This course is an introduction to design methodologies in information systems. Structured systems analysis and design methodologies are discussed. An introduction to database design methodologies is also included. Topics related to different database models and their implementation is discussed. Students are also required to design and implement information systems using appropriate computer software.
This course relates database theories and practices to concepts from other areas such as programming languages, algorithms, data structures, and information systems. The relational, network, and hierarchical models are introduced. A major portion of the course deals with data manipulation languages for the relational model, design theory for relational databases and query optimization. Pre-req. ACIS 5504
Study of theoretical and pragmatic approaches to the development of computer-based information systems. The emphasis is on the management of the systems development process. Strategies for managing the complexity of information systems are explored. The building of logical and physical models of systems through traditional non-executable models and executable computer prototypes. Pre-req. ACIS 5504
Organization and management of data in the health care industry. Includes standards for electronic health records, healthcare enterprise systems architecture, health database design, existing database platforms, data integration from multiple sources, database accessibility. Analysis of healthcare-related organizations from the prespective of multiple user groups including patients, technicians, nurses, physicians, clinics, hospitals and insurance companies.
Cybersecurity governance and risk management program in organizations. Governance frameworks for cybersecurity and external drivers for cybersecurity. Risk management, including existing frameworks, principles, and strategies related to risk assessment and implementation of cybersecurity policies, controls and procedures. Budgeting and evaluation of risk management programs. Compliance with organizational cybersecurity programs, including risks of insider threats, management of security-related personnel, and establishment of cyber hygiene. Cybersecurity governance in relation to cybersecurity regulation.
This course provides an in-depth investigation into the complex and evolving nature of security, privacy, and safety in cyberspace. Students traverse the cyber threat landscape and the motives, methods, and mechanisms that shape it. Coursework examines the consequences posed by cyber threats at the individual, corporate, national, and societal levels. Designed for students with diverse backgrounds and interests across technical, managerial, and policy aspects of cybersecurity.
Key legal, ethical, and policy cyber governance and cybersecurity topics for managers and information security officers. Legal rights, remedies, and limitations related to cybercrime, computer intrusion, national security, and data breaches. Privacy laws and standards, impact assessments, privacy and security by design as policy and legal requirements. Comparison of international approaches to relevant laws and policies. Fundamentals of managing legal and policy aspects of information technology and security.
This course covers the enterprise cybersecurity lifecycle from a managerial perspective. Coursework includes the design of a comprehensive and resilient enterprise cybersecurity program that aligns with a set of business objectives. Topics include establishing policies and managing resources; overseeing and running cybersecurity operations; assessing security posture and mitigating vulnerabilities, and responding to security threats and failures.
This course explains the characteristics, use, and development of decision support systems (DSS) within the context of other business information systems. The process of designing and implementing decision support systems in business is discussed from both theoretical and practical standpoints. Students will learn various ways of measuring the success of DSS implementation as well as the difficulties associated with all such measures. Students will learn to use common software tools to develop a simple DSS and will learn to use the Internet as a decision-making and productivity tool.
Modeling and design of smart services and service systems. Application of deep question-answer processes in subject matter domains for cognitive assistants. Integration of cognitive assistants into smart service systems. Service journey customization through context-adaptive cognitive assistants. Application of state-of-the-art cognitive computing resources towards building and training a cognitive computing system in a subject domain. Pre-req. BIT 5474
Overview of business intelligence and analytics technologies and their strategic use including defining/framing the business context for decisions, decision models, data issues, business intelligence, building analytics capability, cloud computing, making organizations smarter, and measuring the value of analytics.
Development of business intelligence and analytics solutions and applications for various types of decision-making problems. Analytics software and techniques. Data preparation, data exploration and visualization, predictive analytics techniques, text analytics, and spatial analytics. Pre-req. BIT 5524
Use of information technology in the health care industry. Topics address electronic health records, patient informatics, evidence-based medicine, electronic prescribing and telemedicine and the use of these technologies to improve patient health and medical systems operations.
