This document provides information about a 60-322 Object-Oriented Software Analysis and Design course offered in the winter 2015 term at the University of Windsor. It outlines the instructor details, course description, prerequisites, required textbook, evaluation breakdown, examination dates and locations, teaching evaluation process, notes for students, and policies on assignments, examinations, plagiarism and academic misconduct.
LIS 532G: Final Project Presentation
Case Study: What is it? How do you write it? How do you use it?
Preparation for Final Project to design and teach a case study.
University of Arizona, College of Nursing workshop on how to apply to an entry level nursing degree program. The College of Nursing offers two degree programs for students seeking an initial license to become a Registered Nurse (RN).
www.nursing.arizona.edu/bsn
www.nursing.arizona.edu/mepn
A very good presentation on how to finance a college education. This is great information for parents with high school students heading to college next year. I got this presentation from a good friend at J&J.
LIS 532G: Final Project Presentation
Case Study: What is it? How do you write it? How do you use it?
Preparation for Final Project to design and teach a case study.
University of Arizona, College of Nursing workshop on how to apply to an entry level nursing degree program. The College of Nursing offers two degree programs for students seeking an initial license to become a Registered Nurse (RN).
www.nursing.arizona.edu/bsn
www.nursing.arizona.edu/mepn
A very good presentation on how to finance a college education. This is great information for parents with high school students heading to college next year. I got this presentation from a good friend at J&J.
Database teaching in different universitiesKarwan Jacksi
Investigating a course from computer science dept at different levels of different universities. The study were done in three universities from Kurdistan region of Iraq.
Track 10. Teacher education research and ICT.
Authors: Jose Antonio Montero, David Fonseca, Lluís Vicent, August Climent, Xavier Canaleta and Sergi Villagrasa
The objective of the study was to find out the reasons why adult students studying either in the bachelor’s or master’s degree programme in business information technology at HAAGA-HELIA University of Applied Sciences have proceeded slowly in their studies or dropped out. The other objective of the study was to look for practices and tools to boost graduation of adult learners.
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docxmarilucorr
COURSE SYLLABUS
Data Analysis and Reporting
Spring 2019
I. Class
· Course Description: Students will gain practical experience in using advanceddatabase techniques and data visualization, data warehousing, reporting and other Business Intelligence (BI) tools. Contemporary BI tools and technologies will be used to create intelligent solutions to realistic problems.
· Course Objectives:
1. Effectively understand the evolution of business analytics needs and to develop an appreciation for issues in managing data/information/knowledge.
2. Apply in advanced database techniques in designing and executing complex queries in enterprise level database management information systems (Oracle,
SQL server, DB2 …).
3. Understand data warehousing administration and security issues.
4. Apply data extraction, transformation, and load (ETL) processes.
5. Administer and build reports
BI. Required Course Materials
· Free eBooks and other software resources will be posted on Blackboard.
· We use the Microsoft SQL Server 2017 in this class through a virtual machine that you can access from home or from campus.
· The on-campus computer lab in the business building located off the Atrium is available for student use and has the necessary computers and software. Computer lab hours can be found at: http://ualr.edu/cob/student-services/advising/advising-faq/
· Some of the assignments will require Microsoft Office software (e.g., MS Word, Excel, etc.). One way to get access to the MS Office software is get a free subscription to MS Office 365 ProPlus. Get the MS Office software here for free..
2
IV.
Course Grading
Course grading will be the combination of exams, term project, assignments, and quizzes. Grades are based on: A: 90~ 100%, B: 80~ 89%, C: 70~ 79%, D: 60~ 69%, F: 59 as described below. Graduate students will be evaluated using the same criteria as the undergraduate students. However, they will have to submit an additional assignments and/or extra project.
Grade Element
%
A.
Participation
10%
B.
Reading Quizzes
20%
C.
Assignments
30%
D.
Assignment Quizzes
10%
E.
