23.10.2014 Views

BIS Self-Study Appendices - University of Nebraska Omaha

BIS Self-Study Appendices - University of Nebraska Omaha

BIS Self-Study Appendices - University of Nebraska Omaha

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

-2-


APPENDIX 1 – INSTITUTIONAL SUMMARY ....................................................................... 5<br />

APPENDIX 2 – COURSE DESCRIPTIONS ........................................................................... 27<br />

APPENDIX 3 – FACULTY VITAE ....................................................................................... 353<br />

APPENDIX 4 – CURRENT LIST OF SERIALS TITLES .................................................. 501<br />

APPENDIX 5 – STRATEGIC PLAN FOR INFORMATION<br />

TECHNOLOGY SERVICE .......................................................................... 503<br />

APPENDIX 6 – COLLEGE OF IS&T SYSTEM OVERVIEW ............................................ 529<br />

APPENDIX 7 – ASSESSMENT DATA COLLECTION ...................................................... 605<br />

-3-


-4-


APPENDIX 1 – INSTITUTIONAL SUMMARY<br />

The Institution<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong><br />

John E. Christensen, Chancellor<br />

Type <strong>of</strong> Control<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> is a comprehensive, public university located in the heart <strong>of</strong><br />

<strong>Nebraska</strong>’s largest city. It is the second-largest higher education campus in the state. UNO is part <strong>of</strong> the<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> system, which also includes the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-Lincoln, the <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> at Kearney and the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Medical Center.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, with 471 full-time faculty members, <strong>of</strong>fers approximately 100<br />

baccalaureate degree programs and more than 60 masters and doctoral degree programs.<br />

Undergraduate degree programs are <strong>of</strong>fered in the colleges <strong>of</strong> Arts and Sciences, Business<br />

Administration, Education, Fine Arts, Information Science and Technology, Public Affairs and Community<br />

Service, and Division <strong>of</strong> Continuing Studies. Programs and courses also are <strong>of</strong>fered in the College <strong>of</strong><br />

Human Resources and Family Sciences, the College <strong>of</strong> Engineering and Technology, the College <strong>of</strong><br />

Agriculture and Natural Resources, and the College <strong>of</strong> Architecture, which are administered by the<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-Lincoln. The College <strong>of</strong> Public Affairs and Community Service is administered by<br />

the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> on both the <strong>Omaha</strong> and Lincoln campuses.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> has a central administration with a President at the helm who reports to an<br />

elected Board <strong>of</strong> Regents. Each campus including UNO has a chancellor who reports to the system<br />

President. UNO is organized into five colleges (College <strong>of</strong> Information Science & Technology, College <strong>of</strong><br />

Fine Arts, Communication and Media, College <strong>of</strong> Public Administration and Community Affairs, College<br />

<strong>of</strong> Education and the College <strong>of</strong> Arts & Sciences), with Deans who report to the Vice Chancellor <strong>of</strong><br />

Academic Affairs.<br />

History <strong>of</strong> Institution<br />

What is now the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> was founded in 1908 as the <strong>University</strong> <strong>of</strong> <strong>Omaha</strong>, a<br />

private non-sectarian college, with a campus at 24th and Pratt Streets in northeast <strong>Omaha</strong>. The first<br />

term <strong>of</strong> the co-educational college began in 1909, under the leadership <strong>of</strong> Dr. Daniel E. Jenkins, with<br />

twenty students.<br />

The movement to make the <strong>University</strong> a municipal institution began in 1929, and in May, 1930 the<br />

citizens <strong>of</strong> <strong>Omaha</strong> voted to establish the Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong>. In the summer <strong>of</strong> 1930, the<br />

<strong>Omaha</strong> Board <strong>of</strong> Education selected the first <strong>University</strong> Board <strong>of</strong> Regents who was inducted into <strong>of</strong>fice<br />

-5-


on July 1, 1930. In January, 1931 the new Board <strong>of</strong> Regents took over the <strong>University</strong> <strong>of</strong> <strong>Omaha</strong> and its<br />

properties.<br />

The expansion <strong>of</strong> the Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong> in the early 1930s led to a decision to move the<br />

campus to a 52-acre site southwest <strong>of</strong> Dodge and 60th Streets. In November 1936, the <strong>University</strong><br />

secured a grant from the Works Progress Administration which, together with some accrued building<br />

funds, financed the construction <strong>of</strong> a Georgian-style building. This building, now called Arts and<br />

Sciences Hall, was finished in 1938 and served as the sole campus building until the 1950s.<br />

In July 1968, the citizens <strong>of</strong> <strong>Omaha</strong> voted to transfer all <strong>University</strong> property to the <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong>, and the former Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong> became the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>.<br />

The <strong>University</strong> began rapid growth when it became a part <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> System.<br />

Enrollment was 8,730 in the fall <strong>of</strong> 1967 which was the last year as the Municipal <strong>University</strong> <strong>of</strong> <strong>Omaha</strong>.<br />

Three years later, enrollment was 13,185, a growth <strong>of</strong> 51 percent in the first three years as the<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>. Student enrollment for the fall 2003 semester is 14,959.<br />

The Dodge Street campus has expanded from its original 52 acres to the current 158.5 acres at two<br />

locations. On January 17, 1998 the Board <strong>of</strong> Regents approved a ground lease with <strong>Nebraska</strong> Housing I<br />

Limited Partnership (with Century Development as the general partner) to provide 576 beds <strong>of</strong> student<br />

housing at UNO. Six buildings and a club/<strong>of</strong>fice was completed for the fall 1999 semester and Scott Hall<br />

was completed for the fall 2000 semester which provided housing for an additional 164 students. Scott<br />

Village opened in fall 2003; total on-campus housing capacity is now 1,212 students. Groundbreaking for<br />

The Peter Kiewit Institute <strong>of</strong> Information Science, Technology and Engineering began on September 10,<br />

1997 and was open for the fall 1999 semester. This 147,797 square foot facility is located on the former<br />

Aksarben property and is designed to meet present needs and has the flexibility to adapt easily to<br />

breaking technologies <strong>of</strong> tomorrow. The building will house UNO’s College <strong>of</strong> Information Science and<br />

Technology and the <strong>Omaha</strong>-based programs <strong>of</strong> UNL’s College <strong>of</strong> Engineering and Technology.<br />

Student Body<br />

With a student body <strong>of</strong> 14,959 undergraduate and graduate students, the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at<br />

<strong>Omaha</strong> strives to treat each student as an individual. The UNO student population is a diverse mix <strong>of</strong> full<br />

and part-time students, men and women, and traditional and non-traditional-age enrollees. Students<br />

come from all walks <strong>of</strong> life, from business pr<strong>of</strong>essionals to international students. Such broad<br />

backgrounds and experiences enrich the classroom atmosphere. Ample opportunity is provided for<br />

specialized study in terms <strong>of</strong> interest, talent and ultimate vocational objective. Thus, the <strong>University</strong> is<br />

concerned that its graduates be good citizens who earn a better living and live a richer, fuller life.<br />

The <strong>University</strong>, in addition to <strong>of</strong>fering courses for college credit, designs training courses for thousands<br />

<strong>of</strong> business and industrial employees; provides in-service training for elementary and secondary school<br />

-6-


teachers; conducts television classes for college credit and sponsors a wide variety <strong>of</strong> conferences,<br />

workshops, lectures, and fine art events to enrich the college credit <strong>of</strong>ferings.<br />

Opportunities for teaching and research abroad, coordinated by the Office <strong>of</strong> International Studies and<br />

Programs, exist through the <strong>University</strong>’s network <strong>of</strong> sister institutions in Germany, India, Japan, Norway<br />

the Philippines, Romania and Czechoslovakia, and through exchange programs with China, Austria,<br />

Russia, Belgium and Mexico.<br />

Regional or Institutional Accreditation<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> is accredited by the North Central Association <strong>of</strong> Colleges and<br />

Secondary Schools, and has programs which are accredited or approved by the National Council for<br />

Accreditation <strong>of</strong> Teacher Education, the Council for Accreditation <strong>of</strong> Counseling and Related Educational<br />

Programs, the National Council on Social Work Education, the Engineers Council for Pr<strong>of</strong>essional<br />

Development, Computing Accreditation Commission/Accreditation Board for Engineering and<br />

Technology, National Association for Industrial Technology, the American Home Economics<br />

Association(for undergraduate programs), the American Dietetic Association, the AACSB International –<br />

the Association to Advance Collegiate Schools <strong>of</strong> Business, the National Association <strong>of</strong> School <strong>of</strong> Music,<br />

the National Association <strong>of</strong> Schools <strong>of</strong> Public Affairs and Administration, the Educational Standards<br />

Board <strong>of</strong> the Board <strong>of</strong> Examiners in Speech-Language Pathology and Audiology, the Commission on<br />

Accreditation <strong>of</strong> Allied Health Education Programs (CAAHEP), the Council on Aviation Administration,<br />

Association <strong>of</strong> Small Business Development Centers, and the American Chemical Society.<br />

UNO’s courses are accepted for purposes <strong>of</strong> teacher certification by the <strong>Nebraska</strong> State Department <strong>of</strong><br />

Education. The Elementary School, Secondary School and Community Counseling programs are<br />

accredited by the Council for the Accreditation <strong>of</strong> Counseling and Related Educational Programs<br />

(CACREP), the national accrediting agency for Counselor Education programs.<br />

Course credits from UNO are accepted by other member colleges and universities <strong>of</strong> the North Central<br />

Association and by member institutions <strong>of</strong> other regional accrediting agencies<br />

Personnel and Policies<br />

Promotion and Tenure<br />

In general, tenure-track junior faculty must be reappointed each year. Their portfolios are reviewed first<br />

by a departmental committee consisting <strong>of</strong> all tenured faculty members within the department. This<br />

committee evaluates the individual's performance as outstanding, above average, average, or belowaverage<br />

in the three categories <strong>of</strong> teaching, research, and service. In addition, a vote is taken on<br />

whether to reappoint the individual. This evaluation and the vote, together with supporting arguments<br />

and recommendations for the department chair and for the individual, are submitted to the faculty<br />

member review and possible comments. Then the portfolios are submitted to the department chair.<br />

-7-


The department chair writes a recommendation on whether to reappoint the individual or not.<br />

Following the Department chair's review, the faculty member reviews the portfolio prior to its<br />

submission to the College Personnel Committee, which similarly evaluates the faculty member's<br />

accomplishments in teaching, research, and service, and votes on reappointment. The recommendation<br />

<strong>of</strong> the Personnel Committee, consisting <strong>of</strong> three members each <strong>of</strong> the ISQA and CS departments, is then<br />

reviewed by the faculty member, and then the portfolio is submitted to the Dean. Having received<br />

recommendations from the committees, the department chair and the College Personnel Committee,<br />

the Dean writes a recommendation to the Senior Vice Chancellor for Academic and Student Affairs, who<br />

makes the final decision on reappointment. Prior to submission to the Vice Chancellors Office, the<br />

faculty member is required to review and sign the portfolios.<br />

The process for tenure and promotion is similar. Unless a faculty member has been hired on a "fasttrack"<br />

to tenure, he or she submits a tenure packet for review during the fall <strong>of</strong> the sixth year <strong>of</strong><br />

employment at UNO. The tenure packet is reviewed by the same committees and individuals as for<br />

reappointment with the faculty member allowed the opportunity to review the portfolio after each<br />

review and recommendation. The difference is that the departmental committee now consists only <strong>of</strong><br />

those individuals who have already received tenure. Each committee votes on whether or not to<br />

recommend tenure and/or promotion. Rather than making the final decision in the case <strong>of</strong> tenure, the<br />

Senior Vice Chancellor for Academic and Student Affairs makes recommendations to the Board <strong>of</strong><br />

Regents, which must approve each decision.<br />

To be eligible for tenure, an individual must be evaluated as outstanding in either teaching or research,<br />

and above average in the other. Service must be average or better. To help make this evaluation more<br />

objective, the College faculty has approved the use <strong>of</strong> a scoring matrix to assist the committees in<br />

evaluating the scholarly contribution <strong>of</strong> various elements <strong>of</strong> the tenure packet. This scoring matrix may<br />

be made available upon request. This matrix is used as an aid in decision making, but does automate<br />

the tenure decision. Committee members rely on their own judgments and letters <strong>of</strong> reference from<br />

those outside the College who may be in a position to evaluate the faculty member's scholarly<br />

contributions.<br />

Depending on their pr<strong>of</strong>essional experience prior to hire, a faculty member may be hired on a "fasttrack"<br />

tenure schedule, submitting a tenure packet in the fall <strong>of</strong> third year <strong>of</strong> employment.<br />

Faculty Salaries<br />

Each February, all faculty members must submit an Annual Performance Review report, which is used as<br />

the basis for annual performance reviews by the Department Faculty, Department Chair, and the Dean.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> chapter <strong>of</strong> the American Association <strong>of</strong> <strong>University</strong> Pr<strong>of</strong>essors in<br />

their collective bargaining agreement with the faculty negotiates with the <strong>University</strong> the total dollars<br />

that shall be used in determining salary increase for satisfactory performance. This is distributed across<br />

campus on an equal increase for each faculty member who has achieved a satisfactory performance<br />

rating.<br />

-8-


The same Annual Performance Review report is used as the basis for determining merit salary<br />

adjustments. Each year, the Senior Vice Chancellor informs the College <strong>of</strong> the availability <strong>of</strong> money for<br />

merit salary increases which is determined from the amount specified in the Union Bargaining<br />

Agreement less any promotion increases achieved by campus faculty during the<br />

reappointment/promotion/tenure process. Each Department Committee reviews the annual<br />

Performance Review Reports and categorizes each faculty member in the three areas <strong>of</strong> research,<br />

service and teaching. The review is submitted to the department chairperson who then uses these<br />

reviews to assist in assessing faculty performance. The chairperson determines categories based upon<br />

department input and to determine merit salary increments which are submitted to the Dean. The<br />

Dean reviews the recommendations and makes any adjustments that he deems appropriate and the<br />

information is forwarded to the Academic and Student Affairs Office.<br />

Faculty Benefits<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> has a workforce <strong>of</strong> approximately 13,000, including faculty and staff<br />

members on campuses and in outreach locations throughout the state. As one <strong>of</strong> <strong>Nebraska</strong>'s largest<br />

employers, the <strong>University</strong> <strong>of</strong>fers excellent benefits, tuition assistance for faculty and staff and their<br />

families, a diverse multicultural work environment and access to tremendous cultural and education<br />

opportunities.<br />

The normal retirement age for all members <strong>of</strong> the <strong>University</strong> staff is 59 1/2 years. Employees may retire<br />

at age 55 after 10 years <strong>of</strong> service with the <strong>University</strong> with earned annuity benefits computed on an<br />

actuarially equivalent basis. An employee also may retire prior to the normal retirement age because <strong>of</strong><br />

physical or mental disability that prevents such employee from satisfactorily performing work. A faculty<br />

member who is disabled because <strong>of</strong> physical or mental disability and who carries the <strong>University</strong> group<br />

long-term disability income insurance may request a disability leave in lieu <strong>of</strong> a disability retirement.<br />

Among the benefits in the Fringe Benefit Program <strong>of</strong>fered to retirees and early retirees are group life<br />

insurance with various age limits, group medical insurance (or health maintenance organization<br />

participation) which includes prescription benefits, group dental insurance, and long-term care<br />

insurance. The retired employee pays the entire premium for these insurance options.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> provides employees a retirement plan for the purpose <strong>of</strong> accumulating<br />

lifetime retirement income through participation in the Basic Retirement Plan. Participation is<br />

mandatory at age 30 and optional at age 26 with two years <strong>of</strong> service. Both the employee and the<br />

<strong>University</strong> contribute to the basic retirement plan based on a percentage <strong>of</strong> income on a pre-tax basis.<br />

The employee chooses between two levels <strong>of</strong> participation: Tier 1 is 3.5 percent for employee’s<br />

contribution and 6.6 percent for the <strong>University</strong>. Tier 2 is 5.5 percent for the employee’s contribution<br />

and 8.0 percent for the <strong>University</strong>. All contributions, including those made by the <strong>University</strong> are vested<br />

immediately in the employee’s name. Employees have the option to allocate contributions with TIAA-<br />

-9-


CREF and/or Fidelity Investments in several investment categories. Accumulations can be accessed after<br />

employment with the <strong>University</strong> is terminated and can be taken as a lifetime retirement annuity or as a<br />

lump sum payment.<br />

Employees may also participate in the Supplemental Retirement Plan (SRA) which establishes individual<br />

annuity and/or custodial accounts for the purpose <strong>of</strong> supplementing the basic retirement plan. Any<br />

employee, regardless <strong>of</strong> age or length <strong>of</strong> service, may enroll in the SRA. All contributions are made on a<br />

pre-tax, voluntary basis and no <strong>University</strong> contributions are made to this plan. Participants may invest<br />

with TIAA-CREF and/or Fidelity Investments. Accumulations can be accessed only after employment<br />

with <strong>University</strong> is terminated and can be taken as a lifetime retirement annuity or as a lump sum<br />

payment. In addition to the basic and supplemental retirement programs, the <strong>University</strong> also<br />

participates in the Federal Social Security Program.<br />

All retired faculty who have met the normal retirement regulations are also eligible for the employee<br />

scholarship program. Retirees whose applications have been approved pay all normal admission and<br />

matriculation fees. They shall also pay all usual course-related costs such as books and supplies. The<br />

courses may be taken for credit or audit. The program allows tuition equal to the <strong>University</strong>’s residencytuition-charge-per-semester<br />

credit hours less $1.00 per semester credit hour. The program is limited to<br />

not more than 15 credit hours in any 12-month period and is restricted to no more than 6 credit hours<br />

per semester. The program also allows retired employees to be eligible for the Dependent Scholarship<br />

Program which allows a spouse or dependent children to use the employee’s scholarship. Full-time<br />

enrollment status is required for a dependent child to be eligible but not for a spouse and is limited to<br />

undergraduate academic credit courses at any campus <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>.<br />

Retired faculty has the same right to <strong>University</strong> non-academic facilities and services as full-time<br />

employees. These include access and/or admission to <strong>University</strong> non-academic facilities, services,<br />

intercollegiate athletic events, and fine arts programs.<br />

-10-


Education Unit<br />

The chief academic <strong>of</strong>ficer is Dr. Terry Hynes, Senior Vice Chancellor <strong>of</strong> Academic Affairs.<br />

The complete hierarchy <strong>of</strong> the educational unit is provided in the following organizational<br />

chart.<br />

-11-


Credit Unit<br />

We count the 50 minute meeting <strong>of</strong> classroom contact as equal to one contact hour and our semesters<br />

are 16 weeks total which includes one week for finals and one week (5 days total) <strong>of</strong> non-class time<br />

(Spring Break in the Spring semester and Fall Break and Thanksgiving Break in the Fall semester) which is<br />

a total <strong>of</strong> 28 weeks <strong>of</strong> scheduled instruction between a fall and spring semester.<br />

Instructional Modes<br />

In addition to traditional on-campus instruction, the College <strong>of</strong> IS&T has been <strong>of</strong>fering online or distance<br />

education courses. The College <strong>of</strong> IS&T collaborates with the Division <strong>of</strong> Continuing Studies to <strong>of</strong>fer<br />

online degrees in a BGS in MIS and BGS in IT. The BS in MIS is only two or three courses from having<br />

their program online. The following courses have been developed into an online <strong>of</strong>fering:<br />

Pre-requisites for BGS in MIS<br />

*CIST 1100 – Introduction to Personal Computers<br />

*CSCI 1400 – Introduction to Computer Programming<br />

*CIST 2500 – Introduction to Statistics<br />

*ISQA 3210 – Advanced Technology for Personal Productivity<br />

Required Courses<br />

*CIST 3100 – Organizations, Applications, and Technology<br />

*CSCI 1620 – Introduction to Computer Science II<br />

*ISQA 3300 – File Structures for Information Systems<br />

*ISQA 3310 – Managing the Database Environment<br />

**ISQA 4110 – Information Systems Analysis<br />

**ISQA 4120 – Systems Design and Implementation<br />

**ISQA 3400 – Business Data Communications<br />

*CIST 3110 – Information Technology Ethics<br />

*CIST 3600 – Information Security and Policy<br />

*denotes the courses that have been developed and available for online <strong>of</strong>fering<br />

**denotes that these courses are under development and will be available Fall Semester 2009.<br />

Several <strong>of</strong> these courses are <strong>of</strong>fered only once a year or twice a year. For example, CIST 3600 is<br />

<strong>of</strong>fered Spring Semester during the daytime and an online course would be available for<br />

evening students. Courses could alternate semesters between an in-person and online delivery<br />

mode.<br />

Grade-Point Average<br />

For all programs in the College <strong>of</strong> IS&T, a minimum cumulative GPA <strong>of</strong> 2.5 is required for graduation. A<br />

student must obtain a grade <strong>of</strong> C- or better in each class counted towards the degree.<br />

-12-


Academic Supporting Units<br />

The following departments teach courses that are required for the MIS major:<br />

Department College Name and Title <strong>of</strong> Responsible Individual<br />

Accounting Business Administration Jack L. Armitage, Department Chair<br />

Economics Business Administration Donald Baum, Department Chair<br />

English Arts & Sciences Susan Naramore Maher, Department Chair<br />

Mathematics Arts & Sciences Jack Heidel, Department Chair<br />

School <strong>of</strong><br />

Communication, Fine Arts, and Jeremy Lipschultz, School Director<br />

Communication Media<br />

Students are also required to take a co-requisite course, which may be chosen from either an ISQA<br />

course or from one <strong>of</strong> the following departments:<br />

Department College Name and Title <strong>of</strong> Responsible Individual<br />

Finance, Banking,<br />

and Law<br />

Marketing and<br />

Management<br />

Business Administration<br />

Business Administration<br />

David Volkman, Department Chair<br />

Phani Tej Adidam, Department Chair<br />

Students also take Distribution requirements which include the Natural Sciences (Biology, Chemistry,<br />

Physics, Geology, etc.), Humanities (History, Philosophy, Religion, selected English courses, Foreign<br />

Languages, etc.), Social Sciences (Anthropology, Goodrich, Sociology, Psychology, Political Sciences,<br />

selected subjects <strong>of</strong> communication, etc.), Racial minorities (Native American studies, Black Studies,<br />

Latino/Latin American studies, etc.), and International dimension/or Women Studies. Most <strong>of</strong> these<br />

courses are taught by the College <strong>of</strong> Arts & Sciences and some by the College <strong>of</strong> Communication, Fine<br />

Arts and Media.<br />

Non-Academic Supporting Units<br />

<br />

Criss Library<br />

Dr. C.C. and Mabel L. Criss Library (http://library.unomaha.edu) serves as the primary source <strong>of</strong><br />

academic information for the <strong>University</strong> community through its collections, academic and reference<br />

services, innovative and modern technology, exhibit and event programming and modern physical<br />

-13-


facilities. A library staff liaison person is specifically assigned to the college <strong>of</strong> IS&T. In addition, the<br />

college <strong>of</strong> IS&T has a faculty member who is a designated library liaison.<br />

Primary contact: Nora Hillyer, IS&T Staff Liaison (nhillyer@mail.unomaha.edu; 554-2138).<br />

PKI Career Resource Center<br />

The Peter Kiewit Institute's Career Resource Center is dedicated to providing and facilitating unique<br />

opportunities that will enhance your college career and allow students to graduate fully prepared to<br />

enter their chosen pr<strong>of</strong>ession well prepared for success!<br />

Opportunities provided to students by the Career Resource Center include:<br />

Internships with a large variety <strong>of</strong> business partners during the academic year and summer.<br />

Internship include full/part-time internships, salaried and "for credit" internships.<br />

Full-time employment opportunities following graduation.<br />

Resume/cover letter development and assistance.<br />

Mock interviews with business/industry representatives.<br />

Networking opportunities with business/industry partners.<br />

A library and other reading material.<br />

An environment conducive to study and interaction with other students and staff.<br />

Primary contact: Doug Bahle, Coordinator, Career Resource Center (dbahle@nufoundation.org;<br />

554-2090)<br />

UNO Career Center<br />

The UNO Career Center (http://unoceo.unomaha.edu/) establishes and develops partnerships<br />

with employers, the community, and alumni to assist students in exploring their career<br />

possibilities. These partnerships provide students, alumni, and faculty with enhanced career<br />

development and educational experiences. The career center <strong>of</strong>fers various services including the<br />

following:<br />

-14-


Fairs & Exhibits<br />

Career Preparation Workshops<br />

Info Sessions & Tables<br />

On-campus Interviews<br />

Resume & Cover Letter<br />

Job Search<br />

Interviewing & Salary<br />

Networking & Apparel<br />

<strong>Self</strong> Assessment<br />

Graduate School Advising<br />

UNO CareerConnect<br />

Primary contact: Michelle Perone, Director, UNO Career Center (554-3523)<br />

Information Technology Services (ITS)<br />

ITS provides customer service and free s<strong>of</strong>tware through a site license program with Micros<strong>of</strong>t and<br />

McAfee. They also <strong>of</strong>fer a laptop loan program and support computer user rooms, labs and Internet<br />

centers in multiple buildings on campus. ITS also provides training for a variety <strong>of</strong> computer programs<br />

including MS Office, Lotus Notes, and Blackboard; supports distance education courses; and manages<br />

campus servers and networks.<br />

Primary contact: Lanyce Keel, Director, ITS (554-2020).<br />

College <strong>of</strong> IS&T Systems Support<br />

The members <strong>of</strong> the Systems Staff at the College <strong>of</strong> Information Science and Technology are dedicated<br />

to providing quality support for faculty, staff and students. Support services provided by this group<br />

include:<br />

S<strong>of</strong>tware Installation and troubleshooting<br />

Classroom server support<br />

Printer Installation<br />

Hardware Repairs<br />

Backups<br />

Website help<br />

Technical specifications<br />

Primary contact: Mike Grove, Director, Systems Support (mgrove@mail.unomaha.edu; 554-4392)<br />

International Studies & Programs (http://world.unomaha.edu)<br />

Since 1973, International Studies and Programs (IS&P) has developed and coordinated UNO’s<br />

international projects, student and faculty exchanges, and the undergraduate program in International<br />

Studies. IS&P serves as a focal point for the international mission <strong>of</strong> the university, cultivating global<br />

-15-


awareness and expanding the international connections <strong>of</strong> the students and faculty <strong>of</strong> UNO and the<br />

citizens <strong>of</strong> the State <strong>of</strong> <strong>Nebraska</strong>. IS&P provides outstanding programs and services for prospective and<br />

currently enrolled international students, as well as all other UNO students, faculty and staff. IS&T<br />

international students are serviced by IS&P staff advisors and are the first point <strong>of</strong> contact for all<br />

applicants.<br />

Primary contact: Merry Ellen Turner, Director <strong>of</strong> International Studies & Programs (554-2562;<br />

mturner@mail.unomaha.edu)<br />

UNO Writing Center (http://www.unomaha.edu/writingcenter/)<br />

The Writing Center <strong>of</strong>fers UNO students, faculty, and staff in all university divisions the service to work<br />

with a writing consultant on any university-related writing project. This free service can be used to work<br />

on assignments, resumés, business letters, or other projects. The center’s goal is to encourage students<br />

to become effective, independent writers, rather than edit papers for you, the center helps student<br />

develop the ability to edit their own work. A number <strong>of</strong> IS&T students use this center’s service.<br />

