{"id":8,"date":"2017-10-31T07:42:56","date_gmt":"2017-10-31T11:42:56","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis3580sec001s2018\/?page_id=7"},"modified":"2022-01-13T01:13:00","modified_gmt":"2022-01-13T06:13:00","slug":"about","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/about\/","title":{"rendered":"Syllabus"},"content":{"rendered":"<p>This course introduces students to the methods used as organizations builds an enterprise information system architecture within an environment of internal control. Topics include information system planning, management and usage, the development, acquisition and maintenance of these technologies and their impact on the organization\u2019s business processes.<\/p>\n<h3>Course Objectives<\/h3>\n<ol>\n<li>Evaluate the business case for the proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether it meets business objectives.<\/li>\n<li>Evaluate IT supplier selection and contract management processes service levels and requisite controls are met.<\/li>\n<li>Evaluate the project management framework and controls to determine whether business requirements are achieved in a cost-effective manner while managing risks to the organization.<\/li>\n<li>Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation, and has timely and accurate status reporting.<\/li>\n<li>Evaluate controls for information systems during the requirements, acquisition, development and testing standards, procedures and applicable external requirements.<\/li>\n<li>Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls and the requirements are met.<\/li>\n<li>Conduct post-implementation reviews of systems to determine whether project deliverables, controls and the requirements are met.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><\/p>\n<h3>\u00a0Textbook and Readings and Reference Material<\/h3>\n<table class=\"aligncenter\" style=\"width: 90%;border-style: solid;border-color: #606060;background-color: #f0f0f0\" border=\"1\" width=\"90%\" cellspacing=\"0\">\n<tbody>\n<tr style=\"border-style: solid;border-color: #606060\">\n<td style=\"width: 13.9461%;height: 79px\" width=\"85\">\n<h5>Textbooks<\/h5>\n<\/td>\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p>Valacich J.S. and George J.F., 2017, <u>Modern Systems Analysis and Design<\/u>, Eighth Edition, Pearson Education, Inc., ISBN-13: 978-0-13-420492-5<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 58px\">\n<td style=\"width: 13.9461%;height: 979px\" rowspan=\"16\" width=\"85\">\n<h5>ISACA<\/h5>\n<\/td>\n<td style=\"width: 84.6276%;height: 58px\" width=\"540\">\n<p>CISA Review Manual 26<sup>th<\/sup> Edition, 2015, ISACA, ISBN 978-1-60420-367-7<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p>\u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/COBIT-2019-Framework-Introduction-and-Methodology_res_eng_1118.pdf\">COBIT 2019: Framework Introduction and Methodology<\/a>\u201d, ISACA, ISBN 978-1-60420-763-7<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>\u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/COBIT5-Ver2-enabling.pdf\">COBIT 5: Enabling Processes<\/a>\u201d, 2012, ISACA, ISBN 978-1-60420-241-0<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p>Chaudhuri, A., von Solms, SH, Chaudhuri, D. (2011), \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/AuditingSecurityRisksInVirtualITSystems.pdf\">Auditing Risks in Virtual IT Systems<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>Gelbstein, E. (2015) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/Auditors-and-Large-Software-Projects-Part-1_joa_Eng_0915.pdf\">Auditors and Large Software Projects, Part 1<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>Gelbstein, E. (2015) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/Auditors-and-Large-Software-Projects-Part-2_joa_Eng_1015.pdf\">Auditors and Large Software Projects, Part 2<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>Gelbstein, E. (2015) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/Auditors-and-Large-Software-Projects-Part-3_joa_Eng_1115.pdf\">Auditors and Large Software Projects, Part 3<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>Helskanen, A.LJK (2012) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/Project-Portfolio-Management.pdf\">Project Portfolio Management<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p>Kancharia, M. and Bhattacharjee, S. (2010) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/Realizing-Benefits-of-IT-Investments.pdf\">Realizing Benefits of IT Investments: Overcoming the Silver-bullet View<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p>Raval, V. and Sharma, R. (2017) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/Mitigating-the-Risk-Factors-of-IT-Project-Failure.pdf\">Mitigating