Exams (three)
30%
Total
100%
A. Participation
You will be responsible for various in-class activities that will allow you to exercise your skills and knowledge, stimulate your critical thinking, and perform your assignments. You are expected to attend all the sessions, come to the class before it starts, stay in class for lectures and assignments, and participate with all class activities. Failure in any of these four areas will impact your participation grade.
Class attendance, measured as a percentage of classes attended where role is called, sets the baseline for the participation grade (e.g., 80% means you attended 8 out of 10 classes and did not leave those classes early). Additional points may be removed for non-participation in classroom activities or discussions.
· Class attendances will be verified at the beginning of each class. Students will be count.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ITS 630 – Organization Leadership & Decision Making
Section – 04
SEMESTER – First BI-TERM – Online Course
Professor: Dr. Sherri Braxton
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: One of the most important skills a business leader needs to have concerning technology involves effective
decision making and governance. This class will consist of a case study approach presenting different
scenarios that require decisions to be made on technology issues that are relevant to today’s business
environment. Students will develop the skills for understanding the components and elements of these
technology decisions, and assess associated risks. This course will draw upon a cross section of technology,
finance, security, project management, leadership, and other aspects of effective decision making.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Develop IT strategy for business value
• Understand business metrics
• Understand how to communicate with business managers
• Understand the management of IT-based risk
• Create and evolve a technology roadmap
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
James D. McKeen, Heather A. Smith, IT Strategy: Issues and Practices, Third Edition. Pearson, 2015, ISBN-13
978-0-13-354424-4.
Recommended Reading:
• High, Peter A. Implementing World Class IT Strategy. Jossey-Bass, 2014.
• Tiwana, Amrit. IT Strategy for Non-IT managers, MIT Press, 2017 Aaron K. Olson, B. Keith Simerson
Other articles and readings may be assigned by course professor.
Course Expectations
Course Activities and
Experiences:
Students are expected to:
• Review any assigned reading material, complementary materials, and weekly lectures and prepare
responses to homework assigned.
• Actively participate in activities, assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assignments.
• Connect content knowledge from core courses to practical training placement and activities.
Academic Integrity: At a Christian liberal arts universi.
Database teaching in different universitiesKarwan Jacksi
Investigating a course from computer science dept at different levels of different universities. The study were done in three universities from Kurdistan region of Iraq.
Track 10. Teacher education research and ICT.
Authors: Jose Antonio Montero, David Fonseca, Lluís Vicent, August Climent, Xavier Canaleta and Sergi Villagrasa
The objective of the study was to find out the reasons why adult students studying either in the bachelor’s or master’s degree programme in business information technology at HAAGA-HELIA University of Applied Sciences have proceeded slowly in their studies or dropped out. The other objective of the study was to look for practices and tools to boost graduation of adult learners.
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docxmarilucorr
COURSE SYLLABUS
Data Analysis and Reporting
Spring 2019
I. Class
· Course Description: Students will gain practical experience in using advanceddatabase techniques and data visualization, data warehousing, reporting and other Business Intelligence (BI) tools. Contemporary BI tools and technologies will be used to create intelligent solutions to realistic problems.
· Course Objectives:
1. Effectively understand the evolution of business analytics needs and to develop an appreciation for issues in managing data/information/knowledge.
2. Apply in advanced database techniques in designing and executing complex queries in enterprise level database management information systems (Oracle,
SQL server, DB2 …).
3. Understand data warehousing administration and security issues.
4. Apply data extraction, transformation, and load (ETL) processes.
5. Administer and build reports
BI. Required Course Materials
· Free eBooks and other software resources will be posted on Blackboard.
· We use the Microsoft SQL Server 2017 in this class through a virtual machine that you can access from home or from campus.
· The on-campus computer lab in the business building located off the Atrium is available for student use and has the necessary computers and software. Computer lab hours can be found at: http://ualr.edu/cob/student-services/advising/advising-faq/
· Some of the assignments will require Microsoft Office software (e.g., MS Word, Excel, etc.). One way to get access to the MS Office software is get a free subscription to MS Office 365 ProPlus. Get the MS Office software here for free..
