br />

none in summer months.<br />

-487-


-488-


Kerry Ward<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Kerry Ward<br />

Assistant Pr<strong>of</strong>essor<br />

Non-tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Associate Pr<strong>of</strong>essor<br />

3. Degrees with fields, institutions, and dates<br />

Dates Held<br />

August 2005 – Present<br />

Degree Field Institution Date<br />

PhD MIS Indiana <strong>University</strong>, Bloomington, IN, Dec. 2005<br />

MBA Finance/MIS <strong>University</strong> <strong>of</strong> Notre Dame, Notre Dame, IN May 1999<br />

BS Business Indiana <strong>University</strong>, Indianapolis, IN May 1992<br />

(Accounting)<br />

BA Psychology Wabash College, Crawfordsville, IN May 1985<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

International Conference on Information Systems (2008)<br />

Academy <strong>of</strong> Management Annual Meeting (2008)<br />

Third Annual Midwest Conference <strong>of</strong> the Association for Information Systems (2008)<br />

International Conference on Information Systems (2007)<br />

Academy <strong>of</strong> Management Annual Meeting (2007)<br />

International Conference on Information Systems (2006)<br />

International Conference on Information Systems (2005)<br />

Teaching Circle on Information Technology for Instruction (2005-2006)<br />

Americas Conference on Information Systems (2005)<br />

International Conference on Information Systems (2004)<br />

-489-


6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

2000 – 2005 Kelley School <strong>of</strong> Business Associate Instructor<br />

1997 – 2002 Avarus Network Solutions CFO and part owner<br />

1996 – 1998 Slattery and Holman, P.C.,<br />

Indianapolis, IN<br />

Senior Accountant<br />

Implemented accounting systems for clients,<br />

including establishment <strong>of</strong> chart accounts,<br />

set up <strong>of</strong> prior accounting information and<br />

training <strong>of</strong> client personnel<br />

In charge responsibilities for clients including<br />

budgeting, quarterly compilation, review <strong>of</strong><br />

payroll and other tax and accounting<br />

functions<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

1999 – 2000 Management Solutions<br />

Group, Deloitte & Touché,<br />

LLC, Dallas TX<br />

Senior Consultant<br />

Performed package selection projects<br />

Cleaned up dysfunctional ERP<br />

implementations<br />

Worked with computer forensic group<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Member <strong>of</strong> the <strong>University</strong> Committee on for the Advancement <strong>of</strong> Teaching (UCAT)<br />

Member <strong>of</strong> the pr<strong>of</strong>essional development committee<br />

Member <strong>of</strong> graduate program committee<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Member <strong>of</strong> the <strong>University</strong> Committee on for the Advancement <strong>of</strong> Teaching (UCAT) (2006 – 2009)<br />

Member <strong>of</strong> the pr<strong>of</strong>essional development committee (2007-2010)<br />

-490-


Member <strong>of</strong> graduate program committee (2006-2009)<br />

IA Recruiting Committee (2007-2008)<br />

ISQA Recruiting Committee (2007-2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Ward, Kerry W. Brown, Susan A. and Massey, Anne P. (2005) Organizational Influences on Attitudes in<br />

Mandatory Systems Use Environments: A Longitudinal <strong>Study</strong>, International Journal <strong>of</strong> Business<br />

Information Systems. 1(1&2), (33% Contribution)<br />

H<strong>of</strong>f, Greg, Fruhling, Ann and Ward, Kerry W. (2008) Requirement Prioritization Decision Factors for<br />

Agile Development Environments, Proceedings <strong>of</strong> the 2008 Americas Conference on Information<br />

Systems, (Toronto). (10% Contribution)<br />

Ward, Kerry W., Rees, Jackie and Adu, Prince (2008) Research in Progress: Evaluating the Role <strong>of</strong> Risk<br />

Models in Information Assurance, Proceedings <strong>of</strong> the Third Midwest United States Association for<br />

Information Systems, (Eau Claire) (50%)<br />

Street, Christopher T. and Ward, Kerry W. (2007) Threats to Validity and Reliability in Longitudinal Case<br />

<strong>Study</strong> Timelines, Proceedings <strong>of</strong> the Academy <strong>of</strong> Management Annual Meeting, Philadelphia, PA. (50%<br />

Contribution) – Nominated for Best Paper Award and included in Conference Proceedings<br />

Ward, Kerry W. (2004) Generalizing the Theory <strong>of</strong> Alignment as Guided Adaptation and the Role <strong>of</strong><br />

External Change in the Alignment Factor Adaptation Process, International Conference on Information<br />

Systems (ICIS) Doctoral Consortium, (Washington, D.C.)<br />

Ward, Kerry W. (2001) Impact <strong>of</strong> Industry and Industry Position on IT Focus: An Alternative IT Value<br />

Model, Proceedings <strong>of</strong> the 2001 Americas Conference on Information Systems, (Boston).<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

4/05 – 12/05 Doctoral Student Grant in Aid <strong>of</strong> Research $1,000<br />

9/04 – 12/04 Center for International Business Education Research $2,500<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Course<br />

Semester Class<br />

Term/year number Course title<br />

hrs size<br />

Spring 2009 ISQA 3400 Business Data Communications 3 20<br />

-491-


ISQA 8060 Research in MIS 3 26<br />

Fall 2008 ISQA 3400 Business Data Communications 3 16<br />

ISQA 8060 Research in MIS 3 29<br />

Spring 2008 ISQA 3400 Business Data Communications 3 24<br />

ISQA 8060 Research in MIS 3 20<br />

Fall 2007 CIST 3110- Information Technology Ethics 3 28<br />

001<br />

CIST 3110-<br />

002<br />

Information Technology Ethics 3 27<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: ___50__%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Research interests include IS strategy, Information Assurance, IT infrastructure, and organizational<br />

impacts <strong>of</strong> information technology. Experience includes seven years consulting and public accounting<br />

with Deloitte and Touché and PriceWaterhouseCoopers.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-492-


Peter Wolcott<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Peter Wolcott<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Associate Pr<strong>of</strong>essor August 2001-present<br />

Assistant Pr<strong>of</strong>essor August 1995 – August 2001<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. MIS <strong>University</strong> <strong>of</strong> Arizona 1993<br />

B.A. Computer Dartmouth College 1984<br />

Science<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Difficult Dialogue “Begin to Develop Cross-Cultural Relationships”, April 8, 2008.<br />

2008 National CASTL Summer Institute: Developing Scholars <strong>of</strong> Teaching and Learning. June 5-7, 2008<br />

Attended a three-day workshop “GIS for Web Developers” led by Scott Davis and hosted by Raytheon.<br />

August 26-28, 2008.<br />

Attended ½ day workshop entitled “XBRL: Opportunities and Challenges”, Creighton <strong>University</strong>, College<br />

<strong>of</strong> Business, September 8, 2008.<br />

“Best Assessment Practices Symposium IX” at Rose-Hulman Institute <strong>of</strong> Technology, Terre Haute,<br />

Indiana, April 12-13, 2007. Learned a great deal about ABET-accreditation related assessment practices.<br />

Conducted a 20-hour workshop on Database Administration for a group from ITS, April 30-May 3<br />

“The Learning Horizon: Blending Design, Assessment, and Technology” at UNO, May 15-16, 2007.<br />

“CSAB Computing Accreditation Workshop”, October 5, 2007, Tampa, FL. The workshop was designed<br />

to familiarize those involved with accreditation <strong>of</strong> the new accreditation criteria.<br />

“Cultural Competency 101: Starting Points and Definitions”, at the Center for Human Diversity, Feb. 13,<br />

2008, <strong>Omaha</strong>, NE. I attended the workshop to gain new skills and insights that would help me and my<br />

students develop relationships with microenterprise owners and others in North <strong>Omaha</strong> and elsewhere<br />

in the city.<br />

UNO Speech Center workshop “Incorporating Student Presentations Into Your Class”, presented by<br />

-493-


Marlina Howe, January 26, 2007<br />

EDUCAUSE workshop “Assessing the Efficacy <strong>of</strong> Technology in Promoting Student Learning: Principles<br />

That Anchor Effective Inquiry”, presented by Peggy L. Maki (LSU), September 15, 2006<br />

Oracle Technical Exchange Meeting “Oracle 10g Technology Update: Oracle Service Oriented<br />

Architecture and Oracle Times Ten In-Memory Database,” hosted by Northrup Grumman, Sept. 27,<br />

2006.<br />

Developed three-part on-line lectures on “Data Warehousing, OLAP, and Related Topics” using Camtasia<br />

and Flash. These lectures were designed for and delivered to Agder <strong>University</strong> College as a guest lecture<br />

in a course entitled “Advanced Database Systems”. 2006<br />

Defining graduate certificates in Project Management, Information Assurance, and Systems Analysis and<br />

Design. There certificates were approved and went into effect Fall 2006.<br />

Developed a dual-degree MBA/MS MIS in conjunction with the College <strong>of</strong> Business. Proposal approved<br />

& went into effect Fall 2006.<br />

Organized a “GIS Curriculum Workshop” that drew together two dozen GIS practitioners and educators<br />

from the private and public sectors, at the municipal, county, state, and national levels for a 4-hour<br />

workshop to discuss the requirements for a geographic information systems curriculum. Workshop was<br />

held on December 9, 2005<br />

January 18, 2005. Attended the faculty development workshop entitled “Digital Natives”<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

7. Consulting—list agencies and dates, and briefly describe each project<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Member, Distance Education Advisory Council<br />

Member, UNO Assessment Team<br />

Chair, <strong>University</strong>-wide selection committee for the Peter Kiewit Student Entrepreneurial Award and the<br />

Walter Scott Entrepreneurial Business Award<br />

Chair, ABET Accreditation Steering Committee<br />

Member, Distance Education Steering Committee<br />

Member, Recruiting Committee, CS HPC Position<br />

Director <strong>of</strong> the Masters <strong>of</strong> MIS Program<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Faculty Senate (2005-2007)<br />

-494-


Co-Chair, Library and Learning Resources Committee (Spring 2007)<br />

Member, Distance Education Advisory Council (2005-2007)<br />

Faculty Senate liason to the Faculty Task Force to Design a Common Course Evaluation Instrument<br />

(Spring, 2007)<br />

Assessment mentor for Academic and Student Affairs (Spring 2007)<br />

IT for Development poster presented at the UNO Strategic Planning Forum, March 2, 2007<br />

Member, Institutional Research Advisory Council (AY 2007)<br />

Member, <strong>University</strong>-wide selection committee for the Peter Kiewit Student Entrepreneurial Award and<br />

the Walter Scott Entrepreneurial Business Award (CY 2008)<br />

Chair, ABET Accreditation Steering Committee (2004-present)<br />

IS&T Personnel Committee (2007-2008)<br />

Distance Education Steering Committee (2007-2008)<br />

Director <strong>of</strong> the Masters <strong>of</strong> MIS Program (2005-)<br />

Member, AQIP Advisory Committee for the myMAPP ePortfolio Action Project (2005-2007)<br />

IS&T Academic Committee (2004-2006)<br />

IS&T Personnel Committee (2004-2006)<br />

IS&T Technology Committee (2004-2006)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Qureshi, S., Kamal, M., and P. Wolcott “Information Technology Therapy for Competitiveness in Micro-<br />

Enterprises.” International Journal <strong>of</strong> E-Business Research. Idea Group International. 5(1), 117-140<br />

January-March 2009.<br />

Wolcott, P., Kamal, M. and S. Qureshi “Meeting the Challenges <strong>of</strong> ICT Adoption by Micro-enterprises”.<br />

Journal <strong>of</strong> Enterprise Information Management. Emerald. Volume 21, Issue 6. 2008.<br />

Qureshi, S., Kamal, M., & Wolcott, P. (2008). Information Technology Therapy for Micro-enterprise<br />

Success: Directions for Sustainable Development. Hawaii International Conference on System Sciences,<br />

Hawaii. Jan. 7-10.<br />

Wolcott, P., Qureshi, S., & Kamal, M. (2007). An Information Technology Therapy Approach to Microenterprse<br />

Adoption <strong>of</strong> ICTs. Americas Conference on Information Systems (AMCIS), Keystone, CO. Aug.<br />

10-12.<br />

Abdelaal, A, Kalmal, M., and Wolcott, P. “Employing Social Capital by Small & Medium Enterprises to<br />

Bear Fruit from Wireless Communications,” Midwest AIS 2007.<br />

"Local E-Government in Norway: Current Status and Emerging Issues," Scandinavian Journal <strong>of</strong><br />

Information Systems, (17, 2), 2005, pp.41-84.<br />

http://www.cs.aau.dk/SJIS/journal/volumes/volume17/no2/05flaketal.pdf. (with Leif Flak, Dag Olsen)<br />

"The Provision <strong>of</strong> Internet Services in India," In Information Systems in Developing Countries, Davison,<br />

R.M., Harris, R.W., Qureshi, S., Vogel, D.R. and de Vreede, G.J. Eds.), <strong>University</strong> <strong>of</strong> Hong Kong Press, Hong<br />

Kong, 2004.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

-495-


“<strong>Nebraska</strong> eTeams for Microenterprise Economic Development” with Sajda Qureshi, Teresa Lamsam,<br />

John Bartle, Ken Kriz, Scott Tarry, Bob Bernier. <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Foundation. ($114,494).<br />

Najjar, L., Khazanchi, D. and Wolcott, P. (12/15/2008 to 5/13/2009). "Business Database Competitive<br />

Audit Project". Awarded a grant <strong>of</strong> $17,603 for conducting a business database audit for InfoUSA.<br />

UCAT funding (2008) to purchase ABET material on rubric development ($149) with Leah Pietron and<br />

Dwight Haworth.<br />

UCAT funding to attend the 2008 National CASTL Institute, June 4-7th, <strong>Omaha</strong>, NE. ($350)<br />

Najjar, L., Khazanchi, D. and Wolcott, P. (1/1/2005 to 5/31/2005). "Business Database Competitive Audit<br />

Project". Awarded a grant <strong>of</strong> $14,575 for conducting a business database audit for InfoUSA. This project<br />

was conducted under the auspices <strong>of</strong> the PKI Technology Development Corp (PKITDC).<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year Course number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 8410-001 Database Management 3 25<br />

Fall 2008 ISQA 4300/8306 Database Administration 3 20<br />

ISQA 4000/8080 IT for Development 3 10<br />

Summer 2008 ISQA 8410-101 Database Management 3 24<br />

Spring 2008 ISQA 8410-001 Database Management 3 17<br />

ISQA 8410-850 Database Management 3 6<br />

Fall 2007 ISQA 4300/8306 Database Administration 3 15<br />

ISQA 4000/8080 IT for Development 3 5<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __100___%. Please<br />

give a brief description <strong>of</strong> your major research and scholarly activities:<br />

Research: My major stream <strong>of</strong> research at the moment is in the area <strong>of</strong> IT for Development. The focus<br />

<strong>of</strong> the research is on how to facilitate the adoption <strong>of</strong> information technologies by microenterprises to<br />

bring about economic, social, and human development.<br />

Scholarly activities: In addition to teaching responsibilities, primarily in the area <strong>of</strong> database<br />

management and administration, and IT for development, I am the director <strong>of</strong> the MS MIS program and<br />

the chair <strong>of</strong> the ABET accreditation steering committee. In the latter role, I manage assessment and<br />

accreditation activities for the College <strong>of</strong> IS&T.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-496-


Chi Zhang<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Chi Zhang<br />

Lecturer<br />

n/a<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Lecturer<br />

August 2007-Present<br />

Instructor August 2001-May 2007<br />

Adjunct Faculty May 2001-June 2001<br />

Graduate Assistant May 1999-May 2001<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D.<br />

M.Sc.<br />

M.S.Ed.<br />

B.Sc.<br />

Candidate in<br />

Information<br />

Technology<br />

Computer<br />

Science<br />

Instructional<br />

Technology<br />

Educational<br />

Technologies<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> 2004-<br />

Present<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> 2000<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Kearney 1998<br />

Beijing Normal <strong>University</strong>, China 1990<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

-497-


Presented and Attended research conferences (AMCIS 2005, 2007, 2008; ICIS 2007, PACIS 2008, MWAIS<br />

2006, 2007, 2008; Big XII+ IS doctoral students Symposium 2008)<br />

Attended research development activities (UNL Research Fair 2005)<br />

Attended faculty development workshops (Adobe Connect Workshop 2008, Second Life 2008)<br />

Attended CS workshops and CMIT research round table sessions to get to know colleagues’ research<br />

interests (2005-2006)<br />

Participated in blackboard training programs<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

August 1996-<br />

May 1998<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at<br />

Kearney<br />

Graduate Assistant<br />

Providing technology assistance in Instructional<br />

Technology Center and providing trainings to faculty,<br />

staff and students. Maintaining department web pages.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

May 1997-<br />

August 1998<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at<br />

Kearney<br />

Computer Consultant<br />

Providing technology assistance, updating <strong>of</strong>fice<br />

computer systems, recommending purchases, providing<br />

new application trainings to staff, working with public<br />

computer labs, and creating web pages for the <strong>Nebraska</strong><br />

Student Union and student organizations.<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Undergraduate Program Committee Member, Department <strong>of</strong> Computer Science<br />

-498-


9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Undergraduate Program Committee Member, Department <strong>of</strong> Computer Science (2007 - Present)<br />

Peer Review Committee Member (2007)<br />

IS&T Graduate Affairs (2005)<br />

Merit Raise Committee (2005)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Zhang, C & Zigurs, I (2009), An Exploratory <strong>Study</strong> <strong>of</strong> the Impact <strong>of</strong> a Virtual Learning World Learning<br />

Environment on Student Interaction and Learning Satisfaction, America’s Conference on Information<br />

Systems, AMCIS 2009, San Francisco, CA. August 6-9, 2008.<br />

Zhang, C (2009), Comparing Sense <strong>of</strong> Classroom Community and Learning Satisfaction in a Virtual World<br />

Learning Environment, Midwest Association for Information Systems Conference, MWAIS 2009,<br />

Madison, SD. May 22-23, 2008.<br />

Zhang, C (2009), An Exploratory <strong>Study</strong> <strong>of</strong> the Impact <strong>of</strong> a Virtual Learning World Learning Environment<br />

on Sense <strong>of</strong> Classroom Community and Learning Satisfaction, China Summer Workshop on Information<br />

Management, CSWIM 2009, Guangzhou, China. June 27-28, 2009.<br />

Zhang, C & Zigurs, I (2008), Learning in Virtual Worlds: Understanding the Impact on Social and Cognitive<br />

Processes in Learning, Midwest Association for Information Systems Conference, MWAIS 2008, Eau<br />

Claire, WI. May 23-24, 2008.<br />

Tarmizi, H, Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.-J. de and Zigurs, I. (2007)<br />

Technical and Environmental Challenge <strong>of</strong> Collaboration Engineering in Distributed Environments. E-<br />

Service Journal, Vol 6, No.1, Fall 2007.<br />

Zhang, C. (2007). Theory and Practice: Review Technology-Mediated Learning Research. Midwest<br />

Association for Information Systems Conference, MWAIS 2007, Springfield, Illinois.<br />

Kamal, M., Zhang, C., Najjar, L., and Qureshi, S. (2007). Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support. Midwest Association for Information<br />

Systems Conference, MWAIS 2007, Springfield Illinios.<br />

Tarmizi, H., Payne, M., Noteboom, C., Steinhauser, L., Vreede, G.-J. de and Zigurs, I. (2006). Technical<br />

and Environmental Challenge <strong>of</strong> Collaboration Engineering in Distributed Environments. Proceedings <strong>of</strong><br />

the 12th International Workshop, CRIWG 2006, September 17-21, 2006, Medina del Camp, Spain.<br />

Noteboom, C., Zhang, C., Tarmizi, H., Steinhauser, L., Payne, M., Vreede, G.-J. de and Zigurs, I. (2006).<br />

Research as Teaching and Teaching as Research: Reflections on a Virtual Team Project. Midwest<br />

Association for Information Systems Conference, MWAIS 2006, May 5-6, Grand Rapids, Michigan.<br />

Tarmizi, H., Steinhauser, L., Payne, M., Noteboom, C., Zhang, C., Vreede, G.-J. de and Zigurs, I. (2006). A<br />

Gaming Laboratory to <strong>Study</strong> Distributed Collaboration Processes. Proceedings <strong>of</strong> Collaboration<br />

Engineering Workshop at Hawaii International Conference on System Sciences, HICSS 2006, Kauai, HI.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

-499-


12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 CIST 2500- Intro to Applied Stats for IS&T 3 23<br />

001<br />

CIST 2500- Intro to Applied Stats for IS&T 3 22<br />

002<br />

CSCI 2710 Intro to Digital Design Principles 3 10<br />

Fall 2008 CIST 2500- Intro to Applied Stats for IS&T 3 24<br />

850<br />

CIST 3100- Organizations, Applications and Technology 3 25<br />

850<br />

CSCI 2710- Intro to Digital Design Principles 3 13<br />

001<br />

CSCI 2710- Intro to Digital Design Principles 3 7<br />

002<br />

Summer CSCI 2710 Intro to Digital Design Principles 3 11<br />

2008<br />

Spring 2008 CSCI 2710- Intro to Digital Design Principles 3 19<br />

001<br />

CSCI 2710- Intro to Digital Design Principles 3 16<br />

002<br />

Fall 2007 CIST 2500 Intro to Applied Stats for IS&T 3 25<br />

CSCI 1500 Beginning Programming 3 11<br />

CSCI 2710- Intro to Digital Design Principles 3 13<br />

001<br />

CSCI 2710-<br />

002<br />

Intro to Digital Design Principles 3 11<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-500-


APPENDIX 4 – CURRENT LIST OF SERIALS TITLES<br />

Current List <strong>of</strong> Serials Titles for Information Science & Quantitative Analysis (ISQA)<br />

Communications <strong>of</strong> the Association for Information Systems<br />

Computer Security Journal<br />

Data Base for Advances in Information Systems<br />

DECISION SCIENCES - Membership<br />

DECISION SCIENCESDecision support systems.<br />

Electronic Commerce World<br />

E-Service Journal<br />

IEEE transactions on engineering management.<br />

Information & management.<br />

Information economics and policy.<br />

Information resources management journal.<br />

Information systems management.<br />

Information systems research : ISR : a journal <strong>of</strong> the Institute <strong>of</strong><br />

INFORMS journal on computing.<br />

Intelligent enterprise.<br />

International Journal <strong>of</strong> E-collaboration<br />

International Journal <strong>of</strong> Electronic Commerce<br />

International Journal <strong>of</strong> Information Technology and Decision Making<br />

International journal <strong>of</strong> operations and quantitative management : IJOQM.<br />

International Journal <strong>of</strong> Project Management<br />

Journal <strong>of</strong> Computer Information Systems<br />

Journal <strong>of</strong> Information Warfare<br />

Journal <strong>of</strong> management information systems : JMIS.Journal <strong>of</strong> organizational and end user computing.<br />

(ONLINE ONLY).<br />

Journal <strong>of</strong> s<strong>of</strong>tware maintenance and evolution.<br />

Journal <strong>of</strong> the Association for Information Systems<br />

Management science.<br />

MIS quarterly.<br />

Omega.<br />

Telecommunications policy.<br />

Select Engineering Titles<br />

Computer (ONLINE ONLY).<br />

Electronic Design (ONLINE ONLY).IEEE Computer Graphics and Applications (ONLINE ONLY).<br />

IEEE Spectrum (ONLINE ONLY).<br />

-501-


-502-


APPENDIX 5 – STRATEGIC PLAN FOR INFORMATION TECHNOLOGY SERVICE<br />

-503-


INFORMATION TECHNOLOGY SERVICES<br />

Information Technology Services<br />

Strategic Plan<br />

September 2008<br />

through<br />

September 2010<br />

-504-


-505-


AGENCY CONTACT INFORMATION<br />

Primary Agency IT Contact<br />

(List the person responsible for IT in the agency.)<br />

Name John Fiene<br />

Title Associate Vice Chancellor for Technology<br />

Phone 402-554-3670<br />

Email jfiene@unomaha.edu<br />

Information Technology Services (ITS) Contact List<br />

Title Name Email Address<br />

Director <strong>of</strong><br />

Academic<br />

Computing<br />

Director <strong>of</strong><br />

Administrative<br />

Services<br />

Director <strong>of</strong><br />

Information<br />

Technology<br />

Infrastructure<br />

Director <strong>of</strong> IT Project<br />

Management<br />

Assistant Director <strong>of</strong><br />

Academic<br />

Lanyce Keel<br />

Bret Blackman<br />

Steve Lendt<br />

Joyce Crockett<br />

Jay Killion<br />

lkeel@unomaha.edu<br />

bblackma@unomaha.edu<br />

slendt@unomaha.edu<br />

jcrocket@unomaha.edu<br />

jaykillion@unomaha.edu<br />

-506-


Computing<br />

Business Manager Alice Villone avillone@unomaha.edu<br />

Manager <strong>of</strong><br />

Academic<br />

Partnership in<br />

Instruction and<br />

Distance Education<br />

Manager <strong>of</strong><br />

Customer Services<br />

Shelley Schafer<br />

Matt Galardi<br />

sschafer@mail.unomaha.edu<br />

mgalardi@unomaha.edu<br />

-507-


Information Technology Services Mission, Vision and Values<br />

Mission<br />

Information Technology Services (ITS) provides technology leadership by bringing the knowledge<br />

assets <strong>of</strong> the world to the campus via high-speed computer networks. ITS facilitates the innovative<br />

use <strong>of</strong> technology for instruction, research, and outreach via user-centered services and by<br />

stimulating a culture <strong>of</strong> academic discovery that contributes to the world-wide academic community.<br />

Vision<br />

ITS develops effective partnerships with the colleges, administrative units, student organizations, and<br />

central administration to provide needed collaboration for building technology infrastructure, and<br />

providing complementary services. These partnerships address both the principles <strong>of</strong> economies <strong>of</strong><br />

scale and personalized services through the coordination <strong>of</strong> centralized and distributed IT<br />

pr<strong>of</strong>essionals at UNO. Although our goal is innovation, work is done simultaneously at four levels to<br />

build the necessary infrastructure as a foundation. Today’s innovation becomes tomorrow’s<br />

integration.<br />

The application <strong>of</strong> technology is simultaneously performed at four levels:<br />

Automation:<br />

Integration:<br />

creating efficient methods <strong>of</strong> handling routine tasks that allow greater effort to be<br />

focused on the UNO academic mission.<br />

re-engineering to effectively combine shared functions into streamlined<br />

processes that fulfill multiple purposes and reduce redundant efforts.<br />

Communication: enhancing collaboration by diminishing the effect <strong>of</strong> geographical distances for<br />

both synchronous and asynchronous dialog: one to one, in groups, and to the<br />

world.<br />

Innovation:<br />

simply using technology to achieve what was previously not possible.<br />

Values<br />

ITS shares the values <strong>of</strong> the <strong>of</strong>fice <strong>of</strong> Academic and Student Affairs and holds the following values:<br />

Measuring success through the achievements <strong>of</strong> students, faculty, and staff.<br />

-508-


Creating flexible partnerships with campus units to achieve the appropriate balance <strong>of</strong><br />

complimentary centralized and de-centralized functions and services.<br />

Extending the principles <strong>of</strong> shared governance and shared accomplishments.<br />

Enhancing the welfare, talents, and futures <strong>of</strong> ITS employees and expanding pr<strong>of</strong>essional<br />

development.<br />

Encouraging involvement in pr<strong>of</strong>essional IT associations in education and industry consistent<br />

with staff development plans.<br />

Promoting good stewardship through efficient utilization <strong>of</strong> resources.<br />

Exercising good judgment through effective applications <strong>of</strong> technology.<br />