Primary contact: Dorianne Richards, Director (554-3311; drichards@mail.unomaha.edu)<br />

UNO Math and Science Learning Center<br />

The Math-Science Learning Center (MSLC) is a place where UNO students can find the assistance they<br />

need to conquer academic challenges in Math and Science. Model students serve as tutors,<br />

supplemental instruction leaders and study group facilitators trained to assist their peers in achieving<br />

academic success. The MSLC houses meeting alcoves, study/tutoring space, tutorial computers and<br />

reserve study materials. It also <strong>of</strong>fers academic consultation for students seeking to increase their<br />

overall learning effectiveness and efficiency.<br />

Primary contact: Dr. Dana Richter-Egger, Director<br />

UNO Honors Program<br />

The mission <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> Honors Program is to provide an enhanced and<br />

supportive learning environment responsive to the educational needs <strong>of</strong> highly able and/or<br />

exceptionally motivated undergraduate students. This goal will be accomplished through participation <strong>of</strong><br />

faculty noted for excellence in teaching by providing small honor sections <strong>of</strong> regular courses,<br />

interdisciplinary Honors colloquia, special seminars, and increased opportunity for undergraduate<br />

research/creative activity. The <strong>University</strong> Honors Program is a program with its own budget with a<br />

Director who is responsible to the Vice Chancellor for Academic and Student Affairs through the<br />

Associate Vice Chancellor for Academic Affairs. The Director works closely with the <strong>University</strong> Honors<br />

Committee to establish and review policies and procedures for the <strong>University</strong> Honors Program.<br />

Primary contact: Dr. Rosalie C. Saltzman, Director (rsaltzma@mail.unomaha.edu; 554-4963)<br />

-16-


Faculty Workload<br />

<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> and the college <strong>of</strong> IS&T has specific guidelines on faculty workload.<br />

Teaching load per faculty member per term is based on a 12-hour equivalent workload. (Most courses<br />

are taught as a 3-hour course.) Tenured and tenure-track faculty members on an average teach 6 hours<br />

per semester with the additional 6 hours for research and/or service activities. Newly recruited faculty<br />

members will have their teaching workload further reduced normally to give them opportunity to begin<br />

their research (if recruited directly after receiving their Ph.D.) or an opportunity to continue their<br />

research activities while acclimating to a new academic environment.<br />

-17-


Day<br />

Co-op<br />

Off<br />

Campus<br />

Alternate<br />

Mode<br />

Now<br />

Accredited.<br />

Not Now<br />

Accredited<br />

Now<br />

Accredited<br />

Not Now<br />

Accredited<br />

Nominal<br />

Years to<br />

Complete<br />

Administrative<br />

Head<br />

Table 1. Programs Offered by the Educational Unit<br />

Program Title 1 Modes Offered 2<br />

Administrative<br />

Unit or Units<br />

(e.g. Dept.)<br />

Exercising<br />

Budgetary<br />

Control<br />

BS Computer Science X 4 Quiming Zhu Computer<br />

Science<br />

X<br />

Submitted for<br />

Evaluation 3<br />

Offered, Not<br />

Submitted for<br />

Evaluation 4<br />

BS Management<br />

Information Systems<br />

X 4 Ilze ZIgurs ISQA X<br />

BS Bioinformatics X X<br />

BS Information<br />

Assurance<br />

X<br />

X<br />

MS Computer<br />

Science<br />

X 2 Quiming Zhu<br />

Computer<br />

Science<br />

X<br />

MS Management<br />

Information Systems<br />

X 2 Ilze Zigurs ISQA X<br />

-18-


List <strong>of</strong> the titles <strong>of</strong> all degrees <strong>of</strong>fered by the education unit responsible for the programs being evaluated, undergraduate and graduate, granted by the institution. If there are<br />

differences in the degrees awarded for completion <strong>of</strong> co-op programs, these should be clearly indicated.<br />

1<br />

Give program title as shown on a graduate’s transcript<br />

2<br />

Indicate all modes in which the program is <strong>of</strong>fered. If separate accreditation is requested for an alternative mode, list on a separate line.<br />

Describe “Other” by footnote.<br />

3<br />

Only those programs being submitted at this time for reaccreditation (now accredited) or initial accreditation (not now accredited) should be<br />

checked in this column.<br />

-19-


Table 2. Degrees Awarded and Transcript Designations by Educational Unit<br />

Modes Offered 2 Alternative Name <strong>of</strong> Degree<br />

Program Title 1 Day Co-op Off Campus Mode<br />

Awarded 3 Designation on Transcript 4<br />

Dept: Computer Science<br />

Major Computer Science<br />

Dept: Information Systems<br />

Quantitative Analysis<br />

Major: Management<br />

Information Systems<br />

Bachelor <strong>of</strong><br />

Science in<br />

Computer Science<br />

Bachelor <strong>of</strong><br />

Science in<br />

Management<br />

Information<br />

Systems<br />

Complete the table for all programs, as follows:<br />

1<br />

Give the program title as <strong>of</strong>ficially published in catalog.<br />

2<br />

List the mode for each program <strong>of</strong>fered. 3 List degree awarded for each mode <strong>of</strong>fered. If different degrees are awarded, list on separate lines.<br />

4<br />

Indicate how the program is listed on transcript for each mode <strong>of</strong>fered. If different designations are used, list on separate lines.<br />

-20-


The transcript <strong>of</strong> a Computer Science major would show the following information:<br />

Current Academic Program:<br />

Information Science & Technology<br />

Bachelor <strong>of</strong> Science, Computer Sci<br />

Major: Computer Science<br />

The transcript <strong>of</strong> a Management Information Systems major would show the following information:<br />

Current Academic Program:<br />

Information Science & Technology<br />

Bach <strong>of</strong> Science, Mgmt Info Systems<br />

Major: Management Info Systems<br />

-21-


Table 3. Support Expenditures<br />

Information Systems and Quantitative Analysis<br />

Fiscal Year 2007-2008 2008-2009 2009-2010<br />

Expenditure Category<br />

Operations (not including staff) 25,480 34,808 34,808<br />

Travel 26,048 17,786 17,786<br />

Equipment<br />

(a) Institutional Funds 0 0 0<br />

(b) Grants and Gifts<br />

Graduate Teaching Assistants 45,234 47,686 47,548<br />

Part-time Assistance<br />

7,976 915 945<br />

(other than teaching)<br />

Faculty Salaries 1,356,993 1,553,708 1,615,708<br />

College <strong>of</strong> IS&T<br />

Fiscal Year 2007-2008 2008-2009 2009-2010<br />

Expenditure Category<br />

Operations (not including staff) 293,154 356,258 370,508<br />

Travel 69,818 74,305 71,333<br />

Equipment<br />

(a) Institutional Funds 11,432 0 0<br />

(b) Grants and Gifts<br />

Graduate Teaching Assistants 314,150 189,767 197,357<br />

Part-time Assistance<br />

217,828 87,485 90,984<br />

(other than teaching)<br />

Faculty Salaries 3,735,088 4,117,042 4,420,273<br />

Approximately 24% <strong>of</strong> total faculty salaries for their benefits are not included in Faculty Salary<br />

figures.<br />

-22-


Table 4. Personnel and Students<br />

Information Systems and Quantitative Analysis<br />

Year: __2008-2009___<br />

HEAD COUNT FTE RATIO TO<br />

FT PT<br />

FACULTY<br />

Administrative .6 0 .6<br />

Faculty (tenure-track) 13.4 0 13.4<br />

Other Faculty (excluding student<br />

Assistants) 2 3 2.75<br />

Student Teaching Assistants 0 0 0 0<br />

Student Research Assistants 4 0 4 25%<br />

Technicians/Specialists 0 0 0 0<br />

Office/Clerical Employees 1 0 1 6%<br />

Others 0 0 0 0<br />

Undergraduate Student enrollment<br />

Graduate Student enrollment<br />

*The undergraduate student enrollment figures include Freshmen and Sophomores.<br />

College <strong>of</strong> IS&T<br />

Year: __2008-2009___<br />

HEAD COUNT FTE RATIO TO<br />

FT PT<br />

FACULTY<br />

Administrative 2.7 0 2.7<br />

Faculty (tenure-track) 30.3 0 30.3<br />

Other Faculty (excluding student<br />

Assistants) 12 .29 12.29<br />

Student Teaching Assistants 4 0 4 9%<br />

Student Research Assistants 20 0 20 47%<br />

Technicians/Specialists 7 1.9 8.9 21%<br />

Office/Clerical Employees 6 .5 6.5 15%<br />

Others 7.05 0 7.05 17%<br />

Undergraduate Student enrollment 473 123 522 14%<br />

Graduate Student enrollment 78 182 95 6%<br />

*The undergraduate student enrollment figures include Freshmen and Sophomores and<br />

one Early Entry.<br />

*Others including advising, grant writer and IT Outreach<br />

-23-


Total<br />

Undergrad<br />

Total<br />

Grad<br />

Table 5. Program Enrollment and Degree Data<br />

Information Systems and Quantitative Analysis<br />

Enrollment Year<br />

Degrees Conferred<br />

Academic<br />

Year<br />

1st 2nd 3 rd 4th 5th Bachelor Master Doctor Other<br />

CURRENT FT 26 35 34 43 138 34<br />

Fall 2008 08-09 PT 5 4 10 28 5 52 109<br />

1 FT 31 29 40 41 1 142 40<br />

Fall 2007 07-08 PT 10 11 12 18 3 54 84 50 35 45<br />

2 FT 34 35 44 39 1 153 34<br />

Fall 2006 06-07 PT 3 7 15 29 7 61 82 57 27 11<br />

3 FT 42 34 46 57 179 31<br />

Fall 2005 05-06 PT 5 3 17 41 8 74 87 68 38<br />

4 FT 26 42 61 50 3 182 27<br />

Fall 2004 04-05 PT 1 5 19 53 11 89 89 94 26<br />

5 FT 40 53 63 80 4 240 57<br />

Fall 2003 03-04 PT 7 16 29 49 7 108 99 78 52<br />

Note: 08-09 Degrees Conferred will be made available during the campus visit in fall 2009.<br />

The 1 st year column includes some undeclared majors.<br />

The 5 th year columns reports special undergraduates and undergraduates enrolled in only a certificate program. Give <strong>of</strong>ficial fall term<br />

enrollment figures (head count) for the current and preceding five academic years and undergraduate and graduate degrees conferred during<br />

each <strong>of</strong> those years. The "current" year means the academic year preceding the fall visit.<br />

FT--full time, PT—part time<br />

-24-


Table 6. Faculty Salary Data 1<br />

Information Systems and Quantitative Analysis<br />

Academic Year 2008-2009<br />

Pr<strong>of</strong>essor<br />

Associate<br />

Pr<strong>of</strong>essor Assistant Pr<strong>of</strong>essor Instructor<br />

Number 2 9 3 2<br />

High 157,544 129,304 108,130 47,491<br />

Mean 152,439 99,299 105,355 44,157<br />

Low 147,334 85,929 100,000 40,823<br />

1<br />

College <strong>of</strong> IS&T<br />

Chairs and segregated salary support is not included in these figures. The Instructor<br />

column includes Instructors and Lecturers.<br />

Academic Year 2008-2009<br />

Pr<strong>of</strong>essor<br />

Associate<br />

Pr<strong>of</strong>essor Assistant Pr<strong>of</strong>essor Instructor Other<br />

Number 9 14 8 8 8<br />

High 157,544 129,304 108,130 59,484 158,327<br />

Mean 113,261 99,485 98,742 42,196 71,416<br />

Low 94,797 85,929 82,994 39,924 57,757<br />

1<br />

Chairs and segregated salary support is not included in these figures. The Instructor<br />

column includes Assistant Instructors and Lecturers. Other column includes Senior<br />

Community Service Associate, Senior Fellows, Senior Research Fellows and Senior<br />

Research Tech Fellows. This does not include any faculty support from grants.<br />

-25-


-26-


APPENDIX 2 – COURSE DESCRIPTIONS<br />

For each required or elective course in the program that can be counted in the curriculum being reviewed for<br />

accreditation, include a two-page or three-page course outline, as indicated below, at this point in the <strong>Self</strong>-<strong>Study</strong><br />

Report. If your documentation does not exactly follow this format, be sure that all <strong>of</strong> the requested information<br />

(if applicable) is present, and please in any case adhere to a common format for all course descriptions. If some <strong>of</strong><br />

this documentation is on-line (e. g., in an instructor’s web site), please give here the URLs for accessing any such<br />

materials. These URLs should be made accessible to the visiting team as soon as the <strong>Self</strong>-<strong>Study</strong> is sent to them.<br />

As described in Section H <strong>of</strong> the General Instructions for the <strong>Self</strong>-<strong>Study</strong>, the course outline for each required or<br />

elective computing course in the program (including those that satisfy the IS Environment component <strong>of</strong> an<br />

Information Systems program) must also be included in a display <strong>of</strong> course materials that is available for study at<br />

all times during the evaluation visit.<br />

-27-


-28-


CIST 1010 Foundations <strong>of</strong> Information Science and Technology<br />

Department and Course Number CIST 1010<br />

Course Title<br />

Course Coordinator<br />

Total Credits 1<br />

Date <strong>of</strong> Last Revision 10/12/08<br />

Foundations <strong>of</strong> Information Science and Technology<br />

Ilze Zigurs<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

An introduction to the information age; focus on foundations <strong>of</strong> information technologies,<br />

problem solving, information system applications, and social issues. Also describes careers in<br />

information related fields.<br />

1.2 For whom course is intended.<br />

This course is the first <strong>of</strong> six included in the College <strong>of</strong> IS&T’s new core curriculum. Core courses<br />

are to be taken by students before moving into their major area <strong>of</strong> study in the college.<br />

Foundations <strong>of</strong> IS&T is for all students coming into the college (i.e., new incoming freshmen,<br />

transfers from other colleges and universities, and transfers from other colleges in UNO), as well<br />

as students from other colleges who are interested in an overview <strong>of</strong> the broad topics in<br />

information science and technology.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

There are no prerequisites for the course.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

None.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

This course is unique in taking an experiential approach to the discovery <strong>of</strong> information science<br />

and technology. Students have the opportunity to find out what the College <strong>of</strong> Information<br />

Science and Technology is all about – the main areas <strong>of</strong> study, the big topics in the field, and the<br />

opportunities that are ahead. In-class exercises allow students to experience the “inner workings”<br />

<strong>of</strong> information technology and get a first-hand feel for what they might do, so that they can make<br />

informed choices for their careers as students and beyond.<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 Understand the main areas <strong>of</strong> study in information science and technology.<br />

2.2 Recognize and appreciate the range <strong>of</strong> career options in information science and technology.<br />

2.3 Be able to find answers to questions during your career as a student here.<br />

2.4 Know how to connect with faculty members in your areas <strong>of</strong> interest<br />

-29-


2.5 Know how to connect with staff members who can help you accomplish your academic goals .<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence.<br />

3.1 Description <strong>of</strong> College <strong>of</strong> IS&T; Foundation <strong>of</strong> information science 2 hours<br />

and technology fields<br />

3.2 Foundations <strong>of</strong> bioinformatics; experiencing bioinformatics 2 hours<br />

3.3 Foundations <strong>of</strong> computer science; experiencing computer science 2 hours<br />

3.4 Foundations <strong>of</strong> management information systems; experiencing 2 hours<br />

management information systems<br />

3.5 Foundations <strong>of</strong> information assurance; experiencing information 2 hours<br />

assurance<br />

3.6 IT innovation and problem solving 1 hour<br />

3.7 Careers and career development in IS&T 2 hours<br />

3.8 Interdisciplinary issues in IS&T; Social impacts 2 hours<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The class is a mix <strong>of</strong> experiential exercises with discussion. Exercises are conducted in lab sessions<br />

and follow-up discussion builds on what was learned in lab. Guest instructors are included to<br />

expose students to a broad range <strong>of</strong> faculty in the college as well as some guests from industry.<br />

Virtual learning environments and collaboration technologies expose students to leading-edge<br />

methods for collaborative learning.<br />

4.2 Student role in the course.<br />

Students are asked to learn concepts through experiencing them, not to memorize lists and<br />

specific content presented in class. In addition, they are required to apply these concepts in<br />

discussion and exploration.<br />

5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students are continuously evaluated during the course. Each experiential exercise is preceded by<br />

research on that topic and a short written assignment.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

The final grade will be calculated as follows:<br />

Component<br />

Grading<br />

Class attendance and participation in exercises 50%<br />

-30-


Weekly written assignments 50%<br />

5.3 Grading scale and criteria.<br />

The course is a pass-fail course. Students must achieve at least 2500 out <strong>of</strong> 3000 possible points in<br />

order to pass the course. Each weekly assignment is worth 100 points and each weekly class<br />

attendance/participation is worth 100 points.<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

There are no textbooks or required/suggested reading materials.<br />

6.2 Other suggested reading materials, if any.<br />

Current news articles as assigned.<br />

6.3 Other sources <strong>of</strong> information.<br />

The students are provided handouts <strong>of</strong> selected overheads presented in each class presentation<br />

to help them to identify key concepts.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 8<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __15___ written reports (not including exams, tests, quizzes,<br />

or commented programs) to typically __1__ pages and to make __0__ oral presentations <strong>of</strong> typically<br />

_____ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as<br />

well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

One speaker per semester<br />

-31-


10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

No coverage<br />

11.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

One speaker per semester<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections<br />

No coverage<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

6/24/03 ABET cleanup Wolcott<br />

10/12/08 Change to experiential exercises;<br />

Zigurs<br />

Update approach to evaluation to<br />

having regular assignments over the<br />

course <strong>of</strong> the semester;<br />

Update course coordinator<br />

-32-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 1010<br />

Course Title<br />

Foundations <strong>of</strong> Information Science and Technology<br />

Course Coordinator<br />

Ilze Zigurs<br />

Total Credits 1<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the main areas <strong>of</strong> study in<br />

information science and technology.<br />

Recognize and appreciate the range <strong>of</strong> career<br />

options in information science and technology.<br />

Be able to find answers to questions during your<br />

career as a student here<br />

Know how to connect with faculty members in<br />

your areas <strong>of</strong> interest<br />

Know how to connect with staff members who<br />

can help you accomplish your academic goals<br />

S X X X X X X<br />

S X X X X<br />

X X X X X X X X<br />

X<br />

X<br />

X<br />

-33-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-34-


CIST 1100 Introduction to Computing<br />

Department and Course Number CIST 1100<br />

Course Title<br />

Introduction to Personal Computing<br />

Course Coordinator<br />

Mary Levesque<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/13/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course is an introduction to program development using Visual Basic, Excel and<br />

Access.<br />

1.2 For whom course is intended.<br />

Designed for majors in the College <strong>of</strong> IS&T and others required to take it as a pre-requisite<br />

for CIST 1400<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

None.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

None.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

2.0 Objectives:<br />

There are no unusual circumstances for this course.<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 Understanding <strong>of</strong> the program development cycle,<br />

2.2 Create basic Visual Basic programs<br />

2.3 Apply introductory user interface design practices<br />

2.4 Create functional databases using Micros<strong>of</strong>t Access<br />

2.5 Create and use Excel spreadsheets<br />

3.0 Content and Organization:<br />

3.1 Introduction to Spreadsheets – 13.5 Hours<br />

3.1.1 Introduction to Micros<strong>of</strong>t Excel (4.5 hours)<br />

3.1.2 Charts and Graphs in Excel (1.5 hours)<br />

3.1.3 3D Workbooks and file Linking (1.5 hours)<br />

-35-


3.1.4 List and Data Management (3.0 hours)<br />

3.1.5 Exam (1.5 hours)<br />

3.2 Introduction to Programming – 21.0 hours<br />

3.2.1 CPU Fundamentals (1.5 hours, integrated with other topics)<br />

3.2.2 Introduction to programming languages<br />

3.2.3 Problem solving<br />

3.2.4 User-interface design issues (1.5 hours)<br />

3.2.5 Fundamentals <strong>of</strong> Visual Basic (3.0 hours)<br />

3.2.6 Functions (1.5 hours)<br />

3.2.7 Procedures (1.5 hours)<br />

3.2.8 Decisions (4.5 hours)<br />

3.2.9 Repetition (3.0 hours)<br />

3.2.10 Files (1.5 hours)<br />

3.2.11 Arrays (1.5 hours, if time allows)<br />

3.2.12 Exam (1.5 hours)<br />

3.3 Introduction to Database – 10.5 hours<br />

3.3.1 Introduction to Micros<strong>of</strong>t Access (1.5 hours)<br />

3.3.2 Access Tables (3.0 hours)<br />

3.3.3 Reports and Queries from a Data base (1.5 hours)<br />

3.3.4 Miscellaneous (1.5 hours)<br />

3.3.5 Relating Tables (1.5 hours)<br />

3.3.6 Exam (1.5 hours)<br />

-36-


4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The course will be taught through lecture, discussions and demonstrations in the Visual Basic,<br />

Access and Excel applications.<br />

4.2 Student role in the course.<br />

Students will be evaluated through programming assignments, Micros<strong>of</strong>t Application assignments<br />

(written and computer) quizzes and three exams.<br />

4.3 Contact hours.<br />

3 hours<br />

5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

The grade will be based on a combination <strong>of</strong> quizzes, examinations, applications, and<br />

programming assignments.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

The grade will be determined from a weighted average that may resemble the following:<br />

Component<br />

Grading<br />

Quizzes 10%<br />

Exams 50%<br />

Program assignments 40%.<br />

5.3 Grading scale and criteria.<br />

-37-


Points Grade<br />

96-100% A+<br />

92-95% A<br />

89-91% A-<br />

86-88% B+<br />

82-85% B<br />

79-81% B-<br />

76-78% C+<br />

72-75% C<br />

69-71% C-<br />

66-68% D+<br />

62-65% D<br />

59-61% D-<br />

0-58% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Shelly, Gary, Cashman, Thomas, and Hoisington, Corinne, Mocros<strong>of</strong>t Visual Basic 2008 for<br />

Windows and Modile Applications, Introductory.<br />

6.1.2 Farrell, Joyce, Programming Logic and Design Fifth Edition bundled with a flowcharting<br />

tool called Visual Logic<br />

6.1.3 Shelly, Gary, Cashman, Thomas, and Quasney, Jeffrey, Micros<strong>of</strong>t Office Excel 2007<br />

Complete Concepts and Techniques.<br />

6.1.4 Shelly, Gary, Cashman, Thomas, Pratt, Philip, and Last, Mary, Micros<strong>of</strong>t Office Access<br />

2007 Complete Concepts and Techniques.<br />

6.2 Other sources <strong>of</strong> information.<br />

Students are directed to search the World Wide Web for other relevant material.<br />

6.3 Current bibliography <strong>of</strong> resource for student’s information.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category<br />

Core<br />

Hardware and s<strong>of</strong>tware 15<br />

Networking and telecommunications<br />

Modern programming language 18<br />

Analysis and Design 2<br />

Data management 9<br />

Role <strong>of</strong> IS in Organizations<br />

Advanced<br />

-38-


8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___0__ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __0___ pages and to make ___0__ oral presentations <strong>of</strong> typically<br />

__0___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

No coverage<br />

11.0 Problem analysis:<br />

No coverage<br />

12.0 Solution design:<br />

No coverage<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

9/26/02 Initial ABET version Levesque<br />

6/24/03 ABET cleanup Wolcott<br />

10/13/08 Reference list updated Levesque<br />

-39-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 1100<br />

Course Title<br />

Introduction to Personal Computing<br />

Course Coordinator<br />

Mary Levesque<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/13/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understanding <strong>of</strong> the program<br />

X<br />

development cycle,<br />

Create basic Visual Basic programs X X S<br />

Apply introductory user interface design X X S<br />

practices<br />

Create functional databases using<br />

X X S<br />

Micros<strong>of</strong>t Access<br />

Create and use Excel spreadsheets X S S<br />

-40-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-41-


-42-


CIST 1300 Introduction to Web Development<br />

Department and Course Number CIST 1300 / CSCI 1300<br />

Course Title<br />

Introduction to Web Development<br />

Course Coordinator<br />

Robert Fulkerson<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision November 17, 2008<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> course (Catalog description)<br />

This course will provide students with a practical introduction to web development. By learning<br />

the basic skills needed to develop an interactive website, students will develop an understanding<br />

<strong>of</strong> the web development task and an appreciation <strong>of</strong> the importance <strong>of</strong> the Internet in both<br />

business and academic environments. Specific technical topics to be covered include XHTML, CSS,<br />

the Unix/Linux operating system, web server s<strong>of</strong>tware, and a programming language. As part <strong>of</strong><br />

the class, each student will develop a working website.<br />

1.2 For whom course is intended<br />

This course is intended for all college students with an interest in computers.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

