SemesterReview - competitive advantages, or meet a...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
MIS Department Assessment Criteria 1. Students will be able to describe how and why information systems are used today as well as explain the technology and the major components of an information systems infrastructure. Examples include CPU, router, types of network, etc. 2. Students will understand how information systems help enforce organizational structures and processes, foster stronger relationships with customers and suppliers, and enable new forms of commerce between individuals, organizations, and governments. Examples include ERP, SCM, etc. 3. Students will be able to discuss the influence information systems have on globalization and the new forms of communication, collaboration, and partnering enabled by emerging technologies. Examples include collaboration, knowledge management, various types of outsourcing, etc. 4. Students will study how the different levels and functions within a business utilize information systems to gain business intelligence, support decision making, create
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: competitive advantages, or meet a competitive necessity. Examples include data warehouse, competitive advantage, etc. 5. Students will learn to develop and acquire information systems and technologies, to assess the value of information systems investments, and to formulate a business case for a new information system, including estimation of both costs and benefits. Examples include Enterprise systems, etc. 6. Students will understand the importance of securing information systems resources, the use of both human and technological safeguards, the mitigation of risks, as well as disaster planning and recovery. Examples include authentication, biometrics, phising, etc. 7. Students will learn how information systems raise ethical concerns in society and how information systems influence crime, terrorism, and war. Example include denial ‐ of ‐ service attack privacy, ID theft, etc....
View Full Document

This note was uploaded on 09/21/2011 for the course ISOM 3263 taught by Professor Staff during the Spring '08 term at University of Central Oklahoma.

Ask a homework question - tutors are online