Facilitating meaningful partnerships in our community to enhance learning through the<br />

appropriate use <strong>of</strong> technology.<br />

Leading proactively in the use <strong>of</strong> technology to solve problems.<br />

Encouraging the use <strong>of</strong> technology as a communication tool.<br />

Fostering the use <strong>of</strong> technology in support <strong>of</strong> lifelong learning.<br />

Embracing diversity as an effective model <strong>of</strong> the university’s working environment.<br />

Aligning ITS policies, procedures, and behaviors with the highest pr<strong>of</strong>essional ideals <strong>of</strong> ethics<br />

and legality.<br />

Protecting the privacy and integrity <strong>of</strong> the information resources <strong>of</strong> the academic community<br />

1. Current Assets (Sections 1.1 through 1.4)<br />

Overview <strong>of</strong> the UNO Campus and Technology Services<br />

UNO is a comprehensive public university located on 89 acres in the heart <strong>of</strong> <strong>Nebraska</strong>’s biggest city<br />

with more than 400 faculty <strong>of</strong>fering 95 baccalaureate degrees, 66 advanced degrees including 6 doctoral<br />

programs. UNO is the NU system’s metropolitan university, which means it provides a multitude <strong>of</strong><br />

activities and service learning opportunities in a wide variety <strong>of</strong> settings that are designed to meet the<br />

needs <strong>of</strong> the UNO students and the community.<br />

The value <strong>of</strong> UNO investment in information technology is substantial and must be considered critical to<br />

the daily operations <strong>of</strong> the organization. Technology is thoroughly integrated into every function <strong>of</strong> the<br />

university and it is critically important to accomplish the university mission. The most valuable assets are<br />

the knowledge and social capital that are developed in our information technology pr<strong>of</strong>essionals and<br />

users <strong>of</strong> information technology that allow the university to work together to perform our mission.<br />

UNO Information Technology Services (ITS) is responsible for providing technology leadership by<br />

facilitating the UNO community’s access to network resources that enhance academic excellence and<br />

-509-


administrative effectiveness. ITS strives to achieve effective partnerships with the colleges,<br />

administrative units, and student organizations. These partnerships simultaneously address the principle<br />

<strong>of</strong> economies <strong>of</strong> scale and personalized services to students, faculty, staff, and community.<br />

-510-


Campus Customers/Partners<br />

Statistics in this section copied from the UNO 2007 Fact Book published by UNO Institutional Research<br />

14,156 Undergrad & Grad Students 235 Graduate Assistants<br />

487 Full-time Faculty 393 Part-time Faculty<br />

799 Full-time staff 46 Part-time staff<br />

70,000 Active Pages - Website<br />

Development/ Support<br />

Administrative Information Services<br />

15,000 Students Every Semester Using<br />

E-BRUNO (Electronic Better Registration<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>)<br />

150,000+ Page Views Each Week on Main<br />

UNO Web Page<br />

30,000 Daily Transactions using E-BRUNO<br />

Students<br />

250,000 NU ID’s (adding more each day) 5000+ Courses Annually Graded Using E-<br />

BRUNO/Faculty<br />

30,000 Active Identities 125+ SIS Updates Applied Yearly<br />

30+ Web Template Users 1500+ Ad Hoc WebFocus Reports & 270<br />

Production Reports<br />

1 Datamart 30+ End User WebFocus Support<br />

1,000,000+ Lines <strong>of</strong> COBOL Code<br />

Supported<br />

1 Mainframe Student Information System<br />

(SIS) Supported<br />

-511-


4 Distance Education Synchronous Video<br />

Facilities<br />

Client Services<br />

4,600 PC/Mac Workstations; 100<br />

UNIX/Linux Workstations on Campus<br />

90 Discipline Specific Labs/Computer<br />

Classroom indirect support<br />

42 Kiosk Stations<br />

9 Open Labs w/525 Workstations Support for Over 40 S<strong>of</strong>tware Products<br />

(http://www.unomaha.edu/its/s<strong>of</strong>tware.php)<br />

Hi-Tech Rooms on Campus:<br />

Auditoriums: 16<br />

3 Partnerships for 6 Community Labs<br />

Conference: 21<br />

Labs: 80<br />

Lecture: 183<br />

Total 300<br />

20,000 Helpdesk Calls/Walk-ins (Yearly)<br />

Distance Education<br />

Academic Partnership for Instruction<br />

Training, Instructional Design,<br />

Multimedia and Web Support<br />

10 DE Programs Supported 107 Training courses taught annually<br />

164 DE Courses supported annually 800+ attendees at training sessions<br />

annually<br />

20 New DE Courses supported annually 15 faculty received instructional design<br />

consulting<br />

3,800 DE Student Enrollments annually 15 Multimedia presentations/projects/<br />

documentation<br />

11,700+ DE Student Credit Hours annually 13 Websites created and/or consulted<br />

-512-


McAfee: Anti- Virus and Anti-Spyware for<br />

Campus and Home (Students, Faculty and<br />

Staff)<br />

Micros<strong>of</strong>t: Office, Desktop Operating<br />

system and Servers (Campus Use and<br />

Faculty/Staff Home)<br />

Site Licenses<br />

Statistical and Mathematical Campus<br />

Use:<br />

1. Maple<br />

2. Minitab<br />

3. SAS<br />

4. SPSS<br />

AutoCAD: <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong><br />

Macintosh: OS10<br />

Not Site License - Special prices for<br />

campus use:<br />

Adobe Reseller Campus use<br />

-513-


Significant ITS Custom Applications<br />

Students, faculty and staff use customized technology daily to meet their needs. ITS continuously<br />

collaborates with our clients to provide the optimum technology support that integrates s<strong>of</strong>tware and<br />

support services. The following list are the significant custom applications developed by UNO ITS that<br />

includes “middleware” to integrate commercial systems with existing ones and web based systems to<br />

support critical <strong>University</strong> requirements.<br />

myUNO (Blackboard 8.0)/SIS<br />

The myUNO (Blackboard) course management system was upgraded to version 8.0 the spring <strong>of</strong> 2008. This<br />

version enhanced the level <strong>of</strong> integration with UNO’s SIS system and improved system performance and<br />

stability.<br />

Web<strong>of</strong>fice/myFolder<br />

Platform Development Tools Support<br />

Windows 2003<br />

Windows Active<br />

Directory<br />

In-house IS staff<br />

UNO has created an integrated and enhanced campus-wide file storage system with a unique web<br />

enabled method <strong>of</strong> access. By integrating campus standard products such as Micros<strong>of</strong>t Server, web<br />

browser support and SSL web encryption as well as custom integration s<strong>of</strong>tware, the UNO campus<br />

now has a departmental document storage system called web<strong>of</strong>fice that is available to any UNO<br />

department, and an individual document storage system called myFolder that is available to all UNO<br />

faculty, staff and students. The real value <strong>of</strong> these integrated systems is easy access to documents<br />

from any Internet connected computer.<br />

Identity Management<br />

Campus wide web based systems and forms supported by ITS use a shared account name and<br />

password called the UNO NetID. Custom identity management services include NetID<br />

provisioning/de-provisioning, LDAP population, password resets and creation <strong>of</strong> <strong>University</strong> wide<br />

unique identifiers (NU ID). Identity Management processes are being migrated to Sun<br />

Microsystems’s Identity Management Suite.<br />

Sungard SCT - Student Information System (SISPLUS)<br />

UNO’s Student Information System (SIS) supports the core academic business needs <strong>of</strong> UNO<br />

students. SIS includes Admissions, Records and Registration, Billing and Financial Aid modules.<br />

UNO has created custom enhancements to the base SIS system to meet campus specific policies.<br />

E-BRUNO for Students<br />

Platform<br />

Development Tools Support<br />

-514-


Red Hat Linux PHP, C, Hllapi In-house IS staff<br />

E-BRUNO for Students is UNO's web-based enrollment services system. With E-BRUNO for<br />

Students, students can use their NU ID and PIN to log in and obtain grades, current class schedules,<br />

register for classes, pay tuition via credit card, accept financial aid and much more. E-BRUNO for<br />

Students provides students with web access to UNO’s Student Information System.<br />

(https://ebruno.unomaha.edu/login.html)<br />

E-BRUNO for Faculty<br />

Platform<br />

Development Tools Support<br />

Red Hat Linux PHP, C, Hllapi In-house IS staff<br />

With E-BRUNO for Faculty, a UNO web-based system, faculty can use their NU ID number and PIN<br />

to log in and obtain class rosters, submit course grades and give permits and authorizations, along<br />

with a host <strong>of</strong> special Blackboard functions. (https://ebruno.unomaha.edu/php/facstaff/)<br />

Datamart<br />

Platform<br />

Development Tools Support<br />

Red Hat Linux Web Focus, mySQL In-house IS staff<br />

UNO developed a campus Datamart, built with data from the Student Information System, to meet<br />

census-reporting requirements.<br />

Short Term Loan System (STLS)<br />

Platform<br />

Development Tools Support<br />

Red Hat Linux Postgres, PHP In-house IS staff<br />

UNO developed a STLS to meet the needs <strong>of</strong> short-term student loans from the Student Accounts<br />

<strong>of</strong>fice.<br />

-515-


Data Exchange<br />

Below are the major entities outside <strong>of</strong> the NU System that ITS exchanges data with.<br />

Entity<br />

JSA Technologies<br />

National Student Loan Program<br />

(NSLP)<br />

U.S. Department <strong>of</strong> Education<br />

National Student Clearinghouse<br />

U.S. Immigration and Customs<br />

Enforcement (ICE)<br />

Dragonfly Athletics<br />

General Revenue Corporation<br />

Credit World Services<br />

CashNet<br />

Internal Revenue Service<br />

Various Banks<br />

Description<br />

Web based deposits for Cbord ID card system<br />

Financial Aid loan services<br />

Financial Aid processing<br />

Degree and enrollment verification<br />

Student and Exchange Visitor Program (SEVP)<br />

Athletic Management System<br />

Collection <strong>of</strong> past due student tuition and fees<br />

Collection <strong>of</strong> past due student tuition and fees<br />

Student Accounts system<br />

1098 tax reporting<br />

Student refunding<br />

-516-


Technical Architecture<br />

Our goal is information availability whenever and wherever (24x7 access, ubiquitous/pervasive, and in<br />

real-time where appropriate). Our choice will be via industry standards, higher education best practices<br />

and using products and solutions providing lower Total Cost <strong>of</strong> Ownership (TCO) and best services to<br />

the whole campus.<br />

This table is technical in nature and explains the technical architecture ITS will be following over the next<br />

two years. The following web site will assist in defining terms listed in this table. http://webopedia.com/<br />

Legacy Current Future<br />

Currently in<br />

Research<br />

Hardware/Servers<br />

Gigabit & multi-Gigabit network<br />

backbone X X<br />

Dynamic Disk Storage (SAN)<br />

Dell/Intel servers X X<br />

IBM RS 6000 Limited Limited<br />

IBM S/390 Mainframe – Based X Limited<br />

Intel Based (PC) X X<br />

Wireless networking access X X<br />

Data Bases<br />

IBM DB2/UDB (Database<br />

2/Universal Database) X X Limited<br />

IBM VSAM (Virtual Storage<br />

Access Method) X Limited Limited<br />

Sun Enterprise LDAP Directory<br />

(Lightweight Directory Access<br />

Protocol) X X<br />

-517-


Legacy Current Future<br />

Currently in<br />

Research<br />

Lotus Notes document and<br />

tracking database<br />

Limited<br />

Micros<strong>of</strong>t Active Directory X X<br />

Micros<strong>of</strong>t SQL (Structured Query<br />

Language) server X X<br />

Open source DB (Postgres,<br />

MYSQL) X X<br />

Oracle<br />

X<br />

-518-


Legacy Current Future<br />

Currently in<br />

Research<br />

Server S<strong>of</strong>tware<br />

Apache web server X X<br />

iWay ETL Manager X X<br />

Oracle Application Server<br />

X<br />

Micros<strong>of</strong>t IIS server for web<br />

enabled applications X X<br />

PHP (Php: Hypertext<br />

Preprocessor) for web enabled<br />

applications X X<br />

Tomcat X X<br />

Hibernate X X<br />

Web DAV (Distributed Authoring<br />

And Versioning) X X<br />

WebFOCUS Reporting Server X X<br />

Lotus Notes X X<br />

Blackboard X X<br />

Server Operating Systems<br />

Cisco router language IOS X X<br />

VMware X X<br />

IBM zOS X Limited<br />

Redhat Linux on Intel X X<br />

Micros<strong>of</strong>t 200x Server X X<br />

Languages<br />

C/CGI (Computer Graphics<br />

Interface) X Limited<br />

-519-


Legacy Current Future<br />

Currently in<br />

Research<br />

COBOL (Common Business-<br />

Oriented Language) X X Limited<br />

CSS X X<br />

HLLAPI (High Level Language<br />

Application Program Interface)<br />

screen scraping X X Limited<br />

JAVA /J2EE X X<br />

JavaScript X X<br />

PHP (Php: Hypertext<br />

Preprocessor) Web-scripting<br />

language X X<br />

Structured Query Language<br />

(SQL) X X<br />

WebFOCUS X X X<br />

XHTML<br />

(HyperTextMarkupLanguage) X X<br />

XML<br />

(EXtensibleMarkupLanguage) X X<br />

Oracle PL/SQL<br />

X<br />

-520-


Legacy Current Future<br />

Currently in<br />

Research<br />

Application Development Methodologies and Toolsets<br />

ANT Build Tool for Java X X<br />

Configuration Mgmt Tools (UNIT<br />

testing, etc) X X<br />

Eclipse IDE X X<br />

NetBeans IDE X X<br />

Spring X X<br />

Struts X X<br />

UML X X<br />

Web based Content Mgmt<br />

Systems X X<br />

Web Services X X<br />

Application Delivery Methodologies/Protocols<br />

IBM DB2 (DataBase 2) Connect X X<br />

JDBC (Java DataBase<br />

Connectivity) X X<br />

LDAP (Lightweight Directory<br />

Access Protocol) X X<br />

iWay Data Adapters X X<br />

ODBC (Open<br />

DataBaseConnectivity) X X<br />

SOAP (Simple Object Access<br />

Protocol) X X<br />

UDDI (Universal Description,<br />

Discovery and Integration) X X<br />

-521-


Legacy Current Future<br />

Currently in<br />

Research<br />

WAP (Wireless Application<br />

Protocol) /WML (Wireless Markup<br />

Language) X X<br />

WSDL (Web Services Description<br />

Language) X X<br />

XML (EXtensible Markup<br />

Language) X X<br />

Rich Content Protocols (Video/Audio)<br />

Direct Analog and Digital Video<br />

over fiber X X<br />

H.323 X X<br />

MPEG4 over IP X X<br />

NEB*SAT H.261 Limited Limited<br />

Windows Media Player<br />

Quicktime<br />

Flash X X X<br />

Project Management tools<br />

c.support X X<br />

Micros<strong>of</strong>t Excel X X<br />

Daptiv X X<br />

Subversion X X<br />

Jira Issue Tracking X Limited<br />

Lotus Notes Team Room<br />

Limited<br />

-522-


Legacy Current Future<br />

Currently in<br />

Research<br />

Authentication and Security<br />

TippingPoint IPS X X<br />

FTP X Limited<br />

LDAP with Unique Username X X<br />

PGP X X<br />

Photo ID card with Database X X<br />

PIN (Personal Identification<br />

Number) X X<br />

SAP Personnel Number X Limited<br />

SFTP/SCP X X<br />

SSH Secure Shell X X<br />

SSL/TLS Secure Socket Layer X X<br />

Student ID (SSN) Limited Limited<br />

Foundstone Vulnerability Mgt X X<br />

UNO NetID X X<br />

NU ID X X<br />

VPN Virtual Private Network Limited X<br />

Sun IdM Suite X X<br />

Wireless VPN Limited X X<br />

McAfee Anti-virus and Spyware X X<br />

McAfee Enterprise Policy<br />

Orchestrator (EPO)<br />

X<br />

Cisco Firewalls X X<br />

VLANS X X<br />

-523-


Legacy Current Future<br />

Currently in<br />

Research<br />

Security Event Management<br />

X<br />

Network Environment<br />

General Description<br />

Information Technology Services pr<strong>of</strong>essionally manages many <strong>of</strong> the 'mission critical' computer systems<br />

on campus. These include centralized email servers, centralized file servers, campus inter- and intranetworks,<br />

including local and wide area networks, Internet and World-Wide-Web communications,<br />

application delivery systems, academic and research systems, instructional delivery systems including<br />

web-based mediums, and streaming media systems in support <strong>of</strong> the campus-wide academic mission.<br />

The desktop management s<strong>of</strong>tware being used is Altiris - http://www.altiris.com/ .<br />

The LAN monitoring tools used are:<br />

What’s Up Gold http://www.whatsupgold.com/<br />

Tipping Point http://www.tippingpoint.com/<br />

Pakateer http://www.netequalizer.com/appe.htm<br />

Foundstone http://www.foundstone.com/us/index.asp<br />

Netmri http://www.netcordia.com/<br />

-524-


Network Devices<br />

Current<br />

Planned – See<br />

narrative below<br />

Firewalls (Hardware) 3<br />

Wireless Access Points 116<br />

Video Cameras (USB)*<br />

IP Phones** 35<br />

POP Servers 0<br />

Web Servers<br />

Windows 2003<br />

Red Hat Linus<br />

34***<br />

35****<br />

Application Delivery (e.g. Citrix,<br />

Terminal Services servers)<br />

(Specify)<br />

Remote Desktop Connection<br />

80<br />

* UNO has many video cameras across the campus to enhance security and will continue to add in<br />

the appropriate places.<br />

** ITS is currently testing the use <strong>of</strong> VOIP. The UNO Telecommunications department has set up<br />

VOIP for the Chili Greens location.<br />

*** This only includes ITS-owned & operated systems and 18 <strong>of</strong> the 34 are running on VMWare<br />

**** This only includes ITS-owned & operated systems and 29 <strong>of</strong> the 35 are running on VMWare<br />

With the physical expansion <strong>of</strong> the UNO campus to the south (Pacific and Center streets) the expansion<br />

<strong>of</strong> all IT services will be impacted and we are involved in the planning <strong>of</strong> this growth. On average there<br />

has been a 10% expansion <strong>of</strong> web servers, but with our use <strong>of</strong> VMware this growth may change.<br />

-525-


Future Direction & Intent<br />

Campus IT in the next biennium is likely to be heavily influenced by the implementation <strong>of</strong> a new student<br />

information system across the university system. Such systems represent the core academic business<br />

processes <strong>of</strong> a campus and tend to affect the overall direction and technical architecture <strong>of</strong> the institution.<br />

Both vendors under current consideration use Oracle, as the underlying technology and therefore it<br />

becomes core to the IT operations <strong>of</strong> the campus for development <strong>of</strong> interfaces to other campus systems<br />

as well as for future application development.<br />

In addition, the unprecedented campus physical expansion and renovations planned in the next two<br />

years similarly mandate re-thinking overall campus infrastructure on a new scale. This may include<br />

campus network re-design with consideration <strong>of</strong> a fiber ring from the Dodge Campus to the Center<br />

Campus to assure appropriate business continuity. Another factor contributing to network infrastructure<br />

design is ongoing convergence <strong>of</strong> voice, video and data applications on the IP-based network as well as<br />

ubiquitous wireless access that includes a variety <strong>of</strong> mobile devices.<br />

In response to environmental sustainability, limited capital resources and staffing limitations, UNO ITS is<br />

in the process <strong>of</strong> re-inventing the campus data center. Server virtualization is achieving significant<br />

savings in electrical costs, server hardware expenses, and system administration costs. Elimination <strong>of</strong><br />

major system printing through an output management system and electronic system distribution <strong>of</strong> output<br />

allows the elimination <strong>of</strong> larger system printers, their associated electrical and maintenance costs as well<br />

as paper and other supplies. These steps allow the data center to be managed exclusively by the<br />

systems administration staff with no computer operators. Further work in the “greening” <strong>of</strong> the data<br />

center will continue to produce similar benefits in the next two years.<br />

Regulatory mandates as well as best practice diligence triggers continued attention to data security and<br />

privacy concerns. While much has been done to address these issues, it is ongoing and dynamic in<br />

ways that will continue to make it a priority into the foreseeable future. One <strong>of</strong> the attendant issues is<br />

identity management. The university has purchased the Sun Identity Management system, which will<br />

continue to be implemented and refined over the next two years. Continuity Planning will be further<br />

enhanced by the virtualization <strong>of</strong> alternative site operations.<br />

The Academic Partnership for Instruction (API), a division <strong>of</strong> ITS continues to provide strategic and<br />

operational support to distance education and to dedicate efforts in integrating emerging technologies<br />

with innovative pedagogy, assessment and instructional design for individual faculty and campus<br />

organizations including the Center for Faculty Development, Teaching Circles, the <strong>University</strong> Committee<br />

-526-


for the Advancement <strong>of</strong> Teaching, the Faculty Senate Educational and Resources and Services<br />

Committee, and the Distance Education Advisory Committee.<br />

The increasing viability <strong>of</strong> S<strong>of</strong>tware as a Service and the potential for aspects <strong>of</strong> infrastructure as a<br />

service will play a role in future IT acquisitions. Project management and elements <strong>of</strong> business continuity<br />

are currently done in this way and the ongoing evaluation <strong>of</strong> the success <strong>of</strong> this approach will continue.<br />

2. Staff and Training<br />

Personnel<br />

Information Technology Services has 45 full time employees with 19 part time student workers.<br />

Depending on the project outside contractors can be involved.<br />

IT Related Training<br />

Summarize the agency’s efforts to address training needs relating to information technology, including<br />

training for IT staff and users.<br />

Yearly performance reviews require ITS employees in conjunction with their manager work on personal<br />

development plans that includes training requirements. Employees receive $250 a year to supplement<br />

their personnel development plans. This money is used to contribute toward attending conferences, join<br />

national technical organizations, and subscribe to technology journals, or purchase books or tools that<br />

support new skill development. Training activities include:<br />

All staff has attended local and national conferences and belongs to national technology<br />

associations.<br />

ITS API staff utilizes a course development model that includes presenting new technology<br />

training courses to ITS staff prior to <strong>of</strong>fering them to the campus. This process provides the ITS<br />

instructor with the opportunity to practice and ITS staff with the opportunity to learn about new<br />

technology.<br />

ITS ADIS staff attended 10 days <strong>of</strong> Sun Identity Management training.<br />

Each year ITS participates in NU tech day, a system-wide one day workshop for technology<br />

pr<strong>of</strong>essionals.<br />

-527-


In the last year, the focus <strong>of</strong> training has been on project management. The newly developed ITS<br />

<strong>of</strong>fice <strong>of</strong> project management has developed and implemented extensive training for senior staff,<br />

project management champions and the staff at large.<br />

Technology training for the campus community consists <strong>of</strong> formal presentations about upgrades <strong>of</strong><br />

campus supported s<strong>of</strong>tware such as Micros<strong>of</strong>t 2007, new applications such as the UNO ePortfolio<br />

system used for faculty and staff annual performance appraisals or the campus webpage template, and<br />

new instructional technologies such as clickers. Additionally, ITS staff provides small group and<br />

individual training upon request.<br />

-528-


APPENDIX 6 – COLLEGE OF IS&T SYSTEM OVERVIEW<br />

COLLEGE OF INFORMATION SCIENCE AND TECHNOLOGY<br />

College <strong>of</strong> Information Science &<br />

Technology<br />

Systems Overview<br />

January 2009<br />

-529-


TABLE OF CONTENTS<br />

CONTACT INFORMATION .................................................................................... 3<br />

COMPUTING SUPPORT MODEL ............................................................................ 3<br />

MISSION AND VALUES ........................................................................................ 4<br />

NETWORK CONNECTIVITY AND CONFIGURATION ..................................................... 5<br />

CLASSROOM, LAB, AND RESEARCH COMPUTERS ...................................................... 9<br />

PRINTING....................................................................................................... 11<br />

VIRTUALIZATION REPORT .................................................................................. 14<br />

SERVER INFORMATION .................................................................................. 16<br />

SOFTWARE LIST – CLASSROOM AND LABS .......................................................... 22<br />

MICROSOFT DEVELOPER NETWORK ACADEMIC ALLIANCE...................................... 24<br />

RESEARCH LABS AND PROJECTS ....................................................................... 25<br />

WEBSITES .................................................................................................. 33<br />

POLICIES, PROCEDURES, AND GUIDELINES FOR TECHNOLOGY USAGE ........................ 38<br />

-530-


College <strong>of</strong> IS&T Systems and Support Contact Information<br />

Location and Hours <strong>of</strong> Operation<br />

Location: PKI 356B<br />

Phone: (402)554-4932<br />

Emergency Pager: (402)888-2927<br />

Emergency Email Address: 4028882927@atsbeep.com<br />

Hours <strong>of</strong> Operation: Monday-Friday 8:00am - 5:00pm<br />

Primary IT Contact<br />

Name<br />

Michael Grove<br />

Title<br />

Director<br />

Phone 402-554-2790<br />

Email<br />

mrgrove@unomaha.edu<br />

Email Contact List<br />

The Director will be updating an email list <strong>of</strong> systems contacts. The list will be used to provide general IT<br />

related updates and information to agencies.<br />

Name Title Email Address Phone<br />

James Harr Research Systems Manager jharr@unomaha.edu 554-3219<br />

Joseph Hrabak Production Systems Manager chrabak@unomaha.edu 554-3340<br />

Mohammad Shafiullah Research Systems Manager mshafiullah@unomaha.edu 554-2973<br />

Computing Support Model<br />

The members <strong>of</strong> the Systems Staff at the College <strong>of</strong> Information Science and Technology are dedicated<br />

to providing quality support for faculty, staff, and students. We provide assistance with s<strong>of</strong>tware<br />

installation and troubleshooting, account creation, departmental purchases, printer installation,<br />

hardware repair, security, server configuration and maintenance, backups, web development, and much<br />

more.<br />

Our approach is different than the standard IT support model. Our team pairs up with faculty, staff, and<br />

researchers forming a true symbiotic relationship. We learn about the project or research being<br />

performed, and work to envision new ways to achieve technological goals. In return, the traditional<br />

researcher or program director receives a fully documented computing solution. This allows both<br />

-531-


partners in the process to grow in their understanding <strong>of</strong> the material, and to develop new and<br />

innovative ways to provide IT solutions.<br />

College <strong>of</strong> IS&T Mission and Values<br />

Mission<br />

The College <strong>of</strong> Information Science and Technology (IS&T) represents the joint efforts <strong>of</strong> the <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong>, the State <strong>of</strong> <strong>Nebraska</strong>, and private industry to address the growing global needs for<br />

knowledgeable pr<strong>of</strong>essionals in the area <strong>of</strong> Information Technology. The college is striving to develop<br />

areas <strong>of</strong> national prominence in bioinformatics, wireless networks/mobile computing, management<br />

information systems, information assurance, project management, decision support systems &<br />

visualization, collaboration science, theoretical and applied computing. The college mission is:<br />

To provide comprehensive up-to-date education <strong>of</strong> the highest quality in the various areas <strong>of</strong><br />

information science and technology to individuals at the Metropolitan <strong>Omaha</strong>, state, national<br />

and international level.<br />

To engage in basic and applied research activities to be carried out by students and faculty <strong>of</strong> the<br />

college with collaboration <strong>of</strong> other <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> units as well as pr<strong>of</strong>it and non-pr<strong>of</strong>it<br />

organizations.<br />

To equip college graduates with the knowledge and expertise to contribute significantly to the<br />

work force and to continue to grow pr<strong>of</strong>essionally.<br />

To partner with other university units in the development and utilization <strong>of</strong> information<br />

technology in teaching and service activities.<br />

To partner with local, state, national and international entities in the resolutions <strong>of</strong> information<br />

technology problems and issues.<br />

In order to accomplish the college's mission and vision, the faculty and staff will strive to achieve the<br />

following three strategic goals:<br />

1. Keep students at the center <strong>of</strong> all college efforts;<br />

2. Strive to achieve the highest academic excellence; and<br />

3. Actively lead and collaborate with academic, business and community entities in various projects<br />

related to IS&T.<br />

-532-


Values<br />

The college's overarching philosophy is exemplified by the value statement, "No student will go<br />

unassisted or unchallenged." The college is focused on reaching the next level <strong>of</strong> information technology<br />

innovation through collaboration. This collaboration is fostered by the presence <strong>of</strong> the college in the<br />