MATH 1310 (or equivalent)<br />

1.4 Prerequisites <strong>of</strong> the course (Topics)<br />

1.4.1 User knowledge <strong>of</strong> a computer (PC or equivalent), keyboard and mouse<br />

1.4.2 Basic algebra<br />

1.5 Unusual circumstances <strong>of</strong> the course<br />

None<br />

2.0 Objectives<br />

2.1 List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

Students successfully completing this class will have developed:<br />

1.5.1 A working knowledge <strong>of</strong> a command-line oriented operating system.<br />

1.5.2 The ability to write simple programs in the Perl programming language.<br />

1.5.3 The ability to create an XHTML standards-compliant web page.<br />

1.5.4 The ability to create standards-compliant CSS documents.<br />

-43-


3.0 Content and Organization<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> contact hours on each).<br />

3.1 Introduction and Overview 3<br />

3.2 Unix 1.5<br />

3.2.1 asdjklfasjd<br />

3.2.2 Overview <strong>of</strong> Unix<br />

3.2.3 ssh<br />

3.2.4 mkdir<br />

3.2.5 chmod<br />

3.2.6 directory structure<br />

3.2.7 cd<br />

3.2.8 ls<br />

3.2.9 mv<br />

3.2.10 rm<br />

3.2.11 vim<br />

Contact Weeks<br />

3.3 XHTML 6<br />

3.3.1 Overview<br />

3.3.2 Web browsers<br />

3.3.3 Web servers<br />

3.3.4 Block vs. Inline elements<br />

3.3.5 Content vs. Structure<br />

3.3.6 URLs, relative and absolute<br />

3.3.7 Minimal page (, , , , , )<br />

3.3.8 Headers (, , , , , )<br />

3.3.9 Paragraphs, line breaks and blocks (, , , )<br />

3.3.10 Naming and labeling elements (, )<br />

3.3.11 Comments ()<br />

3.3.12 Formatting (, , , , , , , )<br />

3.3.13 Block quotes ()<br />

3.3.14 More formatting (, , , )<br />

3.3.15 Abbreviations and acronyms (, )<br />

3.3.16 Images ()<br />

3.3.17 Image types (JPEG, GIF, PNG)<br />

3.3.18 Links (, )<br />

3.3.19 Lists (, , , , , )<br />

3.3.20 Tables (, , , )<br />

-44-


3.4 CSS 4.5<br />

3.4.1 Overview<br />

3.4.2 Inline vs. Embedded vs. External<br />

3.4.3 Inline CSS via style attribute<br />

3.4.4 CSS Predefined Values<br />

3.4.5 CSS Lengths / Percentages (em, px, in, cm, mm, pt, pc)<br />

3.4.6 RGB triplets for color<br />

3.4.7 Common properties used for formatting (border, border-color, width, padding, font-size,<br />

font-family, background-color, border-top, border-bottom, etc)<br />

3.4.8 Embedded CSS via tag<br />

3.4.9 Style sheets and rules<br />

3.4.10 External CSS via tag<br />

3.4.11 Pseudo-classes<br />

3.4.12 What is meant by “Cascading” style sheets<br />

3.5 Box Model <strong>of</strong> CSS Layout<br />

Perl 18<br />

3.5.1 Overview<br />

3.5.2 Machine language, Assembly Language, High-level Language<br />

3.5.3 Compiling<br />

3.5.4 Basic output using print, printf<br />

3.5.5 Types <strong>of</strong> programming errors (syntax, runtime, semantic)<br />

3.5.6 Scalar data type<br />

3.5.7 Basic input using <br />

3.5.8 Variable interpolation<br />

3.5.9 Escape characters<br />

3.5.10 chomp() and chop()<br />

3.5.11 Basic arithmetic (+, -, *, /, %, **, ., x)<br />

3.5.12 Precedence <strong>of</strong> operators<br />

3.5.13 Compound assignment operators<br />

3.5.14 Unary increment and decrement operators<br />

3.5.15 if selection<br />

3.5.16 if/else selection<br />

3.5.17 Boolean expressions (&&, ||, !)<br />

3.5.18 Uninitialized variables<br />

3.5.19 while repetition<br />

3.5.20 until repetition<br />

3.5.21 Array data type<br />

3.5.22 foreach repetition<br />

3.5.23 for repetition<br />

3.5.24 Data::Dumper for debugging<br />

3.5.25 Hash data type<br />

3.6 XHTML Forms 3<br />

-45-


3.6.1 Overview<br />

3.6.2 Submit and reset buttons<br />

3.6.3 Checkboxes and radio buttons<br />

3.6.4 Text fields, password fields, text areas<br />

3.6.5 Combo boxes<br />

3.7 CGI 6<br />

3.7.1 Overview<br />

3.7.2 Static content vs. dynamic content<br />

3.7.3 CGI defined<br />

3.7.4 Basic CGI using simple Content-Type: text/html<br />

3.7.5 CGI.pm overview<br />

3.7.6 CGI.pm to create basic XHTML<br />

3.7.7 CGI::Carp for debugging<br />

3.7.8 CGI.pm to create XHTML forms<br />

3.7.9 CGI.pm to process forms<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used<br />

The material is taught through lectures based on a common set <strong>of</strong> slides for all instructors. Some<br />

sections may use hands-on laboratory classrooms for each lecture or for special lectures<br />

throughout the semester.<br />

4.2 Student role in the course<br />

Students are encouraged to read the material in the books in advance <strong>of</strong> the lecture so that new<br />

concepts and terms are not “sprung on them”. They are encouraged to participate in class<br />

discussions and ask questions when the material is unclear since all <strong>of</strong> the material is cumulative<br />

and builds on understanding <strong>of</strong> the material that has come before it in the course.<br />

4.3 Contact hours<br />

5.0 Evaluation<br />

The course usually meets for two 75-minute periods weekly (3.0 contact hours).<br />

5.1 Types <strong>of</strong> student products that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. (For laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Each student will write complete approximately 15 assignments on the various topics as they are<br />

covered during the semester. These assignments will include creating XHTML web pages, CSS style<br />

-46-


sheets and Perl programs. Additionally, the students will take a mid-term and a final exam along<br />

with quizzes as needed.<br />

5.2 Basis for determining the final grade.<br />

70% <strong>of</strong> grade will be based on the program/homework scores, 30% <strong>of</strong> the grade will be based on<br />

the quiz and exam scores.<br />

5.3 Grading scale.<br />

6.0 Resource Material<br />

A+ 97% - 100% 4.00 GPA<br />

A 93% - 96% 4.00 GPA<br />

A- 90% - 92% 3.67 GPA<br />

B+ 87% - 89% 3.33 GPA<br />

B 83% - 86% 3.00 GPA<br />

B- 80% - 82% 2.67 GPA<br />

C+ 77% - 79% 2.33 GPA<br />

C 73% - 76% 2.00 GPA<br />

C- 70% - 72% 1.67 GPA<br />

D+ 67% - 69% 1.33 GPA<br />

D 63% - 66% 1.00 GPA<br />

D- 60% - 62% 0.67 GPA<br />

F 0% - 59% 0.00 GPA<br />

6.1 Textbook(s) or other required readings<br />

6.1.1 Randall L. Schwartz, Tom Phoenix, brian d foy. Learning Perl, Fourth Edition. O’Reilly,<br />

2005.<br />

6.1.2 Elizabeth Castro. HTML, XHTML and CSS, Sixth Edition. Peachpit Press, 2006.<br />

6.2 Other suggested reading materials, if any<br />

6.1.3 http://www.perl.com/<br />

6.1.4 http://www.w3.org/<br />

6.1.5 http://www.w3schools.com/<br />

6.3 Current bibliography and other resources<br />

7.0 Computing Accreditation Commission Category Content (class time in hours)<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language 43.5<br />

Analysis and Design<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

-47-


8.0 Oral and Written Communications<br />

Every student is required to submit at least 0 written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically N/A pages and to make 0 oral presentations <strong>of</strong> typically 0<br />

minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as<br />

for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth)?<br />

None.<br />

10.0 Theoretical content<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

None.<br />

11.0 Problem analysis<br />

Please describe the analysis experiences common to all course sections.<br />

Students will learn a number <strong>of</strong> fundamental computer concepts and skills. At the end <strong>of</strong> the course, they<br />

will be able to apply these skills to the development <strong>of</strong> their own dynamic, data-driven web site.<br />

12.0 Solution design<br />

Please describe the design experiences common to all course sections.<br />

This course will require the student to apply a set <strong>of</strong> initially unfamiliar tools to a diverse set <strong>of</strong> problems.<br />

As the student works through each problem, he/she will gain experience and competence in the broader<br />

skill <strong>of</strong> problem solving.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

4/22/2004 Initial ABET version Pauley<br />

3/9/2005 Change to initial course <strong>of</strong> a sequence Brown Also formatted the course to be<br />

suitable for General Education<br />

8/18/05 Reorganization <strong>of</strong> Content and<br />

Pauley<br />

Organization section to make the course<br />

more web page centric. Also added a<br />

semester project.<br />

9/11/06 Further reorganization <strong>of</strong> Content and Pauley<br />

-48-


Organization to make the course even<br />

more web page centric.<br />

4/21/08 Revision to reflect course conversion to Fulkerson<br />

Perl since Fall 2007<br />

4/24/08 Revision to reflect CSCI 1300 cross-listing Fulkerson<br />

and removal <strong>of</strong> “database” in course<br />

description<br />

11/17/08 Update to include CS Program outcomes Fulkerson<br />

-49-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> CS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 1300 / CSCI 1300<br />

Course Title<br />

Introduction to Web Development<br />

Course Coordinator<br />

Robert Fulkerson<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision November 17, 2008<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

A working knowledge <strong>of</strong> a command-line<br />

oriented operating system<br />

The ability to write simple programs in the<br />

Perl programming language.<br />

The ability to create an XHTML standardscompliant<br />

web page<br />

The ability to create standards-compliant CSS<br />

documents.<br />

S S<br />

X S S X<br />

X X S S X S<br />

X X S S X S<br />

-50-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-51-


-52-


CIST 1400 Introduction to Computer Programming<br />

Department and Course Number CIST 1400<br />

Course Title<br />

Introduction to Computer Programming<br />

Course Coordinator<br />

Robert Fulkerson<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision April 24, 2008<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

An introduction to programming within the context <strong>of</strong> a high level modern programming<br />

language. Coverage <strong>of</strong> fundamental programming concepts and program design; including arrays,<br />

user defined types, and objects. This course has a laboratory component in CIST 1404. This lab is<br />

optional.<br />

1.2 For whom course is intended.<br />

This course is intended for freshman-level students in the College <strong>of</strong> IS&T. It also serves many<br />

other departments, including math, education, geography/geology and engineering.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

MATH 1310 AND EITHER CIST 1100 OR CIST 1300<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

Fundamental computing basics and familiarity with computer processing (input, output). Basic<br />

college algebra.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 The student should be able to write moderately complex programs in the Java language that<br />

accomplish moderately difficult tasks.<br />

2.2 The students are prepared for the continuation <strong>of</strong> their Java studies in CSCI 1620.<br />

2.3 The students should be comfortable working in a Unix-based console environment.<br />

3.0 Content and Organization<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> contact hours on each).<br />

-53-


3.1 Overview (1.5 hrs)<br />

3.1.1 What is a computer<br />

3.1.2 Machine Language<br />

3.1.3 Assembly Language<br />

3.1.4 High-Level Langauge<br />

3.1.5 Compiling bytecode<br />

3.2 Introduction to console-based Java Applications (6 hrs)<br />

3.2.1 Basic program structure<br />

3.2.2 Console output with System.out.printf()<br />

3.2.3 Console output with System.out.print()<br />

3.2.4 Console output with System.out.println()<br />

3.2.5 Variables<br />

3.2.6 int<br />

3.2.7 Console Input Using the Scanner Class<br />

3.2.8 Arithmetic (+, -, *, /, %)<br />

3.2.9 Precedence <strong>of</strong> operators<br />

3.2.10 Equality and relational operators (==, !=, , =)<br />

3.2.11 if<br />

3.3 Introduction to Classes and Objects (7.5 hrs)<br />

3.3.1 Classes, objects and instance variables<br />

3.3.2 Declaring a class with a method<br />

3.3.3 Instantiating an object <strong>of</strong> a class<br />

3.3.4 Declaring a method with a parameter<br />

3.3.5 Primitive types<br />

3.3.6 Constructors<br />

3.4 Control Structures (10.5 hrs)<br />

3.4.1 if<br />

3.4.2 if/else<br />

3.4.3 switch<br />

3.4.4 while<br />

3.4.5 do/while<br />

3.4.6 for<br />

3.4.7 Boolean operators (&&, ||, !)<br />

3.4.8 break<br />

3.4.9 continue<br />

3.5 Arithmetic (1.5 hrs)<br />

3.5.1 Compound assignment operators<br />

3.5.2 Unary increment and decrement operators<br />

3.6 Methods (9 hrs)<br />

-54-


3.6.1 Static methods<br />

3.6.2 Static fields<br />

3.6.3 Math class<br />

3.6.4 Java API packages<br />

3.6.5 Methods with multiple parameters<br />

3.6.6 Argument promotion and casting<br />

3.6.7 Scope<br />

3.6.8 Method overloading<br />

3.7 Arrays (9 hrs)<br />

3.7.1 Introduction to Arrays<br />

3.7.2 Arrays and References<br />

3.7.3 Programming with Arrays<br />

3.7.4 Multidimensional Arrays<br />

3.7.5 Searching and sorting<br />

3.7.6 Variable length argument lists<br />

3.7.7 Command-line arguments<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used.<br />

The material is taught through lectures based on a common set <strong>of</strong> slides, assignments and other<br />

documents for all instructors.<br />

4.2 Student role in the course.<br />

Students are encouraged to read the material in the book in advance <strong>of</strong> the lecture so that new<br />

concepts and terms are not “sprung on them”. They are encouraged to participate in class<br />

discussions and ask questions when the material is unclear since all <strong>of</strong> the material is cumulative<br />

and builds on understanding <strong>of</strong> the material that has come before it in the course.<br />

4.3 Contact hours.<br />

5.0 Evaluation<br />

3.0 contact hours per week<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Each student will write approximately 15 – 20 complete console-based Java programs on<br />

the various topics as they are covered during the semester. Additionally, the students will<br />

take four substantial quizzes and a final exam. There may be writing assignments to help<br />

build a fundamental understanding <strong>of</strong> key programming concepts.<br />

-55-


5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

60% <strong>of</strong> grade will be based on the program/homework scores, 40% <strong>of</strong> the grade will be<br />

based on the quiz and final exam scores.<br />

5.3 Grading scale and criteria.<br />

6.0 Resource Material<br />

A+ 97% - 100% 4.00 GPA<br />

A 93% - 96% 4.00 GPA<br />

A- 90% - 92% 3.67 GPA<br />

B+ 87% - 89% 3.33 GPA<br />

B 83% - 86% 3.00 GPA<br />

B- 80% - 82% 2.67 GPA<br />

C+ 77% - 79% 2.33 GPA<br />

C 73% - 76% 2.00 GPA<br />

C- 70% - 72% 1.67 GPA<br />

D+ 67% - 69% 1.33 GPA<br />

D 63% - 66% 1.00 GPA<br />

D- 60% - 62% 0.67 GPA<br />

F 0% - 59% 0.00 GPA<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Java How to Program, Seventh Edition, Deitel & Deitel, 2007<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Thinking in Java, Fourth Edition, Bruce Eckel, 2006<br />

6.2.2 Java Pocket Guide, Robert Liquori, Patricia Liquori, 2008<br />

6.3 Other sources <strong>of</strong> information.<br />

6.3.1 asdjklajsd<br />

6.3.2 Student study groups<br />

6.3.3 Tutoring provided by the College <strong>of</strong> IS&T<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

7.0 Computing Accreditation Commission (CAC) Category Content (class time in hours)<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

-56-


8.0 Oral and Written Communications<br />

Modern programming language 43.5<br />

Analysis and Design<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

Every student is required to submit at least ___0__ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __0___ pages and to make __0___ oral presentations <strong>of</strong> typically<br />

__0___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

None.<br />

10.0 Theoretical content<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

None.<br />

11.0 Problem analysis<br />

Students must be able to identify the desired goals from a problem statement.<br />

12.0 Solution design<br />

Although each programming assignment targets some topics more than others (namely those that have<br />

been recently presented in the lectures), the solutions will be designed using cumulative knowledge.<br />

Students will design a solution by selecting those techniques that are appropriate to the problem at hand.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

12/16/2002 Initial ABET version Fulkerson<br />

06/13/2003 Cleanup Wileman<br />

12/04/2007 First draft for migration to Java Dasgupta<br />

04/21/2008 Second draft for migration to Java Fulkerson<br />

-57-


04/24/2008 Third draft, minor updates Fulkerson<br />

11/17/08 Update to include CS Program<br />

Outcomes table<br />

Fulkerson<br />

-58-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 1400<br />

Course Title<br />

Introduction to Computer Programming<br />

Course Coordinator<br />

Robert Fulkerson<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision May 27, 2009<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

The student should be able to write<br />

moderately complex programs in the Java<br />

language that accomplish moderately<br />

difficult tasks.<br />

The students are prepared for the<br />

continuation <strong>of</strong> their Java studies in CSCI<br />

1620.<br />

The students should be comfortable<br />

working in a Unix-based console<br />

environment.<br />

S X S<br />

S X S<br />

X S<br />

-59-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-60-


CIST 2500 Introduction to Applied Statistics for IS&T<br />

Department and Course Number CIST 2500<br />

Course Title<br />

Introduction to Applied Statistics for IS&T<br />

Course Coordinator<br />

L<strong>of</strong>tollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 6/24/03<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course emphasizes the function <strong>of</strong> statistics in information science and technology<br />

including topics such as descriptive statistical measures, probability, discrete probability,<br />

sampling, estimation analysis, hypothesis testing, regression, and analysis <strong>of</strong> variance. A<br />

well-known computer package will be used to support the problem-solving process.<br />

1.2 For whom course is intended.<br />

The course is primarily intended for College <strong>of</strong> Information Science and Technology<br />

(CIST) undergraduate and graduate students who need to satisfy foundation requirements.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 MATH 2030 or MATH 2040 or permission <strong>of</strong> advisor<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Combinatorics<br />

1.4.2 Probability<br />

1.4.3 Discrete Random Variables<br />

1.4.4 Continuous Random Variables<br />

1.4.5 Polynomial Equations<br />

1.4.6 Quadratic Equations<br />

1.4.7 Log and Natural Log Functions<br />

1.4.8 Exponential Functions<br />

1.4.9 Summations (single, double and triple)<br />

1.4.10 Binomial Functions<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives:<br />

The broad objective <strong>of</strong> this course is to enable you to gain an overview <strong>of</strong> the functions <strong>of</strong> statistics<br />

in modern business. This course will facilitate your understanding <strong>of</strong> the concepts and your<br />

-61-


development <strong>of</strong> the skills needed to apply statistics to the business decision-making process. This<br />

course will also enable you to extend your understanding and use <strong>of</strong> computer-based statistical tools<br />

and provide opportunities to use them to analyze business problems.<br />

3.0 Content and Organization:<br />

Contact Hours<br />

3.1 Data and Statistics 2<br />

3.2 Descriptive Statistics I: Tabular and Graphical Methods 3<br />

3.3 Descriptive Statistics II: Numerical Methods 5<br />

3.4 Probability 1<br />

3.5 Discrete Probability Distributions 2<br />

3.6 Continuous Probability Distributions 1<br />

3.7 Sampling and Sampling Distributions 5<br />

3.8 Interval Estimation 4<br />

3.9 Hypothesis Testing 5<br />

3.10 Statistical Inference about Means with Two Populations 3<br />

3.11 Analysis <strong>of</strong> Variance 4<br />

3.12 Regression Analysis 5<br />

3.13 Interpretation <strong>of</strong> Statistics for Technology Pr<strong>of</strong>essionals 3<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The course uses a combination <strong>of</strong> approaches including lecturing, problem solving, contemporary<br />

project using a statistical packages (MINITAB and Excel), and exams<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in discussion on assigned readings, complete<br />

assigned projects, and complete required examinations<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Class attendance and participation<br />

Three to four problem-solving projects using a statistical package<br />

Three examinations with combination <strong>of</strong> problem solving and multiple-choice questions about<br />

the concepts discussed in the class.<br />

Component<br />

Grading<br />

-62-


Class attendance and participation 10%<br />

Examinations 60%<br />

Projects 30%<br />

5.2 Grading scale and criteria.<br />

The final grade is based on the percentage <strong>of</strong> points that the student receives out <strong>of</strong> the<br />

total possible points for the course. The guaranteed grade scale is shown in the following<br />

table. A curve may be used to scale the entire class higher, if necessary, but scaling down<br />

will not be done.<br />

Points<br />

92-100% A<br />

89-91% A-<br />

86-88% B+<br />

82-85% B<br />

79-81% B-<br />

76-78% C+<br />

72-75% C<br />

69-71% C-<br />

66-68% D+<br />

62-65% D<br />

59-61% D-<br />


7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design<br />

Data management 5<br />

Role <strong>of</strong> IS in Organizations 3<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least _3___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically ___5__ pages and to make __0___ oral presentations <strong>of</strong> typically<br />

___0__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage.<br />

10.0 Theoretical content:<br />

Contact Hours<br />

Descriptive Statistics 8<br />

Sampling and Sampling Distributions 5<br />

Interval Estimation 3<br />

Hypothesis Testing 5<br />

Analysis <strong>of</strong> Variance 4<br />

Regression Analysis 5<br />

11.0 Problem analysis:<br />

11.1 Data Collections<br />

11.2 Data Organization<br />

11.3 Data Analysis<br />

12.0 Solution design:<br />

-64-


Student design the appropriate experimental design using statistical models and a well known statistical<br />

s<strong>of</strong>tware such as Excel or MINITAB. Then the appropriate conclusions will be drawn from the results for a<br />

better decision-making.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

10/9/200 Initial ABET version Najjar<br />

6/24/03 ABET clean-up Wolcott<br />

6/25/03 Expansion <strong>of</strong> prerequisite topics Najjar Prerequisite topics previously listed<br />

just prerequisite class titles.<br />

Mapping <strong>of</strong> CS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 2500<br />

Course Title<br />

Introduction to Applied Statistics for IS&T<br />

Course Coordinator<br />

L<strong>of</strong>tollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/27/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

-65-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Course objective<br />

The broad objective <strong>of</strong> this course is to enable<br />

you to gain an overview <strong>of</strong> the functions <strong>of</strong><br />

statistics in modern business. This course will<br />

facilitate your understanding <strong>of</strong> the concepts and<br />

your development <strong>of</strong> the skills needed to apply<br />

statistics to the business decision-making process.<br />

This course will also enable you to extend your<br />

understanding and use <strong>of</strong> computer-based<br />

statistical tools and provide opportunities to use<br />

them to analyze business problems.<br />

S<br />

S<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

-66-


11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-67-


-68-


CIST 3000 Advanced Technical Writing for IS&T<br />

Department and Course Number CIST 3000<br />

Course Title<br />

Advanced Composition for IS & T<br />

Course Coordinator<br />

Sheri Hronek<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/15/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Advanced Composition for IS & T provides students with instruction and practice in<br />

academic writing for the technical sciences. The course focuses on principles <strong>of</strong> rhetoric<br />

and composition, advanced library-based research techniques, academic modes <strong>of</strong> writing<br />

suited to the technical sciences, style, grammar, and punctuation, all with attention to<br />

adapting writing to suit the needs <strong>of</strong> various academic and pr<strong>of</strong>essional audiences.<br />

1.2 For whom course is intended.<br />

Undergraduate students in IS & T or other students interested in academic writing in the<br />

technical sciences.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

ENGL1160 (or placement in a 3 rd year writing course)<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

Students should be able to demonstrate the basic writing competencies developed during<br />

their freshman composition course work.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

2.0 Objectives:<br />

None<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

By the end <strong>of</strong> the course, students will exhibit:<br />

2.1 an advanced understanding <strong>of</strong> various academic-based writing strategies and <strong>of</strong> the genres<br />

appropriate for and expected in the technical sciences<br />

2.2 an ability to apply field-related, advanced research skills including a knowledge <strong>of</strong> scholarly, peerreviewed<br />

journals and indexes, the use <strong>of</strong> primary sources, the ability to evaluate sources, and<br />

expertise in using field-appropriate documentation<br />

-69-


2.3 a sophisticated understanding <strong>of</strong> grammar and language issues as they apply to writing generally<br />

and to the style expected in academic writing in the technical sciences<br />

2.4 developed pr<strong>of</strong>iciency in using discourse-community specific language, including vocabulary and<br />

style<br />

2.5 a sophisticated understanding <strong>of</strong> writing as a process that includes multiple drafts that<br />

productively and effectively respond to feedback<br />

2.6 an understanding <strong>of</strong> how writing functions in various academic and pr<strong>of</strong>essional communities<br />

students will encounter in their personal, pr<strong>of</strong>essional, and academic life<br />

2.7 a mature awareness <strong>of</strong> audience and the ability to adapt writing to various audiences and<br />

purposes<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> hours on each).<br />

As various instructors will teach the course, the sequence <strong>of</strong> topics may vary. The following table<br />

provides a suggested sequence based on collaborative research proposals and projects (groups <strong>of</strong><br />

3-4).<br />

3.1 Discourse communities & academic/pr<strong>of</strong>essional communication practices 3<br />

3.2 Writing fundamentals overview 3<br />

3.3 Style 1: Discourse communities & tiles<br />

3.4 Style II: General Stylistic Conventions 3<br />

3.5 General technical stylistic conventions<br />

3.6 Diction & Style<br />

3.7 Theoretical/historical research overview 3<br />

3.8 Theoretical/historical research proposals<br />

3.9 Collaboration<br />

3.10 Style III Persuasive writing<br />

3.11 Using sources 3<br />

3.12 Style IV: Paragraphing<br />

3.13 Style V: Tone 3<br />

3.14 Peer Review practices<br />

3.15 Shifting from proposal to research<br />

3.16 Research project norming<br />

3.17 Style VI: Syntactical Revision Workshop 3<br />

Class Hours<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

-70-


Teaching methods may vary from instructor to instructor. The course may include any <strong>of</strong><br />

the following: lectures, writing/draft workshops, group discussion, norming sessions,<br />

library research instruction, and peer-review sessions.<br />

4.2 Student role in the course.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

The student’s role in the course flows from the objectives and content benchmarks<br />

outlined above (2.1). In general, students should seek to develop and advance their<br />

academic writing skills through active, conscientious engagement in the various writing<br />

projects and activities.<br />

3 hours<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

As writing projects may vary from instructor to instructor, the following list is suggestive<br />

only.<br />

5.1.1 Field Description (technically informed audience)<br />

5.1.2 Field Introduction (nontechnically informed audience)<br />

5.1.3 Peer-Reviewed Journal Analysis<br />

5.1.4 Library-Based Research Proposal (individual or collaborative)<br />

5.1.5 Library-Based Research Project (individual or collaborative)<br />

5.1.6 Abstract<br />

5.1.7 Project Plans<br />

5.1.8 Individual Activity Logs<br />

5.1.9 Semester <strong>Self</strong>-Assessment memos<br />

5.1.10 Research Presentation (individual or collaborative)<br />

5.1.11 Portfolio<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

The basis for determining the final may vary depending on instructors. The following is a<br />

suggestive model assessing both individual and collaborative writing efforts.<br />

5.2.1 Individual Assessments:<br />

Documentation Exams I & II 10%<br />

Field Description & Intro 5%<br />

Journal Analysis 15%<br />

-71-


5.2.2 Individual Effort & Work Participation 15%<br />

Abstract<br />

Documentation Workshop<br />

Individual Portfolio<br />

Quote, Paraphrase, Summary Ex.<br />

5.2.3 Individual’s Collaborative Effort & Work 15%<br />

5.2.4 Group Assignments:<br />

Research Proposal & Deliverables 15%<br />

Research Project & Deliverables 25%<br />

-72-


5.3 Grading scale and criteria.<br />

6.0 Resource Material<br />

98-100 A+<br />

95-97 A<br />

92-94 A-<br />

88-91 B+<br />

85-87 B<br />

82-84 B-<br />

78-81 C+<br />

75-77 C<br />

72-74 C-<br />

68-71 D+<br />

65-67 D<br />

62-64 D-<br />

-61 F<br />

An “I” or “IP” will be awarded only if a student is unable to complete the course<br />

requirements due to circumstances beyond her/his control as specified in the UNO<br />

catalog. The student must also have substantially completed the course and have a<br />

passing grade when the grade <strong>of</strong> “I” is requested.<br />

6.1 Textbooks and/or other required readings used in course.<br />

Textbook selection may vary from instructor to instructor. The following is a suggestive<br />

list.<br />

6.1.1 Hansen, K. (1998). A rhetoric for the social sciences: A guide to academic and pr<strong>of</strong>essional<br />

communication. Upper Saddle River, NJ: Prentice Hall.<br />

6.1.2 Jones, D. (1998). Technical writing style. Boston: Allyn and Bacon.<br />

6.1.3 Lunsford, A. A. (2008). The St. Martin’s handbook (6th ed.). Boston: Bedford/St.Martin’s.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Readings that support the students’ development as writers are recommended,<br />

particularly peer-reviewed, article-length or book-length works. Students should also<br />

become familiar with the APA Publication Manual (2001) or other style guides suitable to<br />

academic writing in the technical sciences.<br />

6.3 Other sources <strong>of</strong> information.<br />

6.3.1 Industry white papers & reports related to areas <strong>of</strong> technical research.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