2
IV.
Course Grading
Course grading will be the combination of exams, term project, assignments, and quizzes. Grades are based on: A: 90~ 100%, B: 80~ 89%, C: 70~ 79%, D: 60~ 69%, F: 59 as described below. Graduate students will be evaluated using the same criteria as the undergraduate students. However, they will have to submit an additional assignments and/or extra project.
Grade Element
%
A.
Participation
10%
B.
Reading Quizzes
20%
C.
Assignments
30%
D.
Assignment Quizzes
10%
E.
Exams (three)
30%
Total
100%
A. Participation
You will be responsible for various in-class activities that will allow you to exercise your skills and knowledge, stimulate your critical thinking, and perform your assignments. You are expected to attend all the sessions, come to the class before it starts, stay in class for lectures and assignments, and participate with all class activities. Failure in any of these four areas will impact your participation grade.
Class attendance, measured as a percentage of classes attended where role is called, sets the baseline for the participation grade (e.g., 80% means you attended 8 out of 10 classes and did not leave those classes early). Additional points may be removed for non-participation in classroom activities or discussions.
· Class attendances will be verified at the beginning of each class. Students will be count.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ITS 630 – Organization Leadership & Decision Making
Section – 04
SEMESTER – First BI-TERM – Online Course
Professor: Dr. Sherri Braxton
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: One of the most important skills a business leader needs to have concerning technology involves effective
decision making and governance. This class will consist of a case study approach presenting different
scenarios that require decisions to be made on technology issues that are relevant to today’s business
environment. Students will develop the skills for understanding the components and elements of these
technology decisions, and assess associated risks. This course will draw upon a cross section of technology,
finance, security, project management, leadership, and other aspects of effective decision making.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Develop IT strategy for business value
• Understand business metrics
• Understand how to communicate with business managers
• Understand the management of IT-based risk
• Create and evolve a technology roadmap
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
James D. McKeen, Heather A. Smith, IT Strategy: Issues and Practices, Third Edition. Pearson, 2015, ISBN-13
978-0-13-354424-4.
Recommended Reading:
• High, Peter A. Implementing World Class IT Strategy. Jossey-Bass, 2014.
• Tiwana, Amrit. IT Strategy for Non-IT managers, MIT Press, 2017 Aaron K. Olson, B. Keith Simerson
Other articles and readings may be assigned by course professor.
Course Expectations
Course Activities and
Experiences:
Students are expected to:
• Review any assigned reading material, complementary materials, and weekly lectures and prepare
responses to homework assigned.
• Actively participate in activities, assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assignments.
• Connect content knowledge from core courses to practical training placement and activities.
Academic Integrity: At a Christian liberal arts universi.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ITS 630 – Organization Leadership & Decision Making
Section – 04
SEMESTER – First BI-TERM – Online Course
Professor: Dr. Sherri Braxton
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: One of the most important skills a business leader needs to have concerning technology involves effective
decision making and governance. This class will consist of a case study approach presenting different
scenarios that require decisions to be made on technology issues that are relevant to today’s business
environment. Students will develop the skills for understanding the components and elements of these
technology decisions, and assess associated risks. This course will draw upon a cross section of technology,
finance, security, project management, leadership, and other aspects of effective decision making.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Develop IT strategy for business value
• Understand business metrics
• Understand how to communicate with business managers
• Understand the management of IT-based risk
• Create and evolve a technology roadmap
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
James D. McKeen, Heather A. Smith, IT Strategy: Issues and Practices, Third Edition. Pearson, 2015, ISBN-13
978-0-13-354424-4.
Recommended Reading:
• High, Peter A. Implementing World Class IT Strategy. Jossey-Bass, 2014.
• Tiwana, Amrit. IT Strategy for Non-IT managers, MIT Press, 2017 Aaron K. Olson, B. Keith Simerson
Other articles and readings may be assigned by course professor.