Peter Kiewit Institute and is materializing in the form <strong>of</strong> research, teaching and service/outreach<br />

initiatives in partnership with our stakeholders in the community (government, public and private<br />

sector), other academic units across the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> and the rest <strong>of</strong> the <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong> System.<br />

College <strong>of</strong> IS&T Network Connectivity<br />

There are two Gigabit network ports in each faculty and staff <strong>of</strong>fice. If you are experiencing trouble with<br />

your connectivity, please call us at 554-4932. There is also a VPN available and wireless access<br />

throughout the building. See the text below for more information.<br />

VPN<br />

The College <strong>of</strong> IS&T has a Virtual Private Network available for faculty and staff. Connecting to the VPN<br />

allows you to access your files, connect to network shares, print from the wireless network, and more.<br />

Instructions on connecting to the VPN are listed below.<br />

1. Download the IS&T VPN Client. ** If you have a modem in your computer you will need to disable<br />

this. This can be done by opening up the Control Panel and going to Device Manager -> Network<br />

Adapters, then locate your modem and Right-click -> Disable.<br />

2. Navigate to the directory where you saved the file. Double click it to install the application.<br />

3. Click 'Yes' to install the VPN client.<br />

4. Check the box to save a shortcut on your desktop.<br />

5. Double click the 'IS&TVPN - Shortcut' on your desktop to connect to the VPN.<br />

6. You will see a box popup with the UNO logo. Type in your IS&T username and password,<br />

followed by PKI-IST in the 'logon domain' box. (To connect faster in the future, you may check the<br />

'Save Password' or 'Connect Automatically' boxes.)<br />

7. Click connect.<br />

8. You may see your connection status at anytime or disconnect by double clicking the 'IS&TVPN -<br />

Shortcut' on your desktop.<br />

Connecting to My Office PC: Remote Desktop<br />

-533-


You may control your <strong>of</strong>fice computer from a remote location, as long as you are connected to the VPN.<br />

This allows you to have full access to your computers files, printers, programs, etc. See instructions<br />

below.<br />

1. Install the IS&T VPN Client - see instructions above<br />

2. Windows XP: Click Start --> Run --> type 'mstsc' without the quotes, press enter<br />

3. Windows Vista: Click the Windows button (Formerly Start) --> type 'mstsc' without the quotes,<br />

press enter<br />

4. Type the name <strong>of</strong> your computer in the computer field when the remote desktop box appears<br />

and press enter<br />

(example: computer-name.ist.unomaha.edu)<br />

5. You may find your computer name by going to the control panel and clicking 'System'<br />

Wireless Network<br />

The College <strong>of</strong> IS&T provides unencrypted wireless network access based on common 802.11 standards.<br />

Currently there are 30 active access points providing PKI with nearly 100% wireless coverage.<br />

How to use it<br />

You'll need a computer or other portable device with 802.11 wireless networking capability either built<br />

in or with a wireless network card installed. If you do not have or are not sure if your computer or device<br />

has 802.11 wireless networking capabilities, check with the company or person from whom you<br />

obtained the item.<br />

Set your SSID network name <strong>of</strong> 'unowireless'.<br />

The wireless network will attempt to automatically assign the computer or device a network number<br />

using DHCP. You may need to turn the computer or device <strong>of</strong>f and back on so it seeks a network<br />

number. If your computer or device does not have a fairly current version <strong>of</strong> a standard Windows or Mac<br />

operating system, there may be some special steps that system requires you to perform before being<br />

able to use wireless networking with that device. Check the website or call the technical support number<br />

for the device if you're not sure.<br />

-534-


College <strong>of</strong> IS&T Network Configuration<br />

Physical Equipment:<br />

15 Network Switches<br />

1 Core Router<br />

1000 Network Ports<br />

35 Wireless Access Points<br />

Over the past 6 months IS&T Systems has facilitated several network architecture changes in the pursuit<br />

<strong>of</strong> better service to computer users in both performance and security. This portion <strong>of</strong> the document<br />

explains the changes that have been made through the past year.<br />

The use <strong>of</strong> network address translation to increase security<br />

There are several reasons why NAT is common place in current networks. The two most prominent<br />

reasons are a shortage <strong>of</strong> available IP address space and an implicit firewall policy. The network at PKI<br />

uses mixed NAT and public IP addressing. Each has its benefits, but it can also cause problems. The<br />

following diagram is a small part <strong>of</strong> our network 12 months ago.<br />

Private Lab<br />

Networks<br />

Private NAT<br />

Router<br />

PKI Building<br />

Network<br />

PKI Core<br />

Router<br />

Internet<br />

Private<br />

Workstations<br />

Public Workstations<br />

and Servers<br />

IS&T made extensive use <strong>of</strong> private addressing for research networks. The primary goal was to increase<br />

security and that was a success. However, several drawbacks arose. Nearly all traffic is forced through<br />

the Private NAT router. While the NAT router operates at 1000Mbps and UNO’s Internet connection<br />

runs at 100Mbit, a majority <strong>of</strong> burst traffic occurs to/from servers inside PKI. The limited scalability <strong>of</strong><br />

this solution soon became apparent; the NAT router becomes the bottleneck in our design.<br />

To mitigate the bottleneck issue, IS&T took several heavily used servers and multi-homed them. That is<br />

gave them addresses on both public and private networks. While this solution works, it is far from<br />

optimal. It increases management overhead, requires several non-standard tweaks to DNS to keep<br />

clients connecting to the appropriate adapter on a server, and some applications simply don’t function<br />

right under this set up, in particular any application requiring a license server. This is ignoring the fact<br />

that humans do make occasional mistakes and a mistake configuring a DNS entry can render the service<br />

it pertains to useless until it is fixed.<br />

-535-


Transitioning back to all public addresses was not an option and remains so to this day. Several labs use<br />

network sniffers as educational tools and UNO policy dictates that these networks must be isolated on<br />

the layer 1 and 2 network level. A new approach was needed to maintain security, improve<br />

performance, and simplify server management.<br />

A new approach – Internally routable private addresses<br />

IS&T Systems came up with a new network model to solve these issues without increasing our security<br />

footprint. We wanted to make full use <strong>of</strong> the PKI Core. It has the capability to route 1.2Tbps, and has<br />

20Gbps fiber links to the edge switches. Compare this to the 1Gbps the NAT router <strong>of</strong>fers, it is a<br />

phenomenal improvement. We came to the conclusion that we needed to make use <strong>of</strong> the core router<br />

and policy routing to increase performance and decrease management overhead. The following diagram<br />

illustrates our new model, which, excluding a few minor details, has been implemented fully.<br />

Private<br />

Workstations<br />

PKI Border<br />

Router<br />

PKI Building Network<br />

(including the PKI-Core router)<br />

Internet<br />

Public Workstations<br />

and Servers<br />

Private NAT<br />

Router<br />

The new model calls for the core to handle all routing in the building. Private and Public networks are<br />

handled the same. The difference comes when a workstation or server makes a request destined for the<br />

Internet. The core router uses policy routing to forward public addresses directly to the PKI Border<br />

router as usual. However, private addresses are routed to the Private NAT router, now placed at the<br />

border <strong>of</strong> the PKI network. NAT only occurs for packets destined for the Internet or North Campus. The<br />

performance increases and simplification <strong>of</strong> server management became immediately visible to the IS&T<br />

systems staff.<br />

The networks’ bottlenecks have been eliminated and the NAT router is no longer saturated on a daily<br />

basis, research networks are still isolated from the rest <strong>of</strong> the network using VLAN technology, server<br />

-536-


configuration has become significantly simpler, and the NAT router is now able to handle the load<br />

without any question <strong>of</strong> performance.<br />

-537-


College <strong>of</strong> IS&T Classroom, Lab, and Research Computers<br />

The Systems Staff maintains classrooms and computer labs that directly support academic and research<br />

endeavors <strong>of</strong> the College. Each lab is unique in function, and customized to suit student, faculty, and<br />

staff needs. Students, faculty, and staff may login using their UNO netID. Lab hours are posted outside<br />

<strong>of</strong> each room. For s<strong>of</strong>tware installation requests, please contact us at any time.<br />

All computer labs and classrooms have Dell® Precision 390 workstations with the following<br />

specifications:<br />

Intel® Core 2 Duo 2.66Mhz processor<br />

160GB Hard Drive<br />

2GB <strong>of</strong> RAM<br />

NVIDIA® Quadro FX 3500 Video Card<br />

7 USB ports<br />

3 fire wire ports<br />

Audio jacks in the front and rear<br />

DVD/RW Drive<br />

Below is a list <strong>of</strong> classroom and lab functions, number <strong>of</strong> seats, and number <strong>of</strong> computers.<br />

Room Purpose Seats Computers<br />

PKI155 Classroom 45 1<br />

PKI157 Classroom 23 1<br />

PKI158A Public Computer Lab 50 50<br />

PKI158C IST&E Student Computer Lab 42 40<br />

PKI158G “WOW” Room 10 8<br />

PKI158K Data Mining Lab 20 10<br />

PKI160 Instructional Technology Center - Distance Learning 44 1<br />

PKI161 Instructional Technology Center - Distance Learning 26 1<br />

PKI164 Instructional Technology Center - Distance Learning 56 1<br />

PKI172a Dean's Conference Room 8 1<br />

PKI252 Classroom 45 1<br />

PKI256 Classroom 40 1<br />

PKI259 Graduate Student Lab 9 9<br />

PKI260 Instructional Technology Center 45 45<br />

PKI261 Classroom 35 1<br />

PKI263 Classroom 34 1<br />

PKI269 Instructional Technology Center 30 30<br />

PKI270 Classroom 30 1<br />

PKI274 PhD Student Lab 13 13<br />

PKI276 Instructional Technology Center 30 30<br />

PKI277 Conference Room 8 1<br />

PKI278 Instructional Technology Center for Networking 16 16<br />

PKI 279 Instructional Technology Center 30 3<br />

-538-


PKI285A STEAL Lab 3 8 8<br />

PKI335 Classroom 28 1<br />

PKI350 STEAL Lab 1 40 40<br />

PKI355 Graduate Student Lab 2 2<br />

PKI356A One IP Lab 20 7<br />

PKI356C Adjunct Faculty 3 3<br />

PKI357 E-Learning Lab 2 2<br />

PKI356B Systems Office 12 30<br />

PKI359 Classroom 44 1<br />

PKI360 W.I.N.D.S. Research Lab 4 4<br />

PKI361 STEAL Lab 2 25 25<br />

PKI362 CMANTIC Research Lab 4 5<br />

PKI366 Chronoscope Research Lab 5 5<br />

PKI366A Systems Storage 0 4<br />

PKI367 IS&T Attic 12 12<br />

PKI370 MOSAIC Research Lab 4 4<br />

PKI374 Metaverse Research Lab 6 6<br />

PKI375 Multimedia Production Lab 15 15<br />

PKI377 Classroom 30 1<br />

PKI378 Bioinformatics Research Lab 6 6<br />

PKI383 Classroom 32 1<br />

PKI387 Classroom 25 25<br />

Faculty/Staff Office Computers/Laptops 90 120<br />

Laptops Group Decision Support/Systems Checkout 0 24<br />

Totals 1086 607<br />

-539-


College <strong>of</strong> IS&T Printing<br />

Faculty and Staff Printing<br />

There are two Konica Minolta 750 printers available for Faculty and Staff use. They are located in rooms<br />

170 and 270, and have scanning, copying, and stapling functionality built in. These printers are<br />

automatically installed when you login to your <strong>of</strong>fice computer using the IS&T domain. To locate them<br />

on your Windows computer open your control panel and click printers.<br />

Student Printing<br />

All students with a valid UNO Net ID and MavCard may use the printer in lab 158a. For more<br />

information, see instructions here. Graduate and PhD students may print in your respective labs and<br />

<strong>of</strong>fices. If you are experiencing trouble printing, please call us at 554-4932.<br />

Wireless Printing<br />

Faculty and Staff members may print from the wireless network; however you must be connected to our<br />

VPN. After connecting to the VPN, click the install printers link. The 1st and 2nd floor faculty printers will<br />

install automatically.<br />

(Type PKI-IST\your-username and your domain password when prompted)<br />

Step 1) Install IS&T VPN (Windows XP and Vista)<br />

1. Download the IS&T VPN Installer. ** If you have a modem in your computer you will need to<br />

disable this. This can be done by opening up the Control Panel and going to Device Manager -><br />

Network Adapters, then locate your modem and Right-click -> Disable.<br />

2. Navigate to the directory where you saved the file. Double click it to install the application.<br />

3. Click 'Yes' to install the VPN client.<br />

4. Check the box to save a shortcut on your desktop.<br />

5. Double click the 'IS&TVPN - Shortcut' on your desktop to connect to the VPN.<br />

6. You will see a box popup with the UNO logo. Type in your IS&T username and password,<br />

followed by PKI-IST in the 'logon domain' box. (To connect faster in the future, you may check the<br />

'Save Password' or 'Connect Automatically' boxes.)<br />

7. Click connect.<br />

8. You may see your connection status at anytime or disconnect by double clicking the 'IS&TVPN -<br />

Shortcut' on your desktop.<br />

Step 2) Install IS&T Printers (Windows XP and Vista)<br />

1. Download the IS&T Printer Installer.<br />

2. Navigate to the directory where you saved the file. Double click it to install the application.<br />

3. Setup should take anywhere from 10 - 60 seconds. You can watch the status <strong>of</strong> the installation by<br />

going to your Control Panel and opening up the printers folder.<br />

-540-


4. You will receive a success message if the printers install properly, and error message if the install<br />

fails. If you do receive an error message, please contact the systems <strong>of</strong>fice at 554-4932.<br />

Below is a list <strong>of</strong> all printers managed by IS&T Systems. Printers with an * indicate a shared device.<br />

Location<br />

Model<br />

PKI 158A* HP LaserJet 4200n (2)<br />

PKI 170*<br />

Konica Minolta Magicolor<br />

PKI 170B HP Photosmart 1215<br />

PKI 172 HP Laserjet 2200<br />

PKI 172B HP Laserjet 4050<br />

PKI 172C<br />

HP Deskjet 970cxi<br />

PKI 172C HP LaserJet 2200<br />

PKI 172E HP DeskJet 5600<br />

PKI 173A HP Laserjet 4050<br />

PKI 173C Dell 1720<br />

PKI 173D HP LaserJet 2200<br />

PKI 173E HP Officejet 6300<br />

PKI 174C<br />

HP Laserjet 2200DN<br />

PKI 174E HP LaserJet 1018<br />

PKI 174F HP Photosmart 1215<br />

PKI 174G HP PSC 2400<br />

PKI 174H HP LaserJet 4050<br />

PKI 174I HP LaserJet 2200<br />

PKI 175A HP Color Laserjet 4500<br />

PKI 175A<br />

HP Officejet G55<br />

PKI 175c<br />

HP DeskJet 970 CXi<br />

PKI 175D HP LaserJet 3330<br />

PKI 175E HP Laserjet 2100<br />

PKI 176B HP LaserJet 1022<br />

PKI 176C HP DeskJet 5100<br />

PKI 176D*<br />

Magicolor 2300DL<br />

PKI 176D<br />

Konica Minolta 2300DL<br />

PKI 176E HP LaserJet 1022<br />

PKI 177A HP Photosmart 1215<br />

PKI 177A<br />

HP LaserJet4050 Series PS<br />

PKI 177B HP OfficeJet 7400<br />

PKI 177C<br />

HP PhotoSmart C5180<br />

PKI 177D HP Laserjet 2200<br />

PKI 259* HP Laserjet 4050<br />

-541-


PKI 260* HP Laserjet 4050<br />

PKI 269*<br />

HP LaserJet 4350tn Printer<br />

PKI 274*<br />

HP Laserjet 2015DN<br />

PKI 275B<br />

HP LaserJet 1100 Series<br />

PKI 276*<br />

HP LaserJet 4350tn Printer<br />

PKI 279* HP Laserjet 4050<br />

PKI 280A*<br />

HP 4050N<br />

PKI 280B HP Laserjet 4050<br />

PKI 280C HP Color Laserjet 5500<br />

PKI 281A<br />

HP Color Laserjet 2600N<br />

PKI 281C NEC SuperScript 870<br />

PKI 281D HP Color LaserJet 1000<br />

PKI 281E<br />

Hp LaserJet 1320 Series<br />

PKI 282B HP PhotoSmart 1215<br />

PKI 282C HP LaserJet 2200<br />

PKI 282D<br />

HP Pr<strong>of</strong>essional 2000C<br />

PKI 282E HP LaserJet 2420<br />

PKI 282F HP LaserJet 2200<br />

PKI 282G<br />

HP LaserJet 2100TN<br />

PKI 282H HP LaserJet 3030<br />

PKI 282I HP LaserJet 3030<br />

PKI 283B HP PhotoSmart 1215<br />

PKI 283E<br />

HP DeskJet 895C Series<br />

PKI 284A HP PhotoSmart 1215<br />

PKI 284B HP LaserJet 1022<br />

PKI 284C HP LaserJet 1022<br />

PKI 284D hp LaserJet 1320<br />

PKI 284E HP LaserJet 2200<br />

PKI 285A HP PhotoSmart 1215<br />

PKI 286*<br />

HP Laserjet 5550 Color Printer<br />

PKI 355*<br />

HP 2100TN<br />

PKI 356B*<br />

HP LaserJet 4050 Series PS<br />

PKI 360* HP Laserjet 2420<br />

PKI 362*<br />

HP LaserJet 2420 PS<br />

PKI 375 *<br />

Sharp Color Printer<br />

PKI 378* HP LaserJet 2200<br />

PKI 391* HP Laserjet 8100<br />

-542-


College <strong>of</strong> IS&T Virtualization Report – January 2009<br />

During the summer <strong>of</strong> 2008, the PKI Foundation did a round <strong>of</strong> server upgrades for the College <strong>of</strong> IS&T, the<br />

College <strong>of</strong> Engineering, and the PKI Infrastructure group. Virtualization had started to take a foothold in the IT<br />

industry as a cost effective IT tool, so it was debated as to whether to continue using our physical server layout<br />

that we had in the past, or forge ahead with this new technology. After several in depth discussions, it was<br />

decided that all 3 entities would push forward with virtualization. This document gives a broad technical overview<br />

<strong>of</strong> the college <strong>of</strong> IS&T’s virtualization infrastructure.<br />

Virtualization S<strong>of</strong>tware<br />

VMware Infrastructure Enterprise was chosen after a product demo. It proved to be stable, flexible, and was the<br />

industry standard for x86 virtualization at the time (and still is as <strong>of</strong> this document’s publish date). VMware<br />

supports a wide variety <strong>of</strong> features that increase the performance <strong>of</strong> the virtualization farm. A brief summary <strong>of</strong><br />

these features follows:<br />

VMware Virtual Center – A centralized console for managing all aspects <strong>of</strong> the virtualization<br />

cluster.<br />

VMFS – Shared storage file system that runs over Fiber Channel or iSCSI SAN Fabrics.<br />

VMotion/SVMotion – Ability to move a live virtual machine from one ESX host to another<br />

without rebooting, downtime, or loss <strong>of</strong> data.<br />

DRS – Distributed Resource Scheduling. A service that uses VMotion to balance physical server<br />

load to provide optimum VM performance.<br />

VMware HA – A service that monitors hardware health metrics and will evacuate VMs from a<br />

host if hardware failure is eminent.<br />

VMware Consolidated Backup – An API for backup s<strong>of</strong>tware to efficiently back up virtual<br />

machines over the SAN without impacting the performance <strong>of</strong> the cluster.<br />

Performance metrics to measure bottlenecks for cluster performance to help ensure peak<br />

performance.<br />

VMware Converter Enterprise – S<strong>of</strong>tware to convert existing physical servers into virtual servers.<br />

Virtualization Hardware<br />

After reviewing configuration options, 4 Dell 2950 servers were chosen with 8 processor cores, 32GB <strong>of</strong> ram, and<br />

6x1 gigabit network connections. The servers were built with reliability and performance in mind. iSCSI was<br />

chosen as a SAN protocol as it fit into our existing network infrastructure, proved to be more cost-effective than<br />

Fiber-Channel, and is displacing Fiber-Channel as the industry standard storage protocol.<br />

PKI donated space on the EMC CLARiiON to the virtualization farm. The CLARiiON has redundant power, network,<br />

data paths, and data movers. In short, any component can fail without a SAN outage. An EMC AX4-5i was<br />

purchased as a secondary storage medium for backup.<br />

Current State<br />

At the end <strong>of</strong> the summer 2008 semester, the VMware cluster was set up and testing began. The cluster endured<br />

several tests <strong>of</strong> SAN component failure, network failure, hardware failure (memory errors, etc) and still remained<br />

-543-


stable. During the fall semester <strong>of</strong> 2008, virtualization was implemented and IS&T’s existing server infrastructure<br />

was converted over to virtual machines. IS&T maintains a few core servers outside the VMware cluster to keep<br />

vital services operating if the cluster were to suffer a complete failure.<br />

Traditionally, new server hardware requires a fresh Operating System install which lengthens the time required to<br />

implement hardware upgrades. This is no longer true and is a great benefit <strong>of</strong> Virtualization. The decoupling <strong>of</strong><br />

hardware upgrades and s<strong>of</strong>tware upgrades has greatly increased the flexibility and productivity <strong>of</strong> IS&T Systems.<br />

When the next round <strong>of</strong> hardware upgrades come through, a rolling upgrade can and will be performed. That is<br />

upgrade hardware piece by piece while keeping all the VMs operational. This significantly reduces the amount <strong>of</strong><br />

time spent on hardware upgrades and allows s<strong>of</strong>tware upgrades to be performed at a more appropriate time.<br />

Performance<br />

The virtualization cluster has performed beyond expectations. For the month <strong>of</strong> December 2008, CPU load<br />

averaged 11.3% and peaked at 30%; Memory utilization averaged 66%. The cluster currently runs 48 virtual<br />

machines (production, research, and internal R&D VMs). It is important to emphasize that for virtualization<br />

clusters to maintain optimal performance, resource utilization should peak at 80% or below.<br />

Power consumption has been drastically decreased and while metrics for SAN and network are not available, but<br />

the cluster nodes utilize only 800 watts <strong>of</strong> power total, over a 3 fold reduction in power utilization. This has also<br />

reduced the cooling requirements for the production server room. While IS&T does not directly pay for power, it<br />

is an important contribution to keeping the university utility costs down.<br />

The next section <strong>of</strong> the document will list all IS&T servers, both virtual and physical.<br />

-544-


College <strong>of</strong> IS&T Servers<br />

The Systems Staff maintains numerous servers that directly support academic and research endeavors <strong>of</strong> the<br />

College. Each server is unique in function, and customized to suit student, faculty, staff, or project needs.<br />

Production Virtual Machines (16)<br />

VM Hostname Description Contacts<br />

altiris<br />

Deployment Server: Altiris Deployment Server,<br />

Deepfreeze Enterprise Server, DHCP Services for the<br />

Network<br />

-545-<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

bfdc1 Domain Controller for the Blackforest site James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

bfdc2 Domain Controller for the Blackforest site James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

cistvss IST Systems internal SharePoint server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

exchange Mail server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

license1<br />

license2<br />

Licensing server for OPNet, MATLAB, any pooled license<br />

s<strong>of</strong>tware we have.<br />

Redundant license server for MATLAB, any pooled license<br />

s<strong>of</strong>tware we have.<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

manage Production Domain Controller, Production print server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

metis<br />

Production Domain Controller; McAfee E-Policy<br />

Orchestrator Server; Temporary license server for OPNet<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu


James Harr<br />

jharr@ist.unomaha.edu<br />

pf1 NAT Router for private network addresses James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

pf2 Redundant NAT router James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

six 2008 test domain controller Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

sus<br />

Windows Server Update Services (Manages s<strong>of</strong>tware<br />

updates for Micros<strong>of</strong>t products)<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

svn Subversion (revision control) server James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

vpn VPN Server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

windows-web Primary Production Web Server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

-546-


College <strong>of</strong> IS&T Production Non-VM Servers (112 including 56 Blackforest nodes)<br />

VM/Non-VM<br />

Hostname<br />

Short Description<br />

Contacts<br />

acm<br />

Web & Project server for the UNO ACM Association <strong>of</strong><br />

Computing Machinery Chapter<br />

-547-<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

Erin Cox tygrr.v2@gmail.com<br />

apollo Community Outreach Production Zac Fowler<br />

zfowler@unomaha.edu<br />

atticfw Community Outreach Firewall Zac Fowler<br />

zfowler@unomaha.edu<br />

azureus Course development server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

bfnfs Blackforest Cluster Network File System Server James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

biigserver Bioinformatics Development server (Non-VM) James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

biigserver2 biigserver replacement James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

biobase Bioinformatics Course and Development server (Non-VM) James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

bioshare Bioinformatics Sun Storage (Non-VM) Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

Josh Johnston<br />

mociyl@gmail.com<br />

blackforest Blackforest Cluster Web interface (Non-VM) James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

blizzard<br />

Student development server for Programming on the<br />

Internet<br />

Robert Fulkerson<br />

robert.fulkerson@gmail.com<br />

chronoscope Text Mining Lab server (Non-VM) Mohammad Shafiullah<br />

clabsvn<br />

CLAB (Collaborative Laboratory for Applied Bioinformatics)<br />

SVN server (Non-V M)<br />

mshafiullah.ne@gmail.com<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

cmjsp Chad Meyer’s Japanese study web application Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com


Chad Meyer<br />

chadmeyer001@gmail.com<br />

csalpha Computer Science server (Non-VM) Stan Wileman<br />

stanw@unomaha.edu<br />

Csalpha2 Computer Science server (Non-VM) Stan Wileman<br />

stanw@unomaha.edu<br />

Csalpha3 Computer Science server (Non-VM) Stan Wileman<br />

stanw@unomaha.edu<br />

db Community Outreach Database Server Zac Fowler<br />

zfowler@unomaha.edu<br />

callisto Community Outreach Development Server Zac Fowler<br />

zfowler@unomaha.edu<br />

df<br />

Web server for the KEWI (Knowledge Engineering and Web<br />

Intelligence) Group<br />

-548-<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

Josh Johnston<br />

mociyl@gmail.com<br />

elearning Production Faculty/Staff Streaming Media Server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

esx1 Clustered Virtual Server Farm Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

esx2 Clustered Virtual Server Farm Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

esx3 Clustered Virtual Server Farm Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

esx4 Clustered Virtual Server Farm Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

flashcom Community Outreach Streaming Media Server Zac Fowler<br />

zfowler@unomaha.edu<br />

gsaf Gene Sequence Analysis Facility legacy server at UNMC Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

hive<br />

College <strong>of</strong> IST Ubuntu, CentOS, and OpenBSD mirror (Non-<br />

VM)<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

istaudit Nessus Scanner Server Josh Johnston<br />

mociyl@gmail.com<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

James Harr<br />

jharr@ist.unomaha.edu


ist-file College <strong>of</strong> IST user network shares server (Non-VM) Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

irc Systems Administrators’ communication server James Harr<br />

jharr@ist.unomaha.edu<br />

jrt S<strong>of</strong>tware Engineering course server James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