An examination of the concepts, technologies, and applications of electronic commerce. Topics include the World Wide Web as a platform for electronic commerce; intranets; electronic data interchange; electronic banking and payment systems; security and firewalls; software agents; and the social, legal, and international issues of electronic commerce.
Object-oriented programming concepts and the Java programming language. The application of design strategies, notations, and patterns related to object-oriented systems. Techniques and libraries for developing applications related to the World Wide Web. Pre-req. Proficiency in a high-level programming language (C, C++ or Java), practical training and/or work experience related to developing computer software and systems.
This course covers languages and technologies needed to develop applications for modern mobile devices. Students discuss mobile infrastructure and a range of mobile devices, with a focus on mobile phones, and the Android platform in particular. Students learn the principles of interactive graphical user interfaces for mobile devices and look at the protocols and standards for using mobile device features such as sensors, networking, location, camera, and audio. They also discuss mobile app architecture, performance considerations, and asynchronous programming--along with the principles and technologies for mobile seucrity. Pre-req. CS 5044
Basic principles and techniques for big data analytics, including methods for storing, searching, retrieving, and processing large datasets; introduction to basic machine learning libraries for analyzing large datasets; data visualization; case studies with real-world datasets. Pre-req. CS 5044
Social media platforms, media feeds, and data formats; machine learning and graph theory foundations for social media analytics. Forms of social media analytics - text analytics, network analytics, and action analytics. Forecasting models and applications, including in marketing, event tracking, surveying and A/B testing. Pre-req. CS 5044
Study of the principles and tools applicable to the methodical construction and controlled evolution of complex software systems. All phases of the life cycle are presented; particular attention focuses on the design, testing, and maintenance phases. Introduction to software project management. Attention to measurement models of the software process and product that allow quantitative assessment of cost, reliability, and complexity of software systems. Pre-req. CS 5044
This course focuses on critical aspects of the software lifecycle that have significant influence on the overall quality of the software system including techniques and approaches to software design, quantitative measurement and assessment of the system during implementation, testing, and maintenance, and the role of verification and validation in assuring software quality. Pre-reqs. CS 5044 & CS 5704
Cybersecurity principles and technologies motivated by the evolving ecosystem of the Internet of Things (IoT): devices, operating systems, sensors, data storage, networking and communication protocols, and system services. IoT device and system security and privacy vulnerabilities, analysis and attack mitigation techniques. Pre-reqs. ECE 5484 or CS 5044
Fundamental principles and concepts of computer systems. Computer hardware, Boolean logic, number systems and representation design and operation of digital logic; analysis of instruction set architectures and computer organization, and specification of data communication and networking standards.
Fundamental principles and concepts of computer networks, application, transport, network, and data link protocols. Contemporary and emerging networks; Internet protocols. Principles of quality of service, network security and network management. Pre-req. ECE 5484
Performance evaluation via analysis, simulation and experimental methods of networks and network protocols. Wireless and mobile network technologies and protocols, wireless local area networks, cellular systems, sensor networks and the Internet of Things. Mobility in the Internet and application support for mobility. Pre-reqs. ECE 5484 & ECE 5485.
Fundamental Internet and computer security principles and applications; legal and privacy issues; risk analysis, attack techniques, intrusion detection concepts, basic computer forensics, and system and application security hardening techniques. Pre-req. ECE 5484 required and CS 5044 recommended
Advanced security and trust concepts and implementation in wired and wireless computer networks; computer systems malware defenses; impacts of channel fragility, node mobility, and cooperative functionality, and resource constraints on security and trust at the different layers of the Internet protocol stack. Pre-reqs. ECE 5484, ECE 5585 required and CS 5044 recommended
This course focuses on the role of the leader in crafting corporate and business strategies where technology provides the basis for the firm's competitive advantage.