the Risk Factors of IT Project Failure<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>Singleton, T. (2014) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/LogicalReasonForConsiderationOfIT.pdf\">The Logical Reason for Consideration of IT<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>Singleton, T. (2014) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/The-Core-of-IT-Auditing.pdf\">The Core of IT Auditing<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>Singleton, T. (2012) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/Auditing-Applications-Part-1.pdf\">Auditing Applications, Part 1<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>Singleton, T. (2012) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/Auditing-Applications-Part-2.pdf\">Auditing Applications, Part 2<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>Singleton, T. (2011) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/UnderstandingTheNewSOC-Reports.pdf\">Understanding the New SOC Reports<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p>Singleton, T. (2010) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/IT-Audits-of-Cloud-and-SaaS.pdf\">IT Audits of Cloud and SaaS<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 63px\">\n<td style=\"width: 13.9461%;height: 63px\" width=\"85\">\n<h5>FedRAMP<\/h5>\n<\/td>\n<td style=\"width: 84.6276%;height: 63px\" width=\"540\">\n<p>\u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/CSP_Authorization_Playbook_Getting_Started_with_FedRAMP-1.pdf\">CSP Authorization Playbook \u2013 Getting Started with FedRAMP<\/a>\u201d<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 13.9461%;height: 79px\" width=\"85\">\n<h5>FIPS<\/h5>\n<\/td>\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/FIPS-PUB-199-final.pdf\">PUB 199 \u201cStandards for Security Categorization of Federal information System and Information Systems\u201d<\/a><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 13.9461%;height: 316px\" rowspan=\"4\" width=\"85\">\n<h5>NIST<\/h5>\n<\/td>\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/nistspecialpublication800-34r1.pdf\">Special Publication 800-34 Revision 1 \u201cContingency Planning Guide for Federal Information Systems\u201d<\/a><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/nistspecialpublication800-53Ar4.pdf\">Special Publication 800-53A Revision 4 \u201cAssessing Security and Privacy Controls in Federal Information Systems and Organizations\u201d<\/a><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/nistspecialpublication800-53r4.pdf\">Special Publication 800-53 Revision 4 \u201cSecurity and Privacy Controls for Federal information Systems and Organizations\u201d<\/a><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/nistspecialpublication800-64r2.pdf\">Special Publication 800-64 Revision 2 \u201cSecurity Considerations in the System Development Life Cycle\u201d (SDLC)<\/a><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 13.9461%;height: 79px\" width=\"85\">\n<h5>SANS<\/h5>\n<\/td>\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p>Hein, R. (2004) <a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/application-audit-process-guide-information-security-professionals-1534.pdf\">\u201cThe Application Audit Process \u2013 A Guide for Information Security Professionals\u201d<\/a><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 13.9461%;height: 134px\" rowspan=\"2\" width=\"85\">\n<h5>Misc.<\/h5>\n<\/td>\n<td style=\"width: 84.6276%;height: 55px\" width=\"540\">\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/Why_IT_Projects_Fail_-_Best_Practice_Guidance.pdf\">INTOSAI (2008) \u201cWhy IT Projects fail, Best Practices Guide\u201d<\/a><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 79px\">\n<td style=\"width: 84.6276%;height: 79px\" width=\"540\">\n<p>Peppard, J. (2016) \u201c<a href=\"http:\/\/community.mis.temple.edu\/mis5203sec001sp2019\/files\/2019\/01\/A-Tool-to-Map-Your-Next-Digital-Initiative.pdf\">A Tool to Map Your Next Digital Initiative<\/a>\u201d, Harvard Business Review<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center\"><strong>\u00a0<\/strong><\/p>\n<h3>Schedule<strong> of class topics:<\/strong><\/h3>\n<p><strong>\u00a0<\/strong><\/p>\n<h3>Assignments<\/h3>\n<p>The readings, questions, and case study assignments will bring the real world into class discussion while illustrating fundamental concepts.