Josh Johnston<br />

mociyl@gmail.com<br />

karp2 Dr. Chundi’s text mining research server James Harr<br />

james.harr@gmail.com<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

kitty Clone <strong>of</strong> blizzard for testing purposes Bob Fulkerson<br />

rfulk@unomaha.edu<br />

klab<br />

private Wiki for CLAB (Collaborative Laboratory for Applied<br />

Bioinformatics) (Non-VM)<br />

-549-<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

lb1 NAT Router for the Blackforest Cluster (Non-VM) James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

lb2<br />

Redundant NAT Router for the Blackforest Cluster (Non-<br />

VM)<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

mascot Web server for the Bioinformatics tool Mascot Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

missouri Community Outreach Webserver Zac Fowler<br />

zfowler@unomaha.edu<br />

mp1 Bioinformatics course server (for Mark Pauley) (Non-VM) Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

mp2 Bioinformatics course server (for Mark Pauley) (Non-VM) Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

necro Linux Server BackupPC solution James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

oracle Database course server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

padev Web server for the tool for the pattern discovery and Joe Hrabak


usage in virtual project management<br />

chrabak@mail.unomaha.edu<br />

pegasus Community Outreach Development Server Zac Fowler<br />

zfowler@unomaha.edu<br />

phpmysql<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

phylogeny<br />

Bioinformatics course<br />

server (for Dhundy Bastola)<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

rain<br />

Rheumatoid Arthritis Investigational Network web server Mohammad Shafiullah<br />

research<br />

(Non-VM)<br />

College <strong>of</strong> IST research Windows Terminal Server (Non-<br />

VM)<br />

mshafiullah.ne@gmail.com<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

sp1<br />

Motif Tools Assessment Project Development server (for<br />

Dan Quest) (Non-VM)<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

sp2<br />

Redundant Motif Tools Assessment Project Development<br />

server (for Dan Quest) (Non-VM)<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

ssp Sharepoint server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

vulcan Student Programming/Web development James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

zenoss Monitoring server Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

-550-


College <strong>of</strong> IS&T Classroom and Lab S<strong>of</strong>tware List – Spring 2009<br />

The College <strong>of</strong> IS&T has various s<strong>of</strong>tware available for faculty, staff, and student use in our classroom and labs. Applications with an * indicates site license or open source.<br />

S<strong>of</strong>tware Package 155 157 158a 158c 158k 160 161 164 260 261 269 270 276 278 279 357 359 375 383 387 391<br />

Adobe Reader* x x x x x x x x x x x x x x x x x x x x<br />

Adobe Acrobat Pr<strong>of</strong>essional 8<br />

x<br />

Adobe Creative Suite<br />

x<br />

Adobe Photoshop CS3<br />

x<br />

Adobe Creative Suite 4 Web Prem<br />

AllFusion Suite 7* x x x x x x x x x x x x x x x<br />

ArcView GIS 3.3<br />

x<br />

Camtasia Studio 5<br />

x<br />

CN 3D 4.1 x x x<br />

Clickers* x x x x x x x x x x x x x x x x x x x x<br />

Clickers PowerPoint* x x x x x x x x x x x x x x x x x x x x<br />

ColdFusion Studio<br />

x<br />

Eclipse* x x x x x x x<br />

Firefox* x x x x x x x x x x x x x x x x x x x x<br />

Flash Player* x x x x x x x x x x x x x x x x x x x x<br />

Gimp 2.0* x x x<br />

Gnu Prolog* x x x<br />

Google Earth* x x x<br />

Homesite 4.5* x x x<br />

IBM Rational Requisite Pro x x<br />

Java* x x x x x x x x x x x x x x x x x x x x<br />

Jcreator x x x<br />

Maple x x<br />

MapWin x x<br />

Matlab<br />

x<br />

Maya 7.0<br />

x<br />

McAfee Anti-Virus* x x x x x x x x x x x x x x x x x x x x<br />

Micros<strong>of</strong>t Internet Explorer* x x x x x x x x x x x x x x x x x x x x<br />

Micros<strong>of</strong>t Office 2007* x x x x x x x x x x x x x x x x x x x x<br />

Micros<strong>of</strong>t Project 2007 x x x x x x x x x x x x x x x x x x x x<br />

Micros<strong>of</strong>t Visio 2007 x x x x x x x x x x x x x x x x x x x x<br />

-551-


Micros<strong>of</strong>t Visual Studio 2005* x x x x x x x x<br />

Micros<strong>of</strong>t Visual Studio 2008* x x x x x<br />

Micros<strong>of</strong>t Visual Studio 6* x x x<br />

Micros<strong>of</strong>t Silverlight* x x x x x x x x x x x x x x x x x x x x<br />

Micros<strong>of</strong>t SQL Server x x x<br />

Multisim 7 x x x<br />

Multisim 8 x x x<br />

Netbeans IDE 5.5* x x x<br />

OpNet<br />

x<br />

Oracle x x x x x x x x x x x x x x x x x x<br />

PC Alert* x x x x x x x x x x x x x x x x x x x x<br />

Pov-Ray 3.6 x x x<br />

Primo PDF* x x x x x x x x x x x x x x x x x x x x<br />

Putty* x x x x x x x x x x x x x x x x x x x x<br />

Python* x x x x<br />

Quicktime Player* x x x x x x x x x x x x x x x x x x x x<br />

QT by Trolltech 4.1.1 x x x<br />

Real Player* x x x x x x x x x x x x x x x x x x x x<br />

SAP Front End* x x x<br />

SAS* x x x x x x<br />

See5<br />

x<br />

Shockwave Player* x x x x x x x x x x x x x x x x x x x x<br />

SPSS x x<br />

SQL Yog x x x<br />

SWI Prolog x x x x x x x x x x x x x x x<br />

Terragen x x x<br />

Visual Ham<br />

x<br />

Visual Logic x x<br />

Visual Prolog x x x<br />

WinSCP* x x x x x x x x x x x x x x x x x x x x<br />

-552-


Other S<strong>of</strong>tware Available at the College <strong>of</strong> IS&T<br />

MSDNAA<br />

The Micros<strong>of</strong>t Developer Network Academic Alliance is a program that the College <strong>of</strong> IS&T<br />

subscribes to that allows us to <strong>of</strong>fer free Micros<strong>of</strong>t s<strong>of</strong>tware to Faculty, Staff, and students that<br />

have majors or minors declared in Computer Science, MIS, Bioinformatics, and Information<br />

Assurance. Below is a current list <strong>of</strong> available s<strong>of</strong>tware. For more information, go to<br />

http://www.ist.unomaha.edu/msdnaa . If you would like to provide this to your students,<br />

please send us a class list and course number.<br />

Expression Studio<br />

Micros<strong>of</strong>t Groove 2007<br />

Micros<strong>of</strong>t InfoPath 2007<br />

Micros<strong>of</strong>t OneNote 2007<br />

Micros<strong>of</strong>t Project Pr<strong>of</strong>essional 2007<br />

Micros<strong>of</strong>t SharePoint Designer 2007<br />

Micros<strong>of</strong>t SQL Server 2005 Standard Edition - 32-bit - DVD<br />

Micros<strong>of</strong>t Visio Pr<strong>of</strong>essional 2007<br />

Micros<strong>of</strong>t Visual Studio 2008 Pr<strong>of</strong>essional<br />

Windows Server 2003 R2 Enterprise - 2 Discs<br />

Windows Server 2003 Standard Edition<br />

Windows Server 2003 Web Edition<br />

Windows Server 2008<br />

Windows Services for UNIX<br />

Windows Vista Business (32 and 64bit)<br />

Windows XP Pr<strong>of</strong>essional (32 and 64bit)<br />

-553-


College <strong>of</strong> IS&T Research Labs and Projects<br />

BioCMS<br />

Website: https://biodev.ist.unomaha.edu<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Overview:<br />

BioCMS is a prototype version <strong>of</strong> a Content Management System developed for enhancing the<br />

bioinformatics researcher experience. This project is being undertaken by the Genetic Sequence<br />

Analysis Facility at the College <strong>of</strong> IS&T at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> using WebGUI.<br />

Bioinformatics Lab<br />

Location: PKI378<br />

Director: Dr. Hesham Ali, Dean<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Equipment:<br />

5 Dell Desktops<br />

1 Mac Desktop<br />

1 Printer<br />

Flat Screen LCD TV<br />

Overview:<br />

Bioinformatics merges computer and information science with the study <strong>of</strong> genetic information and<br />

biological structures. Bioinformatics allows researchers to open new windows <strong>of</strong> insight into our genetic<br />

makeup, providing pathways to understanding disease processes and creating novel diagnostic and<br />

treatment strategies. There is an immense and growing need for experts in this field, in order to<br />

capitalize on the growing body o knowledge regarding the genome.<br />

Blackforest Cluster<br />

Location: PKI158B<br />

Director: Mike Grove<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com, James Harr –<br />

jharr@unomaha.edu<br />

Website: http://blackforest.gds.unomaha.edu/<br />

Equipment:<br />

56 IBM Servers<br />

3.2 TB Centralized Storage<br />

-554-


Overview:<br />

The Blackforest Computing Cluster was funded through the National Science Foundation's Biomedical<br />

Research Infrastructure Network, and is located in the College <strong>of</strong> Information Science and Technology at<br />

the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>. The Blackforest is one <strong>of</strong> four clusters in <strong>Nebraska</strong> funded through<br />

BRIN, each capable <strong>of</strong> utilizing the computational power <strong>of</strong> the others in times <strong>of</strong> need.<br />

Currently the Blackforest Cluster at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> consists <strong>of</strong> forty nodes, which<br />

run MPICH. MPICH is a freely available, portable implementation <strong>of</strong> MPI, the Standard for messagepassing<br />

libraries. Message passing is a paradigm used widely on certain classes <strong>of</strong> parallel machines<br />

especially those with distributed memory. There is also a proprietary web interface solution we call<br />

"Nazo". This interface allows chemical and biomedical researchers to manage their interaction with the<br />

cluster in a simple, easy to understand manner. All results are stored locally, so that researchers can<br />

retrieve any query/job run in the past. In addition, researchers can apply to house their own custom<br />

BLAST databases on the cluster, for faster searches with near real-time updatability.<br />

Chronoscope<br />

Location: PKI366<br />

Director: Dr. Parvathi Chundi<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Equipment:<br />

3 Dell Desktops<br />

1 IBM Desktop<br />

1 Server(IBM)<br />

Overview:<br />

The objective <strong>of</strong> this project is to extract temporal information by constructing several time<br />

decompositions (time points). Now we are studying the time decomposition problem in the context <strong>of</strong><br />

medical research abstracts. We extract temporal information pertaining to a disease or an organism by<br />

constructing several time decompositions <strong>of</strong> research abstracts and by correlating the meta-information<br />

associated with the abstracts. This experimental study will demonstrate the effectiveness <strong>of</strong> the time<br />

decomposition method on research journal articles in the medical domain.<br />

CMJSP<br />

Website: http://cmjsp.ist.unomaha.edu/<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Overview:<br />

This site is designed to help intermediate and advanced students <strong>of</strong> the Japanese language further<br />

develop their language skills. It works by having the user create lists <strong>of</strong> kanji or words they wish to study<br />

-555-


and then using these lists in review applets. Words can be added to lists by either directly finding words<br />

in the Dictionary, to performing queues on the database to find words that match your criteria. Once<br />

you have a list with all the words you want, go to the Review section to review it.<br />

i3Bio<br />

Website: http://i3bio.gds.unomaha.edu/<br />

Technical Contact: James Harr – jharr@unomaha.edu<br />

Overview:<br />

Advances in medicine such as organ and bone marrow transplantation have increased the number <strong>of</strong><br />

people who are immuno-compromised and susceptible to mycobacterial infections. Mycobacteria in<br />

general and Mycobacterium tuberculosis specifically are known as the great imitators in clinical<br />

medicine because the symptoms that they cause resemble numerous other diseases. The ability to<br />

detect and identify microbial pathogens rapidly for optimal patient management is limited by growthbased<br />

phenotypic testing methods now used in the microbiology laboratory. This limitation is <strong>of</strong> greatest<br />

challenge for the evaluation <strong>of</strong> those pathogens that grow slow, those that require specialized methods<br />

for detection and identification, and for those emerging pathogens that have become more common in<br />

current clinical practice. Organisms commonly associated within this group include, but are not limited<br />

to the Mycobacterium species and fungi.<br />

Cmantic Lab – Collaborative Multi-Agent Networking Technologies and<br />

Intelligent<br />

Location: PKI362<br />

Director: Dr. Raj Dasqupta<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Website: http://prithviraj.dasgupta.googlepages.com/cmanticlabpage<br />

Equipment:<br />

4 Dell Desktops<br />

1 Printer<br />

Overview:<br />

This research lab focuses on the following major topics: multi-agent systems, swarmed robotics and<br />

game theory and computational economics.<br />

Led by Dr. Raj Dasgupta, the research focus for the group is in developing technologies for coordinating<br />

individual resource-constrained components to behave collectively and collaboratively as a single, largescale<br />

distributed system. A major application is controlling a team <strong>of</strong> mobile mini-robots using multiagent<br />

algorithms. The unique contribution <strong>of</strong> this research has been to integrate market-based<br />

techniques for multi-robot coordination with swarm-based techniques for robot control.<br />

We are currently developing technologies for coordinating individual resource-constrained components<br />

-556-


to behave collectively and collaboratively as a single, large-scale distributed system. One <strong>of</strong> our major<br />

applications is controlling a team <strong>of</strong> mobile mini-robots using multi-agent algorithms to collaboratively<br />

perform complex tasks in an unknown environment. The unique contribution <strong>of</strong> our research has been<br />

to integrate market-based techniques for multi-robot coordination with swarm-based techniques for<br />

robot control.<br />

The Collaborative Multi-Agent Networking Technologies and Intelligent Coordination Lab is located at<br />

the Peter Kiewit Institute, Room 362.<br />

Data Mining Lab<br />

Location: PKI158K<br />

Director: Dr. Yong Shi<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Website: http://prithviraj.dasgupta.googlepages.com/cmanticlabpage<br />

Equipment:<br />

9 Dell Desktops<br />

Overview:<br />

The data mining research laboratory was set up by NU foundation to support research and teaching on<br />

data warehousing and data mining, and to allow students, faculty, and industry fellows to conduct<br />

application-oriented projects for analytic customer relationship management (CRM), bioinformatics and<br />

other real-world applications. The multidisciplinary nature <strong>of</strong> these projects means that the laboratory<br />

will significantly enhance the collaboration in the departments <strong>of</strong> IS&T: Computer Science and<br />

Information System and Quantitative Analysis, and between IS&T and other university units, such as the<br />

College <strong>of</strong> Engineering and Technology in the PKI building, the College <strong>of</strong> Business Administration at<br />

UNO, UNMC, and numerous business and industry for joint research and teaching activities in data<br />

mining.<br />

E-learning Lab<br />

Location: PKI357<br />

Director: Dr. Leah Pietron<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Website: http://elearning.ist.unomaha.edu<br />

Equipment:<br />

1 Dell Desktop<br />

1 Mac Desktop<br />

Web cameras<br />

Headsets with voice<br />

-557-


Overview:<br />

The E-Learning Lab is designed for faculty and staff to create classroom material (Videos/Lectures) for<br />

online and distance education.<br />

Group Decision Support Lab<br />

Location: PKI279<br />

Director: Dr. GJ deVreede<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Equipment:<br />

22 Dell Laptops<br />

1 Dell Desktop<br />

3 Projectors<br />

Overview:<br />

The Group Decision Support Lab is an active high-tech meeting room with facilities which enhance faceto-face<br />

meetings in the room, as well as computer-mediated collaborations involving participants<br />

worldwide. The lab contains presentation, display, and communication technologies which enhance the<br />

information exchange for all meeting participants. Research efforts in the Group Decision Support Lab<br />

address meeting facilitation, meeting participation, information exchange, and document collaboration.<br />

MTAP<br />

Website: http://biobase.ist.unomaha.edu<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Overview:<br />

Automated regulatory motif detection is a fundamental problem in molecular biology. Currently, there<br />

are more than 80 different tools for identification <strong>of</strong> cis-regulatory motifs. Consequently, it is extremely<br />

difficult for the molecular biologist to know which tools are effective even on the most simple <strong>of</strong><br />

genomes. A root cause <strong>of</strong> this is a lack <strong>of</strong> good datasets for benchmarking. Recently, Tompa et al. (2005)<br />

proposed a dataset and complementary benchmark for eukaryotes. In this work, we expand upon this<br />

study by introducing a complementary dataset and benchmark for Escherichia coli and Bacillus subtilis.<br />

Using RegulonDB and DBTBS as our true positives, we evaluated sensitivity, specificity and other<br />

important statistics for prokaryote motif detection programs. Even though this domain is less<br />

challenging than eukaryotes, our preliminary data shows that current motif detection programs still fall<br />

short <strong>of</strong> accurate detection <strong>of</strong> regulatory motifs in prokaryotes. We therefore believe that there is still a<br />

great opportunity for improvement in motif discovery methods.<br />

Metaverse Lab – Second Life<br />

-558-


Location: PKI374<br />

Directors: Dr. Khazanchi, Dr. Ilze Zigurs<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Website: http://slurl.com/secondlife/IS&T%20<strong>Nebraska</strong>%20<strong>Omaha</strong>/131/26/37<br />

Equipment:<br />

4 IBM Desktops<br />

1 Dell Desktop<br />

Flat Screen LCD TV<br />

Headsets<br />

Overview:<br />

Metaverses are fully immersive 3-dimensional virtual worlds in which people interact as avatars with<br />

each other and with s<strong>of</strong>tware agents, using the metaphor <strong>of</strong> the real world but without its physical<br />

limitations. The ubiquitous availability <strong>of</strong> high speed Internet access has spurred enormous interest in<br />

virtual worlds like SecondLife and World <strong>of</strong> Warcraft, both in terms <strong>of</strong> user gaming and potential as a<br />

new technological platform for global virtual collaboration. These environments allow for richer, more<br />

engaging collaboration but their capabilities have yet to be studied and explored in depth. The lab was<br />

setup with seed funding from the NU Foundation Tech Fee grant <strong>of</strong> $200,000 with the primary goal to<br />

sustain a cross-disciplinary and collaborative effort that focuses on leveraging virtual world technology<br />

capabilities for facilitating e-learning and conducting research and development in such immersive,<br />

multi-participant 3D environments. Students and faculty in the lab work on creative projects in<br />

collaboration with other UNO colleges while building on research already conducted under the<br />

supervision <strong>of</strong> Drs. Khazanchi and Zigurs over the past year. The overall research goal <strong>of</strong> the lab is to<br />

enhance virtual team and virtual project management practice in the context <strong>of</strong> these new technology<br />

environments.<br />

Multi-Media Lab<br />

Location: PKI375<br />

Technical Contact: Zac Fowler – zfowler@unomaha.edu<br />

Equipment:<br />

10 Dell Desktops<br />

5 Macintosh<br />

Keyboards<br />

Tape Decks<br />

Recording devices<br />

Modeling and Simulation Lab<br />

Location: PKI370<br />

Director: Dr. Mahadevan Subramaniam<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

-559-


Equipment:<br />

4 Dell Desktops<br />

1 Printer<br />

Overview:<br />

The Modeling, Simulation and Automated Inference Center (MOSAIC) conducts collaborative<br />

instruction, research, and development in the areas <strong>of</strong> modeling, simulation, visualization, and<br />

verification <strong>of</strong> complex interdisciplinary applications domains including transportation, public health,<br />

intelligent buildings, web, and financial data studies. The laboratory will address the following research<br />

problems that are cross-cutting across several simulation applications.<br />

<strong>Omaha</strong> Wireless<br />

Website: http://omahawireless.unomaha.edu<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Overview:<br />

<strong>Omaha</strong> Wireless Network is a grassroots effort proposed by a group <strong>of</strong> students at the <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> at <strong>Omaha</strong> to build a wireless Metropolitan Area Network (MAN) in <strong>Omaha</strong>, <strong>Nebraska</strong>, extend<br />

it to the rural areas <strong>of</strong> <strong>Nebraska</strong> and beyond. This is an attempt to provide free, ubiquitous wireless<br />

connectivity to the community. The goal is to build a self-sufficient wireless network that can be used for<br />

various services that may be found on the Internet: web, mail, chat, gaming and resource sharing. Such a<br />

network will not depend on the Internet for content or connectivity. Instead, it can work in conjunction<br />

with the Internet to supplement ways for one to better use connectivity. Users on this wireless network<br />

who wish to share their bandwidth may function as Internet Service Providers (ISPs) and provide access<br />

to the Internet.<br />

Security Technology Evaluation and Analysis Laboratories (STEAL)<br />

Location: PKI350<br />

Director: Dr. Bill Mahoney<br />

Technical Contact: Lucas Wentz – lwentz@unomaha.edu<br />

Equipment:<br />

25 Dell Desktops<br />

Internal, air gapped network<br />

Overview:<br />

The <strong>Nebraska</strong> <strong>University</strong> Consortium on Information Assurance (NUCIA) supports three labs.STEAL One is<br />

designed to be an open laboratory for students to use both for coursework and individual exploration.<br />

The lab is fully configurable, with many different operating systems and application sets to choose from.<br />

-560-


Our goal is to create a flexible environment that can be used to create or simulate any desired computing<br />

capability or environment.<br />

STEAL Two has been designed to be a hands-on instructional laboratory. It has been sized to allow entire<br />

classes (max 28 participants) to collectively engage in academic Information Assurance exercises <strong>of</strong> all<br />

kinds. As with STEAL One, the lab has been designed to be completely flexible, to allow users to simulate<br />

most any type <strong>of</strong> environment imaginable. A set <strong>of</strong> dedicated servers provides backbone services, such<br />

as DNS, DHCP, PXE, TFTP, routing, and the like. Each <strong>of</strong> these services is configurable as well, in order to<br />

allow for more accurate simulations.<br />

STEAL three is a place where NUCIA students, scholars, student workers, Etc congregate and work.<br />

Designed as a lounging area, STEAL 3 generally has a "laid-back" atmosphere where people can relax and<br />

discuss IA topics, get answers to questions from faculty and attend meetings and ad-hoc information<br />

assurance events.<br />

Statpack – (Secure telecommunications application terminal)<br />

Location: PKI364<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Director: Dr. Ann Fruhling<br />

Website: http://statpack.org/<br />

Overview:<br />

The STATPack (Secure Telecommunications Application Terminal) system is an Emergency Response<br />

system for the Public Health Microbiology Laboratories. The STATPack Laboratory is fully equipped to<br />

support this project. The laboratory has 3 client/production computer systems configured for<br />

production support and training, 4 developer work stations for programming and testing, and 3<br />

development servers with version control s<strong>of</strong>tware and server development tools for unit testing,<br />

integration testing and system testing.<br />

Winds Lab – Wireless infrastructure for networks <strong>of</strong> distributed systems<br />

Location: PKI360<br />

Director: Dr. Jong – Hoon Youn<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Website: http://motes.ist.unomaha.edu<br />

Equipment:<br />

Flat screen LCD TV<br />

5 IBM Desktops<br />

1 Mac Desktop<br />

1 Printer<br />

-561-


Overview:<br />

The Wireless Infrastructure for Networks <strong>of</strong> Distributed Sensors (WINDS) laboratory is specifically<br />

designed to include sensor network testbeds for supporting research activities for the college and other<br />

research groups in <strong>Nebraska</strong>. The main goal <strong>of</strong> the research in this lab is to provide an innovative and<br />

comprehensive research and development program that result in solutions for high-speed wireless data<br />

network connectivity problems in rural as well as urban <strong>Nebraska</strong>. In particular, the following four<br />

objectives have been identified for the lab's research efforts.<br />

Develop a wireless network laboratory with testbeds and a working prototype <strong>of</strong> a highperformance<br />

wireless data network infrastructure for supporting research, education, and<br />

services in wireless sensor networks.<br />

Investigate solutions for a number <strong>of</strong> research problems in wireless sensor networks, which have<br />

inhibited complete utilization <strong>of</strong> high-speed wireless data network technology in critical<br />

applications in agriculture, transportation and bio-security in <strong>Nebraska</strong>.<br />

Employ wireless networks solutions in various real-world applications.<br />

The Wireless Infrastructure for Networks <strong>of</strong> Distributed Sensors (WINDS) Lab is located at the Peter<br />

Kiewit Institute, Room 360.<br />

-562-


College <strong>of</strong> IS&T Websites<br />

The Systems Staff maintains numerous websites that directly support academic and research endeavors<br />

<strong>of</strong> the College. Each website is unique in function, and customized to suit student, faculty, staff, or<br />

project needs.<br />

Community Outreach/Web Development<br />

Website Description Location Contacts<br />

www.ist.unomaha.edu College <strong>of</strong> IS&T Linuxweb Roni Myers<br />

aia.ist.unomaha.edu<br />

Society <strong>of</strong> American Institute <strong>of</strong><br />

Architects - <strong>Omaha</strong> Chapter Job<br />

Shadow<br />

Linuxweb<br />

Roni Myers<br />

Kris Nelson, Leo A<br />

Daly<br />

alumni.ist.unomaha.edu College <strong>of</strong> IS&T Alumni Linuxweb Roni Myers<br />

cmi.unomaha.edu<br />

Juvenile Justice Institute Case<br />

Management Inventory System<br />

Linuxweb Roni Myers<br />

Tomas Helikar<br />

insider.ist.unomaha.edu College <strong>of</strong> IS&T Newsletter Linuxweb Roni Myers<br />

istlive.unomaha.edu IS&T Live Linuxweb Roni Myers<br />

www.lewisandclarkne.org <strong>Nebraska</strong> Lewis and Clark Linuxweb Zac Fowler<br />

Bicentennial Commission<br />

americanhistory.unomaha.edu Teaching American History for<br />

Students<br />

Linuxweb Zac Fowler, Steve<br />

Bullock<br />

tahg.org<br />

Teaching American History<br />

(MOCC)<br />

Linuxweb Zac Fowler, Steve<br />

Bullock<br />

theomahaproject.org Teaching American History (OPS) Linuxweb Zac Fowler, Steve<br />

Bullock<br />

world.unomaha.edu International Studies Website Linuxweb Zac Fowler, Deepak<br />