Course Expectations
Course Activities and
Experiences:
Students are expected to:
• Review any assigned reading material, complementary materials, and weekly lectures and prepare
responses to homework assigned.
• Actively participate in activities, assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assignments.
• Connect content knowledge from core courses to practical training placement and activities.
Academic Integrity: At a Christian liberal arts universi ...
1 School of Computer & Information Scien.docxadkinspaige22
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1 School of Computer & Information Sciendrennanmicah
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste ...
eTROYTerrorism CJ4440Term Five 2013For course syllabus pos.docxgitagrimston
eTROY
Terrorism CJ4440
Term Five 2013
For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The instructor will notify students, via e-mail or Blackboard announcement, when changes are made in the requirements or grading of the course.
eTROY Courses at Troy University
All eTROY courses at Troy University utilize the Blackboard Learning System. In every eTROY course, students should read all information presented in the Blackboard course site and should periodically check for updates-at least every 48 hours. Remember: This is not a “correspondence course” in which a student may work at his/her own pace. Each week there are assignments, online discussions, online activities and/or exams with due dates. Refer to the schedule at the end of the syllabus for more information.
Instructor Information
James Smith
Department of Criminal Justice
Troy University (Dothan Campus)
Malone Hall Room 123
Telephone: 334 -983-6556 Extension 1313
Email address: [email protected]
Office Hours: 7 am – 6 pm Monday - Thursday
Instructor Education
Master of Science in Safety, University of Southern California
Bachelor of Science, Troy University
Course Description
Course Description: This course provides the student a basic understanding and definition of terrorism and threat groups, motivation and mindset of a variety of domestic and international terrorist and threat groups is examined. The structure of terrorist organizations along with methods used to attack selected targets is addressed. A variety of terrorist campaigns, target selection, and mode of operation will be explored. The effect of the media on terrorism, the targets selected, and reaction by the public will be examined. The interaction of legislation and Constitutional issues are reviewed. Countermeasures and antiterrorism methods will be assessed.
Course Objectives
1. To provide an understanding of terrorism and homeland security in relation to criminal justice.
2. To provide an overview of homeland security and the changes wrought by the information age, Internet and computers.
3. To provide an overview of the general principles, finances, typology, organizational structures and group dynamic theory of international and domestic terrorism are studied.
4. The concepts of target assessment, hardening and layered defenses are discussed.
5. The philosophies of various terrorist groups are explored.
6. The law enforcement role in homeland security is discussed.
7. The concepts of “lone wolf attacks”, single cause and multiple cause groups, religious and other extremist groups are discussed.
8. The application of homeland security concepts in law enforcement, judicial system, probation and parole along with corrections are discussed.
9. The Patriot Acts, current legal issues, civil, liberties, privacy and Constitutional issues are explored.
Student Learning Outcomes
1. Explain the significance of orga ...
1 School of Computer & Information Scie.docxmarilynnhoare
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL633 - Legal, Regulations, Investigations, and Compliance
Section – 30 & 31
Summer 2019 – MAIN term – Hybrid Course with Required Residency
Residency Session Date: 7/12/19- 7/14/2019
Residency Session Course Site: Seattle, WA
Professor: Dr. Jack A. Hyman
Contact
Information:
Office Hours: By appointment
E-mail: [email protected]
Online Support
(IT) and I-Learn
Policy:
All members of the University of the Cumberlands’ community who use the University’s
computing, information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands
website: http://www.ucumberlands.edu/ilearn/
Course
Description:
The course examines computer crimes, laws and regulations. It includes techniques for investigating
a crime, gathering evidence, and communicating results.
Alignment Matrix Course Objectives/Learner Outcomes:
• Recognize the legal aspects of information security systems.
• Examine the concept of privacy and its legal protections.
• Identify the basic components of the American legal system.
• Describe legal compliance laws addressing how public and private institutions protect the security and
privacy of consumer financial information.
• Analyze intellectual property laws.