\u00a0<\/p>\n<ol>\n<li>Readings: Below is the reading schedule you are responsible for completing. Check the class website for updates and changes to the readings. \u00a0Complete each reading and answer reading discussion questions posted to the class website before each class:<\/li>\n<\/ol>\n<table class=\"aligncenter\" style=\"width: 90%;border-color: #606060;background-color: #f0f0f0;border-style: solid\" border=\"1\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td width=\"60\">\n<p><strong>Unit #<\/strong><\/p>\n<\/td>\n<td width=\"498\">\n<p><strong>Readings<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>1<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 1, Ch. 2 \u201cSystems Development Environment\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cSystems Development Methodologies\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cSDLC Models\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cSDLC Phases\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>2<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch.1 \u201cProject Management\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cProject Management and Governance\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>3<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 4 \u201cIdentifying and Selecting Projects\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 5 \u201cInitiating and Planning Information Systems Projects\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cBusiness Case and Feasibility Analysis\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>4<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 6 \u201cDetermining Systems Requirements\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cRequirements Definition\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>5<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 7 \u201cStructured System Process Requirements\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cStructured Techniques\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>6<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 8 \u201cStructured System Data Requirements\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cEntity Relationship Diagrams\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>8<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 9 \u201cDatabase Design\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cControl Identification and Design\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cRelational and Embedded Databases\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>9<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cSoftware Development Methods\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cSystem Development Tools and Productivity Aids\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cControl Identification and Design\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>10<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 10 \u201cDesigning Forms and Reports\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 11 \u201cDesigning Interfaces and Dialogues\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>12<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 12 \u201cDesigning Distributed and Internet Systems\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cInfrastructure Development and Acquisition Practices\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cHardware and Software Acquisition\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>13<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 13 \u201cSystems Implementation\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cIS Auditors Role in Project Management\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cSoftware Development Methodologies\u201d<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISA Ch. 3 \u201cSoftware Testing\u201d<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"60\">\n<p>14<\/p>\n<\/td>\n<td width=\"498\">\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 MSAD Ch. 14 \u201cMaintaining Information Systems\u201d<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Participation<\/h3>\n<p>Much of your learning will occur as you prepare for and participate in discussions about the course material.\u00a0 The assignments, analysis, and readings have been carefully chosen to bring the real world into class discussion while also illustrating fundamental concepts.<\/p>\n<p>To encourage participation, 10% of the course grade is earned by preparing before class and discussing the topics between and in class. Evaluation is based on you consistently demonstrating your engagement with the material. Assessment is based on what you contribute, not simply what you know.<\/p>\n<ol>\n<li>Preparation before class \u2013 To facilitate active participation in the class I request that you do the following before noon on the day of the class:<\/li>\n<\/ol>\n<p>Briefly address and summarize:<\/p>\n<ol>\n<li>One key point you took from each assigned reading. (One or two sentences per reading)<\/li>\n<li>One question that you would ask your fellow classmates that facilitates discussion.