Khazanchi, Mary<br />

Ellen Turner<br />

lewisclarkandbeyond.com/org/net Lewis, Clark and Beyond Linuxweb Zac Fowler<br />

attic.ist.unomaha.edu IS&T Attic website Linuxweb Zac Fowler<br />

skype.ist.unomaha.edu Skype Trial Blog for IS&T College Linuxweb Zac Fowler<br />

mena.unomaha.edu IS&P MENA Exchange blog Linuxweb Zac Fowler<br />

unmcpda.ist.unomaha.edu<br />

Terrecom.ist.unomaha.edu<br />

UNMC PDA project: mobile SQL<br />

replication service and portal<br />

website<br />

Local company development<br />

website<br />

UNMCPDA<br />

Windows-web<br />

Zac Fowler, Deepak<br />

Khazanchi, Lynne<br />

Buchanan (UNMC)<br />

Roni Myers, Zac<br />

Fowler<br />

-563-


Research/Course Websites<br />

Website Description Location Contacts<br />

http://acm.ist.unomaha.edu<br />

Web server for the UNO ACM<br />

Association <strong>of</strong> Computing<br />

Machinery Chapter<br />

acm<br />

James Harr<br />

Mohammad<br />

Erin Cox<br />

http://biobase.ist.unomaha.edu<br />

https://blackforest.gds.unomaha.edu<br />

http://cmjsp.net<br />

http://gsaf.unmc.edu<br />

http://hive.ist.unomaha.edu<br />

https://jrt.ist.unomaha.edu:9443<br />

http://clab.ist.unomaha.edu<br />

http://gsaf.ist.unomaha.edu<br />

https://klab.ist.unomaha.edu<br />

http://mascot.ist.unomaha.edu/mascot<br />

http://biigserver.ist.unomaha.edu/<br />

http://ccliwiki.ist.unomaha.edu<br />

http://ccli.ist.unomaha.edu<br />

Web server hosting wiki pages<br />

for the Motif Tools<br />

Assessment Project<br />

Blackforest Cluster Web<br />

Interface<br />

Website hosting Chad<br />

Meyer’s Japanese <strong>Study</strong><br />

Program<br />

Gene Sequence Analysis<br />

Facility legacy server at UNMC<br />

hosting the GCG Seqweb<br />

website<br />

Website hosting College <strong>of</strong> IST<br />

Ubuntu, CentOS, and<br />

OpenBSD mirror<br />

IBM Rational Jazz Team<br />

Concert website for Harvey<br />

Siy’s S<strong>of</strong>tware Engineering<br />

course<br />

Public wiki website for CIST<br />

Collaborative Laboratory for<br />

Applied Bioinformatics<br />

Wiki website for the Gene<br />

Sequence Analysis Facility<br />

Internal wiki website for CIST<br />

Collaborative Laboratory for<br />

Applied Bioinformatics<br />

Website hosting the<br />

Bioinformatics tool Mascot<br />

Website hosting home pages<br />

for different Bioinformatics<br />

undergraduate, graduate and<br />

Ph.D. students.<br />

Wiki website for the<br />

Integrated Curriculum for<br />

Bioinformatics project<br />

Website for Integrated<br />

Curriculum for Bioinformatics<br />

project<br />

-564-<br />

biobase<br />

blackforest<br />

reslin<br />

gsaf<br />

hive<br />

jrt<br />

klab<br />

klab<br />

klab<br />

mascot<br />

biigserver<br />

mp1<br />

mp1<br />

Mohammad<br />

Daniel Quest<br />

James Harr<br />

Mohammad<br />

James Harr<br />

Mohammad<br />

Mohammad<br />

James Harr<br />

Mohammad<br />

Dhundy Bastola<br />

Jay Hannah<br />

Mohammad<br />

Dhundy Bastola<br />

Jay Hannah<br />

Mohammad<br />

Dhundy Bastola<br />

Jay Hannah<br />

Mohammad<br />

Mohammad<br />

James<br />

Mohammad<br />

Mark Pauley<br />

Mohammad<br />

Mark Pauley<br />

Mohammad<br />

http://ccli_test.ist.unomaha.edu Development wiki for mp1 Mark Pauley


http://mp1.ist.unomaha.edu/blast<br />

Integrated Curriculum for<br />

Bioinformatics project<br />

Website hosting the<br />

wwwblast bioinformatics tool<br />

mp1<br />

Mohammad<br />

Mark Pauley<br />

Mohammad<br />

http://mp2.ist.unomaha.edu/blast<br />

http://phylogeny.ist.unomaha.edu<br />

https:// rain.ist.unomaha.edu<br />

http://df.ist.unomaha.edu/main/<br />

Another website hosting the<br />

wwwblast bioinformatics tool<br />

Wiki website for<br />

Bioinformatics course by<br />

Dhundy Bastola<br />

Rheumatoid Arthritis<br />

Investigational Network web<br />

server<br />

Website for Knowledge<br />

Engineering and Web<br />

Intelligence project<br />

mp2<br />

phylogeny<br />

rain<br />

df<br />

Mark Pauley<br />

Mohammad<br />

Dhundy Bastola<br />

Mohammad<br />

Abhijeet Maskey<br />

Dhundy Bastola<br />

Mohammad<br />

Bill Mahoney<br />

Haifeng Guo<br />

Qiuming Zhu<br />

Ryan Nickell<br />

Matt Payne<br />

Peter Hospodka<br />

William Sousan<br />

James Harr<br />

Mohammad<br />

-565-


Production/Course Websites<br />

Website Description Location Contacts<br />

itd.ist.unomaha.edu<br />

The Journal <strong>of</strong> Information<br />

Technology for Development<br />

windows-web<br />

criwg.ist.unomaha.edu<br />

accreditation.ist.unomaha.edu<br />

Collaboration Researchers’<br />

International Workshop<br />

windows-web<br />

windows-web<br />

Joseph Hrabak, GJ<br />

deVreede<br />

Joseph Hrabak, GJ<br />

deVreede<br />

Joseph Hrabak, Peter<br />

Wolcott<br />

IS&T ABET Page<br />

windows-web Joseph Hrabak, Jerry<br />

viadesign.ist.unomaha.edu Design & Development<br />

Wagner<br />

faculty.ist.unomaha.edu Faculty pages windows-web Joseph Hrabak<br />

archive.ist.unomaha.edu ISQA Archives windows-web Joseph Hrabak<br />

Joseph Hrabak,<br />

Modeling, Simulation and<br />

Mahadevan<br />

mosaic.ist.unomaha.edu Automated Inference Center windows-web Subramaniam<br />

support.ist.unomaha.edu IS&T Systems and IT Support windows-web Joseph Hrabak<br />

Khazanchi.ist.unomaha.edu Deepak Khazanchi's homepage windows-web Joseph Hrabak<br />

cphi.ist.unomaha.edu<br />

Consortium for Publich Health<br />

Informatics<br />

windows-web<br />

Joseph Hrabak, Ann<br />

Fruhling<br />

cist.ist.unomaha.edu CIST Advisory Committee cistvss<br />

Joseph Hrabak, George<br />

Royce<br />

NWINDS.ist.unomaha.edu<br />

<strong>Nebraska</strong> Wireless Infrastructure<br />

for Networks <strong>of</strong> Distributed<br />

Sensors<br />

windows-web<br />

Mohammad Shafiullah,<br />

Jon Youn<br />

amcis2005.isqa.unomaha.edu AMCIS Conference windows-web<br />

Joseph Hrabak, Peter<br />

Wolcott<br />

gstech.ist.unomaha.edu Student workshop windows-web Joseph Hrabak<br />

sponsorsim.ist.unomaha.edu PM Simulation for Sponsors windows-web<br />

The Institute for Collaboration<br />

ics.ist.unomaha.edu<br />

Science<br />

windows-web<br />

cmit.unomaha.edu<br />

iaads.unomaha.edu<br />

Center for Management <strong>of</strong><br />

Information Technology<br />

International Academy for<br />

Advanced Decision Support<br />

windows-web<br />

windows-web<br />

Joseph Hrabak, Deepak<br />

Khazanchi<br />

Joseph Hrabak, GJ<br />

deVreede<br />

Joseph Hrabak, Deepak<br />

Khazanchi<br />

Joseph Hrabak, Jerry<br />

Wagner<br />

omahawireless.unomaha.edu <strong>Omaha</strong> Wireless Project windows-web Mohammad Shafiullah<br />

dm.ist.unomaha.edu Data Mining windows-web Joseph Hrabak, Yong Shi<br />

msdnaa.ist.unomaha.edu Micros<strong>of</strong>t Academic Alliance windows-web Joseph Hrabak<br />

isqa.unomaha.edu ISQA Departmental Site windows-web<br />

Joseph Hrabak, Paul<br />

VanVliet<br />

Joseph Hrabak, Paul<br />

istis.unomaha.edu Information Technology Council windows-web VanVliet<br />

-566-


secondlife.ist.unomaha.edu Metaverse Project windows-web Roni Myers, John Murphy<br />

misso.unomaha.edu MIS Student Group windows-web Joseph Hrabak<br />

phpmyadmin.ist.unomaha.edu PHP Admin Site windows-web Roni Myers<br />

cisco.ist.unomaha.edu Cisco Networking Course windows-web Joseph Hrabak, Bill Pulte<br />

gatech.ist.unomaha.edu Student workshop windows-web Joseph Hrabak<br />

sigitpm.ist.unomaha.edu<br />

Special Interest Group for<br />

Information Technology Project<br />

Management<br />

windows-web<br />

Joseph Hrabak, Deepak<br />

Khazanchi<br />

-567-<br />

Joseph Hrabak, Deepak<br />

Khazanchi<br />

cmit_mutual.ist.unomaha.edu Project Management windows-web<br />

cbctech.ist.unomaha.edu Summer Camp windows-web Roni Myers<br />

<strong>Nebraska</strong> Health Information<br />

nhip.ist.unomaha.edu<br />

Project<br />

windows-web<br />

divtech.ist.unomaha.edu Summer Camp windows-web Roni Myers<br />

Joseph Hrabak, Ann<br />

Fruhling<br />

mosaic.unomaha.edu Global Diffusion <strong>of</strong> the Internet windows-web<br />

Joseph Hrabak, Peter<br />

Wolcott<br />

mymail.ist.unomaha.edu CIST Exchange Email exchange Joseph Hrabak<br />

nucia.unomaha.edu NUCIA homepage helm Lucas Wentz<br />

pietron.ist.unomaha.edu Leah Pietron Course Site cistvss Joseph Hrabak<br />

Redirect for<br />

ist.unomaha.edu - manage www.ist.unomaha.edu manage Joseph Hrabak<br />

Redirect for<br />

ist.unomaha.edu - metis www.ist.unomaha.edu metis Joseph Hrabak<br />

systems.ist.unomaha.edu Systems Office Portal ssp Joseph Hrabak<br />

vulcan.ist.unomaha.edu Vulcan Server Help/FAQ vulcan<br />

sharepointdev.ist.unomaha.edu<br />

Sharepoint Portal / wolcott's<br />

class??<br />

azureus<br />

groyce.ist.unomaha.edu Groyce Sharepoint Portal azureus<br />

James Harr, Joseph<br />

Hrabak<br />

Joseph Hrabak, Peter<br />

Wolcott<br />

Joseph Hrabak, George<br />

Royce<br />

blizzard.ist.unomaha.edu Web Dev Class Server Info Page blizzard<br />

Bob Fulkerson, Joseph<br />

Hrabak<br />

elearning.ist.unomaha.edu<br />

CIST Online Class Multimedia<br />

Server elearnining Joseph Hrabak<br />

teamnet.ist.unomaha.edu Teamnet teamnet Azad, Joseph Hrabak<br />

pattern Tool for Deepak padev<br />

Joseph Hrabak, Pujak<br />

Arora<br />

Capstone Course Sharepoint<br />

Joseph Hrabak, Ann<br />

portal8950.ist.unomaha.edu<br />

portal8950b.ist.unomaha.edu<br />

squishy.ist.unomaha.edu<br />

Portal<br />

Capstone Course Sharepoint<br />

Portal<br />

Resource Site for Bob's Web<br />

Programming Class<br />

portal8950<br />

portal8950<br />

blizzard<br />

Fruhling<br />

Joseph Hrabak, Ann<br />

Fruhling<br />

Bob Fulkerson, Joseph<br />

Hrabak


Executive Memorandum No. 16<br />

Policy for Responsible Use <strong>of</strong> <strong>University</strong> Computers and Information Systems<br />

OFFICE OF THE PRESIDENT Executive Memorandum No. 16<br />

1. Purpose<br />

It is the purpose <strong>of</strong> this Executive Memorandum to set forth the <strong>University</strong>'s administrative policy and<br />

provide guidance relating to responsible use <strong>of</strong> the <strong>University</strong>'s electronic information systems.<br />

2. General<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> strives to maintain access for its faculty, staff, students, administrators and<br />

Regents (the "users") to local, national and international sources <strong>of</strong> information and to provide an<br />

atmosphere that encourages sharing <strong>of</strong> knowledge, the creative process and collaborative efforts within<br />

the <strong>University</strong>'s educational, research and public service missions. Access to electronic information<br />

systems at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> is a privilege, not a right, and must be treated as such by all users<br />

<strong>of</strong> these systems. All users must act honestly and responsibly. Every user is responsible for the integrity<br />

<strong>of</strong> these information resources. All users must respect the rights <strong>of</strong> other computer users, respect the<br />

integrity <strong>of</strong> the physical facilities and controls, and respect all pertinent license and contractual<br />

agreements related to <strong>University</strong> information systems. All users shall act in accordance with these<br />

responsibilities, and the relevant local, state and federal laws and regulations. Failure to so conduct<br />

oneself in compliance with this Policy may result in denial <strong>of</strong> access to <strong>University</strong> information systems or<br />

other disciplinary action.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> is a provider <strong>of</strong> a means to access the vast and growing amount <strong>of</strong><br />

information available through electronic information resources. The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> is not a<br />

regulator <strong>of</strong> the content <strong>of</strong> that information and takes no responsibility for the content <strong>of</strong> information,<br />

except for that information the <strong>University</strong> itself and those acting on its behalf create. Any persons<br />

accessing information through the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> information systems must determine for<br />

themselves and their charges whether any source is appropriate for viewing.<br />

Accepting any account and/or using the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>'s information systems shall constitute an<br />

agreement on behalf <strong>of</strong> the user or other individual accessing such information systems to abide and be<br />

bound by the provisions <strong>of</strong> this Policy. The <strong>University</strong> may restrict or prohibit the use <strong>of</strong> its information<br />

systems in response to complaints presenting evidence <strong>of</strong> violations <strong>of</strong> <strong>University</strong> policies or state or<br />

federal laws. When it has been determined that there has been a violation, the <strong>University</strong> may restrict<br />

or prohibit access by an <strong>of</strong>fending party to its information systems through <strong>University</strong>-owned or other<br />

computers, remove or limit access to material posted on <strong>University</strong>-owned computers or networks, and,<br />

if warranted, institute other disciplinary action.<br />

3. Definitions<br />

For purposes <strong>of</strong> this policy the following definitions shall apply:<br />

a. Electronic communications shall mean and include the use <strong>of</strong> information systems in the<br />

communicating or posting <strong>of</strong> information or material by way <strong>of</strong> electronic mail, bulletin boards,<br />

-568-


World Wide Web (internet), or other such electronic tools.<br />

b. Information systems shall mean and include computers, networks, servers and other similar devices<br />

that are administered by the <strong>University</strong> and for which the <strong>University</strong> is responsible. "Networks" shall<br />

mean and include video, voice and data networks, routers and storage devices.<br />

c. Obscene with respect to obscene material shall mean (1) that an average person applying<br />

contemporary community standards would find the material taken as a whole predominantly appeals to<br />

the prurient interest or a shameful or morbid interest in nudity, sex, or excretion, (2) the material<br />

depicts or describes in a patently <strong>of</strong>fensive way sexual conduct specifically set out in Neb. Rev. Stat. §§<br />

28-807 to 28-809, as amended, and (3) the material taken as a whole lacks serious literary, artistic,<br />

political, or scientific value.<br />

4. Permitted Uses<br />

<strong>University</strong> Business Use and Limited Personal Use.<br />

<strong>University</strong> information systems are to be used predominately for <strong>University</strong>-related business. However,<br />

personal use is permitted so long as it conforms with this Policy and does not interfere with <strong>University</strong><br />

operations or an employee user's performance <strong>of</strong> duties as a <strong>University</strong> employee. As with permitted<br />

personal use <strong>of</strong> telephones for local calls, limited personal use <strong>of</strong> information systems does not<br />

ordinarily result in additional costs to the <strong>University</strong> and may actually result in increased efficiencies.<br />

Personal use <strong>of</strong> any <strong>University</strong> information system to access, download, print, store, forward, transmit<br />

or distribute obscene material is prohibited. UNDER ALL CIRCUMSTANCES, PERSONAL USE BY<br />

EMPLOYEES MUST COMPLY WITH SUBSECTION b. OF THIS SECTION AND SHALL NOT CONFLICT WITH AN<br />

EMPLOYEE'S PERFORMANCE OF DUTIES AND RESPONSIBILITIES FOR THE UNIVERSITY. Personal use may<br />

be denied when such use requires an inordinate amount <strong>of</strong> information systems resources (e.g. storage<br />

capacity).<br />

Prior Approval Required for Personal Use for Outside Consulting, Business or Employment.<br />

Personal use <strong>of</strong> <strong>University</strong> information systems resources or equipment by any user for personal<br />

financial gain in connection with outside (non-<strong>University</strong>) consulting, business or employment is<br />

prohibited, except as authorized for employees by Section 3.4.5 <strong>of</strong> the Bylaws <strong>of</strong> the Board <strong>of</strong> Regents.<br />

Employee personal use in conjunction with outside pr<strong>of</strong>essional consulting, business or employment<br />

activities is permitted only when such use has been expressly authorized and approved by the <strong>University</strong><br />

Administration or the Board <strong>of</strong> Regents, as appropriate, in accordance with the requirements <strong>of</strong> said<br />

Section 3.4.5 <strong>of</strong> the Bylaws.<br />

5. Access<br />

Unauthorized access to information systems is prohibited. No one should use the ID or password <strong>of</strong><br />

another; nor should anyone provide his or her ID or password to another, except in the cases necessary<br />

to facilitate computer maintenance and repairs. When any user terminates his or her relation with the<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, his or her ID and password shall be denied further access to <strong>University</strong><br />

computing resources.<br />

6. Misuse <strong>of</strong> Computers and Network Systems<br />

Misuse <strong>of</strong> <strong>University</strong> information systems is prohibited. Misuse includes the following:<br />

Attempting to modify or remove computer equipment, s<strong>of</strong>tware, or peripherals without proper<br />

authorization.<br />

-569-


Accessing without proper authorization computers, s<strong>of</strong>tware, information or networks to which the<br />

<strong>University</strong> belongs, regardless <strong>of</strong> whether the resource accessed is owned by the <strong>University</strong> or the abuse<br />

takes place from a non-<strong>University</strong> site.<br />

c. Taking actions, without authorization, which interfere with the access <strong>of</strong> others to information<br />

systems.<br />

d. Circumventing logon or other security measures.<br />

e. Using information systems for any illegal or unauthorized purpose.<br />

f. Personal use <strong>of</strong> information systems or electronic communications for non-<strong>University</strong> consulting,<br />

business or employment, except as expressly authorized pursuant to Section 3.4.5 <strong>of</strong> the Bylaws <strong>of</strong> the<br />

Board <strong>of</strong> Regents.<br />

g. Sending any fraudulent electronic communication.<br />

h. Violating any s<strong>of</strong>tware license or copyright, including copying or redistributing copyrighted s<strong>of</strong>tware,<br />

without the written authorization <strong>of</strong> the s<strong>of</strong>tware owner.<br />

i. Using electronic communications to violate the property rights <strong>of</strong> authors and copyright owners. (Be<br />

especially aware <strong>of</strong> potential copyright infringement through the use <strong>of</strong> e-mail. See the provisions under<br />

"E-Mail" contained in this Policy.)<br />

j. Using electronic communications to harass or threaten users in such a way as to create an atmosphere<br />

which unreasonably interferes with the education or the employment experience. Similarly, electronic<br />

communications shall not be used to harass or threaten other information recipients, in addition to<br />

<strong>University</strong> users.<br />

k. Using electronic communications to disclose proprietary information without the explicit permission<br />

<strong>of</strong> the owner.<br />

l. Reading other users' information or files without permission.<br />

m. Academic dishonesty.<br />

n. Forging, fraudulently altering or falsifying, or otherwise misusing <strong>University</strong> or non-<strong>University</strong> records<br />

(including computerized records, permits, identification cards, or other documents or property).<br />

o. Using electronic communications to hoard, damage, or otherwise interfere with academic resources<br />

available electronically.<br />

p. Using electronic communications to steal another individual's works, or otherwise misrepresent one's<br />

own work.<br />

q. Using electronic communications to fabricate research data.<br />

r. Launching a computer worm, computer virus or other rogue program.<br />

s. Downloading or posting illegal, proprietary or damaging material to a <strong>University</strong> computer.<br />

t. Transporting illegal, proprietary or damaging material across a <strong>University</strong> network.<br />

u. Personal use <strong>of</strong> any <strong>University</strong> information system to access, download, print, store, forward, transmit<br />

or distribute obscene material.<br />

v. Violating any state or federal law or regulation in connection with use <strong>of</strong> any information system.<br />

7. Privacy<br />

a. User Privacy Not Guaranteed. When <strong>University</strong> information systems are functioning properly, a user<br />

can expect the files and data he or she generates to be private information, unless the creator <strong>of</strong> the file<br />

or data takes action to reveal it to others. Users should be aware, however, that no information system<br />

is completely secure. Persons both within and outside <strong>of</strong> the <strong>University</strong> may find ways to access files.<br />

ACCORDINGLY, THE UNIVERSITY CANNOT AND DOES NOT GUARANTEE USER PRIVACY and users should<br />

be continuously aware <strong>of</strong> this fact.<br />

-570-


. Repair and Maintenance <strong>of</strong> Equipment. Users should be aware that on occasion duly authorized<br />

<strong>University</strong> information systems technological personnel have authority to access individual user files or<br />

data in the process <strong>of</strong> performing repair or maintenance <strong>of</strong> computing equipment the <strong>University</strong> deems<br />

is reasonably necessary, including the testing <strong>of</strong> systems in order to ensure adequate storage capacity<br />

and performance for <strong>University</strong> needs. Information systems technological personnel performing repair<br />

or maintenance <strong>of</strong> computing equipment are prohibited by law from exceeding their authority <strong>of</strong> access<br />

for repair and maintenance purposes or from making any use <strong>of</strong> individual user files or data for any<br />

purpose other than repair or maintenance services performed by them.<br />

c. Response to a Public Records Request, Administrative or Judicial Order or Request for Discovery in the<br />

Course <strong>of</strong> Litigation. Users should be aware that the <strong>Nebraska</strong> public records statutes are very broad in<br />

their application. Certain records, such as unpublished research in progress, proprietary information,<br />

personal information in personnel and student records are protected from disclosure. However, most<br />

other <strong>University</strong> records contained in electronic form require disclosure if a public record request is<br />

made. Users should remember this when creating any electronic information, especially e-mail. Also,<br />

users should be aware that the <strong>University</strong> will comply with any lawful administrative or judicial order<br />

requiring the production <strong>of</strong> electronic files or data stored in the <strong>University</strong>'s information systems, and<br />

will provide information in electronic files or data stored in the <strong>University</strong>'s information systems in<br />

response to legitimate requests for discovery <strong>of</strong> evidence in litigation in which the <strong>University</strong> is involved.<br />

d. Response to Misuse <strong>of</strong> Computers and Network Systems. When for reasonable cause, as such cause<br />

may be determined by the Office <strong>of</strong> the Vice President and General Counsel, it is believed that an act <strong>of</strong><br />

misuse as defined in section 6 above has occurred, then the chief information services <strong>of</strong>ficer serving<br />

Central Administration or serving the relevant campus may access any account, file or other data<br />

controlled by the alleged violator and share such account information, file or other data with those<br />

persons authorized to investigate and implement sanctions in association with the misuse <strong>of</strong> the<br />

<strong>University</strong>'s computer and information systems. Should any <strong>of</strong> the chief information service <strong>of</strong>ficers<br />

reasonably believe that a misuse is present or imminent such that the potential for damage to the<br />

system or the information stored within it, is genuine and serious (e.g. hacking, spamming or theft), then<br />

the chief information <strong>of</strong>ficer may take such action as is necessary to protect the information system and<br />

the information stored in it, including the denial <strong>of</strong> access to any <strong>University</strong> or non-<strong>University</strong> user,<br />

without a determination from the Office <strong>of</strong> the Vice President and General Counsel regarding<br />

reasonable cause; provided however, that the chief information <strong>of</strong>ficer shall contact the Office <strong>of</strong> the<br />

Vice President and General Counsel as soon as possible to confirm that any protective actions taken<br />

were appropriate and within the parameters <strong>of</strong> this executive memorandum. Executive Memorandum No. 16<br />

-571-


e. Access to Information Concerning Business Operations. Employees regularly carry out the business<br />

functions <strong>of</strong> the <strong>University</strong> using the <strong>University</strong>'s information systems. business records, inquiries and<br />

correspondence are <strong>of</strong>ten stored such that individuals may control the access to particular information<br />

stored within the <strong>University</strong>'s information system. Should any employee become unavailable, be<br />

incapacitated due to illness or other reasons, or refuse to provide the information necessary to carry out<br />

the employee's job responsibilities in a reasonably timely manner, then following consultation with and<br />

approval by the Office <strong>of</strong> the Vice President and General Counsel, the chief information <strong>of</strong>ficer <strong>of</strong> Central<br />

Administration or <strong>of</strong> the relevant campus may access the employee's records in order to carry out<br />

<strong>University</strong> business operations on behalf <strong>of</strong> the unavailable or uncooperative employee.<br />

8. E-mail<br />

a. Applicability. ALL POLICIES STATED HEREIN ARE APPLICABLE TO E-MAIL. E-mail should reflect careful,<br />

pr<strong>of</strong>essional and courteous drafting-particularly since it is easily forwarded to others. Never assume that<br />

only the addressee will read your e-mail. Be careful about attachments and broad publication messages.<br />

Copyright laws and license agreements also apply to e-mail.<br />

b. E-mail Retention. E-mail messages should be deleted once the information contained in them is no<br />

longer useful. When e-mail communications are sent, the e-mail information is stored in one or more<br />

backup files for the purposes <strong>of</strong> "disaster recovery", i.e. inadvertent or mistaken deletions, system<br />

failures. In order to provide for the recovery <strong>of</strong> deleted e-mail, while maintaining efficient use <strong>of</strong> storage<br />

capabilities, e-mail information on backup files shall be retained for a period <strong>of</strong> time not to exceed seven<br />

days.<br />

9. Web Pages<br />

The Central Administration and each <strong>University</strong> campus may establish standards for those Web Pages<br />

considered to be "<strong>of</strong>ficial" pages <strong>of</strong> the <strong>University</strong>. All <strong>of</strong>ficial Web Pages shall contain the administrative<br />

unit's logo in the header and footer in order to identify it as an <strong>of</strong>ficial <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Web Page.<br />

No other Web Pages shall be allowed to use <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> logos without the express<br />

permission <strong>of</strong> the <strong>University</strong>.<br />

Originators <strong>of</strong> all Web Pages using information systems associated with the <strong>University</strong> shall comply with<br />

<strong>University</strong> policies and are responsible for complying with all federal, state and local laws and<br />

regulations, including copyright laws, obscenity laws, laws relating to libel, slander and defamation, and<br />

laws relating to piracy <strong>of</strong> s<strong>of</strong>tware.<br />

The persons creating a Web Page are responsible for the accuracy <strong>of</strong> the information contained in the<br />

Web Page. Content should be reviewed on a timely basis to assure continued accuracy. Web Pages<br />

should include a phone number or e-mail address <strong>of</strong> the person to whom questions/comments may be<br />

addressed, as well as the most recent revision date.<br />

10. Notification<br />

This Policy shall be published in all employee and faculty handbooks and student catalogs, and placed on<br />

the World Wide Web in order to fully notify users <strong>of</strong> its existence.<br />

11. Application and Enforcement<br />

-572-


This Policy applies to all administrative units <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>. The Central Administration<br />

and each <strong>University</strong> campus is encouraged to provide supplemental policy guidance, consistent with this<br />

Policy, designed to implement the provisions herein.<br />

Each <strong>University</strong> campus shall be responsible for enforcing this Policy in a manner best suited to its own<br />

organization. It is expected that enforcement will require cooperation between such departments as<br />

computer systems administration, human resources, affirmative action, academic affairs and student<br />

affairs. Prior to any denial <strong>of</strong> access or other disciplinary action, a user shall be provided with such due<br />

process as may be recommended by the <strong>University</strong>'s Office <strong>of</strong> the General Counsel.<br />