-73-


6.4.1 Alred, G., Brusaw, C., & Oliu, W. (1992). The pr<strong>of</strong>essional writer: A guide for advanced<br />

technical writing. New York: St. Martin’s Press. American Psychological Association.<br />

(2001). Publication manual (5th ed.). Washington, DC: American Psychological<br />

Association.<br />

6.4.2 Coe, M. (1996). Human factors for technical communication. New York: Wiley.<br />

6.4.3 Coletta, W. J. (1992). The ideologically based use <strong>of</strong> language in scientific and technical<br />

communication. Technical Communication Quarterly, 1(1), 59-70.<br />

6.4.4 Day, R. (1988). How to write and publish scientific paper (3rd ed.). Phoenix, AZ: Oryx.<br />

6.4.5 Day , R. (1992). Scientific English: A guide for scientists and other pr<strong>of</strong>essionals. Phoenix,<br />

AZ: Oryx.<br />

6.4.6 Ede, L., & Lunsford, A. (1990). Singular texts/plural authors: Perspectives on collaborative<br />

writing. Carbondale: Southern Illinois <strong>University</strong> Press.<br />

6.4.7 Gross, A. G. (1996). The rhetoric <strong>of</strong> science. Cambridge, MA: Harvard <strong>University</strong> Press.<br />

6.4.8 Gurak, L. J. (2000). Oral presentations for technical communications. Boston: Allyn &<br />

Bacon.<br />

6.4.9 Hager, P. J., & Scheiber, H. J. (1997). Designing and delivering scientific, technical, and<br />

managerial presentations. New York: Wiley.<br />

6.4.10 Halloran, M. (1978). Technical writing and the rhetoric <strong>of</strong> science. Journal <strong>of</strong> Technical<br />

Writing and Communication, 8(2), 77-88.<br />

6.4.11 Haring-Smith, T. (1993). Learning together: An introduction to collaborative learning. New<br />

York: HarperCollins.<br />

6.4.12 H<strong>of</strong>t, N. L. (1995). International technical communication: How to export information<br />

about high technology. New York: Wiley.<br />

6.4.13 Houp, K. W., Pearsall, T. E., & Thebeaux, E. (1998). Reporting technical information (9th<br />

ed.). Boston: Allyn & Bacon.<br />

6.4.14 Locke, D. (1992). Science as writing. New Haven, CT: Yale <strong>University</strong> Press.<br />

6.4.15 Miller, C. (1984). Genre as social action. Quarterly Journal <strong>of</strong> Speech, 70, 151-167.<br />

6.4.16 Penrose, A. M., and Katz, S. B. (2004). Writing in the sciences: Exploring conventions <strong>of</strong><br />

scientific discourse (2nd ed.). Boston: Allyn and Bacon.<br />

6.4.17 Porush, D. (1995). A short guide to writing about science. New York: HarperCollins.<br />

6.4.18 Prelli, L. J. (1989). A rhetoric <strong>of</strong> science: Inventing scientific discourse. Columbia:<br />

<strong>University</strong> <strong>of</strong> South Carolina Press.<br />

6.4.19 Rude, C. D. (2002). Technical editing (3rd ed.). New York: Longman.<br />

6.4.20 Sanders, S (1988). How can technical writing be persuasive? In L. Beene & P. White (Eds.),<br />

Solving problems in technical writing (pp. 55-78). New York: Oxford <strong>University</strong> Press.<br />

6.4.21 Schindler, G. E., Jr. (1975). Why engineers and scientists write as they do— Twelve<br />

characteristics <strong>of</strong> their prose. IEEE Transactions on Pr<strong>of</strong>essional Communication, 18(1), 5-<br />

10.<br />

6.4.22 Young, J. Z. (1965). Doubt and certainty in science. In J. Harrison (Ed.), Scientists as writers<br />

(pp. 49-51). Cambridge, MA: MIT Press.<br />

7.0 (Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category<br />

Content (class time in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 0 0<br />

Networking and telecommunications 0 0<br />

Modern programming language 0 0<br />

-74-


Analysis and Design<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

As this course focuses on students’ development as writers, these areas are not directly addressed.<br />

Students may, however, engage any <strong>of</strong> these areas in individual/collaborative writing projects. See 8.0<br />

7.0 (Fill out for CSCI and CIST courses) Estimate Computer Science Accreditation Board (CSAB)<br />

Category Content (class time in hours):<br />

CSAB Category Core Advanced<br />

Data structures 0 0<br />

Computer organization and architecture 0 0<br />

Algorithms and s<strong>of</strong>tware design 0 0<br />

Concepts <strong>of</strong> programming languages 0 0<br />

As this course focuses on students’ development as writers, these areas are not directly addressed.<br />

Students may, however, engage any <strong>of</strong> these areas in individual/collaborative writing projects. See 8.0<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___6__ written reports (not including exams, tests, quizzes, or<br />

commented programs) <strong>of</strong> typically __1-20___ pages and to make ___1__ oral presentations <strong>of</strong> typically<br />

__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

As this is an academic-based writing course, Instructors should present some <strong>of</strong> the basic<br />

principles <strong>of</strong> effective academic document design based on appropriate manuscript preparation<br />

style guides, such as the APA Publication Manual (2001). Students should also demonstrate their<br />

understanding <strong>of</strong> the importance <strong>of</strong> good design through their research presentations.<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

The course should address social and ethical issues related to the practice <strong>of</strong> writing. One area <strong>of</strong><br />

concern is style, particularly the importance <strong>of</strong> unbiased language use (in terms <strong>of</strong> gender,<br />

race/ethnicity, etc.), the role <strong>of</strong> the detached persona, and other elements as specified by the<br />

American Psychological Association’s Publication Manual (2001). Students should be expected to<br />

reflect awareness <strong>of</strong> pr<strong>of</strong>essional language use concerns in all their writing.<br />

-75-


10.0 Theoretical content:<br />

Another area <strong>of</strong> concern should be the ethics <strong>of</strong> working with sources, especially in terms <strong>of</strong><br />

understanding and avoiding plagiarism.<br />

All <strong>of</strong> these issues are explored and reiterated throughout the semester.<br />

Students may also explore social and ethical issues related to the technical fields through their<br />

individual or collaborative research projects.<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

11.0 Problem analysis:<br />

The course should cover relevant rhetorical and compositional theories and practices related to<br />

the process <strong>of</strong> writing such as invention, audience analysis, stylistics, and<br />

argumentation/persuasion in technical academic writing. Theories <strong>of</strong> collaboration as a<br />

community <strong>of</strong> practice are also addressed.<br />

These theories and their application to writing are discussed throughout the semester.<br />

Students may also explore theoretical material through their individual and collaborative projects.<br />

Please describe the analysis experiences common to all course sections.<br />

12.0 Solution design:<br />

Analytical activities generally should focus on examining practical issues related to the writing &<br />

research process. These include, but are not limited to, audience analysis, research planning and<br />

coordination, self-assessment, source assessment, solving problems in the research process,<br />

solving problems in collaboration, and so forth.<br />

While all writing for the class should encourage analysis (implicitly or explicitly), one major writing<br />

project should have an explicitly analytical focus. This may vary from instructor to instructor.<br />

Please describe the design experiences common to all course sections.<br />

CHANGE HISTORY<br />

Students should be encouraged to address solution design as part <strong>of</strong> problem analysis. Forms<br />

(project planning, individual/group activity logs) may be used to help students construct effective<br />

solution decisions by encouraging them to define problems, articulate potential solutions, and the<br />

rationale for the proposed solutions. Ultimately, students’ writing should reflect their abilities to<br />

effectively handle problems with research, collaboration, the writing process, and so forth.<br />

Date Change By whom Comments<br />

5/15/08 Created Hronek<br />

-76-


-77-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> CS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 3000<br />

Course Title<br />

Advanced Technical Writing for IS&T<br />

Course Coordinator<br />

Sheri Hronek<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/15/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

an advanced understanding <strong>of</strong> various<br />

academic-based writing strategies and <strong>of</strong> the<br />

genres appropriate for and expected in the<br />

technical sciences<br />

an ability to apply field-related, advanced<br />

research skills including a knowledge <strong>of</strong><br />

scholarly, peer-reviewed journals and<br />

indexes, the use <strong>of</strong> primary sources, the<br />

ability to evaluate sources, and expertise in<br />

using field-appropriate documentation<br />

a sophisticated understanding <strong>of</strong> grammar<br />

and language issues as they apply to writing<br />

generally and to the style expected in<br />

academic writing in the technical sciences<br />

S<br />

S<br />

S<br />

developed pr<strong>of</strong>iciency in using discourse- S<br />

-78-


community specific language, including<br />

vocabulary and style<br />

a sophisticated understanding <strong>of</strong> writing as a<br />

process that includes multiple drafts that<br />

productively and effectively respond to<br />

feedback<br />

an understanding <strong>of</strong> how writing functions in<br />

various academic and pr<strong>of</strong>essional<br />

communities students will encounter in their<br />

personal, pr<strong>of</strong>essional, and academic life<br />

a mature awareness <strong>of</strong> audience and the<br />

ability to adapt writing to various audiences<br />

and purposes<br />

S<br />

S<br />

S<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-79-


-80-


CIST 3100 Organizations, Applications, and Technology<br />

Department and Course Number CIST 3100<br />

Course Title<br />

Organizations, Applications and Technology<br />

Course Coordinator<br />

Paul van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/2008<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course<br />

This survey course provides an introduction to organizations and the role information and information<br />

systems play in supporting operations, decision-making, processes, quality management, and strategic<br />

activities <strong>of</strong> an organization. In addition, the course covers management <strong>of</strong> the IS function, strategic and<br />

regulatory issues <strong>of</strong> telecommunications, and ethical and legal issues.<br />

1.2 For whom course is intended<br />

The course is intended for undergraduate students in the schools <strong>of</strong> IS&T, Business Administration and<br />

Engineering who need to learn the fundamentals <strong>of</strong> Management Information Systems.<br />

1.3 Prerequisites <strong>of</strong> the course<br />

None<br />

1.4 Unusual circumstances <strong>of</strong> the course<br />

As <strong>of</strong> January 2007, this course is regularly <strong>of</strong>fered as an online course.<br />

2.0 Objectives:<br />

2.1 To understand the role <strong>of</strong> information systems and the subsequent challenges in today’s<br />

competitive business environment<br />

2.2 To understand the diversity <strong>of</strong> Information Systems and networks in the enterprise<br />

2.3 To understand Information Systems, organizations and management models, roles and their<br />

impact on the decision making process.<br />

2.4 To understand how Internet technology, electronic commerce, and electronic web based systems<br />

have transformed organizations, business models, supply chains and quality<br />

2.5 To understand basic computer hardware and s<strong>of</strong>tware and information systems security and<br />

control<br />

2.6 To obtain a basic understanding <strong>of</strong> s<strong>of</strong>tware applications such as operating systems, file<br />

management and data storage<br />

2.7 To gain a basis understanding <strong>of</strong> the challenges <strong>of</strong> maintaining a traditional data environment<br />

versus a database environment<br />

-81-


2.8 To gain a basis understanding <strong>of</strong> telecommunications and networks, including the Internet.<br />

2.9 To understand the business value <strong>of</strong> systems and technology<br />

2.10 To understand how organizations can use expert systems and case-based reasoning to capture<br />

knowledge<br />

2.11 To understand the legal and ethical impacts <strong>of</strong> information systems<br />

3.0 Content and Organization<br />

-82-<br />

Contact Hours<br />

3.1 Introduction to course, description <strong>of</strong> course requirements,<br />

and a discussion <strong>of</strong> expectations for the course 3<br />

3.2 Information Systems in Global Business Today. 3<br />

3.3 Global E-Business: How Businesses Use Information Systems 3<br />

3.4 Information Systems, Organizations, and Strategy 3<br />

3.5 Ethical and Social Issues in Information Systems 3<br />

3.6 IT Infrastructure and Emerging Technologies 3<br />

3.7 Foundations <strong>of</strong> Business Intelligence:<br />

Databases and Information Management 3<br />

3.8 Telecommunications, the Internet, and Wireless Technology 3<br />

3.9 Securing Information Systems 3<br />

3.10 Achieving Operation Excellence and Customer Intimacy:<br />

Enterprise Applications 3<br />

3.11 E-Commerce: Digital Markets, Digital Goods 3<br />

3.12 Managing Knowledge 3<br />

3.13 Enhancing Decision Making 3<br />

3.14 Building Systems 3<br />

3.15 Project Management: Establishing the Business Value <strong>of</strong><br />

Systems and Managing Change 3<br />

3.16 Managing Global Systems 3<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used<br />

The primary teaching method will be discussion <strong>of</strong> chapter contents, case studies, lecture, and<br />

discussion questions.<br />

4.2 Student role in the course<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned projects and papers, and complete required examinations.<br />

4.3 Contact hours<br />

Three (3) hours per week.<br />

5.0 Evaluation<br />

Note: exact contact hours may vary for the online version <strong>of</strong> this course; however, the contents <strong>of</strong><br />

the online course follows the regular course closely.


5.1 Types <strong>of</strong> student products<br />

The student products will be: two examinations (a midterm and final) or a single comprehensive<br />

examination, a ten-page research paper, a group term project, and other small assignments as<br />

deemed useful by the instructor.<br />

5.2 Basis for determining the final grade<br />

Grades will be determined on the basis <strong>of</strong> the student’s participation in class (10%), the student’s<br />

performance on examinations (30%), development <strong>of</strong> a ten-page research report based on<br />

readings from the trade and empirical literature (30%), and completion <strong>of</strong> the term project (30%).<br />

Component<br />

Grading<br />

Examination(s) 30%<br />

Class Participation 10%<br />

Research Paper 30%<br />

Term project 30%<br />

5.3 Grading Scale and Criteria<br />

Earned Grade<br />

Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />

59% F<br />

6.0 Resource Material:<br />

6.1 The latest edition <strong>of</strong> textbook(s) or other required readings used in the course, or equivalent.<br />

-83-


6.1.1 Loudon, K.C. and Loudon, J.P. (2007) Management Information Systems: Managing the<br />

Digital Firm, 10th Edition, Saddle River, NJ: Prentice Hall.<br />

6.2 Other suggested reading materials or equivalent<br />

Additional articles relating to the various topics in the course can be made available at the UNO<br />

Library or via online links. These articles are used to supplement topics presented in various<br />

chapters.<br />

6.3 Other sources for gathering information or equivalent<br />

Students are encouraged to read articles in current pr<strong>of</strong>essional and trade journals and websites<br />

that are relevant to topics in information systems. The process is particularly important in<br />

keeping current with technology and new methodologies.<br />

6.4 Current Bibliography:<br />

6.4.1 Jessup, L. & Valacich, J. (2008) Information Systems Today; Managing in the Digital World,<br />

3rd Edition, Saddle River, NJ: Prentice Hall.<br />

6.4.2 Stair, R. & Reynolds, G., (2006) Principles <strong>of</strong> Information Systems; A Managerial Approach,<br />

7th Edition, Boston, MA: Thomson Course Technology.<br />

6.4.3 Turban, E., Rainer, Jr., R.K., & Potter, R.E. (2005) Introduction to Information Technology,<br />

3rd Edition, Hoboken, NJ, John Wiley & Sons, Inc.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 3<br />

Networking and telecommunications 4<br />

Modern programming language 0<br />

Analysis and Design 2<br />

Data management 3<br />

Role <strong>of</strong> IS in Organizations 8<br />

8.0 Oral and Written Communications:<br />

Written research reports, and optional case study assignments and review questions provide<br />

opportunities for written and oral communication. The students also collaborate on written term projects<br />

which emphasize pr<strong>of</strong>essional communication practices.<br />

Note: for the online version <strong>of</strong> the course, oral student presentations are <strong>of</strong>ten impractical, and written<br />

assignments are regularly substituted.<br />

-84-


9.0 Social and Ethical Issues: Contact Hrs. 3<br />

Every student will be expected to understand the ethical impacts <strong>of</strong> information systems including:<br />

auditing <strong>of</strong> computer systems, the ethical, social and political needs <strong>of</strong> society, the ethical issues involved<br />

in any situation, ethical principles for conduct, and ethical conduct policies as they relate to information<br />

systems<br />

10.0 Theoretical content:<br />

Contact Hours<br />

10.1 Value Chain Model 1<br />

10.2 Industry Competitive Forces Model 1<br />

11.0 Problem analysis:<br />

Case studies are provided at the end <strong>of</strong> each <strong>of</strong> 15 chapters, providing the instructor with the opportunity<br />

to have the students analyze them.<br />

12.0 Solution design:<br />

Review problems are provided at the end <strong>of</strong> each <strong>of</strong> 15 chapters, providing the instructor with the<br />

opportunity to have the students develop solutions and appropriate answers to them.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

9/22/2002 Initial ABET version Van Vliet<br />

6/12/03 Remove Prerequisite. Course Change lw CIST 2010 no longer required<br />

Form 2/11/03<br />

6/24/03 ABET cleanup Wolcott<br />

9/13/2007 Change course number from CIST Van Vliet<br />

2110 to CIST 3100<br />

9/13/2007 Update document to match current Van Vliet<br />

text contents and assignments<br />

9/13/2007 Update document to include e- Van Vliet<br />

learning adjustments<br />

10/12/2008 Reviewed course document, found<br />

contents to be current.<br />

Van Vliet<br />

-85-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 3100<br />

Course Title<br />

Organizations, Applications and Technology<br />

Course Coordinator<br />

Paul van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

To understand the role <strong>of</strong> information systems S S S S X<br />

and the subsequent challenges in today’s<br />

competitive business environment<br />

To understand the diversity <strong>of</strong> Information<br />

S S S X<br />

Systems and networks in the enterprise<br />

To understand Information Systems,<br />

S S S X X<br />

organizations and management models, roles and<br />

their impact on the decision making process.<br />

To understand how Internet technology,<br />

S S S X X X<br />

electronic commerce, and electronic web based<br />

systems have transformed organizations,<br />

business models, supply chains and quality<br />

To understand basic computer hardware and<br />

S X S<br />

s<strong>of</strong>tware and information systems security and<br />

control<br />

To obtain a basic understanding <strong>of</strong> s<strong>of</strong>tware<br />

S X S<br />

applications such as operating systems, file<br />

management and data storage<br />

To gain a basis understanding <strong>of</strong> the challenges <strong>of</strong> S X S<br />

-86-


maintaining a traditional data environment versus<br />

a database environment<br />

To gain a basis understanding <strong>of</strong><br />

telecommunications and networks, including the<br />

Internet.<br />

To understand the business value <strong>of</strong> systems and<br />

technology<br />

To understand how organizations can use expert<br />

systems and case-based reasoning to capture<br />

knowledge<br />

To understand the legal and ethical impacts <strong>of</strong><br />

information systems<br />

S X S<br />

S S X X<br />

S S S<br />

S S S X X<br />

-87-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-88-


CIST 3110 Information Technology Ethics<br />

Department and Course Number CIST 3110<br />

Course Title<br />

Information Technology Ethics<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 09/10/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course will cover the development and need for issues regarding privacy and the application<br />

<strong>of</strong> computer ethics to information technology.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate management information systems (MIS), computer<br />

science (CS), information assurance (IA), and bioinformatics majors.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

CIST 3110 - Organizations, Applications & Technology or equivalent.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Introduction to Information Systems<br />

1.4.2 Review <strong>of</strong> Social, Privacy, Legal, and Ethics theory<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> student behavior.<br />

The student will:<br />

2.1 Be able to determine the impact <strong>of</strong> the privacy laws on information security policies.<br />

2.2 Understand the issues related to intellectual freedom, intellectual property, and copyright law as<br />

they relate to electronic publishing.<br />

2.3 Be able to determine and identify ethical procedures and behaviors in the organization related to<br />

information security.<br />

2.4 Be able to identify issues <strong>of</strong> pr<strong>of</strong>essional conduct in information technology case studies.<br />

-89-


2.5 Be able to apply <strong>University</strong> standards <strong>of</strong> ethical conduct in preparing assignments for all<br />

coursework.<br />

2.6 Learn the areas most impacted by ethical decisions by pr<strong>of</strong>essionals in the computing field and<br />

will gain skills in making such decisions.<br />

2.7 Identify key ethical concerns <strong>of</strong> information technology specialists.<br />

2.8 Apply theories <strong>of</strong> ethics to case situations in the context <strong>of</strong> organizational use <strong>of</strong> information<br />

technology.<br />

2.9 Appreciate how rapid changes in technology might affect ethical issues and changing norms <strong>of</strong><br />

behavior.<br />

2.10 Understand the issues related to privacy and confidentiality as they relate to information<br />

technology.<br />

2.11 Understand the ethical issues associated with gathering, storing and accessing genetic<br />

information in databases.<br />

2.12 Recognize the differences in ethical codes <strong>of</strong> conduct in different cultures and countries.<br />

2.13 Understand the ethical issues that arise from findings in genomic and bioinformatics analyses.<br />

2.14 The student will study and apply the following:<br />

2.14.1 Business Rules<br />

2.14.2 Firewalls<br />

2.14.3 Cryptography<br />

2.14.4 Privacy Laws<br />

2.14.5 Copyright Ownership<br />

2.14.6 Privacy, Publicity and Defamation<br />

2.14.7 Trademarks and Unfair Competition in Cyberspace<br />

2.14.8 Intellectual Property<br />

2.14.9 Contrast <strong>of</strong> Law vs. Ethic<br />

2.14.10 Organizational Ethical Principles<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence<br />

Contact Hours<br />

3.1 Frameworks for Ethical and Policy Analysis 3<br />

3.1.1 Moral Frameworks<br />

3.1.2 General Framework for Ethical Analysis<br />

3.2 Unwrapping the Gift<br />

3.2.1 The Ubiquity <strong>of</strong> Computers and the Rapid Pace <strong>of</strong> Change 3<br />

3.2.2 New Developments and Dramatic Impacts<br />

3.2.3 An Introduction to Some Issues and Themes<br />

3.2.4 Ethics<br />

3.3 Privacy 3<br />

3.3.1 Privacy and Computer Technology<br />

3.3.2 “Big Brother Is Watching You.”<br />

3.3.3 Diverse Privacy Topics<br />

3.3.4 Protecting Privacy: Technology, Markets, Rights and Laws<br />

3.3.5 Communications<br />

-90-


3.4 Freedom <strong>of</strong> Speech 3<br />

3.4.1 Changing Communications Paradigms<br />

3.4.2 Offensive Speech and Censorship in Cyberspace<br />

3.4.3 Anonymity<br />

3.4.4 Spam<br />

3.4.5 Ensuring Valuable and Diverse Content<br />

3.5 Intellectual Property<br />

3.5.1 Intellectual Property and Changing Technology<br />

3.5.2 Copyright Law<br />

3.5.3 Copying and Sharing<br />

3.5.4 Search Engines and Online Libraries<br />

3.5.5 Free-Speech Issues<br />

3.5.6 Free S<strong>of</strong>tware<br />

3.5.7 Issues for S<strong>of</strong>tware Developers<br />

3.6 Computer Crime 3<br />

3.6.1 Introduction<br />

3.6.2 Hacking<br />

3.6.3 Identity Theft and Credit-Card Fraud<br />

3.6.4 Scams and Forgery<br />

3.6.5 Crime Fighting Versus Privacy and Civil Liberties<br />

3.6.6 Whose Laws Rule the Web?<br />

3.7 Work 3<br />

3.7.1 Fears and Questions<br />

3.7.2 The Impact on Employment<br />

3.7.3 The Work Environment<br />

3.7.4 Employee Crime<br />

3.7.5 Employee Monitoring<br />

3.8 Evaluating and Controlling Technology 3<br />

3.8.1 Information, Knowledge, and Judgment<br />

3.8.2 Computers and Community<br />

3.8.3 The Digital Divide<br />

3.8.4 Evaluations <strong>of</strong> the Impact <strong>of</strong> Computer Technology<br />

3.8.5 Making Decisions About Technology<br />

3.9 Errors, Failures, and Risk<br />

3.9.1 Failures and Errors in Computer Systems<br />

3.9.2 Case <strong>Study</strong>: The Therac-25<br />

3.9.3 Increasing Reliability and Safety<br />

3.9.4 Dependence, Risk, and Progress<br />

3.10 Pr<strong>of</strong>essional Ethics and Responsibilities 3<br />

3.10.1 What is Pr<strong>of</strong>essional Ethics?<br />

3.10.2 Ethical Guidelines for Computer Pr<strong>of</strong>essionals<br />

3.10.3 Scenarios<br />

3.11 The S<strong>of</strong>tware Engineering Code and the ACM Code<br />

3.12 ethical Cases in Social, Legal, Privacy and Ethics 15<br />

4.0 Teaching Methodology:<br />

-91-


4.1 Methods to be used.<br />

The primary teaching methods will be instructor-led discussions, student-led small group<br />

discussions, case studies, lecture, guest speakers, and demonstration.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstrations, analyze selected cases, lead and participate<br />

in discussions on assigned readings and cases, complete assigned projects, and complete required<br />

examinations.<br />

4.3 Contact hours.<br />

Three hours per week<br />

5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

The student products will be group and individual case analysis reports, article reviews, book<br />

reports, quizzes, computer projects, examinations, term paper, and oral presentations.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Grades will be determined on the following basis:<br />

Component<br />

Grading<br />

Participation in project/term paper 15%<br />

Book report 10%<br />

Case studies 10%<br />

Oral presentation 5%<br />

Quizzes on readings 10%<br />

Midterm 20%<br />

Final exam 20%<br />

In-class participation 10%<br />

5.3 Grading scale and criteria.<br />

-92-


Points<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />


6.2.11 Cato Institute, a libertarian perspective<br />

6.2.12 Thomas, Library <strong>of</strong> Congress site for bills currently going through the U.S. Congress and<br />

recent U.S. laws.<br />

6.2.13 Privacy.org, news and advocacy <strong>of</strong> strong privacy regulation (EPIC and Privacy<br />

International)<br />

6.2.14 TRUSTe<br />

6.2.15 Federal Trade Commission<br />

6.2.16 "Freedom <strong>of</strong> Speech and Information Privacy" (Eugene Volokh, UCLA Law School)<br />

6.2.17 Federal Bureau <strong>of</strong> Investigation (Use site search tool for "Carnivore," etc.)<br />

6.2.18 Echelonwatch (American Civil Liberties Union, EPIC, and others)<br />

6.2.19 Cryptography issues and legislation (Center for Democracy and Technology).<br />

6.2.20 "Cryptography's Role in Securing the Information Society" (National Academy <strong>of</strong> Sciences)<br />

6.2.21 "Encryption Policy for the 21st Century" (Cato Institute)<br />

6.2.22 CryptoRights Foundation<br />

6.2.23 National Security Agency<br />

6.2.24 EFF's archive on the Digital Millennium Copyright Act<br />

6.2.25 Digitalconsumer.org and its Consumer Technology Bill <strong>of</strong> Rights.<br />

6.2.26 American Library Association Office for Intellectual Freedom, includes the ALA Resolution<br />

on the Use <strong>of</strong> Filtering S<strong>of</strong>tware in Libraries.<br />