• Describe the role of contracts in online transactions and cyberspace.
• Identify cybercrime and tort law issues in cyberspace.
• Examine the principles requiring governance of information within organizations.
• Identify risk analysis and incident response procedures.
• Explain the importance of forensic examination in legal proceedings.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Grama, Joanna Lyn. Legal Issues in Information Security, 2nd ed. Burlington, MA: Jones & Bartlett Learning,
2015
You DO NOT need to buy the lab manual for this section!
Course Expectations
Course Activities
and Experiences:
Students are expected to:
• Review any assigned reading material and prepare responses to homework assigned.
• Actively participate in activities, assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assignments.
• Connect content knowledge from core courses to practical training placement and activities.
Academic Integrity: At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic
dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse
and misuse of information or people to gain an undeserved academic .
School of Computer & Information SciencesCOURSE.docxadkinspaige22
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name:
ISOL/MSDF 633 – Legal, Regulations, Investigations, and Compliance
Section – 02
Spring 2020 – I G Term Asynchronous Online Course
Professor:
Melissa S. Gruner, J.D. – Adjunct Professor
Contact Information:
Office Hours: By appointment
E-mail: [email protected]
Online Support (IT) and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing, information or communication resources must act responsibly. http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website:
Access to the course website is required via the iLearn portal on the University of the Cumberlands website: http://www.ucumberlands.edu/ilearn/
Course Description:
The course examines computer crimes, laws and regulations. It includes techniques for investigating a
crime, gathering evidence, and communicating results.
Alignment Matrix
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
· Recognize the legal aspects of information security systems.
· Examine the concept of privacy and its legal protections.
· Identify the basic components of the American legal system.
· Describe legal compliance laws addressing how public and private institutions protect the security and privacy of consumer financial information.
· Analyze intellectual property laws.
· Describe the role of contracts in online transactions and cyberspace.
· Identify cybercrime and tort law issues in cyberspace.
· Examine the principles requiring governance of information within organizations.
· Identify risk analysis and incident response procedures.
· Explain the importance of forensic examination in legal proceedings.
Prerequisites:
There are no prerequisites for this course.
Books and Resources:
Grama, Joanna Lyn. Legal Issues in Information Security, 2nd ed. Burlington, MA: Jones & Bartlett Learning, 2015
Student Lab Manual and Lab Access Key (also known as supplemental Lessons)
· YOU MUST HAVE THIS TO TAKE THE QUIZZES!
Other articles and readings may be assigned by course professor. Course Expectations
Course Activities and Experiences:
Students are expected to:
• Review any assigned reading material, complementary materials, and weekly lectures and prepare responses to homework assigned.
• Actively participate in activities, assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assignments.
• Connect content knowledge from core courses to practical training placement and activities.
Academic Integrity:
At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of.
1 School of Computer & Information Scien.docxShiraPrater50
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ITS831 – Information Technology Importance in Strategic Planning; Section – 41
Fall 2019 – MAIN term – Hybrid Course with Required Residency
Residency Session Date: Oct 4 – 6, 2019; Friday 5pm – 10pm; Saturday 8am – 10pm; Sunday 8am-1:30pm
Residency Session Course Site: UC @ NOVA Alexandria Campus - 5000 Dawes Ave. Alexandria, VA 22311
Professor: James E. Price, Ph.D.
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: This course focuses on the information technology leader’s collaborative roles working with an organization’s
senior leadership, including aligning business strategy with IT strategy, acting as an equal contributor to the
formation of organizational strategy, and integrating ethical policies and practices into an organization.
Learners evaluate multidisciplinary research and practices related to leadership, organizational structures,
and culture. Through the lens of complexity/chaos and change theories, learners analyze information
technology’s role in contributing to organizational resiliency.