<\/li>\n<\/ol>\n<p>I will also require that you identify, and are prepared to discuss, an article about a current event in the IT, Security, or Project Management arena each week.\u00a0 Each student is expected to contribute a link to an article to the online class discussion each week.\u00a0 An ideal article would be tied thematically to the topic of the week.<\/p>\n<p>However, any article you find interesting and would like to share is welcome. The deadline for posting is noon on the day of class.<\/p>\n<ol start=\"2\">\n<li>Participation during class \u2013 We will typically start each session with \u201copening\u201d questions about the assigned readings and analyses. I may ask for volunteers, or I may call on you.\u00a0 Students called on to answer should be able to summarize the key issues, opportunities, and challenges in the analyses.\u00a0 All students should be prepared to answer these questions.<\/li>\n<\/ol>\n<p>Another important aspect of in-class participation is completion of in-class assignments and contribution to any break out activities.<\/p>\n<ol start=\"3\">\n<li>Participation between classes \u2013 To facilitate ongoing learning of the course material, we will also discuss course material on the class blog in between class.<\/li>\n<\/ol>\n<p>Each topical week, a discussion primer will be posted on the class website. Students should actively engage in meaningful discussion of the weekly topic.\u00a0 Full credit for discussions is not predicated on \u201canswering the question\u201d, but rather on meaningful contribution to the conversations.\u00a0 As a general guideline, students are expected to review and post comments three times during each topical unit.<\/p>\n<p>Any submissions to the discussion board after the topical week concludes will not be considered during grading.\u00a0 Overall, discussion participation will be weighted 20% of the final course grade.<\/p>\n<h3>Exams<\/h3>\n<p>There will be twoe exams given during the semester.\u00a0 <strong>Together these exams are weighted 30% of each student\u2019s final grade.\u00a0 <\/strong><\/p>\n<p>Below is the exam schedule:<\/p>\n<p>These exams will consist of multiple-choice questions.\u00a0 You will have a fixed time (e.g. 50 minutes) to complete the exam.\u00a0 Test one will occur in week 7 and will cover the systems analysis and planning; test two will occur in week 14 and will cover the remaining material.<\/p>\n<p>A missed exam can only be made up in the case of documented and verifiable extreme emergency situation.\u00a0 No make-up is possible for test three.<\/p>\n<h3>Projects<\/h3>\n<p>There will be 5 projects during the course.\u00a0 Each project is weighted 12% of your final grade (60% in total).\u00a0 Details on each project will be provided in class, with the due dates noted on the syllabus.\u00a0 While these projects are graded individually, students may work collaboratively to complete their individual project submissions.\u00a0 Students will be randomly chosen to present their project to the class.<\/p>\n<h3>Weekly Cycle<\/h3>\n<p>As outlined above in the <strong>Assignments and<\/strong> <strong>Participation<\/strong> sections, much of your learning will occur as you prepare for and participate in discussions about course content. To facilitate learning course material, we will discuss course material on the class discussion board between classes.\u00a0 Each week this discussion will follow this cycle:<\/p>\n<h3>Evaluation and Grading<\/h3>\n<table>\n<tbody>\n<tr>\n<td width=\"282\">\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"132\">\n<h2>Item<\/h2>\n<\/td>\n<td width=\"90\">\n<p><strong>Weight<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">\n<p>Assignments<\/p>\n<\/td>\n<td width=\"90\">\n<p>60%<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">\n<p>Participation<\/p>\n<\/td>\n<td width=\"90\">\n<p>10%<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">\n<p>Exams<\/p>\n<\/td>\n<td width=\"90\">\n<p>30%<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">\n<p><strong>\u00a0<\/strong><\/p>\n<\/td>\n<td width=\"90\">\n<p><strong>100%<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<td width=\"294\">\n<table width=\"248\">\n<tbody>\n<tr>\n<td colspan=\"4\" width=\"248\">\n<p><strong>Grading Scale<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>94 \u2013 100<\/p>\n<\/td>\n<td width=\"42\">\n<p>A<\/p>\n<\/td>\n<td width=\"84\">\n<p>73 \u2013 76<\/p>\n<\/td>\n<td width=\"43\">\n<p>C<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>90 \u2013 93<\/p>\n<\/td>\n<td width=\"42\">\n<p>A-<\/p>\n<\/td>\n<td width=\"84\">\n<p>70 \u2013 72<\/p>\n<\/td>\n<td