6.2.27 Chilling Effects Clearinghouse, information about Internet legal issues related to "ceaseand-desist"<br />

letters, letters claiming violation <strong>of</strong> copyright, trademark, and so forth, and<br />

threatening legal action if the claimed violations continue. (EFF and several major law<br />

schools)<br />

6.2.28 Recording Industry Association <strong>of</strong> America<br />

6.2.29 ACM<br />

6.2.30 IEEE Computer Society<br />

6.2.31 Online Ethics Center for Engineering and Science (Case Western Reserve <strong>University</strong>)<br />

Electronic Frontiers Australia<br />

6.2.32 Privacy Commissioner <strong>of</strong> Australia<br />

6.2.33 Privacy Commissioner <strong>of</strong> Canada<br />

6.2.34 "Privacy as Censorship A Skeptical View <strong>of</strong> Proposals to Regulate Privacy in the Private<br />

Sector" (Cato Institute)<br />

6.2.35 Genetics and Public Health in the 21st Century (2000) Muin Khoury, Wylie Burke, and<br />

Elisabeth Thomson, Eds., Oxford <strong>University</strong> Press.<br />

6.2.36 Annual Review <strong>of</strong> Genomics and Human Genetics (yearly since 2000). Eric Lander, David<br />

Page and Richard Lifton, Eds., Annual Reviews, Academic Press.<br />

6.2.37 Nuffield Council on Bioethics Reports: Reports and discussion papers assembled by an<br />

independent body that considers the ethical issues arising from developments in<br />

medicine and biology that plays a major role in contributing to policy making and<br />

stimulating debated in bioethics. http://www.nuffieldbiotethics.org/home<br />

6.3 Other sources <strong>of</strong> information.<br />

Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />

relevant to topics in systems information security privacy and ethics. The process is particularly<br />

important in keeping current with technology and new methodologies.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

-94-


6.4.1 Computer and Internet Use on Campus: A Legal Guide to Issues <strong>of</strong> Intellectual Property,<br />

Free Speech, and Privacy, by Constance S. Hawke, John Wiley & Sons, September 1, 2000<br />

6.4.2 Borders in Cyberspace: Information Policy and the Global Information Infrastructure<br />

(Publication <strong>of</strong> the Harvard Information Infrastructure Project) by Brian Kahin and Charles<br />

Nesson, MIT Press, March 1997.<br />

6.4.3 Cybercrime: Law Enforcement, Security and Surveillance in the Information Age by Tom<br />

Douglas, Routledge, and July 2000.<br />

6.4.4 Data Privacy in the Information Age by Jacqueline Klosek, Praeger Publishing, August 30,<br />

2000.<br />

6.4.5 Database Nation: The Death <strong>of</strong> Privacy in the 21st Century by Simson Garfinkel, O'Reilly &<br />

Associates, and January 2000.<br />

6.4.6 ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy<br />

Regulations, by Timothy D. Casey, Wiley, 2000.<br />

6.4.7 Technology and Privacy: The New Landscape, by Philip E. Agre, and Marc Rotenberg. , MIT<br />

Press, September 1998.<br />

6.4.8 Internet Privacy Protection Guide by J. K. Santiago, Boggy Cove, Inc. 1999.<br />

6.4.9 Building in Big Brother: The Cryptographic Policy Debate by Lance J. H<strong>of</strong>fman, Springer<br />

Verlag, April 1995.<br />

6.4.10 Computer Rules: A Guide to Formulating Computer Operating & Security Policy for Users<br />

by Randal F. Fleury, Compupol, Inc., 1998.<br />

6.4.11 Technology and Privacy: The New Landscape, by Philip E. Agre and Marc Rotenberg, MIT<br />

Press, September 1998 or most recent edition.<br />

6.4.12 Legislating Privacy: Technology, Social Values, and Public Policy, by Priscilla M. Regan,<br />

<strong>University</strong> <strong>of</strong> North Carolina Press, September 1995.<br />

6.4.13 Managing Privacy: Information Technology and Corporate America, by H. Jeff Smith,<br />

<strong>University</strong> <strong>of</strong> North Carolina Press, June 1994.<br />

6.4.14 Computers, Ethics and Social Values by Deborah G. Johnson and Helen Nissenbaum,<br />

Prentice Hall, February 2, 1995.<br />

6.4.15 Computers, Ethics, and Society by M. David Ermann, Mary B. Williams, and Michele S.<br />

Shauf, Oxford <strong>University</strong> Press, April 1997.<br />

6.4.16 Sex, Laws, and Cyberspace: Freedom and Censorship on the Frontiers <strong>of</strong> the Online<br />

Revolution, by Jonathan Wallace and Mark Mangan, Henry Holt, March 1997.<br />

6.4.17 Computer and Information Ethics by John Weckert and Douglas Adeney, Greenwood<br />

Publishing Group, May 1997.<br />

6.4.18 Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing by Tom Forester<br />

and Perry Morrison, MIT Press, December1993.<br />

6.4.19 The Information Systems Security Officer's Guide: Establishing and<br />

6.4.20 Managing an Information Protection Program, by Gerald Kovacich, Butterworth-<br />

Heinemann, 1998.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 3<br />

Networking and telecommunications 3<br />

-95-


Modern programming language<br />

Analysis and Design<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 10<br />

8.0 Oral and Written Communications:<br />

Every student will be required to:<br />

(1) Complete individually the analysis <strong>of</strong> ten to fifteen in class mini-cases and actively participate<br />

in the instructor lead discussions.<br />

(2) Either individually or as a member <strong>of</strong> a small group, analyze six to ten major cases, prepare<br />

either a two to four-page point paper report or a six-page narrative report about the case, and<br />

lead or participate in the in-class discussions.<br />

(3) Lead several small group discussions about the cases<br />

(4) Prepare oral presentations <strong>of</strong> approximately 10-minute duration that present an analysis <strong>of</strong><br />

select cases.<br />

All papers and presentations will be evaluated for technical content, application <strong>of</strong> principles,<br />

appropriateness <strong>of</strong> format, use <strong>of</strong> supporting materials, and correct use <strong>of</strong> grammar and spelling rules.<br />

9.0 Social and Ethical Issues:<br />

This course focuses on the ethical, social, legal, and privacy issues in the information technology,<br />

bioinformatics, and health care industries. After extensive presentations <strong>of</strong> the fundamental theories and<br />

principles <strong>of</strong> ethical behavior, the students will apply the theories and principles to cases and real-world<br />

situations current to these industries.<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

No coverage.<br />

11.0 Problem analysis:<br />

A major part <strong>of</strong> this course is case analysis. Throughout the presentation <strong>of</strong> the theoretical materials,<br />

there will be shore in-class exercises that provide situations for student analysis. These exercises provide<br />

the students with models and processes that will be applied to the more formal lengthier cases and to<br />

situations that the students will encounter in business and industry.<br />

12.0 Solution design:<br />

-96-


The students apply what they have learned in this class to cases and everyday events in the industries <strong>of</strong><br />

focus. Students will be expected to determine the consequences for unethical behavior and to provide<br />

solid justification for their decisions.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

2/14/03 Initial ABET version Pietron<br />

6/24/03 ABET cleanup Wolcott<br />

10/10/08 Major changes to outline, assignments, Scho<strong>of</strong>f<br />

textbook.<br />

6/23/2009 Update <strong>of</strong> the course matrix Pietron<br />

-97-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 3110<br />

Course Title<br />

Information Technology Ethics<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 9/10/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Be able to determine the impact <strong>of</strong> the<br />

privacy laws on information security policies.<br />

Understand the issues related to intellectual<br />

freedom, intellectual property, and copyright<br />

law as they relate to electronic publishing.<br />

Be able to determine and identify ethical<br />

procedures and behaviors in the organization<br />

related to information security.<br />

X<br />

X<br />

X X S X<br />

Be able to identify issues <strong>of</strong> pr<strong>of</strong>essional X X S X<br />

conduct in information technology case<br />

studies.<br />

Be able to apply <strong>University</strong> standards <strong>of</strong> X X S X<br />

-98-<br />

S<br />

S


ethical conduct in preparing assignments for<br />

all coursework.<br />

Learn the areas most impacted by ethical<br />

decisions by pr<strong>of</strong>essionals in the computing<br />

field and will gain skills in making such<br />

decisions.<br />

Identify key ethical concerns <strong>of</strong> information<br />

technology specialists.<br />

Apply theories <strong>of</strong> ethics to case situations in<br />

the context <strong>of</strong> organizational use <strong>of</strong><br />

information technology.<br />

Appreciate how rapid changes in technology<br />

might affect ethical issues and changing<br />

norms <strong>of</strong> behavior.<br />

Understand the issues related to privacy and<br />

confidentiality as they relate to information<br />

technology.<br />

Understand the ethical issues associated with<br />

gathering, storing and accessing genetic<br />

information in databases.<br />

Recognize the differences in ethical codes <strong>of</strong><br />

conduct in different cultures and countries.<br />

Understand the ethical issues that arise from<br />

findings in genomic and bioinformatics<br />

analyses.<br />

The student will study and apply the<br />

following:<br />

X<br />

X X S<br />

X X S<br />

X<br />

X X S<br />

X X S<br />

Business Rules x S<br />

Firewalls X X S<br />

Cryptography X X S<br />

Privacy Laws X X S<br />

Copyright Ownership X X S<br />

Privacy, Publicity and Defamation X S<br />

Trademarks and Unfair Competition in<br />

X X S<br />

Cyberspace<br />

Intellectual Property X X S<br />

Contrast <strong>of</strong> Law vs. Ethics X S<br />

Organizational Ethical Principles X S<br />

S<br />

S<br />

S<br />

S<br />

S<br />

X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

-99-


1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-100-


CIST 3600 Information Security and Policy<br />

Department and Course Number CIST 3600<br />

Course Title<br />

Course Coordinator<br />

Information Security and Policy<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 6/23/2009<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course provides an introduction to the fundamental principles and topics <strong>of</strong> Information<br />

Assurance. The principles are laid out in such a way that computer pr<strong>of</strong>essionals not only learn<br />

about principles; they learn them in a logical order that provides a framework for developing and<br />

performing the security tasks. The course will address hardware, s<strong>of</strong>tware, processes,<br />

communications, applications, and policies and procedures relative to information assurance in<br />

the organization.<br />

This course is intended as a first course in Information Assurance at the undergraduate level. This<br />

course will be a pre-requisite for additional information and network security courses for the<br />

Information Assurance concentration in the undergraduate MIS program.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate information assurance (IA), management information<br />

systems (MIS) and computer science (CS) majors.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 3100<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Types <strong>of</strong> Processing Systems<br />

1.4.2 Essential Concepts <strong>of</strong> Networks<br />

1.4.3 Introduction to Topologies<br />

1.4.4 Understanding <strong>of</strong> TCP/IP<br />

1.4.5 Introduction to Systems Analysis, Design, and Databases<br />

1.4.6 Principles <strong>of</strong> Management<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

-101-


2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes<br />

2.1 Identify the fundamental principles <strong>of</strong> Information Security<br />

2.2 Demonstrate an understanding: the concept <strong>of</strong> threat, evaluation <strong>of</strong> assets, information assets,<br />

physical, operational, and information security – and how they are interrelated<br />

2.3 Understand risk analysis and risk management<br />

2.4 Demonstrate the ability to design and guide the development <strong>of</strong> a security policy for any<br />

corporate environment.<br />

2.5 Demonstrate an understanding <strong>of</strong> mitigation approaches – technical and administrative<br />

2.6 Understand the need for a comprehensive security model and its implications for the security<br />

manager<br />

2.7 Understand the need for the careful design <strong>of</strong> a secure corporate information infrastructure.<br />

2.8 Demonstrate an understanding <strong>of</strong> security technologies.<br />

2.9 Understand the relationship network infrastructure equipment to the implementation <strong>of</strong> a given<br />

security policy.<br />

2.10 Display an introductory understanding <strong>of</strong> basic cryptography, its implementation considerations<br />

and key management<br />

2.11 Understand the importance <strong>of</strong> secure system management - economical and corporation<br />

implications<br />

2.12 The Role <strong>of</strong> Procedures and Education in the overall Corporate Security Solution<br />

3.0 Content and Organization:<br />

3.1 The Future <strong>of</strong> Business 1.0<br />

3.2 Introduction to Information Security 1.0<br />

Contact hours<br />

3.3 Inspection 1.5<br />

3.3.1 Resource Inventory<br />

3.3.2 Threat Assessment<br />

3.3.3 Identifying Vulnerabilities<br />

3.3.4 Assigning Safeguards<br />

3.3.5 Evaluation <strong>of</strong> Current Status<br />

3.4 Protection 1.5<br />

3.4.1 Awareness<br />

3.4.2 Access<br />

3.4.3 Identification<br />

3.4.4 Authentication<br />

-102-


3.4.5 Authorization<br />

3.4.6 Availability<br />

3.4.7 Accuracy<br />

3.4.8 Confidentiality<br />

3.4.9 Accountability<br />

3.4.10 Administration<br />

3.5 Detection 1.5<br />

3.5.1 Intruder Types<br />

3.5.2 Intrusion Methods<br />

3.5.3 Intrusion Process<br />

3.5.4 Detection Methods<br />

3.6 Reaction 1.5<br />

3.6.1 Incident Determination<br />

3.6.2 Incident Notification<br />

3.6.3 Incident Containment<br />

3.6.4 Assessing Damage<br />

3.6.5 Incident Recovery<br />

3.6.6 Automated Response<br />

3.7 Reflection 1.5<br />

3.7.1 Incident Documentation<br />

3.7.2 Incident Evaluation<br />

3.7.3 Legal Prosecution<br />

3.7.4 The Future <strong>of</strong> Information Security<br />

3.8 What is Security Engineering 1.5<br />

3.9 Protocols 1.5<br />

3.10 Passwords 1.5<br />

3.11 Access Controls 1.5<br />

3.12 Cryptography 1.5<br />

3.13 Distributed Systems 1.5<br />

3.14 Multilevel Security 1.5<br />

3.15 Multilateral Security 1.5<br />

3.16 Banking and Bookkeeping 1.5<br />

3.17 Monitoring Systems 1.5<br />

3.18 Nuclear Command and Control 1.5<br />

3.19 Security Printing and Seals 1.5<br />

3.20 Biometrics 1.5<br />

3.21 Physical Tamper Resistance 1.5<br />

3.22 Emission Security 1.5<br />

3.23 Electronic and Information Warfare 1.5<br />

3.24 Telecom System Security 1.5<br />

3.25 Network Attack and Defense 1.5<br />

3.26 Protecting E-Commerce Systems 1.5<br />

-103-


3.27 Copyright and Privacy Protection 1.5<br />

3.28 E-Policy 1.5<br />

3.29 Management Issues 1.5<br />

3.30 System Evaluation and Assurance 1.5<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching method will be discussion, programming-related projects and<br />

demonstrations, case studies, lecture, expert speakers and security-related application<br />

demonstrations.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned programming-related projects, and complete required examinations.<br />

4.3 Contact hours<br />

3.0<br />

5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

The student products will be article reviews, projects, examinations, and oral presentations.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Grades will be determined on the basis <strong>of</strong> the student’s participation in research, presentation <strong>of</strong><br />

results, participation through class discussion, and achievement on examinations. The specific<br />

weights shall be specified in the outline for the particular class.<br />

5.3 Grading scale and criteria.<br />

Points Grading<br />

97 – 100% A+<br />

94 – 96% A<br />

90 – 93% A–<br />

87 – 89% B+<br />

84 – 86% B<br />

80 – 83% B–<br />

77 – 79% C+<br />

-104-


70 – 76% C<br />

70 – 73% C-<br />

67 – 69% D+<br />

64 – 66% D<br />

60 – 63% D–<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 asjdkflaj<br />

6.1.2 Information Security Protecting the Global Enterprise, by Donald L. Pipkin, Prentice-Hall,<br />

2000. (or more recent text)<br />

6.1.3 Security Engineering, by Ross Anderson, Wiley Computer Publishing, 2001. (or more<br />

recent text)<br />

6.2 Other suggested reading materials, if any.<br />

Additional articles that have been collected for various topics are available at the UNO Library.<br />

These articles are used to supplement topics presented in various chapters.<br />

6.3 Other sources <strong>of</strong> information<br />

Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />

relevant to topics in systems analysis and design. The process is particularly important in keeping<br />

current with technology and new methodologies.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

6.4.1 Designing Network Security by Merike and Kaeo, Cisco Systems, Macmillan<br />

Publishing, 1999.<br />

6.4.2 Computer and Internet Use on Campus: A Legal Guide to Issues <strong>of</strong> Intellectual<br />

Property, Free Speech, and Privacy, by Constance S. Hawke, John Wiley & Sons,<br />

September 1, 2000<br />

6.4.3 Borders in Cyberspace: Information Policy and the Global Information Infrastructure<br />

(Publication <strong>of</strong> the Harvard Information Infrastructure Project) by Brian Kahin and Charles<br />

Nesson, MIT Press, March 1997.<br />

6.4.4 Cybercrime: Law Enforcement, Security and Surveillance in the Information Age by Tom<br />

Douglas, Routledge, and July 2000.<br />

6.4.5 Data Privacy in the Information Age by Jacqueline Klosek, Praeger Publishing, August 30,<br />

2000.<br />

6.4.6 ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy<br />

Regulations, by Timothy D. Casey, Wiley, 2000.<br />

6.4.7 Technology and Privacy: The New Landscape, by Philip E. Agre, and Marc Rotenberg. , MIT<br />

Press, September 1998.<br />

6.4.8 Internet Privacy Protection Guide by J. K. Santiago, Boggy Cove, Inc. 1999.<br />

-105-


6.4.9 E-Policy: How to Develop Computer, E-Policy, and Internet Guidelines to Protect Your<br />

Company and Assets by Michael R. Overly, AMACOM, September 1998.<br />

6.4.10 Computer and Information Ethics by John Weckert and Douglas Adeney, Greenwood<br />

Publishing Group, May 1997.<br />

6.4.11 Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing by Tom Forester<br />

and Perry Morrison, MIT Press, December1993.<br />

6.4.12 The Information Systems Security Officer's Guide: Establishing and Managing an<br />

Information Protection Program by Gerald Kovacich, Butterworth-Heinemann, 1998<br />

6.4.13 Information Warfare and Security by Dorothy E. Denning, Addison Wesley, 1999.<br />

6.4.14 Cyberwar 2.0: Myths, Mysteries and Realities, Alan D. Campen and Douglas H. Dearth,<br />

AFCEA Press, 1998.<br />

6.4.15 The Art <strong>of</strong> Information Warfare: Insight into the Knowledge Warrior Philosophy, by<br />

Richard Forno and Ronald Baklarz, Upublish.com, 1999.<br />

6.4.16 Big Brother NSA, and It's Little Brother; National Security Agency's Global Surveillance<br />

Network, by Cook, HSPI, March 1999.<br />

6.4.17 Maximum Security; A Hacker's Guide to Protecting Your Internet Site and Network with<br />

CDROM Anonymous / Sams Publishing, SAMS, 1998.<br />

6.4.18 Information Warfare : Chaos on the Electronic Superhighway by Winn Schwartau,<br />

Thunder's Mouth Pr. October 1996 .<br />

6.4.19 Information Warfare : Principles and Operations by Edward Waltz, Artech House,<br />

September 1998.<br />

6.4.20 Strategic Appraisal: The Changing Role <strong>of</strong> Information in Warfare by John White, Zalmay<br />

Khalilzad , Andrew W. Marshall, Rand Corporation, May 1999.<br />

6.4.21 Toward a Revolution in Military Affairs : Defense and Security at the Dawn <strong>of</strong> the Twenty-<br />

First Century (Contributions in Military Studies, No. 197) by Thierry Gongora and Harald<br />

Von Riekh<strong>of</strong>f, Greenwood Publishing Group, June 30, 2000.<br />

6.4.22 Hacker Pro<strong>of</strong>; The Ultimate Guide to Network Security with CDROM by Lars Klander,<br />

Jamsa Press, 2000.<br />

6.4.23 Hacking Exposed; Network Security Secrets and Solutions, 2000, SAMS.<br />

6.4.24 Designing Network Security by Merike Kaeo, Cisco Systems, Macmillan Publishing, 1999.<br />

7.0 Estimate Computer Science Accreditation Board (CSAB) Category Content (class time in hours):<br />

CSAB Category Core Advanced<br />

Data structures<br />

Computer organization and architecture 12<br />

Algorithms and s<strong>of</strong>tware design<br />

Concepts <strong>of</strong> programming languages<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __2___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __10-20___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

-106-


9.0 Social and Ethical Issues:<br />

The course will address the social and ethical issues on Information Assurance. Students will be graded on<br />

their understanding <strong>of</strong> these topics by class participation, exams, or researches.<br />

10.0 Theoretical content:<br />

10.1 The fundamental principles <strong>of</strong> Information Security 2<br />

10.2 The basic concept <strong>of</strong> threat, evaluation <strong>of</strong> assets, information assets,<br />

physical, operational, and information security and how they are related. 2<br />

Hours<br />

11.0 Problem analysis:<br />

The students will learn the principles that are used by computer pr<strong>of</strong>essionals. They will not only learn<br />

about principles; but learn them in a logical order that provides a framework for developing and<br />

performing the security tasks. The course will address hardware, s<strong>of</strong>tware, processes, communications,<br />

applications, and policies and procedures relative to information assurance in the organization.<br />

12.0 Solution design<br />

Using these established principles and frameworks, students will build and maintain secure and reliable<br />

information systems. Students also learn to design and guide the development <strong>of</strong> a security policy for any<br />

corporate environment.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

11/2/02 Initial ABET version Pietron<br />

6/25/03 ABET clean-up Wolcott<br />

10/14/08 Update to course title, description and Pietron<br />

prerequisites<br />

6/23/2009 Updated course objectives to <strong>BIS</strong> program<br />

objectives<br />

Pietron<br />

-107-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 3600<br />

Course Title<br />

Information Security and Policy<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/27/09<br />

S – Strong relationship<br />

X –Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Identify the fundamental principles <strong>of</strong><br />

Information Security<br />

Demonstrate an understanding: the<br />

concept <strong>of</strong> threat, evaluation <strong>of</strong> assets,<br />

information assets, physical, operational,<br />

and information security – and how they<br />

are interrelated<br />

Understand risk analysis and risk<br />

management<br />

Demonstrate the ability to design and<br />

guide the development <strong>of</strong> a security<br />

policy for any corporate environment.<br />

Demonstrate an understanding <strong>of</strong><br />

mitigation approaches – technical and<br />

administrative<br />

X x x x x x x x x X<br />

S S S<br />

S S S S S S<br />

S S S X X X<br />

S<br />

S<br />

-108-


Understand the need for a<br />

comprehensive security model and its<br />

implications for the security manager<br />

Understand the need for the careful<br />

design <strong>of</strong> a secure corporate information<br />

infrastructure.<br />

Demonstrate an understanding <strong>of</strong><br />

security technologies.<br />

Understand the relationship network<br />

infrastructure equipment to the<br />

implementation <strong>of</strong> a given security policy.<br />

Display an introductory understanding <strong>of</strong><br />

basic cryptography, its implementation<br />

considerations and key management<br />

Understand the importance <strong>of</strong> secure<br />

system management - economical and<br />

corporation implications<br />

The Role <strong>of</strong> Procedures and Education in<br />

the overall Corporate Security Solution<br />

s<br />

s<br />

X S S S<br />

S<br />

S S<br />

S<br />

X X<br />

X x X<br />

-109-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-110-


CIST 4360 Foundations <strong>of</strong> Information Assurance<br />

Department and Course Number CIST 4360 CSCI 4360-001 CSCI 8366-001<br />

Course Title<br />

Foundations <strong>of</strong> Information Assurance<br />

Course Coordinator<br />

Blaine Burnham and Robin Gandhi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision May 26, 2009<br />

Semester Offered Fall 2009<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The purpose <strong>of</strong> the course is to provide students with a comprehensive overview <strong>of</strong> the<br />

Information Assurance subject area starting from its foundational roots and to prepare students<br />

for more extensive study in the subject. The course topics outline what we knew during the early<br />

days <strong>of</strong> the field, what we now know, what has been done until now, and what are the<br />

challenging problems still exist.<br />

1.2 For whom course is intended.<br />

This course is intended for graduate and undergraduate students with IA majors in the College <strong>of</strong><br />

IS&T who understand how computers are organized, how they compute and how they<br />

communicate. These students need to have an uncommon passion for learning and the need to<br />

have a highly motivated curiosity. Typically the class is designed for students that are seniors or<br />

graduate students. However, admission for any qualified student may be arranged with<br />

permission <strong>of</strong> the instructor.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 Introduction to information assurance (IASC 1100, CIST 3600, or instructor permission).<br />

1.3.2 Computer networking (CSCI 3550 or ISQA 3400, or instructor permission).<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Core terms and principles <strong>of</strong> information assurance: Confidentiality, Integrity, Availability,<br />

Threats, Vulnerabilities, Types <strong>of</strong> Malware, Authorization, Access Control, Accountability,<br />

Identification, Authentication, Security Controls, and Defense in Depth.<br />

1.4.2 Computer networking topics: Media, Protocol Stacks, Protocol Encapsulation, ARP, IP<br />

addressing, IP routing, ICMP, DHCP, TCP Virtual Circuits, Network Address Translation,<br />

DNS, and HTTP.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

-111-


2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 Know and comprehend the principle concepts <strong>of</strong> information assurance.<br />