Alignment
Matrix
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
Be proactive with risk management practices;
Understand IT business management;
Understand how to balance customer and shareholder value;
Understand the economics of cloud computing;
Understand the benefits of eco-efficient technology adoption; and
Understand how emerging technologies effect strategic planning.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Pearlson, K., Saunders, C., Galletta, D. (2016). Managing and Using Information Systems: A Strategic
Approach, 6th ed. Burlington, MA: Wiley ISBN: 9781119244288
Recommended Materials/Resources:
Some interesting readings will be added in the content to expand the knowledge. Please see the module
folders each week for these additional readings.
Course Expectations
Course Activities
and Experiences:
Students are expected to:
• Review any assigned reading material and prepare responses to homework assigned.
• Actively participate in activities, Case assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assign ...
School of Computer & Information SciencesCOURSEtroutmanboris
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name:
ITS831 – Info-Tech Import Strat Plan
Section – 11
Fall 2020 – Bi-term –Asynchronous (Online)
Professor:
Dr. George J Trawick
Contact Information:
Office Hours: By appointment
E-mail: [email protected]
Online Support (IT) and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing, information or communication resources must act responsibly. http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website:
Access to the course website is required via the iLearn portal on the University of the Cumberlands website: http://www.ucumberlands.edu/ilearn/
Course Description:
This course focuses on the information technology (IT) leader’s collaborative roles working with an organization’s senior leadership, including aligning business strategy with IT strategy, acting as an equal contributor to the formation of organizational strategy, and integrating ethical policies and practices into an organization. Learners evaluate multidisciplinary research and practices related to leadership, organizational structures and culture. Through the lens of complexity / chaos and change theories, learners analyze IT’s role in contributing to organizational resiliency.
Course Objectives/Learner Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of the course, students will be able to:
a. Explain what managers must know about both using and managing information.
b. Explain the linkages between business and IT strategy, linkages between organizational
and IT strategy, collaboration and individual work, and business processes.
c. Explain the manager’s role and issues related to managing IT itself.
Prerequisites:
There are no prerequisites for this course.
Books and Resources:
Required Text
Pearlson, K., Saunders, C. Galletta, D. Managing and Using Information Systems:
A Strategic Approach, 6th Edition. Burlington, MA: Wiley, 2016.
Professional Associations
• International Information Systems Security Certification Consortium, Inc., (ISC)²® - This Web site provides access to current industry information. It also provides opportunities in networking and contains valuable career tools. http://www.isc2.org/
• ISACA - This Web site provides access to original research, practical education, career-enhancing certification, industry-leading standards, and best practices. It also provides a network of likeminded colleagues and contains professional resources and technical/managerial publications. https://www.isaca.org/Pages/default.aspx
• International Association of Privacy Professionals (IAPP) - This Web site provides an opportunity to interact with a community of privacy professionals and to learn from their experiences. This Web site also provides valuable career advice. https://www.privacyassociation.org/
Course Expectations
Course Activities and Experiences:
Students ar ...
1 School of Computer & Information ScienVannaJoy20
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ITS835 – Enterprise Risk Management
Section – ITS-835 Online
Professor: Dr. George Mikulski
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: This course goes beyond looking at risk management from the confines of quantitative topics to cover the
full spectrum of risks that may emerge in enterprises. It covers a more holistic approach that includes the
decisions and actions of employees in an active enterprise. It uses case studies to demonstrate the issues
and challenges in total risk management. Finally, the course explores techniques for balancing enterprise risk
and reward to enable performance optimization.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Design and implement an appropriate ERM framework and risk governance structure customized to any
type of organization.
• Conduct qualitative risk assessments to identify/prioritize key risks from among all risk sources.
• Quantify all types of risks, including strategic, operational, financial, and insurance.
• Develop a clear definition of risk appetite (the aggregate enterprise-level risk limit).
• Enhance strategic planning, increasing the likelihood of achieving strategic plan goals.
• Provide a rigorous business case for both business and mitigation risk-reward decision-making.
• Assure the board of directors that key risks are well understood and managed.