Reference: August 28, 2001<br />

-573-


IS&T Systems Policies, Procedures, and Guidelines for<br />

Technology Usage<br />

**All policies and guidelines are for internal usage only, and act as an extension <strong>of</strong> and remain<br />

subordinate to Executive Memorandum 16<br />

Guidelines on Anti-Virus Processes<br />

Recommended processes to prevent virus problems:<br />

Always run the standard, supported anti-virus (McAfee) s<strong>of</strong>tware is available from the download<br />

site. Download and run the current version; download and install anti-virus s<strong>of</strong>tware updates as<br />

they become available.<br />

NEVER open any files or macros attached to an email from an unknown, suspicious or<br />

untrustworthy source. Delete these attachments immediately, then "double delete" them by<br />

emptying your Trash.<br />

Delete spam, chain, and other junk email without forwarding, in accordance with the<br />

<strong>University</strong>'s Computer Usage Policy .<br />

Never download files from unknown or suspicious sources.<br />

Avoid direct disk sharing with read/write access unless there is absolutely a business<br />

requirement to do so.<br />

Always scan a media (floppy disks, CD-ROMs, DVD-ROMs, USB devices) from an unknown source<br />

for viruses before using it.<br />

Back-up critical data and system configurations on a regular basis and store the data in a safe<br />

place.<br />

If lab testing conflicts with anti-virus s<strong>of</strong>tware, run the anti-virus utility to ensure a clean<br />

machine, disable the s<strong>of</strong>tware, and then run the lab test. After the lab test, enable the anti-virus<br />

s<strong>of</strong>tware. When the anti-virus s<strong>of</strong>tware is disabled, do not run any applications that could<br />

transfer a virus, e.g., email or file sharing.<br />

New viruses are discovered almost every day. Periodically check your anti-virus s<strong>of</strong>tware for<br />

updates.<br />

-574-


Automatically Forwarded Email Policy<br />

1.0 Purpose<br />

To prevent the unauthorized or inadvertent disclosure <strong>of</strong> sensitive company information.<br />

2.0 Scope<br />

This policy covers automatic email forwarding, and thereby the potentially inadvertent transmission <strong>of</strong><br />

sensitive information by all employees, vendors, and agents operating on behalf <strong>of</strong> the College <strong>of</strong><br />

Information Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>.<br />

3.0 Policy<br />

Employees must exercise utmost caution when sending any email from inside the College <strong>of</strong> Information<br />

Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> to an outside network. Unless approved<br />

by an employee's manager, email will not be automatically forwarded to an external destination.<br />

Sensitive information, as defined in the Information Sensitivity Policy, will not be forwarded via any<br />

means, unless that email is critical to business and is encrypted.<br />

4.0 Definitions<br />

Terms<br />

Email<br />

SMTP.<br />

Forwarded email<br />

Definitions<br />

The electronic transmission <strong>of</strong> information through a mail protocol such as<br />

Programs such as Eudora and Micros<strong>of</strong>t Outlook use SMTP.<br />

Email resent from internal networking to an outside point.<br />

Sensitive information Information is considered sensitive if it can be damaging to the College <strong>of</strong><br />

Information Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> or its reputation or standing.<br />

Unauthorized Disclosure The intentional or unintentional revealing <strong>of</strong> restricted information to<br />

people who do not have a need to know that information.<br />

-575-


Database Password Policy<br />

1.0 Purpose<br />

This policy states the requirements for securely storing and retrieving database usernames and<br />

passwords (i.e., database credentials) for use by a program that will access a database running on one <strong>of</strong><br />

the College <strong>of</strong> Information Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>’s networks.<br />

Computer programs running on the College <strong>of</strong> Information Science and Technology at the <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> <strong>Omaha</strong>'s networks <strong>of</strong>ten require the use <strong>of</strong> one <strong>of</strong> the many internal database servers. In<br />

order to access one <strong>of</strong> these databases, a program must authenticate to the database by presenting<br />

acceptable credentials. The database privileges that the credentials are meant to restrict can be<br />

compromised when the credentials are improperly stored.<br />

2.0 Scope<br />

This policy applies to all s<strong>of</strong>tware that will access a College <strong>of</strong> Information Science and Technology at the<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> multi-user production database.<br />

3.0 Policy<br />

3.1 General<br />

In order to maintain the security <strong>of</strong> the College <strong>of</strong> Information Science and Technology at the <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>'s internal databases, access by s<strong>of</strong>tware programs must be granted only after<br />

authentication with credentials. The credentials used for this authentication must not reside in the<br />

main, executing body <strong>of</strong> the program's source code in clear text. Database credentials must not be<br />

stored in a location that can be accessed through a web server.<br />

3.2 Specific Requirements<br />

3.2.1. Storage <strong>of</strong> Data Base User Names and Passwords<br />

Database user names and passwords may be stored in a file separate from the executing body <strong>of</strong><br />

the program's code. This file must not be world readable.<br />

Database credentials may reside on the database server. In this case, a hash number identifying<br />

the credentials may be stored in the executing body <strong>of</strong> the program's code.<br />

Database credentials may be stored as part <strong>of</strong> an authentication server (i.e., an entitlement<br />

directory), such as an LDAP server used for user authentication. Database authentication may<br />

occur on behalf <strong>of</strong> a program as part <strong>of</strong> the user authentication process at the authentication<br />

server. In this case, there is no need for programmatic use <strong>of</strong> database credentials.<br />

Database credentials may not reside in the documents tree <strong>of</strong> a web server.<br />

Pass through authentication (i.e., Oracle OPS$ authentication) must not allow access to the<br />

database based solely upon a remote user's authentication on the remote host.<br />

Passwords or pass phrases used to access a database must adhere to the Password Policy.<br />

3.2.2. Retrieval <strong>of</strong> Database User Names and Passwords<br />

If stored in a file that is not source code, then database user names and passwords must be read<br />

from the file immediately prior to use. Immediately following database authentication, the<br />

memory containing the user name and password must be released or cleared.<br />

-576-


The scope into which you may store database credentials must be physically separated from the<br />

other areas <strong>of</strong> your code, e.g., the credentials must be in a separate source file. The file that<br />

contains the credentials must contain no other code but the credentials (i.e., the user name and<br />

password) and any functions, routines, or methods that will be used to access the credentials.<br />

For languages that execute from source code, the credentials' source file must not reside in the<br />

same browse able or executable file directory tree in which the executing body <strong>of</strong> code resides.<br />

3. Access to Database User Names and Passwords<br />

Every program or every collection <strong>of</strong> programs implementing a single business function must<br />

have unique database credentials. Sharing <strong>of</strong> credentials between programs is not allowed.<br />

Database passwords used by programs are system-level passwords as defined by the Password<br />

Policy.<br />

Developer groups must have a process in place to ensure that database passwords are<br />

controlled and changed in accordance with the Password Policy. This process must include a<br />

method for restricting knowledge <strong>of</strong> database passwords to a need-to-know basis.<br />

4.0 Definitions<br />

Term<br />

Definition<br />

Computer language A language used to generate programs.<br />

Credentials<br />

Something you know (e.g., a password or pass phrase), and/or something that<br />

identifies you (e.g., a user name, a fingerprint, voiceprint, retina print). Something you know and<br />

something that identifies you are presented for authentication.<br />

Entitlement<br />

The level <strong>of</strong> privilege that has been authenticated and authorized. The privileges<br />

level at which to access resources.<br />

Executing body<br />

program.<br />

Hash<br />

The series <strong>of</strong> computer instructions that the computer executes to run a<br />

An algorithmically generated number that identifies a datum or its location.<br />

LDAP<br />

Lightweight Directory Access Protocol, a set <strong>of</strong> protocols for accessing<br />

information directories.<br />

Module<br />

A collection <strong>of</strong> computer language instructions grouped together either logically<br />

or physically. A module may also be called a package or a class, depending upon which computer<br />

language is used.<br />

Name space<br />

A logical area <strong>of</strong> code in which the declared symbolic names are known and<br />

outside <strong>of</strong> which these names are not visible.<br />

Production<br />

implemented or tested.<br />

Ethics Policy<br />

S<strong>of</strong>tware that is being used for a purpose other than when s<strong>of</strong>tware is being<br />

-577-


1. Overview<br />

The College <strong>of</strong> Information Science and Technology systems staff at the <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> <strong>Omaha</strong>’s purpose for this ethics policy is to establish a culture <strong>of</strong> openness, trust<br />

and integrity in business practices. Effective ethics is a team effort involving the<br />

participation and support <strong>of</strong> every systems employee. All employees should familiarize<br />

themselves with the ethics guidelines that follow this introduction.<br />

The systems staff is committed to protecting employees, partners, vendors and the company<br />

from illegal or damaging actions by individuals, either knowingly or unknowingly. When the<br />

systems staff addresses issues proactively and uses correct judgment, it will help set us apart<br />

from competitors.<br />

The College <strong>of</strong> Information Science and Technology will not tolerate any wrongdoing or<br />

impropriety at anytime. We will take the appropriate measures act quickly in correcting the<br />

issue if the ethical code is broken. Any infractions <strong>of</strong> this code <strong>of</strong> ethics will not be tolerated.<br />

2. Purpose<br />

Our purpose for authoring a publication on ethics is to emphasize the employee’s and<br />

consumer’s expectation to be treated to fair business practices. This policy will serve to<br />

guide business behavior to ensure ethical conduct.<br />

3. Scope<br />

This policy applies to employees, contractors, consultants, temporaries, and other workers at<br />

College <strong>of</strong> Information Science and Technology systems staff, including all personnel<br />

affiliated with third parties.<br />

4. Policy<br />

4.1. Executive Commitment to Ethics<br />

4.1.1. Managers within College <strong>of</strong> Information Science and Technology systems staff<br />

must set a prime example. In any business practice, honesty and integrity must be<br />

top priority for executives.<br />

4.1.2. Executives must have an open door policy and welcome suggestions and concerns<br />

from employees. This will allow employees to feel comfortable discussing any<br />

issues and will alert executives to concerns within the work force.<br />

4.1.3. Executives must disclose any conflict <strong>of</strong> interests regard their position within<br />

College <strong>of</strong> Information Science and Technology.<br />

4.2. Employee Commitment to Ethics<br />

4.2.1. The College <strong>of</strong> Information Science and Technology systems employees will treat<br />

everyone fairly, have mutual respect, promote a team environment and avoid the<br />

intent and appearance <strong>of</strong> unethical or compromising practices.<br />

4.2.2. Every employee needs to apply effort and intelligence in maintaining ethics value.<br />

4.2.3. Employees must disclose any conflict <strong>of</strong> interests regard their position within the<br />

College <strong>of</strong> Information Science and Technology.<br />

4.2.4. Employees will help to increase customer and vendor satisfaction by providing<br />

quality product s and timely response to inquiries.<br />

4.3. Company Awareness<br />

-578-


4.3.1. Promotion <strong>of</strong> ethical conduct within interpersonal communications <strong>of</strong> employees<br />

will be rewarded.<br />

4.3.2. The College <strong>of</strong> Information Science and Technology systems staff will promote a<br />

trustworthy and honest atmosphere to reinforce the vision <strong>of</strong> ethics within the<br />

organization.<br />

4.4. Maintaining Ethical Practices<br />

4.4.1. The College <strong>of</strong> Information Science and Technology systems staff will reinforce<br />

the importance <strong>of</strong> the integrity message and the tone will start at the top. Every<br />

employee, manager, director needs consistently maintain an ethical stance and<br />

support ethical behavior.<br />

4.4.2. Systems employees should encourage open dialogue, get honest feedback and<br />

treat everyone fairly, with honesty and objectivity.<br />

4.4.3. College <strong>of</strong> Information Science and Technology systems staff has established a<br />

best practice disclosure committee to make sure the ethical code is delivered to all<br />

employees and that concerns regarding the code can be addressed.<br />

4.5. Unethical Behavior<br />

4.5.1. Systems employees will avoid the intent and appearance <strong>of</strong> unethical or<br />

compromising practice in relationships, actions and communications.<br />

4.5.2. Harassment or discrimination will not be tolerated.<br />

4.5.3. Unauthorized use <strong>of</strong> company trade secrets & marketing, operational, personnel,<br />

financial, source code, & technical information integral to the success <strong>of</strong> our<br />

organization will not be tolerated.<br />

4.5.4. College <strong>of</strong> Information Science and Technology will not permit impropriety at any<br />

time and we will act ethically and responsibly in accordance with laws.<br />

4.5.5. Systems employees will not use organizational assets or business relationships for<br />

personal use or gain.<br />

-579-


Extranet Policy<br />

1.0 Purpose<br />

This document describes the policy under which third party organizations connect to College <strong>of</strong><br />

Information Science and Technology networks for the purpose <strong>of</strong> transacting business related to the<br />

College <strong>of</strong> Information Science and Technology.<br />

2.0 Scope<br />

Connections between third parties that require access to non-public College <strong>of</strong> Information Science and<br />

Technology resources fall under this policy, regardless <strong>of</strong> whether a Telco circuit (such as frame relay or<br />

ISDN) or VPN technology is used for the connection. Connectivity to third parties such as the Internet<br />

Service Providers (ISPs) that provide Internet access for the College <strong>of</strong> Information Science and<br />

Technology or to the Public Switched Telephone Network does NOT fall under this policy.<br />

3.0 Policy<br />

3.1 Pre-Requisites<br />

3.1.1 Security Review<br />

All new extranet connectivity will go through a security review with the College <strong>of</strong> Information Science<br />

and Technology’s system staff. The reviews are to ensure that all access matches the business<br />

requirements in a best possible way, and that the principle <strong>of</strong> least access is followed.<br />

3.1.2 Third Party Connection Agreement<br />

All new connection requests between third parties and the College <strong>of</strong> Information Science and<br />

Technology require that the third party and the College <strong>of</strong> Information Science and Technology<br />

representatives agree to and sign the Third Party Agreement. This agreement must be signed by<br />

management <strong>of</strong> the Sponsoring Organization as well as a representative from the third party who is<br />

legally empowered to sign on behalf <strong>of</strong> the third party. The signed document is to be kept on file with<br />

the relevant extranet group. Documents pertaining to connections into College <strong>of</strong> Information Science<br />

and Technology labs are to be kept on file with the College <strong>of</strong> Information Science and Technology’s<br />

systems staff.<br />

3.1.3 Business Case<br />

All production extranet connections must be accompanied by a valid business justification, in writing,<br />

that is approved by a project manager in the extranet group. Lab connections must be approved by the<br />

College <strong>of</strong> Information Science and Technology. Typically this function is handled as part <strong>of</strong> the Third<br />

Party Agreement.<br />

3.1.4 Point Of Contact<br />

The Sponsoring Organization must designate a person to be the Point <strong>of</strong> Contact (POC) for the extranet<br />

connection. The POC acts on behalf <strong>of</strong> the Sponsoring Organization, and is responsible for those portions<br />

<strong>of</strong> this policy and the Third Party Agreement that pertain to it. In the event that the POC changes, the<br />

relevant extranet Organization must be informed promptly.<br />

3.2 Establishing Connectivity<br />

-580-


Sponsoring Organizations within the College <strong>of</strong> Information Science and Technology that wish to<br />

establish connectivity to a third party are to file a new site request with the proper extranet group. The<br />

extranet group will engage College <strong>of</strong> Information Science and Technology systems staff to address<br />

security issues inherent in the project. The Sponsoring Organization must provide full and complete<br />

information as to the nature <strong>of</strong> the proposed access to the extranet group and the College <strong>of</strong><br />

Information Science and Technology, as requested.<br />

All connectivity established must be based on the least-access principle, in accordance with the<br />

approved business requirements and the security review. In no case will the College <strong>of</strong> Information<br />

Science and Technology rely upon the third party to protect the College <strong>of</strong> Information Science and<br />

Technology’s network or resources.<br />

3.3 Modifying or Changing Connectivity and Access<br />

All changes in access must be accompanied by a valid business justification, and are subject to security<br />

review. Changes are to be implemented via corporate change management process. The Sponsoring<br />

Organization is responsible for notifying the extranet management group and/or the College <strong>of</strong><br />

Information Science and Technology when there is a material change in their originally provided<br />

information so that security and connectivity evolve accordingly.<br />

3.4 Terminating Access<br />

When access is no longer required, the Sponsoring Organization within the College <strong>of</strong> Information<br />

Science and Technology must notify the extranet team responsible for that connectivity, which will then<br />

terminate the access. This may mean a modification <strong>of</strong> existing permissions up to terminating the circuit,<br />

as appropriate. The extranet and lab security teams must conduct an audit <strong>of</strong> their respective<br />

connections on an annual basis to ensure that all existing connections are still needed, and that the<br />

access provided meets the needs <strong>of</strong> the connection. Connections that are found to be depreciated,<br />

and/or are no longer being used to conduct College <strong>of</strong> Information Science and Technology business,<br />

will be terminated immediately. Should a security incident or a finding that a circuit has been<br />

deprecated and is no longer being used to conduct the College <strong>of</strong> Information Science and Technology<br />

business necessitate a modification <strong>of</strong> existing permissions, or termination <strong>of</strong> connectivity, the College<br />

<strong>of</strong> Information Science and Technology and/or the extranet team will notify the POC or the Sponsoring<br />

Organization <strong>of</strong> the change prior to taking any action.<br />

4.0 Definitions<br />

Terms<br />

Definitions<br />

Circuit<br />

For the purposes <strong>of</strong> this policy, circuit refers to the method <strong>of</strong> network access,<br />

whether it's through traditional ISDN, Frame Relay etc., or via VPN/Encryption technologies.<br />

Sponsoring Organization The organization who requested that the third party have access into<br />

the College <strong>of</strong> Information Science and Technology.<br />

Third Party<br />

A business that is not a formal or subsidiary part <strong>of</strong> the College <strong>of</strong> Information<br />

Science and Technology.<br />

-581-


Information Sensitivity Policy<br />

1.0 Purpose<br />

The Information Sensitivity Policy is intended to help employees determine what information can be<br />

disclosed to non-employees, as well as the relative sensitivity <strong>of</strong> information that should not be<br />

disclosed outside <strong>of</strong> the College <strong>of</strong> Information Science and Technology without proper authorization.<br />

The information covered in these guidelines includes, but is not limited to, information that is either<br />

stored or shared via any means. This includes: electronic information, information on paper, and<br />

information shared orally or visually (such as telephone and video conferencing).<br />

All system employees should familiarize themselves with the information labeling and handling<br />

guidelines that follow this introduction. It should be noted that the sensitivity level definitions were<br />

created as guidelines and to emphasize common sense steps that you can take to protect College <strong>of</strong><br />

Information Science and Technology Confidential information (e.g., Confidential information should not<br />

be left unattended in conference rooms).<br />

Please Note: The impact <strong>of</strong> these guidelines on daily activity should be minimal.<br />

Questions about the proper classification <strong>of</strong> a specific piece <strong>of</strong> information should be addressed to your<br />

manager. Questions about these guidelines should be addressed to the College <strong>of</strong> Information Science<br />

and Technology systems manager.<br />

2.0 Scope<br />

All College <strong>of</strong> Information Science and Technology information is categorized into two main<br />

classifications:<br />

College <strong>of</strong> Information Science and Technology Public<br />

College <strong>of</strong> Information Science and Technology Confidential<br />

College <strong>of</strong> Information Science and Technology Public information is information that has been declared<br />

public knowledge by someone with the authority to do so, and can freely be given to anyone without<br />

any possible damage to the College <strong>of</strong> Information Science and Technology.<br />

College <strong>of</strong> Information Science and Technology Confidential contains all other information. It is a<br />

continuum, in that it is understood that some information is more sensitive than other information, and<br />

should be protected in a more secure manner. Included is information that should be protected very<br />

closely, such as student information, development programs, and other information integral to the<br />

success <strong>of</strong> the organization. Also included in College <strong>of</strong> Information Science and Technology Confidential<br />

is information that is less critical, such as telephone directories, general corporate information,<br />

personnel information, etc..<br />

A subset <strong>of</strong> College <strong>of</strong> Information Science and Technology Confidential information is “College <strong>of</strong><br />

Information Science and Technology Third Party Confidential" information. This is confidential<br />

information belonging or pertaining to another corporation which has been entrusted to the College <strong>of</strong><br />

Information Science and Technology by that company under non-disclosure agreements and other<br />

contracts. Examples <strong>of</strong> this type <strong>of</strong> information include everything from joint development efforts to<br />

vendor lists, customer orders, and supplier information. Information in this category ranges from<br />

-582-


extremely sensitive to information about the fact that we've connected a supplier / vendor into the<br />

College <strong>of</strong> Information Science and Technology's network to support our operations.<br />

College <strong>of</strong> Information Science and Technology personnel are encouraged to use common sense<br />

judgment in securing College <strong>of</strong> Information Science and Technology Confidential information to the<br />

proper extent. If an employee is uncertain <strong>of</strong> the sensitivity <strong>of</strong> a particular piece <strong>of</strong> information, he/she<br />

should contact their manager<br />

3.0 Policy<br />

The Sensitivity Guidelines below provides details on how to protect information at varying sensitivity<br />

levels. Use these guidelines as a reference only, as College <strong>of</strong> Information Science and Technology<br />

Confidential information in each column may necessitate more or less stringent measures <strong>of</strong> protection<br />

depending upon the circumstances and the nature <strong>of</strong> the College <strong>of</strong> Information Science and Technology<br />

Confidential information in question.<br />

3.1 Minimal Sensitivity: General organizational information; some personnel and technical<br />

information<br />

Marking guidelines for information in hardcopy or electronic form.<br />

Note: any <strong>of</strong> these markings may be used with the additional annotation <strong>of</strong> "3rd Party<br />

Confidential".<br />

Marking is at the discretion <strong>of</strong> the owner or custodian <strong>of</strong> the information. If marking is desired,<br />

the words "College <strong>of</strong> Information Science and Technology Confidential" may be written or<br />

designated in a conspicuous place on or in the information in question. Other labels that may be<br />

used include "College <strong>of</strong> Information Science and Technology Proprietary" or similar labels at<br />

the discretion <strong>of</strong> your individual business unit or department. Even if no marking is present,<br />

College <strong>of</strong> Information Science and Technology information is presumed to be "College <strong>of</strong><br />

Information Science and Technology Confidential" unless expressly determined to be College <strong>of</strong><br />

Information Science and Technology Public information by a College <strong>of</strong> Information Science and<br />

Technology employee with authority to do so.<br />

Access: College <strong>of</strong> Information Science and Technology employees, contractors, people with a<br />

business need to know.<br />

Distribution within the College <strong>of</strong> Information Science and Technology: Standard inter<strong>of</strong>fice<br />

mail approved electronic mail and electronic file transmission methods.<br />

Distribution outside <strong>of</strong> College <strong>of</strong> Information Science and Technology internal mail: U.S. mail<br />

and other public or private carriers approved electronic mail and electronic file transmission<br />

methods.<br />

Electronic distribution: No restrictions except that it is sent to only approved recipients.<br />

Storage: Keep from view <strong>of</strong> unauthorized people; erase whiteboards, do not leave in view on<br />

tabletop. Machines should be administered with security in mind. Protect from loss; electronic<br />

information should have individual access controls where possible and appropriate.<br />

Disposal/Destruction: Deposit outdated paper information in specially marked disposal bins on<br />

College <strong>of</strong> Information Science and Technology premises; electronic data should be<br />

expunged/cleared. Reliably erase or physically destroy media.<br />

-583-


Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil<br />

and/or criminal prosecution to the full extent <strong>of</strong> the law.<br />

3.2 More Sensitive: Business, financial, technical, and most personnel information<br />

Marking guidelines for information in hardcopy or electronic form.<br />

Note: any <strong>of</strong> these markings may be used with the additional annotation <strong>of</strong> "3rd Party<br />

Confidential". As the sensitivity level <strong>of</strong> the information increases, you may, in addition or instead<br />

<strong>of</strong> marking the information " College <strong>of</strong> Information Science and Technology Confidential" or<br />

“College <strong>of</strong> Information Science and Technology Proprietary", wish to label the information "<br />

College <strong>of</strong> Information Science and Technology Internal Use Only" or other similar labels at the<br />

discretion <strong>of</strong> your individual business unit or department to denote a more sensitive level <strong>of</strong><br />

information. However, marking is discretionary at all times.<br />

Access: College <strong>of</strong> Information Science and Technology employees and non-employees with<br />

signed non-disclosure agreements who have a business need to know.<br />

Distribution within the College <strong>of</strong> Information Science and Technology: Standard inter<strong>of</strong>fice<br />

mail approved electronic mail and electronic file transmission methods.<br />

Distribution outside <strong>of</strong> College <strong>of</strong> Information Science and Technology internal mail: Sent via<br />

U.S. mail or approved private carriers.<br />

Electronic distribution: No restrictions to approved recipients within the College <strong>of</strong> Information<br />

Science and Technology, but should be encrypted or sent via a private link to approved<br />

recipients outside <strong>of</strong> College <strong>of</strong> Information Science and Technology premises.<br />

Storage: Individual access controls are highly recommended for electronic information.<br />

Disposal/Destruction: In specially marked disposal bins on College <strong>of</strong> Information Science and<br />

Technology premises; electronic data should be expunged/cleared. Reliably erase or physically<br />

destroy media.<br />

Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil<br />

and/or criminal prosecution to the full extent <strong>of</strong> the law.<br />

3.3 Most Sensitive: Trade secrets & marketing, operational, personnel, financial, source code, &<br />

technical information integral to the success <strong>of</strong> our company<br />

Marking guidelines for information in hardcopy or electronic form.<br />

Note: any <strong>of</strong> these markings may be used with the additional annotation <strong>of</strong> "3rd Party<br />

Confidential". To indicate that College <strong>of</strong> Information Science and Technology Confidential<br />

information is very sensitive, you may should label the information “College <strong>of</strong> Information<br />

Science and Technology Internal: Registered and Restricted", " College <strong>of</strong> Information Science<br />

and Technology Eyes Only", " College <strong>of</strong> Information Science and Technology Confidential" or<br />

similar labels at the discretion <strong>of</strong> your individual business unit or department. Once again, this<br />

type <strong>of</strong> College <strong>of</strong> Information Science and Technology Confidential information need not be<br />

marked, but users should be aware that this information is very sensitive and be protected as<br />

such.<br />

-584-


Access: Only those individuals (College <strong>of</strong> Information Science and Technology employees and<br />

non-employees) designated with approved access and signed non-disclosure agreements.<br />

Distribution within the College <strong>of</strong> Information Science and Technology: Delivered direct -<br />

signature required, envelopes stamped confidential, or approved electronic file transmission<br />

methods.<br />

Distribution outside <strong>of</strong> College <strong>of</strong> Information Science and Technology internal mail: Delivered<br />

direct; signature required; approved private carriers.<br />

Electronic distribution: No restrictions to approved recipients within the College <strong>of</strong> Information<br />

Science and Technology, but it is highly recommended that all information be strongly<br />

encrypted.<br />

Storage: Individual access controls are very highly recommended for electronic information.<br />

Physical security is generally used, and information should be stored in a physically secured<br />

computer.<br />

Disposal/Destruction: Strongly Encouraged: In specially marked disposal bins on College <strong>of</strong><br />

Information Science and Technology premises; electronic data should be expunged/cleared.<br />

Reliably erase or physically destroy media.<br />

Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil<br />

and/or criminal prosecution to the full extent <strong>of</strong> the law.<br />

4.0 Definitions<br />

Terms and Definitions<br />

Appropriate measures<br />

To minimize risk to the College <strong>of</strong> Information Science and Technology from an outside business<br />

connection. College <strong>of</strong> Information Science and Technology computer use by competitors and<br />

unauthorized personnel must be restricted so that, in the event <strong>of</strong> an attempt to access College <strong>of</strong><br />

Information Science and Technology information, the amount <strong>of</strong> information at risk is minimized.<br />

Configuration <strong>of</strong> College <strong>of</strong> Information Science and Technology -to-other business connections<br />

Connections shall be set up to allow other businesses to see only what they need to see. This involves<br />

setting up both applications and network configurations to allow access to only what is necessary.<br />

Delivered Direct; Signature Required<br />

Do not leave in inter<strong>of</strong>fice mail slot; call the mail room for special pick-up <strong>of</strong> mail.<br />