2.2 Apply methods and tools associated with information assurance to<br />

engineer dependable s<strong>of</strong>tware systems.<br />

2.3 Analyze case studies related to information assurance to<br />

synthesize meaningful class presentations and discussions.<br />

2.4 Criticize current information assurance approaches.<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence. (Total 43.5 topic hours assuming a 15 week<br />

schedule and 1.5 hours for midterm)<br />

3.1 What is Information? (1 hour)<br />

3.2 Legal, Privacy and Ethical Issues (1.5 hour)<br />

3.2.1 Information and Law<br />

3.2.2 Computer crime<br />

3.2.3 Ethical reasoning<br />

3.3 Overview <strong>of</strong> Information Assurance (3 hours)<br />

3.3.1 A Taxonomy <strong>of</strong> Information Assurance<br />

3.3.2 The meaning <strong>of</strong> “Secure”<br />

3.3.3 Attacks and Computer Criminals<br />

3.3.4 A Vulnerability Taxonomy<br />

3.4 Genesis <strong>of</strong> the Field (6 hours)<br />

3.4.1 The problem description, The Ware Report<br />

3.4.2 Proposed solutions, The Anderson Report<br />

3.4.3 Design principle for secure systems<br />

3.5 General Operating System (3 hours)<br />

3.5.1 Shared Resources<br />

3.5.2 Access Control Mechanisms<br />

3.5.3 General Operating System Process Management<br />

3.5.4 Memory and Address Protection<br />

3.5.5 File Protection<br />

3.5.6 User protection<br />

-112-


3.6 Identification and Authentication (1 hours)<br />

3.6.1 Trusted Path<br />

3.7 Designing Trusted Operating System (3 hours)<br />

3.7.1 Characteristics <strong>of</strong> a Trusted Operating System<br />

3.7.2 Kernelized Design<br />

3.7.3 Separation/Isolation<br />

3.7.4 Virtualization<br />

3.7.5 Layered Design<br />

3.8 Security Models (3 hours)<br />

3.8.1 Information Classification<br />

3.8.2 Bell Lapadula<br />

3.8.3 BIBA<br />

3.8.4 Clark Wilson<br />

3.8.5 Chinese Wall Policy<br />

3.9 Case <strong>Study</strong>: Trusted Operating Systems Architecture (3 hours)<br />

3.9.1 Analysis <strong>of</strong> the Multics Ring Architecture<br />

3.10 Trusted Operating System Assurance (6 hours)<br />

3.10.1 The History <strong>of</strong> Assurance in Computer Systems<br />

3.10.2 Assurance methods<br />

3.10.3 Trusted Computer System Evaluation<br />

Criteria (TCSEC): The Orange Book<br />

3.11 Trusted Database Implementation (3 hours)<br />

3.11.1 Security requirements for databases<br />

3.11.2 Inference problems in databases<br />

3.11.3 Multilevel Databases<br />

3.12 Security in Network (3 hours)<br />

3.12.1 Common Threats to Networks<br />

3.12.2 Network Security Controls<br />

3.12.3 Firewalls and IDS<br />

3.13 Fundamentals <strong>of</strong> Cryptography (6 hours)<br />

3.13.1 Background on Cryptography<br />

3.13.2 Cryptographic Algorithms<br />

3.13.3 Applying Cryptography<br />

3.13.4 Attacks against Cryptography<br />

-113-


3.14 Risk Management (1 hour)<br />

3.14.1 Security Planning<br />

3.14.2 Risk Analysis<br />

3.14.3 Organization Security Policies<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The course will be presented primarily in lecture form. However, students will be expected to<br />

participate in discussions <strong>of</strong> the various topics as they are studied. In addition to the study <strong>of</strong> the<br />

text, students must do homework as assigned. Two tests will be given. A written paper with oral<br />

presentation as a semester project will be required.<br />

4.2 Student role in the course.<br />

The students will be involved through exams, homework, projects, and discussions with each<br />

other.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

5.1 Project.<br />

3 hours per week.<br />

Students will complete a semester long project. The purpose <strong>of</strong> the semester project is to<br />

demonstrate some in-depth knowledge <strong>of</strong> a topic related to the class subject material. Students<br />

can choose to write a research paper exploring some topic related to the class, to demonstrate a<br />

security application program, or to develop a programming project. Students will summarize the<br />

lessons learned from the project with a 10-15 page report and 20 minute conference quality<br />

power point presentation.<br />

5.2 Laboratory Assignments.<br />

The course includes a scheduled Laboratory component. The purpose <strong>of</strong> the Labs is to give<br />

students the opportunity to develop an operational understanding <strong>of</strong> many <strong>of</strong> the concepts<br />

discussed in class as well as additional ones. Each lab exercise will involve an investigation into<br />

some part <strong>of</strong> the subject matter. Each exercise will result in a 5 page written paper and a 10-<br />

minute presentation suitable for presentation at a faculty / student brown-bag forum. Laboratory<br />

assignments will generally require access to STEAL-1 outside <strong>of</strong> class.<br />

Daily Assignments.<br />

-114-


Daily assignments will be for each student to bring to each class a one page write-up <strong>of</strong> two<br />

current events articles and two web sites <strong>of</strong> substantive internet information security resource.<br />

Each <strong>of</strong> these current event articles and web site references needs to be accompanied with a<br />

short and incisive discussion <strong>of</strong> why the article or reference is relevant. The student should be<br />

prepared to discuss these them class.<br />

5.3 Exams.<br />

Student performance will be evaluated through three examinations: 2 in-class exams and a<br />

comprehensive Final Exam. All these exams will include a variety <strong>of</strong> question types to measure<br />

student understanding <strong>of</strong> the material. Tentatively, exams are scheduled every seven weeks.<br />

5.4 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Two exams will be given during the course:<br />

15% Exam 1<br />

15% Exam 2<br />

25% Lab<br />

20% Final exam<br />

15% Semester project<br />

5% Class attendance and participation<br />

5% Daily written assignments<br />

5.5 Grading scale and criteria.<br />

98 –100% A+<br />

93 – 97% A<br />

90 – 92% A-<br />

88 – 89% B+<br />

83 – 87% B<br />

80 – 82% B-<br />

78 – 79% C+<br />

72 – 77% C<br />

70 – 72% C-<br />

68 – 69% D+<br />

62 – 67% D<br />

60 – 62% D-<br />

0 – 59% F<br />

6.0 Resource Material<br />

-115-


6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Pfleeger, C.P., & Pfleeger, S.L. (2003). Security in Computing (3rd ed.). Upper Saddle River,<br />

NJ: Pearson Education, Inc.<br />

6.1.2 Anderson, R. (2001). Security Engineering: A Guide to Building Dependable Distributed<br />

Systems (1st ed.). Wiley.<br />

6.1.3 Schneier, B. (2000). Secrets and Lies: Digital Security in a Networked World (1st ed.). John<br />

Wiley & Sons.<br />

6.1.4 Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook <strong>of</strong> Applied<br />

Cryptography. CRC Press Series on Discrete Mathematics and Its Applications.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Graff, M.G. & van Wyk, K. R. (2003). Secure Coding: Principles and Practice, O’Reilly &<br />

Associates, Inc.<br />

6.2.2 Bishop, M. (2005). Introduction to Computer Security. Addison-Wesley Pr<strong>of</strong>essional.<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional materials and online resources will be identified for students at the beginning <strong>of</strong> the<br />

course and as the course progresses.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

6.4.1 Anderson, J.P. (1972). Computer Security Technology Planning <strong>Study</strong>, ESD-TR-73-51,<br />

ESD/AFSC, Hanscom AFB, Bedford, MA 01731 [NTIS AD-758 206]<br />

6.4.2 Bell, D. E & La Padula, L. (1975). Secure Computer System: Unified Exposition and Multics<br />

Interpretation, ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA 01731. [DTIC AD-<br />

A023588]<br />

6.4.3 Department <strong>of</strong> Defense. (1983, 1985). Trusted Computer System Evaluation Criteria<br />

(Orange Book). DoD 5200.28-STD<br />

6.4.4 Karger, P. A. & Schell, R. R. (1974). MULTICS Security Evaluation: Vulnerability Analysis.<br />

ESD-TR-74-193 Vol. II, ESD/AFSC, Hanscom AFB, Bedford, MA 01731.<br />

6.4.5 Ware, W. (1970) Security Controls for Computer Systems (U): Report <strong>of</strong> Defense Science<br />

Board Task Force on Computer Security. Rand Report R609-1, The RAND Corporation,<br />

Santa Monica, CA.<br />

7.0 Computer Science Accreditation Board (CSAB) Category Content (class time in hours)<br />

CSAB Category Core Advanced<br />

Data structures 5 10<br />

Computer organization and architecture 5 5<br />

Algorithms and s<strong>of</strong>tware design 10 5<br />

Concepts <strong>of</strong> programming languages 5<br />

8.0 Oral and Written Communications:<br />

-116-


Every student is required to submit at least __1 written summary per class period (not including exams,<br />

tests, quizzes, or commented programs) to typically __2__ page and to be prepared to make __1__ oral<br />

presentation per class period <strong>of</strong> typically __3-5__ minutes duration. Include only material that is graded<br />

for grammar, spelling, style, and so forth, as well as for technical content, completeness, and accuracy.<br />

Additionally, every student is required to submit at least __1 written semester project report (not<br />

including exams, tests, quizzes, or commented programs) to typically __10-15__ pages and to make __1__<br />

oral presentation <strong>of</strong> typically __20__ minutes duration.<br />

9.0 Social and Ethical Issues:<br />

Embedded in material covered throughout the course.<br />

10.0 Theoretical content<br />

Contact hours<br />

10.1 What is information assurance? 1.0<br />

10.2 Secure system engineering 0.5<br />

10.3 Intrinsic and extrinsic assurance activities and their interdependencies 1.0<br />

11.0 Problem analysis<br />

Students experience analysis <strong>of</strong> information assurance problems through class examples, homework<br />

exercises, and semester project report.<br />

12.0 Solution design<br />

The semester long project will provide the students with hands-on experience with tools and techniques<br />

for information assurance.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

02/20/2009 Initial ABET version Robin Gandhi<br />

05/26/2009 Corrected the CSCI Course No. Robin Gandhi<br />

-117-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 4360<br />

Course Title<br />

Foundations <strong>of</strong> Information Assurance<br />

Course Coordinator<br />

Blaine Burnham and Robin Gandhi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision May 26, 2009<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Know and comprehend the principle<br />

concepts <strong>of</strong> information assurance.<br />

Apply methods and tools associated with<br />

information assurance to<br />

engineer dependable s<strong>of</strong>tware systems.<br />

Analyze case studies related to<br />

information assurance to<br />

synthesize meaningful class presentations<br />

and discussions.<br />

Criticize current information assurance<br />

approaches.<br />

X S X X S X X X X<br />

S S S X S S X S S X S S S<br />

S S S S S X S X X X X S<br />

S S S S X S X X X S<br />

-118-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-119-


-120-


CIST 4370<br />

Security Administration<br />

Department and Course Number CIST 4370/IASC 4370<br />

Course Title<br />

Host Security Administration Using Windows<br />

Course Coordinator<br />

Stephen Nugen<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision Feb 17, 2009<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Students will learn the principles and practice <strong>of</strong> secure system administration <strong>of</strong><br />

host computers using Micros<strong>of</strong>t Windows operating systems. Lecture,<br />

demonstrations, and hands-on assignments include installation, storage<br />

management, account management, service management, and scripting. Students<br />

will learn how to assess and harden Windows-based hosts operating in server and<br />

client roles.<br />

1.2 For whom course is intended.<br />

This course is intended to be a second course for the Information Assurance degree<br />

or the Information Assurance concentration at the undergraduate level; and a<br />

foundation course for graduate study.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 Computer networking (CSCI 3550 or ISQA 3400, or instructor permission).<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Core terms and principles <strong>of</strong> Information Assurance such as: Confidentiality,<br />

Integrity, Availability, Threats, Vulnerabilities, Types <strong>of</strong> Malware,<br />

Authorization, Access Control, Accountability, Identification, Authentication,<br />

Security Controls, Defense in Depth, Certification and Accreditation.<br />

1.4.2 Understanding <strong>of</strong> networking topics such as: Media, Protocol Stacks, Protocol<br />

Encapsulation, Ethernet, TCP/IP suite, IP addressing, IP routing, TCP Virtual<br />

Circuits, and Network Address Translation.<br />

1.4.3 Understanding the role <strong>of</strong> network application protocols like ARP, ICMP,<br />

DHCP, DNS, and HTTP.<br />

1.4.4 Understanding basic programming constructs sufficient to understand<br />

presented content on Shell Scripting.<br />

-121-


1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives<br />

2.1 Understand core principles <strong>of</strong> Information Assurance with respect to host security.<br />

2.2 Identify key sources for Information Assurance requirements with respect to how<br />

operating systems are installed, configured, and maintained.<br />

2.3 Understand the system administration and security impacts <strong>of</strong> different host<br />

architectures.<br />

2.4 Understand and demonstrate different options for installing the host operating<br />

system.<br />

2.5 Understand and demonstrate different options for user interfaces with respect to<br />

host security.<br />

2.6 Understand and demonstrate how to configure, inspect, and monitor host storage<br />

mechamisms, including disks, partitions and volumes, file systems, and access<br />

controls.<br />

2.7 Understand and demonstrate how to write system administration scripts.<br />

2.8 Understand and demonstrate how to configure operating system services.<br />

2.9 Understand and demonstrate how to configure and manage Windows domains,<br />

including domain user credentials.<br />

2.10 Understand and demonstrate how to securely configure and manage Windows<br />

networking and host firewall.<br />

2.11 Identify options for host vulnerability assessments, including frameworks and tools.<br />

3.0 Content and Organization<br />

Contact hours<br />

3.1 Introduction and context 1.5<br />

3.2 Core security principles and requirements 3.0<br />

3.3 Host considerations 3.0<br />

3.4 Boot process and operating system installations 4.5<br />

3.5 Configuring and inspecting host system state 6.0<br />

3.6 Special focus on storage management 3.0<br />

3.7 Special focus on scripting 6.0<br />

3.8 Windows domains 3.0<br />

3.9 Windows networking 4.5<br />

3.10 Operating system services 6.0<br />

3.11 Host assessments 4.5<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used.<br />

-122-


The primary teaching methods will be lecture, discussion, demonstrations, lab<br />

exercises, and reading assignments.<br />

4.2 Student role in the course.<br />

Students will attend lectures and demonstrations, participate in discussions,<br />

complete and submit lab and other assignments, and complete required<br />

examinations.<br />

4.3 Contact hours.<br />

5.0 Evaluation<br />

In-class contact consists <strong>of</strong> two 75-minute lectures per week (3.0 contact<br />

hours/week).<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For<br />

Laboratory projects, specify the number <strong>of</strong> weeks spent on each project.<br />

Students will complete individual assignments requiring independent study and<br />

preparing short written responses to instructor-provided questions.<br />

Students will also complete small and large laboratory assignments and projects with<br />

specified deliverables such as: Report <strong>of</strong> Findings; Test Cases; and Annotated Source<br />

Code. Most laboratory assignments will be be due within one to two weeks <strong>of</strong><br />

assignment. Some laboratory assignments will be started in-class. Laboratory<br />

assignments will require access to STEAL-1 outside <strong>of</strong> class.<br />

Student performance will also be evaluated through two examinations: Midterm and<br />

a comprehensive Final Exam. Both <strong>of</strong> these exams will include a variety <strong>of</strong> question<br />

types to measure student understanding <strong>of</strong> the material.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Grades will be determined on the following basis:<br />

Assignments 55%<br />

Midterm 20%<br />

Final Exam 25%<br />

-123-


100%<br />

5.3 Grading scale and criteria.<br />

Points Grading<br />

99 – 100% A+<br />

92 – 98% A<br />

90 – 91% A–<br />

88 – 89% B+<br />

82 – 87% B<br />

80 – 81% B–<br />

78 – 79% C+<br />

72 – 77% C<br />

70 – 71% C-<br />

68 – 69% D+<br />

62 – 67% D<br />

60 – 61% D–<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course. No required textbook.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Mueller, J.P. (2007). Windows Administration at the Command Line.<br />

Indianapolis, Wiley.<br />

6.2.2 Northrup, T. & Thomoas, O. (2004). Implementing and Administering Security<br />

in a Micros<strong>of</strong>t Windows Server 2003 Network. Redmond, WA: Micros<strong>of</strong>t Press.<br />

6.2.3 Russel, C., Crawford, S., & Gerend, J. (2003). Micros<strong>of</strong>t Windows Server 2003<br />

Administrator's Companion. Redmond, WA: Micros<strong>of</strong>t Press.<br />

6.2.4 Russinovich, M. & Solomon, D. (2005). Micros<strong>of</strong>t Windows Internals, Fourth<br />

Edition. Redmond, WA: Micros<strong>of</strong>t Press.<br />

6.2.5 Scambray, J. & McClure, S. (2003). Hacking Exposed Windows Server 2003.<br />

New York, McGraw-Hill.<br />

6.2.6 Scambray, J. & McClure, S. (2008). Hacking Exposed Windows: Windows<br />

Security Secrets & Solutions, Third Ed. New York, McGraw-Hill.<br />

6.2.7 Stanek, W. R. (2004). Micros<strong>of</strong>t Windows Server 2003 Inside Out. Redmond,<br />

WA: Micros<strong>of</strong>t Press.<br />

6.2.8 Stanek, W. R. (2007). Windows Vista Administrator's Pocket Reference.<br />

Redmond, WA: Micros<strong>of</strong>t Press.<br />

6.2.9 Stanek, W. R. (2008). Micros<strong>of</strong>t Windows Command-Line Administrator’s<br />

Pocket Consultant, Second Edition. Redmond, WA: Micros<strong>of</strong>t Press.<br />

-124-


6.3 Other sources <strong>of</strong> information.<br />

Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals<br />

that are relevant to security administration using Windows. The process is<br />

particularly important in keeping current with technology and new methodologies.<br />

6.4 Current bibliography <strong>of</strong> online resources for student’s information.<br />

6.4.1 Carnegie Mellon S<strong>of</strong>tware Engineering Institute. (2009). CERT Coordination<br />

Center. Available from http://www.cert.org/<br />

6.4.2 CERIAS (Purdue). (2009). CERIAS Blog. Available from<br />

http://www.cerias.purdue.edu/site/blog<br />

6.4.3 Defense Information Systems Agency: Information Assurance Support<br />

Environment. (2009). Security Technical Implementation Guides (STIGS) and<br />

Supporting Documents. Available from http://iase.disa.mil/stigs/index.html<br />

6.4.4 Department <strong>of</strong> Homeland Security. (2009). National Vulnerability Database.<br />

Available from http://nvd.nist.gov/<br />

6.4.5 Intini, F. (2008.) Feliciano Intini's Micros<strong>of</strong>t Security Taxonomy 2.0. Available<br />

from http://blogs.technet.com/feliciano_intini/pages/<br />

micros<strong>of</strong>t-blogs-and-web-resources-about-security.aspx<br />

6.4.6 Jones, J. (2009). Jeff Jones Security Blog. Available from<br />

http://blogs.technet.com/security/default.aspx<br />

6.4.7 LeBlanc, D. (2009). David LeBlanc's Web Log. Available from<br />

http://blogs.msdn.com/david_leblanc/<br />

6.4.8 Margois, A. (n.d.) Aaron Margosis' "Non-Admin" WebLog. Available from<br />

http://blogs.msdn.com/Aaron_Margosis/<br />

6.4.9 Micros<strong>of</strong>t. (2006). BOOT.INI and ARC Path Naming Conventions and Usage.<br />

Available from http://support.micros<strong>of</strong>t.com/kb/102873/EN-US/<br />

6.4.10 Micros<strong>of</strong>t. (2006). Adding Optional Components to Add/Remove Programs<br />

Tool. Available from http://support.micros<strong>of</strong>t.com/kb/223182/en-us<br />

6.4.11 Micros<strong>of</strong>t. (2006). Security Monitoring and Attack Detection. Available from<br />

http://www.micros<strong>of</strong>t.com/downloads/details.aspx?<br />

FamilyID=1E194D99-5734-4B02-9CAA-C80F5C0FB0C0&displaylang=en<br />

6.4.12 Micros<strong>of</strong>t. (2007). How To Add, Modify, Or Delete Registry Subkeys And<br />

Values By Using A Registration Entries (.Reg) File. Available from<br />

http://support.micros<strong>of</strong>t.com/kb/310516/<br />

6.4.13 Micros<strong>of</strong>t. (2008). Windows Registry Information for Advanced Users.<br />

Available from http://support.micros<strong>of</strong>t.com/kb/256986/<br />

6.4.14 Micros<strong>of</strong>t. (2009). Micros<strong>of</strong>t Malware Protection Center: Threat Research &<br />

Response Blog. Available from http://blogs.technet.com/mmpc/<br />

6.4.15 Micros<strong>of</strong>t. (2009). Security Research & Defense. Available from<br />

http://blogs.technet.com/swi/default.aspx<br />

6.4.16 Micros<strong>of</strong>t. (2009). The Micros<strong>of</strong>t Security Response Center (MSRC). Available<br />

from http://blogs.technet.com/msrc/default.aspx<br />

-125-


6.4.17 Micros<strong>of</strong>t. (2009). Windows Client TechCenter. Available from<br />

http://technet.micros<strong>of</strong>t.com/en-us/windows/default.aspx<br />

6.4.18 Micros<strong>of</strong>t. (2009). Windows Server TechCenter. Available from<br />

http://technet.micros<strong>of</strong>t.com/en-us/windowsserver/default.aspx<br />

6.4.19 National Information Assurance Training and Education Center. (2009). Home<br />

Page. Available from http://niatec.info/ViewPage.aspx?id=0.<br />

6.4.20 National Institute <strong>of</strong> Standards and Technology: Computer Security Division.<br />

(2009). Computer Security Resource Center. Available from<br />

http://csrc.nist.gov/index.html<br />

6.4.21 Schneirer, B. (2009). Schneier on Security. Available from:<br />

http://www.schneier.com/blog/<br />

6.4.22 US-CERT. (2009). Technical Users. Available from http://www.uscert.gov/nav/t01/<br />

7.0 CSAB and CAC Category Content (class time in hours)<br />

(CS Program) Estimate Computer Science Accreditation Board (CSAB) Category Content<br />

CSAB Category Core Advanced<br />

Data structures 1 2<br />

Computer organization and<br />

2<br />

6<br />

architecture<br />

Algorithms and s<strong>of</strong>tware design 3<br />

Concepts <strong>of</strong> programming languages 3<br />

8.0 Oral and Written Communications<br />

All student submissions will be evaluated for technical content, application <strong>of</strong> principles,<br />

completeness, accuracy, and use <strong>of</strong> use <strong>of</strong> supporting materials.<br />

Student submittals such as justification <strong>of</strong> test cases or why certain attributes are more<br />

valued in system administrators than other attributes will be also be graded for clarity <strong>of</strong> the<br />

communication which includes: structure, grammar, spelling, for formatting.<br />

Every student will be required to participate in classroom discussion.<br />

Every student will be encouraged to help other students resolve laboratory problems and to<br />

share their experiences and lessons-learned.<br />

9.0 Social and Ethical Issues<br />

The course will address the social and ethical issues related to the special role <strong>of</strong> System<br />

Administration, including: individual privacy, sensitivity <strong>of</strong> information, and investigating<br />

-126-


potential misuse. Students will be graded on their understanding <strong>of</strong> these topics through<br />

participation, assignments, and examinations.<br />

10.0 Theoretical Content<br />

10.1 Transforming broad security policies into specific security controls 6.0<br />

(e.g., access controls and audit).<br />

10.2 Analyzing trade<strong>of</strong>fs between decreased attack surface and diminished 6.0<br />

functionality.<br />

11.0 Problem Analysis<br />

Students will learn the principles <strong>of</strong> host system administration, illustrated through<br />

Micros<strong>of</strong>t Windows operating system environment. Students will demonstrate and extend<br />

their understanding <strong>of</strong> those principles by solving problems in Windows system<br />

administration.<br />

12.0 Solution design<br />

Students will develop command pipelines and scripts for secure host system administration,<br />

choosing the appropriate commands and structures. Students will develop resourceconstrained<br />

host security assessment approaches, defending their trade<strong>of</strong>f choices.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

02/17/2009 Revised ABET version Nugen Prerequisites changed.<br />

-127-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 4370/IASC 4370<br />

Course Title<br />

Host Security Administration Using Windows<br />

Course Coordinator<br />

Stephen Nugen<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision Feb 17, 2009<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand core principles <strong>of</strong><br />

Information Assurance with respect<br />

to host security.<br />

Identify options for host<br />

vulnerability assessments, including<br />

frameworks and tools.<br />

Identify key sources for Information<br />

Assurance requirements with<br />

respect to how operating systems<br />

are installed, configured, and<br />

maintained.<br />

Understand the system<br />

administration and security impacts<br />

<strong>of</strong> different host architectures.<br />

Understand and demonstrate<br />

different options for installing the<br />

X<br />

X<br />

X X X<br />

X<br />

X<br />

-128-


host operating system.<br />

Understand and demonstrate<br />

different options for user interfaces<br />

with respect to host security.<br />

Understand and demonstrate how<br />

to configure, inspect, and monitor<br />

host storage mechamisms, including<br />

disks, partitions and volumes, file<br />

systems, and access controls.<br />

Understand and demonstrate how<br />

to write system administration<br />

scripts.<br />

Understand and demonstrate how<br />

to configure operating system<br />

services.<br />

Understand and demonstrate how<br />

to configure and manage Windows<br />

domains, including domain user<br />

credentials.<br />

Understand and demonstrate how<br />

to securely configure and manage<br />

Windows networking and host<br />

firewall.<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

-129-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-130-


CIST 4540<br />

Computer Security Management<br />

Department and Course Number CIST 4540<br />

Course Title<br />

Computer Security Management<br />

Course Coordinator<br />

Dwight Haworth<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision November 15, 2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The purpose <strong>of</strong> this course is to integrate concepts and techniques from security assessment,<br />

risk mitigation, disaster planning, and auditing to identify, understand, and propose solutions<br />

to problems <strong>of</strong> computer security and security administration.<br />

1.2 For whom course is intended.<br />

This course is intended for all students in the College <strong>of</strong> Information Science and Technology<br />

who desire to increase their understanding <strong>of</strong> computer security management.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 4360 – Foundations <strong>of</strong> Information Assurance<br />

1.3.2 or permission <strong>of</strong> the instructor.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Familiarity with computer hardware and system s<strong>of</strong>tware.<br />

1.4.2 Familiarity with the glossary <strong>of</strong> computer security.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes. The student will be<br />

able to<br />

2.1 Plan an organizational security assessment,<br />

2.2 Specify the required characteristics <strong>of</strong> a system for a specific application,<br />

2.3 Specify a network architecture to support given policy requirements,<br />

2.4 Create a Disaster Response Plan, and<br />

Identify the informational needs <strong>of</strong> a Computer Security Manager.<br />

-131-


3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> contact hours on each).<br />

Hours<br />

3.1 Management responsibilities and liabilities 3.0<br />

3.2 Turquoise Book 3.0<br />

3.3 Vulnerability Assessment 3.0<br />

3.4 Physical threats 3.5<br />

3.5 Protecting Internet-visible systems 3.0<br />

3.6 Orange Book 6.0<br />

3.7 Common Criteria Standards 3.0<br />

3.8 S<strong>of</strong>tware Development Issues 1.5<br />

3.9 Continuity planning 3.0<br />

3.10 Disaster recovery 6.0<br />

3.11 Computer emergency response teams 4.0<br />

3.12 Auditing Computer Security 3.0<br />

3.13 Monitoring and Control Systems 1.5<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

4.1.1 Lecture and discussion <strong>of</strong> assigned material<br />

4.1.2 The student is to prepare reports that require the application <strong>of</strong> principles and techniques<br />

presented in class.<br />

4.1.3 The student will read print media for articles related to the subject matter for the week<br />

and submit a brief synopsis <strong>of</strong> the article.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstration, participate in discussion on assigned<br />

readings, take required quizzes, complete assigned projects, and complete required<br />

examinations<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three contact hours per week<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

5.1.1 Informational Analysis <strong>of</strong> Value Chain Activity (3)<br />

5.1.2 Design <strong>of</strong> a network security architecture (2)<br />

5.1.3 Recovery Process Planning (2)<br />

-132-


5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Component Grading<br />

Quizzes 10%<br />

Two Examinations 50%<br />

Assignments 40%.<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-87% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />


7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 3<br />

Networking and telecommunications 3<br />

Modern programming language 0.5<br />

Analysis and Design 12<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 4.5<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __2___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __10___ pages and to make __0___ oral presentations <strong>of</strong> typically<br />