• Understand and satisfy ERM requirements from rating agencies, regulators, and shareholders.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Fraser, J., Simkins, B., & Narvaez, K. (2014). Implementing enterprise risk management: Case studies and best
practices. John Wiley & Sons
Other articles and readings may be assigned by course professor.
Course Expectations
Course Activities and
Experiences:
Students are expected to:
• Review any assigned reading material, complementary materials, and weekly lectures and prepare
responses to homework assigned.
• Actively participate in activities, assignments, and discussions.
• Evaluate and react to each other’s work in a supportive, constructive manner.
• Complete specific assignments and exams when specified and in a professional manner.
• Utilize learned technologies for class assignments.
• Connect content knowledge from ...
1. School of Computer Science
University of Windsor
401 Sunset Avenue
Windsor, ON N9B 3P4
CANADA
60-322 Object-Oriented Software Analysis and Design - Winter 2015
Instructor: Dr. Satish Ch. Panigrahi
Office: 5106 Lambton Tower
email: satishp@uwindsor.ca
Off. Hrs.: TR, 14:00 pm - 15:00 pm in LT 5106
Lectures
(MW) 16:00-17:20 in ED 1121
Note:
• Students should keep the instructor informed about his/her difficulties/concerns with the course and review their
progress with the instructor during the office hours.
• E-mail is one of the best methods to contact the instructor. Only emails originating from a valid University of
Windsor student account will be accepted from students wishing to contact the instructor. Students must include
their full names and student IDs in their correspondence.
Course Description
This course builds on the knowledge of object-oriented programming, data structures, systems programming.
Students are introduced to object-oriented software analysis and design concepts (such as cohesion and coupling),
and design practices currently used in industry, (such as design patterns and refactoring). These concepts and
practices will be discussed through case studies and programming exercises.
Pre-requisites
60-212, 60-254, 60-256
Required textbook
Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Develop-
ment (3rd Edition) Prentice Hall PTR Upper Saddle River, NJ, USA 2004 ISBN:0131489062
Course Evaluation
The weights for different components of the course will be as follows:
20% Assignments/Project/Mixer (up to 10 assignments will be given)
20% Midterm I
20% Midterm II
40% Final Exam
In accordance with the current policy of the University, students will receive a numeric final grade for this
course. A grade below 50% is considered a failing grade. The University policy for examinations is available at
http://web4.uwindsor.ca/units/registrar/calendars/undergraduate/cur.nsf/inToc/CA4AB426E84D6C51852573690055F0A1?OpenDocument
1
2. Examinations
Midterm Test I: Wednesday February 04, 16:00 PM to 17:20 PM, Room - TBA
Midterm Test II: Monday March 09, 16:00 PM to 17:20 PM, Room - TBA
Final Examination: Saturday, April 18, 15:30 PM 18:30 PM, Room - TBA
Teaching Evaluation
Student Evaluation of Teaching (SET) forms will be administered during the last two weeks of the class schedule.
Notes to Students
General
1. The University of Windsor’s online learning environment CLEW will host the course website.
2. Students are expected to actively participate in the discussions and answer questions.
3. The University of Windsor allows students to take a course only twice. If a student fails to get the specified
minimum grade in a required course after two attempts, the student may be asked to withdraw from the
program. The Dean’s office has to grant permission to take a course more than twice. Students must
note that such permission is granted only under exceptional circumstances. Any student who is taking a
course for the second time and having difficulties with the course must seek counseling before the last day
to withdraw voluntarily from a course.
Assignments
1. The assignments will be handed out, usually on a Monday, and will be due by 16:00 PM the next week
on the same day.
2. Late submissions will be allowed, provided the assignments are handed in within 3 days (72 hours) following
the stipulated deadline. Late submissions will have an automatic penalty of 30% for each assignment
submitted late. No other extension will be allowed.
Exams
1. Once a student attends a test, the grade in that test cannot be overlooked for any reason. If a student
is ill on the day of the test or has any other difficulty, s/he must contact the course instructor before the
test and will be required to submit a written application including a doctor’s note in case of illness.