Approved Electronic File Transmission Methods<br />

Includes supported FTP clients and Web browsers.<br />

Envelopes Stamped Confidential<br />

You are not required to use a special envelope. Put your document(s) into an inter<strong>of</strong>fice envelope, seal<br />

it, address it, and stamp it confidential.<br />

Approved Electronic Mail<br />

Includes all mail systems supported by the College <strong>of</strong> Information Science and Technology systems staff.<br />

These include, but are not necessarily limited to, Lotus Notes and Micros<strong>of</strong>t Exchange. If you have a<br />

business need to use other mailers contact the appropriate support organization.<br />

-585-


Approved Encrypted email and files<br />

Techniques include the use <strong>of</strong> DES and PGP. DES encryption is available via many different public domain<br />

packages on all platforms. PGP use within the College <strong>of</strong> Information Science and Technology is done via<br />

a license. Please contact the appropriate support organization if you require a license.<br />

Company Information System Resources<br />

Company Information System Resources include, but are not limited to, all computers, their data and<br />

programs, as well as all paper information and any information at the Internal Use Only level and above.<br />

Expunge<br />

To reliably erase or expunge data on a PC or Mac you must use a separate program to overwrite data,<br />

supplied as a part <strong>of</strong> Norton Utilities. Otherwise, the PC or Mac's normal erasure routine keeps the data<br />

intact until overwritten. The same thing happens on UNIX machines, but data is much more difficult to<br />

retrieve on UNIX systems.<br />

Individual Access Controls<br />

Individual Access Controls are methods <strong>of</strong> electronically protecting files from being accessed by people<br />

other than those specifically designated by the owner. On UNIX machines, this is accomplished by<br />

careful use <strong>of</strong> the chmod command (use man chmod to find out more about it). On Mac’s and PC's, this<br />

includes using passwords on screensavers, such as Disklock.<br />

Insecure Internet Links<br />

Insecure Internet Links are all network links that originate from a locale or travel over lines that are not<br />

totally under the control <strong>of</strong> the College <strong>of</strong> Information Science and Technology.<br />

Encryption<br />

International issues regarding encryption are complex. Follow organizational guidelines on export<br />

controls on cryptography, and consult your manager and/or corporate legal services for further<br />

guidance.<br />

One Time Password Authentication<br />

One Time Password Authentication on Internet connections is accomplished by using a onetime<br />

password token to connect to College <strong>of</strong> Information Science and Technology's internal network over<br />

the Internet. Contact the systems staff for more information on how to set this up.<br />

Physical Security<br />

Physical security means either having actual possession <strong>of</strong> a computer at all times, or locking the<br />

computer in an unusable state to an object that is immovable. Methods <strong>of</strong> accomplishing this include<br />

having a special key to unlock the computer so it can be used, thereby ensuring that the computer<br />

cannot be simply rebooted to get around the protection. If it is a laptop or other portable computer,<br />

never leave it alone in a conference room, hotel room or on an airplane seat, etc. Make arrangements to<br />

lock the device in a hotel safe, or take it with you. In the <strong>of</strong>fice, always use a lockdown cable. When<br />

leaving the <strong>of</strong>fice for the day, secure the laptop and any other sensitive material in a locked drawer or<br />

cabinet.<br />

Private Link<br />

-586-


A Private Link is an electronic communications path that the College <strong>of</strong> Information Science and<br />

Technology has control over its entire distance. For example, all College <strong>of</strong> Information Science and<br />

Technology networks are connected via a private link.<br />

-587-


Lab Anti-Virus Policy<br />

1.0 Purpose<br />

To establish requirements which must be met by all computers connected to College <strong>of</strong> Information<br />

Science and Technology (IS&T) lab networks to ensure effective virus detection and prevention.<br />

2.0 Scope<br />

This policy applies to all IS&T lab computers that are PC-based or utilize PC-file directory sharing. This<br />

includes, but is not limited to, desktop computers, laptop computers, file/ftp/tftp/proxy servers, and any<br />

PC based lab equipment such as traffic generators.<br />

3.0 Policy<br />

All IS&T PC-based lab computers must have IS&T 's standard, supported anti-virus s<strong>of</strong>tware installed<br />

(McAfee) and scheduled to run at regular intervals. In addition, the anti-virus s<strong>of</strong>tware and the virus<br />

pattern files must be kept up-to-date. Virus-infected computers must be removed from the network<br />

until they are verified as virus-free. Systems Managers are responsible for creating procedures that<br />

ensure anti-virus s<strong>of</strong>tware is run at regular intervals, and computers are verified as virus-free. Any<br />

activities with the intention to create and/or distribute malicious programs into IS&T networks (e.g.,<br />

viruses, worms, Trojan horses, e-mail bombs, etc.) are prohibited, in accordance with the Computer Use<br />

Policy.<br />

Refer to IS&T 's Anti-Virus Recommended Processes to help prevent virus problems.<br />

Noted exceptions: Machines with operating systems other than those based on Micros<strong>of</strong>t products are<br />

exceptions at the current time.<br />

-588-


Password Policy<br />

1.0 Overview<br />

Passwords are an important aspect <strong>of</strong> computer security. They are the front line <strong>of</strong> protection for user<br />

accounts. A poorly chosen password may result in the compromise <strong>of</strong> the College <strong>of</strong> Information Science<br />

and Technology's (IS&T) entire corporate network. As such, all IS&T employees (including contractors<br />

and vendors with access to IS&T systems) are responsible for taking the appropriate steps, as outlined<br />

below, to select and secure their passwords.<br />

2.0 Purpose<br />

The purpose <strong>of</strong> this policy is to establish a standard for creation <strong>of</strong> strong passwords, the protection <strong>of</strong><br />

those passwords, and the frequency <strong>of</strong> change.<br />

3.0 Scope<br />

The scope <strong>of</strong> this policy includes all personnel who have or are responsible for an account (or any form<br />

<strong>of</strong> access that supports or requires a password) on any system that resides at any IS&T facility, has<br />

access to the IS&T network, or stores any non-public IS&T information.<br />

4.0 Policy<br />

4.1 General<br />

All system-level passwords (e.g., root, enable, NT admin, application administration accounts,<br />

etc.) must be changed on at least a quarterly basis.<br />

All production system-level passwords must be part <strong>of</strong> the IS&T administered global password<br />

management database.<br />

All user-level passwords (e.g., email, web, desktop computer, etc.) must be changed at least<br />

every six months. The recommended change interval is every four months.<br />

User accounts that have system-level privileges granted through group memberships or<br />

programs such as "sudo" must have a unique password from all other accounts held by that<br />

user.<br />

Passwords must not be inserted into email messages or other forms <strong>of</strong> electronic<br />

communication.<br />

Where SNMP is used, the community strings must be defined as something other than the<br />

standard defaults <strong>of</strong> "public," "private" and "system" and must be different from the passwords<br />

used to log in interactively. A keyed hash must be used where available (e.g., SNMPv2).<br />

All user-level and system-level passwords must conform to the guidelines described below.<br />

4.2 Guidelines<br />

A. General Password Construction Guidelines<br />

Passwords are used for various purposes at the IS&T. Some <strong>of</strong> the more common uses include: user level<br />

accounts, web accounts, email accounts, screen saver protection, voicemail password, and local router<br />

logins. Since very few systems have support for one-time tokens (i.e., dynamic passwords which are only<br />

used once), everyone should be aware <strong>of</strong> how to select strong passwords.<br />

Poor, weak passwords have the following characteristics:<br />

The password contains less than eight characters<br />

-589-


The password is a word found in a dictionary (English or foreign)<br />

The password is a common usage word such as:<br />

o Names <strong>of</strong> family, pets, friends, co-workers, fantasy characters, etc.<br />

o Computer terms and names, commands, sites, companies, hardware, s<strong>of</strong>tware.<br />

o The words "UNO", " IS&T ", "<strong>Omaha</strong>", “password” or any derivation.<br />

o Birthdays and other personal information such as addresses and phone numbers.<br />

o Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc.<br />

o Any <strong>of</strong> the above spelled backwards.<br />

o Any <strong>of</strong> the above preceded or followed by a digit (e.g., secret1, 1secret)<br />

o Blank password<br />

Strong passwords have the following characteristics:<br />

Contain both upper and lower case characters (e.g., a-z, A-Z)<br />

Have digits and punctuation characters as well as letters e.g., 0-9, !@#$%^&*()_+|~-<br />

=\`{}[]:";'?,./)<br />

Are at least eight alphanumeric characters long and is a passphrase (Ohmy1stu9).<br />

Is not a word in any language, slang, dialect, jargon, etc.<br />

Are not based on personal information, names <strong>of</strong> family, etc.<br />

Passwords should never be written down or stored on-line. Try to create passwords that can be<br />

easily remembered. One way to do this is create a password based on a song title, affirmation,<br />

or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and<br />

the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.<br />

NOTE: Do not use either <strong>of</strong> these examples as passwords!<br />

B. Password Protection Standards<br />

Do not use the same password for IS&T accounts as for other non- IS&T access (e.g., personal ISP<br />

account, option trading, benefits, etc.). Where possible, don't use the same password for various IS&T<br />

access needs. Select a separate password to be used for an NT account and a UNIX account.<br />

Do not share IS&T passwords with anyone, including administrative assistants or secretaries. All<br />

passwords are to be treated as sensitive, Confidential IS&T information.<br />

Here is a list <strong>of</strong> "dont's":<br />

Don't reveal a password over the phone to ANYONE<br />

Don't reveal a password in an email message<br />

Don't reveal a password to the boss<br />

Don't talk about a password in front <strong>of</strong> others<br />

Don't hint at the format <strong>of</strong> a password (e.g., "my family name")<br />

Don't reveal a password on questionnaires or security forms<br />

Don't share a password with family members<br />

Don't reveal a password to co-workers while on vacation<br />

-590-


If someone demands a password, refer them to this document or have them call someone in the<br />

Information Security Department.<br />

Do not use the "Remember Password" feature <strong>of</strong> applications (e.g., Lotus Notes, Outlook, and Netscape<br />

Messenger).<br />

Again, do not write passwords down and store them anywhere in your <strong>of</strong>fice. Do not store passwords in<br />

a file on ANY computer system (including Palm Pilots or similar devices) without encryption.<br />

Change passwords at least once every six months (except system-level passwords which must be<br />

changed quarterly). The recommended change interval is every four months.<br />

If an account or password is suspected to have been compromised, report the incident to IS&T systems<br />

managers and change all passwords.<br />

C. Application Development Standards<br />

Application developers must ensure their programs contain the following security precautions.<br />

Applications:<br />

should support authentication <strong>of</strong> individual users, not groups.<br />

should not store passwords in clear text or in any easily reversible form.<br />

should provide for some sort <strong>of</strong> role management, such that one user can take over the<br />

functions <strong>of</strong> another without having to know the other's password.<br />

should support TACACS+ , RADIUS and/or X.509 with LDAP security retrieval, wherever possible.<br />

5.0 Definitions<br />

Terms<br />

Definitions<br />

Application Administration Account Any account that is for the administration <strong>of</strong> an application<br />

(e.g., Oracle database administrator, ISSU administrator).<br />

-591-


Personal Communication Devices and Voicemail Policy<br />

1.0 Purpose<br />

This document describes Information Security's requirements for Personal Communication Devices and<br />

Voicemail for the College <strong>of</strong> Information Science and Technology. (IS&T)<br />

2.0 Scope<br />

This policy applies to any use <strong>of</strong> Personal Communication Devices and IS&T Voicemail issued by IS&T or<br />

used for IS&T business.<br />

3.0 Policy<br />

3.1 Issuing Policy<br />

Personal Communication Devices (PCDs) will be issued only to IS&T personnel with duties that require<br />

them to be in immediate and frequent contact when they are away from their normal work locations.<br />

For the purpose <strong>of</strong> this policy, PCDs are defined to include handheld wireless devices, cellular<br />

telephones, laptop wireless cards and pagers. Effective distribution <strong>of</strong> the various technological devices<br />

must be limited to persons for whom the productivity gained is appropriate in relation to the costs<br />

incurred.<br />

Handheld wireless devices may be issued, for operational efficiency, to IS&T personnel who need to<br />

conduct immediate, critical IS&T business. These individuals generally are at the executive and<br />

management level. In addition to verbal contact, it is necessary that they have the capability to review<br />

and have documented responses to critical issues.<br />

3.2 Bluetooth<br />

Hands-free enabling devices, such as the Bluetooth, may be issued to authorized IS&T personnel who<br />

have received approval. Care must be taken to avoid being recorded when peering Bluetooth adapters,<br />

Bluetooth 2.0 Class 1 devices have a range <strong>of</strong> 330 feet.<br />

3.3 Voicemail<br />

Voicemail boxes may be issued to IS&T personnel who require a method for others to leave messages<br />

when they are not available. Voicemail boxes must be protected by a PIN which must never be the<br />

same as the last four digits <strong>of</strong> the telephone number <strong>of</strong> the voicemail box.<br />

3.4 Loss and Theft<br />

Files containing confidential or sensitive data may not be stored in PCDs unless protected by approved<br />

encryption. Confidential or sensitive data shall never be stored on a personal PCD. Charges for repair<br />

due to misuse <strong>of</strong> equipment or misuse <strong>of</strong> services may be the responsibility <strong>of</strong> the employee, as<br />

determined on a case-by-case basis. The cost <strong>of</strong> any item beyond the standard authorized equipment is<br />

also the responsibility <strong>of</strong> the employee. Lost or stolen equipment must immediately be reported.<br />

3.5 Personal Use<br />

PCDs and voicemail are issued for IS&T business. Personal is allowed but should be limited.<br />

3.6 PCD Safety<br />

-592-


Conducting telephone calls or utilizing PCDs while driving can be a safety hazard. Drivers should use<br />

PCDs while parked or out <strong>of</strong> the vehicle. If employees must use a PCD while driving, IS&T requires the<br />

use <strong>of</strong> hands-free enabling devices.<br />

4.0 Definitions<br />

Term<br />

Bluetooth<br />

Definition<br />

Bluetooth is an industrial specification for wireless personal area networks<br />

(PANs), also known as IEEE 802.15.1. Bluetooth provides a way to connect<br />

and exchange information between devices such as personal digital<br />

assistants (PDAs), and mobile phones via a secure, globally unlicensed<br />

short-range radio frequency. Source: Wikipedia<br />

Confidential or sensitive data All data that is not approved for public release shall be considered<br />

confidential or sensitive.<br />

-593-


Power Outage Policy and Procedures for Production Systems<br />

I. Current Building Situation During a Power Outage<br />

a. A pair <strong>of</strong> 40kVA battery backup units operating in parallel will maintain power to the<br />

equipment located in: 158B, 158R, 166, 158C, 158A, and the building keycard security<br />

system.<br />

b. The building’s emergency generator should cut in automatically during a power outage.<br />

However, the transfer switch appears to be incorrectly installed, which requires an<br />

occasional manual start.<br />

c. Building blast/fire doors will close during a power outage<br />

d. Faculty wall power outlets are not on UPS or generator power by default.<br />

e. Backup cooling units located in server rooms are NOT on the UPS, and will disengage<br />

when power fails.<br />

II.<br />

Policies and Priorities<br />

a. The following priorities are to be maintained during a power outage:<br />

1. A monitoring device inside the 158R server room that will collect critical<br />

operating environment and status data will be active at all times. This unit<br />

must have keyboard, mouse, and display access maintained at all times.<br />

2. Power to Primary and Backup Domain Controllers must be maintained at all<br />

times, unless operational failure is imminent due to environmental conditions.<br />

3. Power to Domain Name Servers must be maintained at all times, unless<br />

operational failure due to environmental conditions is imminent.<br />

4. Power to File Servers must be maintained for 30 minutes past the start <strong>of</strong> the<br />

outage, to allow faculty, staff, and students, time to save any open files.<br />

5. Power to E-mail servers must be maintained at all times, unless operational<br />

failure due to environmental conditions is imminent.<br />

6. Power to Certificate Servers must be maintained at all times, unless<br />

operational failure is imminent due to environmental conditions.<br />

7. All other production servers not mentioned above will be shut down 15<br />

minutes after the start <strong>of</strong> the power outage, following the defined<br />

procedures.<br />

b. The following personnel are to be notified immediately at the onset <strong>of</strong> a power outage.<br />

Notification should be <strong>of</strong> an automatic nature, provided by a monitoring service:<br />

1. Senior Systems Managers<br />

2. Production Systems Managers<br />

3. Research Systems Managers<br />

c. The following personnel are to direct the implementation <strong>of</strong> procedures during a power<br />

outage. These personnel are listed in order <strong>of</strong> required response:<br />

1. Assistant Production Systems Managers<br />

2. Senior Production Systems Managers<br />

-594-


3. College Computing Director/Dean’s Office<br />

d. In the event that insufficient College personnel are available to respond to the power<br />

outage, the Senior Systems Manager for the College <strong>of</strong> Engineering Technology should<br />

be contacted by the Senior Production Systems Managers to request aid.<br />

e. Each individually cooled environment (i.e. 158B, 158R, etc) should remain isolated from<br />

the remainder <strong>of</strong> the cooled environments for as long as possible.<br />

f. When power is restored to the building, a waiting period <strong>of</strong> 5 minutes should be<br />

observed to ensure that a subsequent power failure will not occur.<br />

g. When powering up equipment after a power failure, the following priorities should be<br />

observed. Each category should be completely restored before the next category is<br />

begun.<br />

1. Network Infrastructure<br />

2. Primary Domain Controllers<br />

3. Backup Domain Controllers<br />

4. Domain Name Servers<br />

5. File Servers<br />

6. E-mail and Certificate Servers<br />

7. All other systems<br />

h. After power failure ends, e-mail notification should be sent to all students, faculty, and<br />

staff to alert them to the occurrence. Systems Managers should prioritize data and<br />

system recovery over all other assignments for a minimum <strong>of</strong> two hours after a power<br />

failure.<br />

III.<br />

Procedures for Power Outages<br />

These procedures are intended to be followed in order by the person assuming<br />

responsibility during a power outage.<br />

1. Facilities Management and Planning should be notified <strong>of</strong> the outage. If not during<br />

normal working hours (8:00 a.m. to 6:00 p.m.) Campus Security should be notified.<br />

During notification, manual verification <strong>of</strong> the generator’s start should be requested.<br />

2. All College Production and Research Managers should be notified <strong>of</strong> the outage.<br />

3. CET Systems managers should be notified <strong>of</strong> the outage.<br />

4. Wide-area notification mechanisms should be utilized to notify Faculty, Staff and<br />

Students connected to College computing resources <strong>of</strong> the imminent shutdown <strong>of</strong> those<br />

resources, and the time frame for that shutdown. Notifications should be repeated<br />

every 15 minutes during the wait/notification period.<br />

5. Alternative cooling mechanisms should be located and brought to standby positions<br />

near all critical locations. The following locations have priority in the following order:<br />

o 158G – UPS Battery Room<br />

o 158R – Production Systems Server room<br />

o 158B – Research Systems Room<br />

-595-


6. After the required notification and wait period, all non-critical systems should be<br />

powered down.<br />

7. After the required notification and wait period, all File Servers should be shut down.<br />

8. Environmental factors within the monitored areas should be constantly watched. If<br />

environmental conditions continue to deteriorate, alternate cooling mechanisms should<br />

be implemented.<br />

9. Should dangerous conditions occur, a notification/wait period <strong>of</strong> 15 minutes should be<br />

instituted. Should dangerous conditions continue, affected critical systems should be<br />

powered down in the following order:<br />

o Backup Domain Controllers<br />

o E-mail and Certificate Servers<br />

o Domain Name Servers and Primary Domain Controllers.<br />

10. Upon Power restoration, systems should be restored according to policy.<br />

11. All Systems manager should be notified <strong>of</strong> the end <strong>of</strong> the outage.<br />

12. Notification should be sent to all Faculty, Staff, and Students, detailing the power<br />

outage, the duration, and any known effects <strong>of</strong> the outage, including damaged<br />

equipment and procedures for reporting problems to the Systems Office.<br />

13. For a minimum <strong>of</strong> two hours following the outage, Systems Repair Priority should be<br />

allocated to data and systems recovery first.<br />

14. A report should be sent from the responsible systems manager to the rest <strong>of</strong> the<br />

systems managers detailing the outage, duration, effects, and any suggested changes to<br />

better respond to future outages.<br />

-596-


Server Malware Protection Policy<br />

1.0 Overview: The College <strong>of</strong> Information Science and Technology (IS&T) is entrusted with the<br />

responsibility to provide pr<strong>of</strong>essional management <strong>of</strong> clients servers as outlined in each <strong>of</strong> the contracts<br />

with its customers. Inherent in this responsibility is an obligation to provide appropriate protection<br />

against malware threats, such as viruses and spyware applications. Effective implementation <strong>of</strong> this<br />

policy will limit the exposure and effect <strong>of</strong> common malware threats to the systems they cover.<br />

2.0 Purpose: The purpose <strong>of</strong> this policy is to outline which server systems are required to have antivirus<br />

and/or anti-spyware applications.<br />

3.0 Scope: This policy applies to all servers that IS&T is responsible to manage. This explicitly includes<br />

any system for which IS&T has a contractual obligation to administer. This also includes all server<br />

systems setup for internal use by IS&T staff, regardless <strong>of</strong> whether IS&T retains administrative obligation<br />

or not.<br />

4.0 Policy: IS&T operations staff will adhere to this policy to determine which servers will have antivirus<br />

and/or anti-spyware applications installed on them and to deploy such applications as appropriate.<br />

4.1 ANTI-VIRUS<br />

All servers MUST have an anti-virus application installed that <strong>of</strong>fers real-time scanning protection to files<br />

and applications running on the target system if they meet one or more <strong>of</strong> the following conditions:<br />

Non-administrative users have remote access capability<br />

The system is a file server<br />

NBT/Micros<strong>of</strong>t Share access is open to this server from systems used by non-administrative<br />

users<br />

HTTP/FTP access is open from the Internet<br />

Other “risky” protocols/applications are available to this system from the Internet at the<br />

discretion <strong>of</strong> the IS&T systems managers<br />

All servers SHOULD have an anti-virus application installed that <strong>of</strong>fers real-time scanning protection to<br />

files and applications running on the target system if they meet one or more <strong>of</strong> the following conditions:<br />

Outbound web access is available from the system<br />

4.2 MAIL SERVER ANTI-VIRUS<br />

If the target system is a mail server it MUST have either an external or internal anti-virus scanning<br />

application that scans all mail destined to and from the mail server. Local anti-virus scanning<br />

applications MAY be disabled during backups if an external anti-virus application still scans inbound<br />

emails while the backup is being performed.<br />

4.3 ANTI-SPYWARE<br />

All servers MUST have an anti-spyware application installed that <strong>of</strong>fers real-time protection to the target<br />

system if they meet one or more <strong>of</strong> the following conditions:<br />

Any system where non-technical or non-administrative users have remote access to the<br />

system and ANY outbound access is permitted to the Internet<br />

-597-


Any system where non-technical or non-administrative users have the ability to install<br />

s<strong>of</strong>tware on their own<br />

4.4 NOTABLE EXCEPTIONS<br />

An exception to the above standards will generally be granted with minimal resistance and<br />

documentation if one <strong>of</strong> the following notable conditions apply to this system:<br />

The system is a SQL server<br />

The system is used as a dedicated mail server<br />

The system is not a Windows based platform<br />

5.0 Definitions:<br />

TERM DEFINITION<br />

Server For purposes <strong>of</strong> this policy, a server is any computer system residing in the physically<br />

secured data center owned and operated by IS&T. In addition, this includes any system<br />

running an operating system specifically intended for server usage as defined by the<br />

IS&T systems staff that has access to internal secure networks. This includes, but is not<br />

limited to, Micros<strong>of</strong>t Server 2000 and all permutations, Micros<strong>of</strong>t Server 2003 and all<br />

permutations, any Linux/Unix based operating systems, and MAC operating systems<br />

that external users are expected to regularly connect to and VMS.<br />

Malware<br />

Spyware<br />

S<strong>of</strong>tware designed to infiltrate or damage a computer system without the owner's<br />

informed consent. It is a blend <strong>of</strong> the words "malicious" and "s<strong>of</strong>tware". The expression<br />

is a general term used by computer pr<strong>of</strong>essionals to mean a variety <strong>of</strong> forms <strong>of</strong> hostile,<br />

intrusive, or annoying s<strong>of</strong>tware or program code.<br />

Broad category <strong>of</strong> s<strong>of</strong>tware designed to intercept or take partial control <strong>of</strong> a computer's<br />

operation without the informed consent <strong>of</strong> that machine's owner or legitimate user.<br />

While the term taken literally suggests s<strong>of</strong>tware that surreptitiously monitors the user, it<br />

has also come to refer more broadly to s<strong>of</strong>tware that subverts the computer's operation<br />

for the benefit <strong>of</strong> a third party.<br />

Anti-virus S<strong>of</strong>tware<br />

Consists <strong>of</strong> computer programs that attempt to identify, thwart and eliminate computer<br />

viruses and other malicious s<strong>of</strong>tware (malware).<br />

-598-


Server Security Policy<br />

1.0 Purpose<br />

The purpose <strong>of</strong> this policy is to establish standards for the base configuration <strong>of</strong> internal server<br />

equipment that is owned and/or operated by the College <strong>of</strong> Information Science and Technology. (IS&T)<br />

Effective implementation <strong>of</strong> this policy will minimize unauthorized access to IS&T proprietary<br />

information and technology.<br />

2.0 Scope<br />

This policy applies to server equipment owned and/or operated by IS&T, and to servers registered under<br />

any IS&T -owned internal network domain.<br />

This policy is specifically for equipment on the internal IS&T network. For secure configuration <strong>of</strong><br />

equipment external to IS&T on the DMZ, refer to the Internet DMZ Equipment Policy.<br />

3.0 Policy<br />

3.1 Ownership and Responsibilities<br />

All internal servers deployed at IS&T must be owned by an operational group that is responsible for<br />

system administration. Approved server configuration guides must be established and maintained by<br />

each operational group, based on business needs and approved by IS&T Director <strong>of</strong> IT. Operational<br />

groups should monitor configuration compliance and implement an exception policy tailored to their<br />

environment. Each operational group must establish a process for changing the configuration guides,<br />

which includes review and approval by the IS&T Director <strong>of</strong> IT.<br />

Servers must be registered within the corporate enterprise management system. At a minimum,<br />

the following information is required to positively identify the point <strong>of</strong> contact:<br />

o Server contact(s) and location, and a backup contact<br />

o Hardware and Operating System/Version<br />

o Main functions and applications, if applicable<br />

Information in the enterprise management system must be kept up-to-date.<br />

Configuration changes for production servers must follow the appropriate change management<br />

procedures.<br />

3.2 General Configuration Guidelines<br />

Operating System configuration should be in accordance with approved systems guidelines.<br />

Services and applications that will not be used must be disabled where practical.<br />

Access to services should be logged and/or protected through access-control methods, when<br />

possible.<br />

The most recent security patches must be installed on the system as soon as practical, the only<br />

exception being when immediate application would interfere with business requirements.<br />

Trust relationships between systems are a security risk, and their use should be avoided. Do not<br />

use a trust relationship when some other method <strong>of</strong> communication will do.<br />

Always use standard security principles <strong>of</strong> least required access to perform a function.<br />

Do not use root when a non-privileged account will do.<br />

-599-


If a methodology for secure channel connection is available (i.e., technically feasible), privileged<br />

access must be performed over secure channels, (e.g., encrypted network connections using<br />

SSH or IPSec).<br />

Servers should be physically located in an access-controlled environment.<br />

Servers are specifically prohibited from operating from uncontrolled cubicle areas.<br />