_____ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as<br />

well as for technical content, completeness, and accuracy. Each graduate student will submit one paper<br />

<strong>of</strong> at least 15 pages (excluding front- and back-matter).<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

None<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

None.<br />

11.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

The student will analyze the value chain <strong>of</strong> a real company to identify critical informational flows along<br />

with material flows necessary to maintain the operation <strong>of</strong> the value chain processes.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

The student will design a partitioned network structure to achieve varying levels <strong>of</strong> protection for the<br />

information resources within each partition.<br />

-134-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

11/15/08 Projects Changed DAH CC Toolbox Not Available<br />

-135-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CIST 4540<br />

Course Title<br />

Computer Security Management<br />

Course Coordinator<br />

Dwight A. Haworth<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 11/15/08<br />

S – Strong relationship<br />

X –Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Plan an organizational security<br />

assessment<br />

Specify the required characteristics <strong>of</strong> a<br />

system for a specific application<br />

Specify a network architecture to support<br />

given policy requirements<br />

Create a Disaster Response Plan<br />

Identify the informational needs <strong>of</strong> a<br />

Computer Security Manager<br />

X<br />

X<br />

X<br />

X X X<br />

X<br />

-136-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-137-


-138-


CSCI 1620<br />

Introduction to Computer Science II<br />

Department and Course Number CSCI 1620<br />

Course Title<br />

Introduction to Computer Science II<br />

Course Coordinator<br />

John Clark<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision December 12, 2008<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (catalog description)<br />

Advanced topics in programming; topics in data representation and manipulation, data structures,<br />

problem solving and algorithm design.<br />

1.2 For whom course is intended<br />

This course is designed primarily for computer science and information systems majors.<br />

1.3 Prerequisites <strong>of</strong> the course (courses)<br />

CSCI 1610 or CIST 1400 with a grade <strong>of</strong> “C” or better<br />

1.4 Prerequisites <strong>of</strong> the course (topics).<br />

Basic programming skills and facility with:<br />

1.4.1 Input/output<br />

1.4.2 Control structures<br />

1.4.3 Using functions<br />

1.4.4 Arrays<br />

1.4.5 Pointers<br />

1.4.6 Basic object properties<br />

1.5 Unusual circumstances <strong>of</strong> the course<br />

None<br />

2.0 Objectives<br />

2.1 sdfgskdl<br />

2.2 Describe the basic data types used in algorithms and discuss their implementation on modern<br />

computer systems.<br />

2.3 Discuss the concept <strong>of</strong> an abstract data type and how it is related to the concept <strong>of</strong> an object in<br />

the context <strong>of</strong> object-oriented programming.<br />

2.4 Characterize the ways in which the scope <strong>of</strong> an object can be controlled, with specific references<br />

to the features available in C++ for controlling object lifetimes.<br />

2.5 Discuss the use <strong>of</strong> recursion and iteration as alternate techniques for solving problems. Comment<br />

on the manner in which local variables are preserved, and on the space/time trade<strong>of</strong>fs in each<br />

approach.<br />

2.6 Describe several elementary sorting algorithms and comment on their running times using the<br />

“big O” notation. Describe efficient algorithms to identify all permutations <strong>of</strong> a set <strong>of</strong> items, and<br />

-139-


to identify all possible combinations <strong>of</strong> a set <strong>of</strong> items. Comment on the running time <strong>of</strong> these<br />

algorithms.<br />

2.7 Comment on the design <strong>of</strong> algorithms, specifically with regard to verifying their correctness.<br />

Discuss the potential effects <strong>of</strong> the failure <strong>of</strong> an algorithm.<br />

2.8 Discuss operator overloading, specifically as it is used in the C++ programming language. Indicate<br />

its purpose, appropriate circumstances for its use, and how the compiler decides which function<br />

to use when an overloaded operated is utilized.<br />

2.9 Illustrate the use <strong>of</strong> templates in the C++ programming language. Indicate how the appropriate<br />

use <strong>of</strong> templates can reduce the size <strong>of</strong> a source program. Comment on whether the size <strong>of</strong> the<br />

object program is also reduced when templates are employed.<br />

2.10 Comment on techniques for defining objects that store collections <strong>of</strong> other objects. Indicate<br />

typical ways in which the objects in these collections may be accessed, including specific coding<br />

examples in C++.<br />

2.11 Describe the stack, queue, and list abstract data types. Provide example implementations in the<br />

C++ programming language. Illustrate the use <strong>of</strong> these data types in several classic applications.<br />

2.12 Define a generic tree abstract data type. Discuss how a generic tree differs from a search tree.<br />

Demonstrate implementation <strong>of</strong> binary trees and binary search trees in the C++ programming<br />

language. Illustrate the use <strong>of</strong> tree is solutions to several classic applications.<br />

3.0 Content and Organization<br />

3.1 Data Representation (2 hours)<br />

3.1.1 Basic Data Types<br />

3.1.2 Computer Storage <strong>of</strong> Basic Data Types<br />

3.2 Abstract Data Types & Objects (4 hours)<br />

3.2.1 Abstract Data Type Specification<br />

3.2.2 Object Specification<br />

3.2.3 Object Implementation<br />

3.2.4 Object Instantiation<br />

3.3 Dynamic Memory Management (3 hours)<br />

3.4 Recursion (5 hours)<br />

3.4.1 Space, Time and Computability Considerations<br />

3.4.2 Run Time Stack<br />

3.4.3 Combinations & Permutations<br />

3.5 Basic sorting techniques (4 hours)<br />

3.5.1 Definition <strong>of</strong> sorting<br />

3.5.2 Basic algorithms for sorting<br />

3.5.3 The “big O” notation<br />

3.5.4 Recursion and sorting<br />

-140-


3.6 Object Oriented Techniques (6 hours)<br />

3.6.1 Operator Overloading<br />

3.6.2 Template Objects<br />

3.7 Collection Classes (4 hours)<br />

3.7.1 Composite Objects<br />

3.7.2 Access Collections<br />

3.7.3 Group Collections<br />

3.7.4 Organizing Collections<br />

3.8 Stacks & Queues (5 hours)<br />

3.8.1 Expression Analysis<br />

3.8.2 Priority Queues<br />

3.8.3 Resource Allocation<br />

3.8.4 Event Driven Simulations<br />

3.9 Linked Lists (4 hours)<br />

3.9.1 Singly Linked<br />

3.9.2 Circular<br />

3.9.3 Doubly Linked<br />

3.10 Trees (8 hours)<br />

3.10.1 Structure<br />

3.10.2 Binary<br />

3.10.3 Binary Search Trees<br />

3.10.4 Parsing<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used<br />

This course is presented primarily through lectures.<br />

4.2 Student role in the course<br />

The student in this course will analyze algorithms, code object oriented and linear data structure<br />

programs, write programs, and work on group projects.<br />

4.3 Contact hours<br />

Three hours per week<br />

-141-


5.0 5.0 Evaluation<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The grade for a student will be based on a combination <strong>of</strong> homework, group projects and<br />

examinations. Between one and two weeks will be spent on each laboratory project.<br />

5.2 Basis for determining the final grade<br />

Traditionally, approximately 60 to 70 percent <strong>of</strong> the grade will be determined by<br />

performance on between 7 and 9 laboratory projects. Scores on examinations and<br />

quizzes will be the basis for the remaining part <strong>of</strong> the grade, with a midterm examination<br />

having a typical weight <strong>of</strong> 10 percent, and a final examination having a weight <strong>of</strong> 20<br />

percent..<br />

Laboratory assignments will be evaluated using the following components and weights:<br />

40 percent for correctness, 40 percent for documentation/ease <strong>of</strong> use and ease <strong>of</strong><br />

maintenance, and 20 percent for having all required components submitted (source files,<br />

output examples, etc.). Suitable penalties for tardiness will be imposed (e.g. 15 percent if<br />

an submission is more than three days late).<br />

5.3 Grading scale and criteria<br />

Points<br />

Grade<br />

97 – 100% A+<br />

93 – 96% A<br />

90 – 92% A-<br />

87 – 89% B+<br />

83 – 86% B<br />

80 – 82% B-<br />

77 – 79% C+<br />

73 – 76% C<br />

70 – 72% C-<br />

67 – 69% D+<br />

63 – 66% D<br />

60 – 62% D-<br />

0 – 59% F<br />

6.0 Resource Material<br />

-142-


6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Ford & Topp,. Data Structures With C++ , Prentice Hall, 1996 (or a more recent<br />

text)<br />

6.2 Other suggested reading materials, if any<br />

None<br />

6.3 Other sources <strong>of</strong> information<br />

None<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information<br />

None<br />

7.0 Computer Science Accreditation Board (CSAB) Category Content (class time in hours)<br />

CSAB Category Core Advanced<br />

Data structures 15<br />

Computer organization and architecture<br />

Algorithms and s<strong>of</strong>tware design 10<br />

Concepts <strong>of</strong> programming languages 20<br />

8.0 Oral and Written Communications<br />

Every student is required to submit at least __0___ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically _____ pages and to make ___0__ oral<br />

presentations <strong>of</strong> typically _____ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy<br />

9.0 Social and Ethical Issues<br />

The importance <strong>of</strong> testing algorithms is made clear to students. Examples <strong>of</strong> algorithm failure<br />

and the impact <strong>of</strong> these failures are presented.<br />

10.0 Theoretical content<br />

This course introduces algorithmic problem-solving in the context <strong>of</strong> a modern programming language.<br />

Such topics as problem solving strategies, basic data structures, data and procedural abstraction, and<br />

algorithmic complexity are treated.<br />

-143-


Contact Hours<br />

10.1 Data Representation 2.0<br />

10.2 Abstract Data Types and Objects 4.0<br />

10.3 Dynamic Memory Management 3.0<br />

10.4 Recursion 5.0<br />

10.5 Object Oriented Techniques 6.0<br />

10.6 Collection Classes 4.0<br />

10.7 Stacks & Queues 5.0<br />

10.8 Linked Lists 4.0<br />

10.9 Trees 8.0<br />

11.0 Problem analysis<br />

Basic problem analysis is a focal point <strong>of</strong> this course. While learning the techniques <strong>of</strong> abstraction and<br />

encapsulation for basic data structures, the programming exercises provide opportunities to use the<br />

analysis techniques discussed in class.<br />

12.0 Solution design<br />

This course amplifies the object-oriented programming techniques introduced in CIST 1400. Students<br />

learn fundamental techniques for organizing data using a variety <strong>of</strong> classic data structures. Treatment <strong>of</strong><br />

memory management and recursion complement the discussion <strong>of</strong> these data structures. The significance<br />

<strong>of</strong> choosing the appropriate data structure for a solution is illustrated throughout the design <strong>of</strong> solutions<br />

to the programming exercises.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

02/20/1998 Original version Clark<br />

06/13/2003 Cleanup, ABET-specific material Wileman<br />

12/2/2008 Cleanup, ABET-specific material Clark<br />

-144-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number CSCI 1620<br />

Course Title<br />

Introduction to Computer Science II<br />

Course Coordinator<br />

John W. Clark<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 12/2/2008<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Describe the basic data types<br />

Abstract data types and objectoriented<br />

programming<br />

Object scope<br />

Recursion and iteration techniques for<br />

solving problems<br />

Searching, sorting and “big O”<br />

notation<br />

Operator overloading<br />

C++ templates<br />

S<br />

S<br />

S<br />

X X X<br />

X S S<br />

Collections and storage classes S X<br />

Linear storage types ( stack, queue,<br />

S<br />

X<br />

and list )<br />

X<br />

S<br />

S<br />

-145-


Trees and binary search trees S X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-146-


ISQA 3150 Principles <strong>of</strong> Quantitative Analysis<br />

Department and Course Number ISQA 3150<br />

Course Title<br />

Principles <strong>of</strong> Quantitative Analysis<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/02/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course is designed to give students the principles <strong>of</strong> Quantitative Analysis, a scientific<br />

approach to decision making that involves the operations <strong>of</strong> organizational systems.<br />

Quantitative Analysis attempts to solve the conflicts <strong>of</strong> interest among the components <strong>of</strong><br />

the organization in a way that is best for the organization as a whole.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to<br />

understand the principles <strong>of</strong> Quantitative Analysis. It is one <strong>of</strong> elective courses for<br />

undergraduates who wish to pursue Data Mining and Business Intelligence.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

CIST 1100 and CIST 2500<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Introduction to Visual Basic Programming,<br />

1.4.2 Program development cycle<br />

1.4.3 Training in spreadsheets and database<br />

1.4.4 Statistics in information science and technology<br />

1.4.5 A well-known computer package being used to support the problem-solving<br />

process.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 To structure the real-life situation into a mathematical model, and abstract the essential elements<br />

so that a solution relevant to the decision maker’s objective can be sought. This involves looking<br />

at the problem in the context <strong>of</strong> the entire organizational system;<br />

2.2 To explore the structure <strong>of</strong> such solutions and develop systematic procedures for obtaining them;<br />

-147-


2.3 To develop a solution that yields an optimal value <strong>of</strong> the organizational system measure <strong>of</strong><br />

desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong> desirability.<br />

3.0 Content and Organization:<br />

3.1 Introduction 3<br />

3.2 Linear Programming: Model Formulation & Graphical<br />

3.3 Solution, Computer Solution and Modeling Examples 12<br />

3.4 Integer Programming 6<br />

3.5 Transportations 6<br />

3.6 Multi-criteria Decision Making 6<br />

3.7 Decision Analysis 6<br />

3.8 Forecasting 6<br />

3.9 Inventory Management 6<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures.<br />

4.2 Student role in the course.<br />

-148-<br />

Contact hours<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Components<br />

Grading<br />

Exams 60%<br />

Class Project 25%


Class Participation / Homework 15%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

96 – 100% A+<br />

90 – 95% A<br />

86 – 89% B+<br />

80 – 85% B<br />

76 – 79% C+<br />

70 – 75% C<br />

66 – 69% D+<br />

60 – 65% D<br />

< 60% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 B. W. Taylor III, Management Science, Prentice Hall, 9th Ed.<br />

6.1.2 B. Render, R. M. Star JR, and N. Balakrishnan, Managerial Decision Modeling,<br />

Prentice Hall, 2nd Ed.<br />

6.1.3 B. Render, R. M. Star JR, and M. E. Hanna, Quantitative Analysis for Management,<br />

Prentice Hall, 8th Ed. (or more recent text)<br />

6.2 Other suggested reading materials, if any.<br />

None<br />

6.3 Other sources <strong>of</strong> information.<br />

None<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

-149-


Modern programming language 12<br />

Analysis and Design 9<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 6<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___3__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically __30___ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __10___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

Hours<br />

10.1 Linear Programming 12<br />

10.2 Integer Programming 6<br />

10.3 Transportations 6<br />

10.4 Multi-criteria Decision Making 6<br />

10.5 Decision Analysis 6<br />

10.6 Forecasting 6<br />

11.0 Problem analysis:<br />

Students learn the principles <strong>of</strong> Quantitative Analysis, a scientific approach to decision making<br />

that involves the operations <strong>of</strong> organizational systems. They learn to solve the conflicts <strong>of</strong><br />

interest among the components <strong>of</strong> the organization in a way that is best for the organization as a<br />

whole.<br />

12.0 Solution design:<br />

Students learn to develop a solution that yields an optimal value <strong>of</strong> the organizational system<br />

measure <strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />

desirability.<br />

-150-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

12/2002 Initial ABET version Shi<br />

6/25/03 ABET cleanup Wolcott<br />

10/09/07 Update <strong>of</strong> resource material Shi<br />

10/02/08 Review completed Shi<br />

-151-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3150<br />

Course Title<br />

Principles <strong>of</strong> Quantitative Analysis<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Structure the real-life situation into a<br />

mathematical model, and abstract the<br />

essential elements so that a solution<br />

relevant to the decision maker’s objective<br />

can be sought. This involves looking at<br />

the problem in the context <strong>of</strong> the entire<br />

organizational system;<br />

Explore the structure <strong>of</strong> such solutions<br />

and develop systematic procedures for<br />

obtaining them;<br />

Develop a solution that yields an optimal<br />

value <strong>of</strong> the organizational system<br />

measure <strong>of</strong> desirability, or compare<br />

alternative courses <strong>of</strong> action by<br />

evaluating their measure <strong>of</strong> desirability.<br />

S<br />

S<br />

S<br />

X<br />

S<br />

S<br />

-152-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-153-


-154-


ISQA 3210 Advanced Technology for Personal Productivity<br />

Department and Course Number ISQA 3210<br />

Course Title<br />

Advanced Technology for Personal Productivity<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/13/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The purpose <strong>of</strong> this class is to give students extensive coverage in the area <strong>of</strong> the<br />

microcomputers and its components, operating systems (Windows XP, Windows Vista),<br />

an <strong>of</strong>fice suite (Micros<strong>of</strong>t Office 2007), and e-commerce site/intranet/internet design<br />

(HTML/XML).<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate MIS majors and minors who wish to study<br />

Advanced Technology for Personal Productivity including the area <strong>of</strong> the microcomputers<br />

and its components, operating systems, an <strong>of</strong>fice suite, and e-commerce<br />

site/intranet/internet design.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

CIST 1100<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Fundamental Competencies in Word, Excel, Access, and PowerPoint<br />

1.4.2 Basic Operating Systems operations<br />

1.4.3 Understanding <strong>of</strong> Hardware Components<br />

1.4.4 Proposal Development<br />

1.4.5 HTML and Web Design<br />

1.4.6 Basic HTML<br />

1.4.7 Introduction to Graphics<br />

1.4.8 Basic Web Design Principles<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

-155-


2.0 Objectives:<br />

2.1 Build and maintain personal computers: Students will complete an End User Needs<br />

Analysis and complete specifications for a proposed client. They will use a lab<br />

environment to build and repair current problems with personal computers.<br />

2.2 Learn to configure and install operating systems (Windows 98/Windows 2000/Windows<br />

XP): Students will deal with configuration and installation <strong>of</strong> an operating system in a LAN<br />

environment, if labs and time are available.<br />

2.3 Develop an e-commerce site/intranet/internet and develop personal and client home<br />

pages using HTML/DHTML/JavaScript. If time allows, students will be given instruction on<br />

using Cold Fusion.<br />

2.4 Learn to use word processing (Word 2000/XP), spreadsheets (Excel 2000/XP), database<br />

management (Access 2000/XP), and presentation graphics (PowerPoint 2000/XP)<br />

programs. In addition, desktop publishing (Publisher 2000) and photo editor (PhotoDraw<br />

2000) might be covered.<br />

3.0 Content and Organization:<br />

3.1 Managing and Maintaining PC 3.0<br />

3.2 End User Analysis Project 3.0<br />

3.3 Operating Systems - Windows 98 & Windows NT/2000/XP 3.0<br />

3.4 HTML 15.0<br />

3.5 DHTML 6.0<br />

3.6 Word 2000 3.0<br />

3.7 Excel 2000 3.0<br />

3.8 Access 2000 3.0<br />

3.9 PowerPoint 2000 3.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

Contact hours<br />

The primary teaching methods include lectures, hands-on demonstrations, and guidance<br />

on the semester projects.<br />

4.2 Student role in the course.<br />

Students will attend lectures, complete homework assignments, and unit projects<br />

4.3 Contact hours.<br />

-156-


5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Operating Systems Exercises<br />

End User Analysis project<br />

Office XP/2000 Word, Excel, Access, and PowerPoint projects<br />

E-Commerce Web Design Project<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

End User Analysis Project 15%<br />

HTML Projects 35%<br />

Web Design/Page Project 10%<br />

Word 2000 10%<br />

Excel 2000 10%<br />

Access 2000 10%<br />

PowerPoint 2000 10%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97% - 100% A+<br />

93% - 96% A<br />

90% - 92% A-<br />

87% - 89% B+<br />

83% - 86% B<br />

80% - 82% B-<br />

77% - 79% C+<br />

73% - 76% C<br />

70% - 72% C-<br />

67% - 69% D+<br />

63% - 66% D<br />

60% - 62% D-<br />

0% - 59% F<br />

-157-


6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Micros<strong>of</strong>t Office 2000, Advanced Concepts and Techniques by Gary B. Shelly,<br />

Thomas J. Cashman, and Misty E. Vermaat. Course Technology, 2000.<br />

6.1.2 Creating Web Pages with HTML and Dynamic HTML by Patrick Carey, Course<br />

Technology, 2001.<br />

6.1.3 Micros<strong>of</strong>t XP New Features Guide: Changes from Office 2000 to Office XP<br />

(packaged with Micros<strong>of</strong>t Office 2000 textbook)<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Web Style Guide: Basic Design Principles for Creating Web Sites by Patrick Lynch<br />

and Sarah Horton, Prentice-Hall, 2001.<br />

6.2.2 Principles <strong>of</strong> Web Design by Joel Skalar, Course Technology, 2001<br />

6.2.3 Cold Fusion by Kapathi & Kapathi, Course Technology, 2002.<br />

6.2.4 A+ Guide to Managing and Maintaining Your PC, Third Edition by Jean Andrews,<br />

Course Technology, 2002.<br />

6.2.5 Designing Web Pages with Cascading Style Sheets by Joel Skalar, Course<br />

Technology, 2001.<br />

6.2.6 Cascading Style Sheets: Designing for the Web, Second Edition by Hakon Wium Lie<br />

and Bert Bos, Addison Wesley, 2001.<br />

6.2.7 Creative HTML Design by Lynda Weinman & William Weinman, Prentice-Hall,<br />

2000.<br />

6.2.8 Micros<strong>of</strong>t Windows 98 for Power Users by Harry L.Phillips, Course Technology,<br />

2000.<br />

6.2.9 Micros<strong>of</strong>t Windows 2000 for Power Users by Harry L.Phillips, Course Technology,<br />

2001.<br />

6.2.10 Micros<strong>of</strong>t MS-DOS Command Line - Comprehensive by Harry L.Phillips, Course<br />

Technology, 2001.<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional course content, either with pages developed especially for this course or with<br />

links to additional course materials, will be provided during the semester.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

-158-


CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 10<br />

Networking and telecommunications 6<br />

Modern programming language 6<br />

Analysis and Design 10<br />

Data management 6<br />

Role <strong>of</strong> IS in Organizations 8<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __2___ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically __15-50___ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __10___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

Social and ethical issues are threaded throughout all the units <strong>of</strong> this course: operating systems,<br />

personal computer maintenance, end user analysis project, Office XP, and the development <strong>of</strong> an<br />

e-commerce site. Topics include piracy <strong>of</strong> s<strong>of</strong>tware, inappropriate duplication <strong>of</strong> s<strong>of</strong>tware,<br />

privacy and security issues regarding data collected on the web sites.<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

No coverage.<br />

11.0 Problem analysis:<br />

The students will complete an End User Needs Analysis project that involves solving a problem<br />

presented to them in a scenario. They have to conduct the research and make recommendations<br />

based on the request for proposals (RFP) presented by the proposal client.<br />

Students learn to analyze configurations, operating and network, and conduct routine<br />

maintenance on their personal and business machines. The learn how to load two major types <strong>of</strong><br />

operating systems: Windows (2000/XP) and Linux (Red Hat 7.4).<br />

-159-


Each student or group <strong>of</strong> two students must create a web site for a client. The student must<br />

analyze the needs <strong>of</strong> the web site and use the appropriate tools to develop and design the web<br />

application.<br />

12.0 Solution design:<br />

The end user project provides the analysis to select the appropriate s<strong>of</strong>tware and hardware<br />

solve the problem for the client. Based on this research, the student recommends systems<br />

configuration, network implications and solutions, and application solutions.<br />

Student will learn to develop an e-commerce site/intranet/internet and develop personal and<br />

client home pages using HTML/DHTML/JavaScript. If time allows, students will be given<br />

instruction on using Cold Fusion and Photoshop. The students will learn not only the code, but<br />

the design elements behind the development <strong>of</strong> pages, graphics, and web sites.<br />

Students will also learn design features <strong>of</strong> the <strong>of</strong>fice suite including word processing (Word<br />

2000/XP), spreadsheets (Excel 2000/XP), database management (Access 2000/XP), and<br />

presentation graphics (PowerPoint 2000/XP) programs. In addition, desktop publishing (Publisher<br />

2000) and photo editor (PhotoDraw 2000) might be covered.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

11/2/02 Initial ABET version Pietron<br />

6/25/03 ABET cleanup Wolcott<br />

10/13/08 Update to course description and<br />

prerequisites<br />

Pietron<br />

-160-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Department and Course Number ISQA 3210<br />

Course Title<br />

Advanced Technology for Personal Productivity<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Build and maintain personal computers:<br />

Students will complete an End User<br />

Needs Analysis and complete<br />

specifications for a proposed client. They<br />

will use a lab environment to build and<br />

repair current problems with personal<br />

computers<br />

Learn to configure and install operating<br />

systems (Windows 98/Windows<br />

2000/Windows XP): Students will deal<br />

with configuration and installation <strong>of</strong> an<br />

operating system in a LAN environment,<br />

if labs and time are available.<br />

Develop an e-commerce<br />

site/intranet/internet and develop<br />

personal and client home pages using<br />

HTML/DHTML/JavaScript. If time allows,<br />

students will be given instruction on<br />

using Cold Fusion.<br />

X<br />

-161-<br />

X<br />

X<br />

X


Learn to use word processing (Word<br />

2000/XP), spreadsheets (Excel 2000/XP),<br />

database management (Access 2000/XP),<br />

and presentation graphics (PowerPoint<br />

2000/XP) programs. In addition, desktop<br />

publishing (Publisher 2000) and photo<br />

editor (PhotoDraw 2000) might be<br />

covered.<br />

S<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-162-


ISQA 3250 Intermediate Quantitative Analysis<br />

Department and Course Number ISQA 3250<br />

Course Title<br />

Intermediate Quantitative Analysis<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/02/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course is designed to provide students advanced decision making models in solving<br />

business case problems. These models include transportation models, integer<br />

programming, goal programming, simulation applications, Markov process in market<br />

shares and dynamic programming. A variety <strong>of</strong> computer s<strong>of</strong>tware will be applied to<br />

formulate and solve both case-study and real-life problems.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to<br />

understand the advanced Quantitative Analysis. It is one <strong>of</strong> elective courses for<br />

undergraduates who wish to pursue Knowledge Management, Data Mining and Business<br />

Intelligence.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 1100<br />

1.3.2 CIST 2500<br />

1.3.3 ISQA 3150<br />

1.3.4 or equivalent<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Introduction to Visual Basic Programming,<br />

1.4.2 Program development cycle<br />

1.4.3 Training in spreadsheets and database<br />

1.4.4 Statistics in information science and technology<br />

1.4.5 A well-known computer package being used to support the problem-solving<br />

process.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

-163-


None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 To structure the real-life situation into advanced mathematical models, and abstract the<br />

essential elements so that a solution relevant to the decision maker’s objective can be<br />

sought. This involves looking at the problem in the context <strong>of</strong> the entire organizational<br />

system;<br />

2.2 To explore the structure <strong>of</strong> such solutions and develop systematic procedures for<br />

obtaining them;<br />

2.3 To develop a solution that yields an optimal value <strong>of</strong> the organizational system measure<br />

<strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />

desirability.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Introduction 3<br />