width=\"43\">\n<p>C-<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>87 \u2013 89<\/p>\n<\/td>\n<td width=\"42\">\n<p>B+<\/p>\n<\/td>\n<td width=\"84\">\n<p>67 \u2013 69<\/p>\n<\/td>\n<td width=\"43\">\n<p>D+<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>83 \u2013 86<\/p>\n<\/td>\n<td width=\"42\">\n<p>B<\/p>\n<\/td>\n<td width=\"84\">\n<p>63 \u2013 66<\/p>\n<\/td>\n<td width=\"43\">\n<p>D<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>80 \u2013 82<\/p>\n<\/td>\n<td width=\"42\">\n<p>B-<\/p>\n<\/td>\n<td width=\"84\">\n<p>60 \u2013 62<\/p>\n<\/td>\n<td width=\"43\">\n<p>D-<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">\n<p>77 \u2013 79<\/p>\n<\/td>\n<td width=\"42\">\n<p>C+<\/p>\n<\/td>\n<td width=\"84\">\n<p>Below 60<\/p>\n<\/td>\n<td width=\"43\">\n<p>F<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><strong>Grading Criteria<\/strong><\/h3>\n<p>The following criteria are used for evaluating assignments. You can roughly translate a letter grade as the midpoint in the scale (for example, an A- equates to a 91.5).<\/p>\n<table width=\"586\">\n<tbody>\n<tr>\n<td width=\"517\">\n<p><strong>Criteria<\/strong><\/p>\n<\/td>\n<td width=\"70\">\n<p><strong>Grade<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"517\">\n<p>The assignment consistently exceeds expectations. It demonstrates originality of thought and creativity throughout. Beyond completing all of the required elements, new concepts and ideas are detailed that transcend general discussions along similar topic areas. There are no mechanical, grammatical, or organization issues that detract from the ideas.<\/p>\n<\/td>\n<td width=\"70\">\n<p>A- or A<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"517\">\n<p>The assignment consistently meets expectations. It contains all the information prescribed for the assignment and demonstrates a command of the subject matter. There is sufficient detail to cover the subject completely but not too much as to be distracting. There may be some procedural issues, such as grammar or organizational challenges, but these do not significantly detract from the intended assignment goals.<\/p>\n<\/td>\n<td width=\"70\">\n<p>B-, B, B+<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"517\">\n<p>The assignment fails to consistently meet expectations. That is, the assignment is complete but contains problems that detract from the intended goals. These issues may be relating to content detail, be grammatical, or be a general lack of clarity. Other problems might include not fully following assignment directions.<\/p>\n<\/td>\n<td width=\"70\">\n<p>C-, C, C+<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"517\">\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The assignment constantly fails to meet expectations. It is incomplete or in some other way consistently fails to demonstrate a firm grasp of the assigned material.<\/p>\n<\/td>\n<td width=\"70\">\n<p>Below C-<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Late Assignment Policy<\/h3>\n<p>An assignment is considered late if it is turned in after the assignment deadlines stated above.\u00a0 No late assignments will be accepted without penalty unless arrangements for validated unusual or unforeseen situations have been made.<\/p>\n<ul>\n<li>The exercise assignments will be assessed <strong>a 20% penalty<\/strong> each day they are late. No credit is given for assignments turned in over five calendar days past the due date.<\/li>\n<li>You must submit all assignments, even if no credit is given. <strong>If you skip an assignment, an additional 10 points will be subtracted from your final grade in the course.<\/strong><\/li>\n<li>Plan ahead and backup your work. <strong><em>Equipment failure is not an acceptable reason for turning in an assignment late.<\/em><\/strong><\/li>\n<\/ul>\n<h3>Citation Guidelines<\/h3>\n<p>If you use text, figures, and data in reports that were created by others you must identify the source and clearly differentiate your work from the material that you are referencing. If you fail to do so you are plagiarizing. There are many different acceptable formats that you can use to cite the work of others (see some of the resources below). The formats are not as important as the intent. You must clearly show the reader what is your work and what is a reference to someone else\u2019s work.<\/p>\n<h3>Plagiarism and Academic Dishonesty<\/h3>\n<p>All work done for this course:\u00a0 examinations, homework exercises, blog posts, oral and written presentations \u2014 is expected to be the individual effort of the student presenting the work.<\/p>\n<p>Plagiarism and academic dishonesty can take many forms.