2. There will be no make-up test if a student misses a midterm test. A student who misses the midterm test
due to unavoidable reasons must submit a request, with adequate documentation (e.g., doctor’s note), to
prorate their grade within 48 hours of the scheduled midterm test. The prorating will be done on the
basis of the final test and will not include the assignment grades.
3. If a student misses the final examination due to serious and unavoidable reasons, s/he must contact the
instructor and submit a written request by 12 Noon, Monday April 20, 2015, with adequate documentation
(e.g., doctor’s note), to take a supplementary test.
4. Students will not be allowed to write the tests if they do not have their student cards with them. Invigi-
lators will check the picture ID of each student during the test. If some special arrangements need to be
made regarding this process, students must inform the instructor beforehand.
5. Students will not be allowed to get their test booklets back. They will get a chance to look at their
tests and may request a copy of their midterm tests by paying the appropriate photocopying charges.
Announcements will be made indicating how the students may look at their midterm tests and the final
test.
2
3. 6. Students should refer to the policy on plagiarism (given below). All cases of academic misconduct will be
reported to the Director, school of Computer Science and appropriate actions will be taken.
7. If a student becomes ill either before or during a test, it is his/her responsibility to get a doctor’s note.
No consideration will be made without an adequate doctor’s note (see requirements for a doctor’s note
given below).
8. Once a student writes a test and hands it in, his/her grade for the test cannot be prorated, ignored or
replaced by his/her grades for other exams.
Requirements about Doctor’s note
1. If a student misses a lab, a project presentation, or a test (the midterm test or the final examination)
due to medical reasons, a doctor’s note must be submitted immediately. A standard form for the medical
note, available on the web (http://www.cs.uwindsor.ca/download/2300/Medical Certificate.pdf), must be
used.
University Policy on Plagiarism
Plagiarism is defined as: ”The act of appropriating the literary composition of another, or parts of passages
of his or her writing, or the ideas or language of the same, and passing them off as the products of one’s own
mind.” (Black’s Law Dictionary)
It is expected that all students will be evaluated and graded on their individual merit and all work submitted
for evaluation should clearly indicate that it is the student’s own contribution.
Students often have to use the ideas of others as expressed in written or published work in preparing essays,
papers, reports, theses and publications. It is imperative that both the data and ideas obtained from any and
all published or unpublished material be properly acknowledged and their sources disclosed. Failure to follow
this practice constitutes plagiarism and is considered to be a serious offence. Thus, anyone who knowingly
or recklessly uses the work of another person and creates an impression that it is his or her own, is guilty of
plagiarism.
Plagiarism also includes submitting one’s own essay, paper, or thesis on more than one occasion. Accordingly,
it is expected that a thesis, essay, paper or a report has not been and is not concurrently being submitted for
credit for any other course at this or any other University. In exceptional circumstances and with the prior
agreement of the instructor, a student may use research completed for one course as part of his or her written
work for a second course.
A confirmed incident of plagiarism will result in a sanction ranging from a verbal warning, to a loss of credit in
the course, to expulsion.
Examples of academic misconduct by students
Some typical examples of improper conduct during a written test which may lead to severe disciplinary measures
against students are given below. The list is not exhaustive.
• Submitting a program very similar to that submitted by another student or a program available somewhere
else (e.g., a book or a web site). If two programs are different only in variable names or comments, they
would be viewed as being similar.
• Communicating with any unauthorized person during an examination in any way (e.g., verbally, using a
cell phone, passing messages in some form to another student).
• Bring into an examination any unauthorized material (e.g., a book or a class note which is marked in any
way, bringing any unauthorized documents or aids).
• Attempting to obtain, by any means, a copy of the test before the examination takes place. This includes
stealing a test, buying a test before the examination is held, accepting (from anyone) a copy of the test
before the examination is held.
3
4. • Starting to write a test before the test is officially scheduled to start.
• Refusing to stop writing a test when the test is over.
• Refusing to obey the instructions of the officer in charge of an examination.
4