3.3 Monitoring<br />

All security-related events on critical or sensitive systems must be logged and audit trails saved<br />

as follows:<br />

o All security related logs will be kept online for a minimum <strong>of</strong> 1 week.<br />

o Daily incremental backups will be retained for at least 1 month.<br />

o Weekly full backups <strong>of</strong> logs will be retained for at least 1 month.<br />

o Monthly full backups will be retained for a minimum <strong>of</strong> 2 years.<br />

Security-related events will be reported to IS&T systems managers, who will review logs and<br />

report incidents to the IS&T Director <strong>of</strong> IT. Corrective measures will be prescribed as needed.<br />

Security-related events include, but are not limited to:<br />

o Port-scan attacks<br />

o Evidence <strong>of</strong> unauthorized access to privileged accounts<br />

o Anomalous occurrences that are not related to specific applications on the host.<br />

3.4 Compliance<br />

Audits will be performed on a regular basis by authorized organizations within the College.<br />

Audits will be managed by the IS&T systems managers, in accordance with the Audit Policy.<br />

Every effort will be made to prevent audits from causing operational failures or disruptions.<br />

Audits will not be used for purposes <strong>of</strong> scanning faculty, staff, and student personal data.<br />

4.0 Definitions<br />

Term<br />

DMZ<br />

Server<br />

Definition<br />

De-militarized Zone. A network segment external to the corporate production network.<br />

For purposes <strong>of</strong> this policy, a Server is defined as an internal IS&T Server. Desktop<br />

machines and Lab equipment are not relevant to the scope <strong>of</strong> this policy.<br />

-600-


Teaching Assistant, Graduate Assistant, PhD Student, and Student<br />

Worker Acceptable Computer Use Policy<br />

The positions this document is directed towards are by their nature desirable and prestigious positions<br />

for students to hold. This also implies that the positions are only awarded to those students who have<br />

the maturity to also bear the responsibility implied in these positions. This document enacts into<br />

College policy those responsible behaviors before signing this policy. After signing this policy,<br />

responsible behavior will be expected. The College <strong>of</strong> Information Science and Technology, in many<br />

cases, provides student workers, graduate assistants, PhD students, and teaching assistants with a<br />

computer to use in the normal course <strong>of</strong> performing their day to day work. These computers are<br />

provided for the express purpose <strong>of</strong> performing College business. College computer users should be<br />

aware these are not personal systems, but rather are intended as utility systems that will be used in<br />

many cases by several people during a given day. IN the interest <strong>of</strong> providing a reliable service and one<br />

in which College computer users are abiding by ethical standards and the laws in effect where this<br />

computer use takes place, this acceptable us policy has been implemented. These policies are not<br />

intended for computers used in research projects or by Faculty. Student users <strong>of</strong> <strong>University</strong> computer<br />

systems agree to the following conditions. Failure to comply with this agreement and the documents<br />

reference in this agreement will result in loss <strong>of</strong> access to these systems and/or services, and possible<br />

other disciplinary or legal action.<br />

May not use these systems to harass or threaten individuals or groups or to create a hostile<br />

environment.<br />

May not store or transfer copyrighted material without the consent or public release by the<br />

legal owner <strong>of</strong> that material, including but not limited to s<strong>of</strong>tware, pictures, video, audio, and<br />

written material as defined by the United States Copyright Office in this document:<br />

http://lcweb.loc.gov/copyright<br />

May not access or attempt to access computing resources without proper authorization,<br />

including unauthorized use <strong>of</strong> someone’s account and password.<br />

May not send or present potentially damaging computer s<strong>of</strong>tware, including but not limited to<br />

computer viruses, and computer worms.<br />

May not use these systems for unsolicited bulk distribution <strong>of</strong> material or information to <strong>of</strong>f<br />

campus systems, including but not limit to mass email. May not use <strong>University</strong> systems or<br />

network resources for distribution <strong>of</strong> copyrighted computer s<strong>of</strong>tware, images, music, video or<br />

documents unless expressly permitted by the copyright holder.<br />

My not load or run peer-to-peer applications that are intended for the distribution <strong>of</strong> s<strong>of</strong>tware<br />

or digital media (music, video, or text). These applications include, but are not limited to Audio<br />

Galaxy, Napster, Bear Share, Lime Wire, mIRC, Bit Torrent, Azureus, and similar systems.<br />

May not store information or use these systems in any ways that violate state or federal laws or<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> policies including executive memorandum 16<br />

http://www.nebraska.edu/about/exec_memo16.pdf .<br />

May not sue these systems for commercial, business or any for-pr<strong>of</strong>it use without documented<br />

permission from the systems administrator and the individual to whom that administrator<br />

reports. The documented permission requirement shall include UNO Lotus Notes email or<br />

printed and signed documents.<br />

May not run additional services without documented permission from the <strong>of</strong>ficial administrators<br />

<strong>of</strong> the system.<br />

-601-


May not use these systems, the services on these systems or the network, to capture private<br />

information or content from other systems or to probe for system and service vulnerabilities<br />

without documented permission from the systems<br />

Continued on Next Page <br />

administrator <strong>of</strong> target systems. Loading <strong>of</strong> s<strong>of</strong>tware used for these purposes such as network<br />

sniffers, password crackers, and port scanners onto <strong>University</strong> systems is sufficient cause to<br />

assume this activity is taking place and to cause disciplinary action to be taken.<br />

If an investigation takes place, you understand that any and all <strong>of</strong> your UNO accounts and<br />

computer use may be subject to review by a designated system administrator and/or UNO<br />

Student Affairs and/or UNO security organizations, as accounts are considered to be the<br />

property <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>. Your accounts may be disabled during any<br />

investigation.<br />

Signed: ______________________________________________________________________________<br />

Printed Name: _______________________________________<br />

Date: __________________________<br />

Witnessed: __________________________________________<br />

Date: __________________________<br />

-602-


Virtual Private Network (VPN) Policy<br />

1.0 Purpose<br />

The purpose <strong>of</strong> this policy is to provide guidelines for Remote Access IPSec or L2TP Virtual Private<br />

Network (VPN) connections to the College <strong>of</strong> Information Science and Technology (IS&T) corporate<br />

network.<br />

2.0 Scope<br />

This policy applies to all IS&T employees, contractors, consultants, temporaries, and other workers<br />

including all personnel affiliated with third parties utilizing VPNs to access the IS&T network. This policy<br />

applies to implementations <strong>of</strong> VPN that are directed through an IPSec Concentrator.<br />

3.0 Policy<br />

Approved IS&T employees and authorized third parties (customers, vendors, etc.) may utilize the<br />

benefits <strong>of</strong> VPNs, which are a "user managed" service. This means that the user is responsible for<br />

selecting an Internet Service Provider (ISP), coordinating installation, installing any required s<strong>of</strong>tware,<br />

and paying associated fees. Further details may be found in the Remote Access Policy.<br />

Additionally,<br />

1. It is the responsibility <strong>of</strong> employees with VPN privileges to ensure that unauthorized users are<br />

not allowed access to IS&T internal networks.<br />

2. VPN use is to be controlled using either a one-time password authentication such as a token<br />

device or a RADIUS/ldap system with a strong passphrase.<br />

3. When actively connected to the corporate network, VPNs will force all traffic to and from the PC<br />

over the VPN tunnel: all other traffic will be dropped.<br />

4. Dual (split) tunneling is NOT permitted; only one network connection is allowed.<br />

5. VPN gateways will be set up and managed by IS&T systems network operational groups.<br />

6. All computers connected to IS&T internal networks via VPN or any other technology must use<br />

the most up-to-date anti-virus s<strong>of</strong>tware that is the corporate standard (McAfee); this includes<br />

personal computers.<br />

7. VPN users will be automatically disconnected from IS&T 's network after thirty minutes <strong>of</strong><br />

inactivity. The user must then logon again to reconnect to the network. Pings or other artificial<br />

network processes are not to be used to keep the connection open.<br />

8. The VPN concentrator is limited to an absolute connection time <strong>of</strong> 72 hours.<br />

9. Users <strong>of</strong> computers that are not IS&T-owned equipment must configure the equipment to<br />

comply with IS&T's VPN and Network policies.<br />

10. Only IS&T-approved VPN clients may be used.<br />

11. By using VPN technology with personal equipment, users must understand that their machines<br />

are a de facto extension <strong>of</strong> IS&T's network, and as such are subject to the same rules and<br />

regulations that apply to IS&T -owned equipment, i.e., their machines must be configured to<br />

comply with IS&T’s Security Policies.<br />

4.0 Definitions<br />

Term<br />

IPSec Concentrator<br />

Definition<br />

A device in which VPN connections are terminated.<br />

-603-


Wireless Communication Policy<br />

1.0 Purpose<br />

This policy discusses access to College <strong>of</strong> Information Science and Technology (IS&T) research networks<br />

via wireless communication mechanisms. Only wireless systems that meet the criteria <strong>of</strong> this policy or<br />

have been granted an exclusive waiver by IS&T systems managers in conjunction with the PKI Network<br />

Administrator are approved for connectivity to IS&T's networks.<br />

2.0 Scope<br />

This policy covers all wireless data communication devices (e.g., personal computers, cellular phones,<br />

PDAs, etc.) connected to any <strong>of</strong> IS&T 's internal networks. This includes any form <strong>of</strong> wireless<br />

communication device capable <strong>of</strong> transmitting packet data. Wireless devices and/or networks without<br />

any connectivity to IS&T’s networks do not fall under the purview <strong>of</strong> this policy.<br />

3.0 Policy<br />

3.1 Register Access Points and Cards<br />

All wireless Access Points / Base Stations connected to IS&T research networks must be registered and<br />

approved by the IS&T Director <strong>of</strong> IT in conjunction with the PKI Network Administrator. These Access<br />

Points / Base Stations are subject to periodic penetration tests and audits. All wireless Network<br />

Interface Cards (i.e., PC cards) used in laptop or desktop computers must be registered with IS&T<br />

systems staff and the PKI Network Administrator.<br />

3.2 Approved Research Projects<br />

All wireless LAN projects for research must be approved by the Dean <strong>of</strong> the College <strong>of</strong> Information<br />

Science and Technology.<br />

3.3 Technical Implementation/Virtual LAN<br />

All approved projects must be planned and implemented by the IS&T systems staff in conjunction with<br />

the PKI Network Administrator. All computers with wireless LAN devices for research projects must<br />

utilize an approved VLAN. All implementations must not interfere with the production (“unowireless”)<br />

network.<br />

3.4 Setting the SSID<br />

The SSID must be registered with IS&T systems staff and the PKI Network Administrator. The SSID<br />

shall not be named “unowireless”. The SSID shall not contain any identifying information such as<br />

student or employee name, or product identifier.<br />

4.0 Definitions<br />

Terms<br />

User Authentication<br />

VLAN<br />

“unowireless”<br />

Definitions<br />

A method by which the user <strong>of</strong> a wireless system can be verified as a legitimate<br />

user independent <strong>of</strong> the computer or operating system being used.<br />

a method <strong>of</strong> creating independent logical networks within a physical network.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> production wireless network.<br />

-604-


APPENDIX 7 – ASSESSMENT DATA COLLECTION<br />

This appendix contains examples <strong>of</strong> the instruments used to collect assessment data, or extracts <strong>of</strong><br />

reports that reflect the assessment data. The complete set <strong>of</strong> assessments may be accessed at:<br />

http://accreditation.ist.unomaha.edu/<br />

To log in, use the username: pki-ist\abet<br />

and password: accreditus2<br />

-605-


Program Objectives<br />

Advisory Board<br />

-606-


Student Focus Group<br />

Questions for Student Focus Group 2008-10-24<br />

Initial Evaluation <strong>of</strong> Courses<br />

1. To what extent do you feel that the courses that you took are a valuable part <strong>of</strong> the curriculum?<br />

2. To what extent do you feel that you learned a lot in the courses that you took?<br />

Feedback on Courses<br />

For each course, students identified strengths, weaknesses, their own preparedness, and improvements.<br />

Curriculum Improvements<br />

How can we improve the undergraduate curriculum?<br />

Staying Power<br />

What would it take for you to stay at IS&T and enter the graduate program?<br />

-607-


Alumni Web Survey<br />

Introduction<br />

Thank you for taking the time to respond to this survey. The purpose <strong>of</strong> this survey is to get feedback<br />

from alumni <strong>of</strong> the College <strong>of</strong> IS&T on two important items:<br />

How well the program prepared you for a career in an IT-related pr<strong>of</strong>ession, and<br />

How the program might be improved to better prepare current and future students.<br />

Your opinions are a vital part <strong>of</strong> our on-going efforts to improve our programs.<br />

Survey<br />

1. Please indicate the undergraduate program from which you graduated:<br />

a. BS Information Systems<br />

b. BS Computer Science<br />

c. BS Bioinformatics<br />

2. Which <strong>of</strong> the following have you participated in within the last year (choose all that<br />

apply)?<br />

a. <strong>Self</strong>-paced tutorial<br />

b. Conferences<br />

c. Workshops<br />

d. Training courses<br />

e. College courses<br />

f. Other (explain)<br />

3. Have you taken any graduate courses since you received your bachelor’s degree?<br />

a. Yes<br />

b. No<br />

4. Have you completed a graduate program (e.g. MS, PhD) since you received you<br />

bachelor’s degree?<br />

a. Yes<br />

b. No<br />

5. For each <strong>of</strong> the following, (1) Indicate how important each has been to your work life,<br />

and (2) how well the undergraduate program prepared you to do it.<br />

How important to your How well did the<br />

work life?<br />

undergraduate program<br />

prepared you to do it?<br />

Understanding the role <strong>of</strong><br />

information systems in the<br />

context <strong>of</strong> the entire<br />

Very important<br />

Important<br />

Neither important nor<br />

-608-<br />

Very well<br />

Well<br />

Neither well nor poorly


organization<br />

Having strong analytic,<br />

problem solving, and critical<br />

thinking skills<br />

Having good interpersonal<br />

communication skills<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Poorly<br />

Very poorly<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Having good team skills<br />

Having strong ethical<br />

principles<br />

Designing, implementing,<br />

delivering or managing<br />

technological solutions to<br />

organizational problems or<br />

opportunities<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Building and/or using current<br />

techniques, skills, & tools<br />

appropriate to your job.<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

-609-<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Engaging in continuing Very important Very well prepared


pr<strong>of</strong>essional development<br />

(e.g. classes, workshops,<br />

seminars, conferences, selflearning)<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

a.<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

6. In your opinion, how well do the program outcomes listed below indicate what a graduate<br />

from the program should know or be able to do?<br />

a. Very well<br />

b. Well<br />

c. Neither well nor poorly<br />

d. Poorly<br />

e. Very poorly<br />

Students will have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to<br />

the discipline.<br />

Students will understand the local and global role <strong>of</strong> IS in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

Students will communicate effectively to a range <strong>of</strong> audiences through listening and through<br />

oral, written, and visual presentation.<br />

Students will work effectively in a team environment and collaborate with others to accomplish<br />

a common goal.<br />

Students will understand and apply appropriate types <strong>of</strong> computer-based tools to support<br />

communication.<br />

Students will understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

Students will understand and model organizational processes and data.<br />

-610-


Students will design, integrate, implement, and evaluate a computer-based system, process,<br />

component, or program to meet desired needs.<br />

Students will manage projects.<br />

Students will manage IS with a specified application environment.<br />

Students will manage change.<br />

Students will recognize the need for continuing pr<strong>of</strong>essional development.<br />

7. How could this list be improved? (open ended)<br />

8. Are there some topics or learning experiences that were missing from the program when<br />

you were in it that you feel should be a part <strong>of</strong> the program today?<br />

9. Envisioning the evolution <strong>of</strong> the role <strong>of</strong> information technologies in our world over the<br />

next five years, are there particular topics, issues, trends, tools, or practices that you feel<br />

we should pay particular attention to?<br />

10. Please suggest some changes not mentioned elsewhere that, if implemented, would<br />

improve the quality <strong>of</strong> the program from which you graduated.<br />

-611-


Survey <strong>of</strong> Graduates<br />

1. From which program are you graduating?<br />

a. Bachelor <strong>of</strong> Science in Bioinformatics<br />

b. Bachelor <strong>of</strong> Science in Computer Science<br />

c. Bachelor <strong>of</strong> Science in Information Assurance<br />

d. Bachelor <strong>of</strong> Science in Information Systems<br />

2. In the year following graduation, I will<br />

a. Stay in <strong>Nebraska</strong><br />

b. Leave <strong>Nebraska</strong><br />

c. Don’t know<br />

3. In the year following graduation, I am going to (check all that apply):<br />

a. Attend graduate school<br />

i. At UNO<br />

ii. Elsewhere<br />

b. Work in the IT field<br />

i. I am currently employed in IT (provide job title)<br />

ii. I have an <strong>of</strong>fer for a job in IT (provide job title)<br />

iii. I am searching for a job in IT<br />

c. Work in a non-IT field<br />

d. Other (specify)<br />

e. Don’t know<br />

4. Which <strong>of</strong> the following types <strong>of</strong> pr<strong>of</strong>essional development do you plan on taking within the next<br />

year? (Check all that apply)<br />

a. College course<br />

b. Training course<br />

c. Workshop<br />

d. <strong>Self</strong>-paced tutorial (e.g. web-based)<br />

e. Other (specify)<br />

5. Please provide one or more suggestions for improving the undergraduate program from which<br />

you are graduating.<br />

-612-


College Statistics Report<br />

Objective #2: Students receiving a bachelor’s degree from the College <strong>of</strong> IS&T are employed in a job that makes use <strong>of</strong> their education<br />

Measure Data collected AY 2002-2003 AY 2003-2004 AY 2004-2005 AY 2006-2007<br />

UO2.M4 Retention rates (CS) Fall-to-fall retention rates for full-time,<br />

73% 77% 88% 84%<br />

Retention rates (IS) degree-seeking freshmen taking courses<br />

82% 90% 100% 73%<br />

Retention rates (Total) within IS&T<br />

75% 80% 89% 80%<br />

UO2.M5 Minority retention rates (CS) Fall-to-fall retention rates for first-time,<br />

75% 86% 100% 67%<br />

Minority retention rates (IS) full-time minority degree-seeking students 100% 100% n/a 100%<br />

Minority retention rates<br />

(Total)<br />

within IS&T<br />

78% 88% 100% 71%<br />

Objective #6: Students, faculty, and staff in the College <strong>of</strong> IS&T participate in community and pr<strong>of</strong>essional outreach<br />

Measure Data collected 2002 2004 2005 2006<br />

UO6.M2 Internships<br />

Number <strong>of</strong> internships (calendar year) 84 79 64 56<br />

Number <strong>of</strong> firms involved 54 51 (est)<br />

Number <strong>of</strong> internship opportunities<br />

91 324 476 1176<br />

<strong>of</strong>fered from Career Resource Center<br />

(calendar year)<br />

Number <strong>of</strong> Career Resource Center<br />

200 (est) 430 600 750<br />

partner organizations<br />

UO6.M9 Funding from the community Dollar amount $ 452,943 $ 1,100,000<br />

Number <strong>of</strong> funded projects 11 19<br />

Access to education Number <strong>of</strong> distance education enabled<br />

25 20 1 3<br />

UO6.M12<br />

course sections<br />

Number <strong>of</strong> students enrolled in distance ed<br />

263 34 1 15<br />

courses<br />

UO6.M13 Events encouraging Number <strong>of</strong> events 15 22 22 13<br />

participation <strong>of</strong> underrepresented<br />

Number <strong>of</strong> individuals involved 585 438 719 932<br />

groups<br />

Objective #7: Resources available in the College <strong>of</strong> IS&T are appropriate to the programs <strong>of</strong>fered and are used in an<br />

efficient and effective manner.<br />

Measure Data collected AY 2002-2003 AY 2004-2005 AY 2005-2006 AY 2006-2007<br />

UO7.M1 Human Resources<br />

Student/Faculty ratio 31 27 23 21<br />

Faculty/Admin support staff (FTE) ratio 7.4 6.8 6.3 6.5<br />

Faculty/ Tech support staff (FTE) ratio 12.3 5.2 6.3 5.6<br />

Student/Tech support staff (FTE) ratio 379 143 145 115<br />

Student/ Advisor (FTE) ratio 413 412 387 357<br />

Student/ Admin support (FTE) ratio 227.4 185.6 145 133.8<br />

UO7.M3 IS&T financial assistance/ student ratio 0 $ 16.98 $ 18.90 $ 22.18<br />

Financial Resources Annual budget for physical and human $ 5,364,108 $ 6,058,836 $ 6,726,702 $ 7,300,862<br />

UO7.M4<br />

resources in IS&T<br />

UO7.M7 Physical Resources<br />

Number <strong>of</strong> sections <strong>of</strong> IS&T classes 459 471 443 268<br />

Number <strong>of</strong> sections IS&T classes not<br />

22 22 13 6<br />

<strong>of</strong>fered at PKI because <strong>of</strong> space<br />

constraints<br />

UO7.M9<br />

Number <strong>of</strong> students enrolled in IS&T /<br />

workstations ratio<br />

3.5 2.9 2.7 2.5<br />

-613-


Faculty Annual Reviews<br />

Objective #4<br />

Objective #5<br />

Objective #6<br />

2003 2005 2007 2009<br />

Faculty in the College <strong>of</strong> IS&T contribute to the advancement <strong>of</strong> their disciplines through<br />

scholarly activity<br />

Peer-reviewed journal articles 20 15 22 28<br />

Peer-reviewed proceedings 29 16 35 37<br />

Conference presentations 11 14 13 8<br />

Book chapters 7 18 9 10<br />

Monographs / Books 2 3 2 2<br />

Editorial board service 22 25 24 30<br />

Other editorial activity (e.g. conference<br />

section chair) 20 18 20 13<br />

Grants funded (No.) 12 19 11 13<br />

Grants funded ($) $ 374,507 $ 422,339 $ 1,643,474 $ 891,207<br />

Grants submitted (unfunded) 20 3 10 21<br />

Scholarly activity with direct relevance to UG<br />

students 6 1 0 38<br />

Faculty and staff in the College <strong>of</strong> IS&T regularly update their pr<strong>of</strong>essional knowledge and skills<br />

and continually develop and enhance programs to meet the needs <strong>of</strong> our students and<br />

community.<br />

Count <strong>of</strong> pr<strong>of</strong>essional development activities<br />

related to courses in various categories 2 5 13 20<br />

Count <strong>of</strong> pr<strong>of</strong>essional development activities<br />

related to advising & support 0 0 1 0<br />

New courses 12 15 6 1<br />

Courses with major change 6 12 11 6<br />

Courses with minor change 26 11 10 32<br />

Students, faculty, and staff in the College <strong>of</strong> IS&T participate in community and pr<strong>of</strong>essional<br />

outreach.<br />

Number <strong>of</strong> projects with external clients<br />

(graduate) 49 58 16 12<br />

Number <strong>of</strong> projects with external clients<br />

(undergraduate) 30 24 22 26<br />

Membership in corporate, pr<strong>of</strong>essional,<br />

advisory, or civic boards 6 2 2 0<br />

Pr<strong>of</strong>essional publications and media<br />

appearances 1 0 5 0<br />

Speaches to popular conferences, civic<br />

groups, meetings 15 9 13 22<br />

Training, consulting, technology transfer<br />

activities 1 3 4 4<br />

Contributions to other institutes 1 8 1 1<br />

Volunteer work 10 1 0 1<br />

-614-


Faculty Questionnaire<br />

General<br />

1. With which department are you affiliated?<br />

Library Facilities<br />

1. The library resources are adequate to enable you to meet your responsibilities and pr<strong>of</strong>essional needs.<br />

2. The process by which you may request the library to order books or subscriptions is adequate<br />

[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />

3. The pr<strong>of</strong>essional librarians and library support staff adequately support your responsibilities and pr<strong>of</strong>essional needs<br />

[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />

4. Access to the library’s system for locating and obtaining information is adequate.<br />

[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />

Classroom Equipment<br />

5. The equipment available in classrooms where you teach is adequate for your teaching needs.<br />

[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />

Faculty Offices<br />

Labs<br />

6. Your <strong>of</strong>fice enables you to meet your responsibilities and pr<strong>of</strong>essional needs<br />

[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />

7. The special purpose labs (e.g. those on the 3rd floor) are adequate to meet your needs.<br />

Support Staff<br />

8. The number <strong>of</strong> support staff is adequate to enable you to meet your responsibilities and pr<strong>of</strong>essional needs.<br />

Comment<br />

If you wish, please elaborate on any answer given above.<br />

-615-


Task list, resource list<br />

Economic Feasibility Analysis<br />

Statement <strong>of</strong> work<br />

Enterprise model<br />

Workflow<br />

Baseline Project Plan<br />

Meeting minutes, other comm.<br />

process model<br />

IDEF0<br />

use cases<br />

work flow<br />

Tracking GANTT<br />

Update <strong>of</strong> project plan<br />

IDEF1X ER Diagram<br />

Database Design<br />

Computer Architecture Design<br />

Control plan<br />

Interface design<br />

Structure Charts (proprietary s<strong>of</strong>tware)<br />

Testing plan<br />

Implementation plan<br />

Maintenance plan<br />

Documentation<br />

System construction/prototyping<br />

Final GANTT diagram<br />

Rework <strong>of</strong> Economic Feasibility Analysis<br />

Post project evaluation<br />

Correspondence between original<br />

requirements analysis and final deliverables<br />

Group presentation<br />

Program Outcomes<br />

Capstone project review<br />

M2 M4 M5 M6 M8 M9<br />

M1 M3 M7 Other<br />

PROJECT:<br />

EVALUATOR:<br />

DATE:<br />

U - Unsatisfactory<br />

E - Emerging<br />

P - Pr<strong>of</strong>icient<br />

D - Distinguished<br />

NO - Not Observed<br />

Objective (a) Students w ill have an ability to apply know ledge <strong>of</strong> computing<br />

and mathematics appropriate to the discipline.<br />

Objective (b) Students w ill have a broad organizational and real-w orld<br />

perspective<br />

(1) Understand the local and global role <strong>of</strong> information systems in supporting<br />

and enabling processes and strategies at the individual, organizational, and<br />

societal level<br />

Objective (c) Students w ill have strong analytic, problem solving, and critical<br />

thinking skills<br />

(1) Apply traditional and contemporary analysis and design techniques to<br />

identify and analyze organizational problems or opportunities, formulate<br />

appropriate strategies and solutions using information technologies, and<br />

evaluate the effectiveness <strong>of</strong> propos<br />

Objective (d) Students w ill have good interpersonal communication, team<br />

skills, and strong ethical principles<br />

(1) Communicate effectively to a range <strong>of</strong> audiences through listening and<br />

through oral, written, and visual presentation<br />

(2) W ork effectively in a team environment and collaborate with others to<br />

accomplish a common goal.<br />

(3) Understand and apply appropriate types <strong>of</strong> computer-based tools to<br />

support communication.<br />

(4) Understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong><br />

conduct<br />

Objective (e) Students w ill be able to design, implement, deliver, and<br />

manage technological solutions to organizational problems or to take<br />

advantage <strong>of</strong> opportunities.<br />

(1) Understand and model organizational processes and data<br />

(2) Design, integrate, implement, and evaluate a computer-based system,<br />

process, component, or program to meet desired needs.<br />

(3) Manage projects.<br />

(4) Manage information systems within a specific application environment<br />

(5) Manage organizational change<br />

(6) Manage project change<br />

Principal strengths:<br />

Principal weaknesses:<br />

Suggestions for improving the content or pedagogy <strong>of</strong> ISQA 4110 and ISQA 4120:<br />

-616-


Writing sample<br />

-617-


Topic area exam<br />

ISQA 3300 File Structures<br />

-618-


CIST 2500 Statistics<br />

-619-


Ethics case study<br />

-620-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!