\u00a0 The most obvious is copying from another student\u2019s exam, but the following are also forms of this:<\/p>\n<ul>\n<li>Copying material directly, word-for-word, from a source (including the Internet)<\/li>\n<li>Using material from a source without a proper citation<\/li>\n<li>Turning in an assignment from a previous semester as if it were your own<\/li>\n<li>Having someone else complete your homework or project and submitting it as if it were your own<\/li>\n<li>Using material from another student\u2019s assignment in your own assignment<\/li>\n<\/ul>\n<p>Plagiarism and cheating are serious offenses, and behavior like this will not be tolerated. In cases of cheating, both parties will be held equally responsible, i.e. both the student who shares the work and the student who copies the work. Penalties for such actions are given at my discretion, and can range from a failing grade for the individual assignment, to a failing grade for the entire course, to expulsion from the program.<\/p>\n<p>Student and Faculty Academic Rights and Responsibilities<\/p>\n<p>The University has adopted a policy on Student and Faculty <a href=\"http:\/\/bulletin.temple.edu\/undergraduate\/academic-policies\/academic-rights-responsibilities\/\">Academic Rights and Responsibilities<\/a> (Policy # <a href=\"http:\/\/policies.temple.edu\/PDF\/99.pdf\">03.70.02<\/a>).<\/p>\n<h3>Additional Information<\/h3>\n<table width=\"636\">\n<tbody>\n<tr>\n<td width=\"143\">\n<p><strong>Availability of Instructor<\/strong><\/p>\n<\/td>\n<td width=\"493\">\n<p>\u00a7\u00a0 Please feel free to contact me via e-mail with any issues related to this class.\u00a0 I will also be available at the end of each session.\u00a0 Please note that these discussions are to address questions\/concerns but are <u>NOT<\/u> for helping students catch up on content they missed because they were absent.<br \/>\nNote: I will respond promptly when contacted during the week<\/p>\n<p>\u00a7\u00a0 I am available to meet personally with you:<\/p>\n<p>\u00fc\u00a0 Immediately before or after class<\/p>\n<p>\u00fc\u00a0 During class breaks<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"143\">\n<p><strong>Attendance Policy<\/strong><\/p>\n<\/td>\n<td width=\"493\">\n<p>\u00a7\u00a0 Class discussion is intended to be an integral part of the course.\u00a0 Therefore, full attendance is expected by every student.<\/p>\n<p>\u00a7\u00a0 If you are absent from class, speak with your classmates to catch up on what you have missed.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"143\">\n<p><strong>Class Etiquette<\/strong><\/p>\n<\/td>\n<td width=\"493\">\n<p>\u00a7\u00a0 Please be respectful of the class environment.\u00a0<\/p>\n<p>\u00a7\u00a0 Class starts promptly at the start time.\u00a0 Arrive on time and stay until the end of class.<\/p>\n<p>\u00a7\u00a0 Turn off and put away cell phones, pagers and alarms during class.<\/p>\n<p>\u00a7\u00a0 Limit the use of electronic devices (e.g., laptop, tablet computer) to class-related usage such as looking up terms and taking notes.\u00a0 Restrict the use of an Internet connection (e.g., checking email, Internet browsing, sending instant messages) to before class, during class breaks, or after class.<\/p>\n<p>\u00a7\u00a0 Refrain from personal discussions during class.\u00a0 Please leave the room if you need to speak to another student for more than a few words.\u00a0 If a student cannot refrain from engaging in private conversation and this becomes a pattern, the students will be asked to leave the classroom to allow the remainder of the students to work.<\/p>\n<p>\u00a7\u00a0 During class time speak to the entire class (or breakout group) and let each person \u201ctake their turn.\u201d<\/p>\n<p>\u00a7\u00a0 Be fully present and remain present for the entirety of each class meeting.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course introduces students to the methods used as organizations builds an enterprise information system architecture within an environment of internal control. Topics include information system planning, management and usage, the development, acquisition and maintenance of these technologies and their impact on the organization\u2019s business processes. Course Objectives Evaluate the business case for the proposed [&hellip;]<\/p>\n","protected":false},"author":8584,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"full-width-content","footnotes":""},"class_list":{"0":"post-8","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/users\/8584"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":11,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":510,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/pages\/8\/revisions\/510"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2020\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}