3.2 Transportation Models: Part I 6<br />

3.3 Transportation Models: Part II 6<br />

3.4 Integer Programming 9<br />

3.5 Goal Programming 6<br />

3.6 Simulation 6<br />

3.7 Markov Processes 6<br />

3.8 Dynamic Programming 6<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures.<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

4.3 Contact hours.<br />

Three (3) hours per week<br />

-164-


5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Components<br />

Grading<br />

Exams 60%<br />

Class Project 25%<br />

Class Participation / Homework 15%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

96 – 100% A+<br />

90 – 95.9% A<br />

86 – 89.9% B+<br />

80 – 85.9% B<br />

76 – 79.9% C+<br />

70 – 75.9% C<br />

66 – 69.9% D+<br />

60 – 65.9% D<br />

< 60% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 B. W. Taylor III, Management Science, Prentice Hall, 9th Ed.<br />

6.1.2 B. Render, R. M. Star JR, and N. Balakrishnan, Managerial Decision Modeling,<br />

Prentice Hall, 2nd Ed.<br />

6.1.3 B. Render, R. M. Star JR, and M. E. Hanna, Quantitative Analysis for Management,<br />

Prentice Hall, 8th Ed. (or more recent text)<br />

6.2 Other suggested reading materials, if any.<br />

-165-


None<br />

6.3 Other sources <strong>of</strong> information.<br />

None<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language 12<br />

Analysis and Design 6<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 3<br />

8.0 Oral and Written Communications<br />

Every student is required to submit at least ___3__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically ___30__ pages and to make _1____ oral<br />

presentations <strong>of</strong> typically ___10__ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

Hours<br />

10.1 Integer Programming 9<br />

10.2 Transportations 12<br />

10.3 Goal Programming 6<br />

10.4 Markov Processes 6<br />

10.5 Dynamic Programming 6<br />

-166-


11.0 Problem analysis:<br />

Students learn the advanced models <strong>of</strong> Quantitative Analysis, a scientific approach to decision<br />

making that involves the operations <strong>of</strong> organizational systems. They learn to solve the conflicts<br />

<strong>of</strong> interest among the components <strong>of</strong> the organization in a way that is best for the organization<br />

as a whole.<br />

12.0 Solution design:<br />

Students learn to develop a solution that yields an optimal value <strong>of</strong> the organizational system<br />

measure <strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />

desirability.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

Fall 2001 Created Shi<br />

6/25/03 ABET cleanup Wolcott<br />

10/09/07 Update <strong>of</strong> resource material Shi<br />

10/02/08 Review completed Shi<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3250<br />

Course Title<br />

Intermediate Quantitative Analysis<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

-167-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Course objective<br />

Structure the real-life situation into<br />

advanced mathematical models, and<br />

abstract the essential elements so that a<br />

solution relevant to the decision maker’s<br />

objective can be sought. This involves<br />

looking at the problem in the context <strong>of</strong><br />

the entire organizational system<br />

Explore the structure <strong>of</strong> such solutions<br />

and develop systematic procedures for<br />

obtaining them<br />

Develop a solution that yields an optimal<br />

value <strong>of</strong> the organizational system<br />

measure <strong>of</strong> desirability, or compare<br />

alternative courses <strong>of</strong> action by<br />

evaluating their measure <strong>of</strong> desirability<br />

S<br />

S<br />

X S X<br />

S S X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

-168-


9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-169-


-170-


ISQA 3300 File Structures for Information Systems<br />

Department and Course Number ISQA 3300<br />

Course Title<br />

File Structures for Information Systems<br />

Course Coordinator<br />

Dwight Haworth<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/30/09<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The purpose <strong>of</strong> this course is to introduce the student to computer file organizations<br />

and access methods. A fundamental understanding <strong>of</strong> the performance implications<br />

<strong>of</strong> each file organization is developed to allow the students to make information<br />

systems design choices that will optimize the performance <strong>of</strong> business information<br />

systems.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate students in the College <strong>of</strong> Information<br />

Science and Technology who wish to pursue the Bachelor <strong>of</strong> Science in Management<br />

Information Systems (<strong>BIS</strong>) degree. It is one <strong>of</strong> the required courses for the degree.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

CSCI 1620 - Introduction Computer Science II.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Ability to program using procedural logic.<br />

1.4.2 Ability to use Micros<strong>of</strong>t Excel.<br />

1.4.3 Familiarity with probability distributions.<br />

1.4.4 Familiarity with computer hardware and s<strong>of</strong>tware.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes. The student will be<br />

able to<br />

2.1 Comprehension <strong>of</strong> computer hardware components,<br />

2.2 Comprehension <strong>of</strong> the attributes and functions <strong>of</strong> file systems,<br />

2.3 Application <strong>of</strong> storage devices to meet specified requirements,<br />

2.4 Analysis <strong>of</strong> file organizations to meet specified response time and storage constraints,<br />

2.5 Evaluate the output <strong>of</strong> processing algorithms with respect to selected performance criteria, and<br />

2.6 Program file processing algorithms (application) using pseudocode.<br />

-171-


3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify approximate number <strong>of</strong> contact<br />

hours on each).<br />

Hours<br />

3.1.1 Computer hardware capabilities and limitations 3.0<br />

3.1.2 File programming fundamentals 3.0<br />

3.1.3 Physical storage organization 3.0<br />

3.1.4 File system implementations (Windows and Unix) 6.0<br />

3.1.5 Techniques for evaluating file performance 3.0<br />

3.1.6 Sorting, searching, and indexing 6.0<br />

3.1.7 Sort-merge and the balance line algorithm 3.0<br />

3.1.8 Indexes 3.0<br />

3.1.9 Tree structures and their maintenance 5.0<br />

3.1.10 Static Hashing 4.0<br />

3.1.11 Extendible Hashing 3.0<br />

3.1.12 Continuous track storage (CDROM, DVD, etc) 1.5<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

4.1.1 Lecture and discussion <strong>of</strong> assigned material<br />

4.1.2 The student is to use a modern programming language to implement selected file<br />

structures and access algorithms.<br />

4.1.3 Laboratory: The student must use a computer to solve assigned problems. The student is<br />

to arrange his/her own laboratory time as needed to complete each assignment. Students<br />

may use their own microcomputer to complete assigned problems.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstration, participate in discussion on assigned<br />

readings, take required quizzes, complete assigned projects, and complete required<br />

examinations.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three contact hours per week<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

5.1.1 History <strong>of</strong> storage technologies (1)<br />

5.1.2 Programming the priming read algorithm (1)<br />

5.1.3 Storage utilization efficiency using blocking (1)<br />

5.1.4 Balance line programming (2)<br />

5.1.5 Static Hashing Algorithm Evaluation (2)<br />

5.1.6 Static hashing programming (2)<br />

-172-


5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Component Approx.<br />

Weight<br />

Quizzes 10%<br />

Two Examinations 50%<br />

Assignments 40%.<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-87% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />


6.4.3 File Systems: Structures and Algorithms, by T. Harbron (1988)<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 9<br />

Networking and telecommunications<br />

Modern programming language 6<br />

Analysis and Design 24<br />

Data management 4<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __0___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically _____ pages and to make __0___ oral presentations <strong>of</strong> typically _____<br />

minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as<br />

for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

None<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

File processing theory 1.5<br />

Probability theory (Poisson Distribution) 1.5<br />

11.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

The student will analyze various file access alternatives to determine which produces the most efficient<br />

storage utilization. The student will analyze hashing algorithms to determine which produces the fewest<br />

collisions.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

The student will use a balance line algorithm to implement one <strong>of</strong> three types <strong>of</strong> problem solutions. The<br />

student will design a static hashing system store a specified number <strong>of</strong> records.<br />

-174-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

6/12/03 Change prerequisite. Course Change Form<br />

5/15/03.<br />

Lw<br />

Change prereq. From CIST 1400 to<br />

CSCI 1620 so students have more<br />

programming experience.<br />

6/25/03 ABET cleanup Wolcott<br />

3/25/08 Update content and required textbook Haworth<br />

5/30/09 Update student outcomes and map<br />

outcomes to Program outcomes<br />

Haworth<br />

-175-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3300<br />

Course Title<br />

File Structures for Information Systems<br />

Course Coordinator<br />

Dwight A. Haworth<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/30/09<br />

S – Strong relationship<br />

X –Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Comprehension <strong>of</strong> computer hardware<br />

components<br />

Comprehension <strong>of</strong> the attributes and<br />

functions <strong>of</strong> file systems<br />

Application <strong>of</strong> storage devices to meet<br />

specified requirements<br />

Analysis <strong>of</strong> file organizations to meet<br />

specified response time and storage<br />

constraints<br />

Evaluate the output <strong>of</strong> processing<br />

algorithms with respect to selected<br />

performance criteria<br />

Program file processing algorithms<br />

(application) using pseudocode<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

X<br />

-176-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-177-


-178-


ISQA 3310 Managing the Database Environment<br />

Department and Course Number ISQA 3310<br />

Course Title<br />

Managing the Database Environment<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 1/31/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Introduction to business database design and management functions. The focus is on the use <strong>of</strong><br />

current database management systems (DBMS) to support the data management function <strong>of</strong> an<br />

organization. Topics include data modeling, database design, SQL, data management and<br />

database administration. Hands-on experience in database design, creation, and use is provided.<br />

1.2 For whom course is intended.<br />

This course is intended for the undergraduates who wish to pursue the Bachelor <strong>of</strong> Science in<br />

Management Information Systems (<strong>BIS</strong>) degree. It is one <strong>of</strong> the required courses for the degree.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 ISQA 3210 Advanced Technology for Personal Productivity (co-requisite)<br />

1.3.2 CIST 1100 Introduction to Personal Programming<br />

1.3.3 CIST 3100 Organizations, Applications, and Technology<br />

or equivalent.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 General knowledge <strong>of</strong> Windows environment from user’s perspective<br />

1.4.2 Introductory exposure to Micros<strong>of</strong>t Access<br />

1.4.3 Knowledge <strong>of</strong> basic storage architecture and terminology<br />

1.4.4 Basic familiarity with the role <strong>of</strong> data within organizations<br />

1.4 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

-179-


2.0 Objectives:<br />

2.1 Distinguish between ‘data’ and ‘information’.<br />

2.2 Define the terms 'database', 'database management system' and distinguish between such<br />

systems and their predecessors.<br />

2.3 Define the characteristics and benefits <strong>of</strong> the relational database model.<br />

2.4 Use SQL to define and modify database objects, and retrieve data.<br />

2.5 Describe the database development process, and explain how it fits into the broader context <strong>of</strong><br />

systems analysis, design, and implementation.<br />

2.6 Use data modeling techniques and tools to develop data models.<br />

2.7 Design appropriately normalized relations in a relational DBMS.<br />

2.8 Design and implement a relational database system <strong>of</strong> modest size using a contemporary DBMS.<br />

2.9 Identify the data integrity and security issues associated with database systems and explain how<br />

these are addressed in contemporary database management systems.<br />

2.10 Discuss the issues and techniques used with databases in a distributed environment, including the<br />

Internet.<br />

2.11 Explain the purpose, architecture, and associated terminology <strong>of</strong> data warehousing.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 File processing systems definition and components <strong>of</strong> database system 3.0<br />

3.2 Micros<strong>of</strong>t Access DBMS 1.5<br />

3.3 The Relational Model 1.5<br />

3.4 SQL & PL/SQL 9.0<br />

3.5 Database development process 4.5<br />

3.6 Data modeling & Entity-Relationship Diagramming 6.0<br />

3.7 Logical database design: ERD to tables, Functional dependencies 4.5<br />

3.8 Logical database design: Normalization 3.0<br />

3.9 Transaction Processing & Concurrency Control 3.0<br />

3.10 Business Intelligence and Data Warehousing 3.0<br />

3.11 Databases and the Internet 3.0<br />

-180-


4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods are lectures, discussion, and in-class demonstrations. Both the<br />

normal class meeting and the Internet-only teaching are available.<br />

4.2 Student role in the course.<br />

The student attends lectures, participate in the class discussion and complete assignments,<br />

required examinations and the semester database project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students participate in the class discussion and complete assignments, required examinations and<br />

the semester database project.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Components Grading<br />

Exams 30%<br />

Assignments 50%<br />

Project 15%<br />

Participation 5%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />

-181-


students primarily learn the relational model; in the part <strong>of</strong> databases in the distributed environment,<br />

students learn distributed databases and the relationship between databases and Internet.<br />

12.0 Solution design:<br />

Students learn the methods and processes needed to develop and design databases: the data modeling<br />

and logical database design. Students will complete the semester database project by designing and<br />

implementing a modest-size, but realistic database application.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

12/19/02 Time spent with Access limited to just<br />

database construction<br />

Wolcott The how-tos <strong>of</strong> interface design will<br />

be provided via links to optional<br />

tutorial. The database class will<br />

focus on the database issues, not<br />

12/19/02 Database administration dropped from<br />

content<br />

12/19/02 Amount <strong>of</strong> time on databases in a<br />

distributed environment, data<br />

warehousing, databases and the Internet<br />

reduced to 1.5 weeks total<br />

6/12/03 Change course description and<br />

prerequisites.<br />

Wolcott<br />

Wolcott<br />

Wild<br />

complete systems development.<br />

ISQA 4300 Database Administration<br />

is available, and more time is<br />

needed in ISQA 3310 for core<br />

concepts.<br />

Databases and the Internet and<br />

databases in a distributed<br />

environment covered in ISQA 4380.<br />

More room left for core topics<br />

Change description to reflect actual<br />

course content and update<br />

prerequisites needed.<br />

6/25/03 ABET cleanup Wolcott Updated prerequisite topics to<br />

reflect new requirement for CIST<br />

1100<br />

10/3/07 Updated resource material Wolcott Update <strong>of</strong> textbook<br />

1/31/08 Insertion <strong>of</strong> table mapping course<br />

objectives to program outcomes<br />

1/31/08 Course objectives updated to improve<br />

wording.<br />

Wolcott<br />

Wolcott<br />

‘Understand’ changed to a more<br />

active verb, e.g. ‘explain’, ‘describe’<br />

in many cases.<br />

10/13/08 Included more business intelligence Wolcott<br />

coverage<br />

10/31/08 Included PL/SQL coverage Wolcott In response to demand by students<br />

and IS&T advisory group.<br />

2/12/09 Updated resource material to APA citation<br />

format.<br />

Wolcott<br />

-183-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3310<br />

Course Title<br />

Managing the Database Environment<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 1/31/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Distinguish between ‘data’ and<br />

‘information’.<br />

Define the terms 'database', 'database<br />

management system' and distinguish<br />

between such systems and their<br />

predecessors.<br />

Define the characteristics and benefits <strong>of</strong><br />

the relational database model.S<br />

Use SQL to define and modify database<br />

objects, and retrieve data.<br />

Describe the database development<br />

process, and explain how it fits into the<br />

broader context <strong>of</strong> systems analysis,<br />

design, and implementation.<br />

Use data modeling techniques and tools<br />

to develop data models.<br />

Design appropriately normalized relations<br />

in a relational DBMS.<br />

Design and implement a relational<br />

X<br />

X<br />

X<br />

X<br />

S<br />

X<br />

X<br />

S<br />

S<br />

S<br />

-184-


database system <strong>of</strong> modest size using a<br />

contemporary DBMS.<br />

Identify the data integrity and security<br />

issues associated with database systems<br />

and explain how these are addressed in<br />

contemporary database management<br />

systems.<br />

Discuss the issues and techniques used<br />

with databases in a distributed<br />

environment, including the Internet.<br />

Explain the purpose, architecture, and<br />

associated terminology <strong>of</strong> data<br />

warehousing.<br />

X<br />

X<br />

X<br />

-185-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-186-


ISQA 3400 Business Data Communications<br />

Department and Course Number ISQA 3400<br />

Course Title<br />

Business Data Communications<br />

Course Coordinator<br />

Kerry Ward<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/01/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Data Communications principles and service operations with computers and telecommunication<br />

systems for operational analysis and decision making. This course will focus on breath, not depth<br />

-- concepts rather than specific technologies because concepts remain constant over time, while<br />

technologies change from year to year. Students are expected to master the basic terminologies<br />

and concepts, not necessarily to become experts in computer networking, nor to know the<br />

engineering details <strong>of</strong> any technology.<br />

1.2 For whom course is intended.<br />

This course is required for those students pursuing undergraduate and graduate degrees. It is one<br />

<strong>of</strong> the required courses for <strong>BIS</strong> degree.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 3100 Organizations, Applications, and Technology<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Computer architecture basics<br />

1.4.2 Transmission links<br />

1.4.3 Network topologies<br />

1.4.4 Network security and management<br />

1.4.5 Network protocols<br />

1.4.6 Network standards<br />

1.4.7 OSI model<br />

1.4.8 Internetworking<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Learn data communications principles and service operations with computers and<br />

telecommunication systems for operational analysis and decision making.<br />

-187-


2.2 Master the basic terminology and concepts <strong>of</strong> data communications.<br />

2.3 Analyze and design a system or a sub-system <strong>of</strong> a large scale system for the semester project<br />

applying the tools and techniques learn in the course.<br />

2.4 Carry out hands-on projects to understand data communications models.<br />

2.5 Understand network implementation, management, and use.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Data Transmission 12.0<br />

3.1.1 asjdklaj<br />

3.1.2 Introduction<br />

3.1.3 Internet Trends<br />

3.1.4 Naming With the Domain Name System<br />

3.1.5 Transmission Media<br />

3.1.6 Long-Distance Communication (carriers,<br />

3.1.7 Modulation, and Modems)<br />

3.2 Networking and Packet Transmission 21.0<br />

3.2.1 Packets, Frames, and Error Detection<br />

3.2.2 LAN Technologies and Network Topology<br />

3.2.3 Hardware Addressing and Frame Type Identification<br />

3.2.4 LAN Wiring, Physical Topology, and Interface Hardware<br />

3.2.5 Extending LANs: Fiber Modems, Repeaters, Bridges, and Switches<br />

3.2.6 Long-Distance Digital Connection Technologies<br />

3.2.7 WAN Technologies and Routing<br />

3.2.8 Connection-Oriented Networking and ATM<br />

3.2.9 Network characteristics: Ownership, Service Paradigm, and Performance<br />

3.2.10 Protocols and Layering<br />

3.3 Internetworking 9.0<br />

3.3.1 Internetworking: Concepts, Architecture, and Protocols<br />

3.3.2 IP: Internet Protocol and Addresses<br />

3.3.3 Binding Protocol Addresses (ARP)<br />

3.3.4 IP Datagrams and Datagram Forwarding<br />

3.3.5 IP Encapsulation, Fragmentation, and Reassembly<br />

3.3.6 The Future IP (Ipv6)<br />

3.3.7 An Error Reporting Mechanism (ICMP)<br />

3.3.8 TCP: Reliable Transport Service<br />

3.3.9 Network Security<br />

4.0 Teaching Methodology:<br />

-188-


4.1 Methods to be used.<br />

The primary teaching methods will be interactive lectures, article discussions and actual cases.<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in in-class discussion, complete quizzes, exams,<br />

assignments and the semester project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will complete quizzes, exams, assignments and semester projects.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

Exams 37.5%<br />

Quizzes 6.25%<br />

Class Participation 6.25%<br />

Class Assignments 12.5%<br />

Class Project Report 25%<br />

Final Exam 12.5%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

98 – 100% A+<br />

90 – 97% A<br />

87 – 89% A-<br />

84 – 86% B+<br />

80 – 83% B<br />

77 – 79% B-<br />

74 – 76% C+<br />

70 – 73% C<br />

67 – 69% C-<br />

64 – 66% D+<br />

-189-


60 – 63% D<br />

57 – 59% D-<br />


Note: For the class project report, a student is expected to work alone or work in project team <strong>of</strong> 2 or 3<br />

students and complete a report and one presentation. The individual assignment requires a student to<br />

complete a summary and one presentation. The student is also expected to complete the team<br />

assignment including a report and one presentation.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

This course primarily provides an overview <strong>of</strong> data communication and computer networking concepts,<br />

and includes the following topics:<br />

10.1 Data Transmission (3 hours)<br />

10.2 Packet Transmission (3 hours)<br />

10.3 OSI Reference model (3 hours)<br />

10.4 Internetworking concepts (3 hours)<br />

11.0 Problem analysis:<br />

Students learn data communications principles and service operations with computers and<br />

telecommunication systems for operational analysis and decision making. Students will learn to analyze a<br />

systems or a sub system <strong>of</strong> a large scale system for the semester project applying the tools and<br />

techniques learn in the course.<br />

12.0 Solution design:<br />

Students will learn to design a systems or a sub system <strong>of</strong> a large scale system applying the tools and<br />

techniques learn in the course. Specially, they will complete the design document for the semester<br />

project.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

6/12/03 Prerequisite from CSCI 2010 to 2110.<br />

Course Change Form 2/21/03<br />

Wild Course 2010 no longer required for<br />

degree.<br />

6/25/03 ABET cleanup Wolcott<br />

10/09/07 Minor Revisions/Updates Ward<br />

10/1/08 Minor Revisions/Updates, including change<br />

in prerequisite course number from CIST<br />

2110 to CIST 3100<br />

Ward<br />

-191-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3400<br />

Course Title<br />

Business Data Communications<br />

Course Coordinator<br />

Kerry Ward<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 01/22/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Learn data communications principles<br />

and service operations with computers<br />

and telecommunication systems for<br />

operational analysis and decision making.<br />

Master the basic terminology and<br />

concepts <strong>of</strong> data communications.<br />

To understand how the Internet and<br />

specific organizational networks function<br />

Analyze a specific aspect <strong>of</strong> business data<br />

communications in depth as a small<br />

group project.<br />

Carry out hands-on projects to<br />

understand data communications<br />

models.<br />

Understand network implementation,<br />

management, and use.<br />

X<br />

X<br />

X<br />

S<br />

S<br />

X X X<br />

X X X<br />

X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

-192-


1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-193-


-194-


ISQA 3420 Managing in a Digital World<br />

Department and Course Number ISQA 3420<br />

Course Title<br />

Managing in a Digital World<br />

Course Coordinator<br />

Stacie Petter<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/08/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course introduces the fundamentals <strong>of</strong> management as they apply in businesses and other<br />

organizations, particularly from an information systems/technology (IS/T) management lens. In<br />

particular, the course examines the various roles, responsibilities, and skills essential to<br />

managerial success in the context in which the IT manager operates today -- a dynamic<br />

environment <strong>of</strong> workforce diversity, a global economy, and concern for ethics and social<br />

responsibility.<br />

1.2 For whom course is intended.<br />

The course is intended for undergraduate students in Information Systems, Computer Science and<br />

related areas who are interested in learning the basics <strong>of</strong> management theory and its application<br />

to the practice <strong>of</strong> IS/T management.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

CIST 3100 or permission from the instructor<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

None<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

The goal <strong>of</strong> this course is to discuss and interpret management theory from an IS/T management lens.<br />

Students examine opportunities and challenges in a world that is increasingly connected to one another<br />

via technology. In this course, students will:<br />

-195-


2.1 Increase awareness <strong>of</strong> how a dynamic and changing information-intensive environment affects IS<br />

managers.<br />

2.2 Appreciate challenges and opportunities <strong>of</strong> IS management in context <strong>of</strong> 21st century<br />

organizations.<br />

2.3 Understand the international aspects <strong>of</strong> IS management to develop a global and multi-cultural<br />

view.<br />

2.4 Understand the importance <strong>of</strong> having a competitive advantage and the potential role <strong>of</strong> IT in<br />

developing a competitive advantage.<br />

2.5 Become familiar with environmental challenges that IS managers face in managing diversity,<br />

quality, information technology, and knowledge for competitive advantage in the 21st century.<br />

2.6 Become familiar with the foundations <strong>of</strong> ethical managerial behavior, using information ethically,<br />

and issues/challenges as it pertains to IS/T management<br />

2.7 Understand IS planning processes as basic managerial responsibilities.<br />

2.8 Understand strategy formulation and business models in a competitive IS/T environment.<br />

2.9 Understand controls and organizational systems for control for the IS/T function.<br />

2.10 Understand the challenges <strong>of</strong> attracting, developing, and maintaining a high quality IT workforce<br />

2.11 Understand ways <strong>of</strong> organizing the workplace, with special emphasis high performance work<br />

designs in IT organizations.<br />

2.12 Identify how work can be altered with the use <strong>of</strong> information system and technology.<br />

2.13 Understand the challenges <strong>of</strong> IS leadership, leadership theories and models, and the role <strong>of</strong> the<br />

Chief Information Officer.<br />

2.14 Understand issues affecting the management <strong>of</strong> global IS/T, particularly challenges <strong>of</strong> and best<br />

practices for managing teleworkers and virtual teams<br />

2.15 Appreciate the IT-enabled change process, including change strategies, resistance to change and<br />

the nature <strong>of</strong> organization development.<br />

2.16 Understand models for technology adoption and diffusion <strong>of</strong> technological innovations.<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> weeks on each).<br />

3.1 The Changing Organization and Workplace 1 week<br />

3.2 Globalization 1 week<br />

3.3 IT Management Environment and Role <strong>of</strong> IT for Competitive Advantage – 1 week<br />

3.4 Ethics in the Digital World 1 week<br />

3.5 IS/IT Planning ½ week<br />

3.6 Business and IS Strategy; Business Models 1 ½ weeks<br />

3.7 Control and Audit <strong>of</strong> Information Systems and Services ½ week<br />

3.8 Managing and Retaining IS/T Employees 1 week<br />

3.9 Motivating IS/T Employees 1 week<br />

3.10 IS Organization Structure ½ week<br />

3.11 Design <strong>of</strong> Work Using IS/IT 1 week<br />

3.12 Organizational Culture and IS 1 week<br />

3.13 IS Leadership 1 week<br />

3.14 Teams, Teamwork, Virtual Teams ½ week<br />

3.15 IT Enabled Change Management 1 week<br />

-196-


4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will include class discussion, case study, and lecture.<br />

4.1 Student role in the course.<br />

The student will attend lectures, participate in class discussion on assigned readings, complete<br />

assigned projects and papers, and complete required examinations.<br />

Each student will be assigned to a learning group to participate in a project during the course <strong>of</strong><br />

the semester. These learning groups will examine a topic in more depth outside <strong>of</strong> the classroom.<br />

Tasks that may be performed by learning groups would be the analysis <strong>of</strong> a case study or the<br />

completion <strong>of</strong> a project in a virtual context.<br />

4.2 Contact hours.<br />

5.0 Evaluation:<br />

3 hours<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will be evaluated on the following basis.<br />

Class participation: Students are expected to attend each and every class and be prepared to<br />

actively participate in the discussion. Much <strong>of</strong> the class will be conducted using an open<br />

discussion approach, and the success <strong>of</strong> the class will be dependent on students’ ability to identify<br />

and discuss relevant issues.<br />

Exams: There will be three examinations.<br />

Class Project: Each person will be assigned to a learning group to complete a case study or class<br />

project which relates to one or more topic in the course.<br />

Assignments: Students will receive assignments to be completed in class or outside <strong>of</strong> class to<br />

reinforce material discussed in the classroom or in the readings.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

The grade base for the course for undergraduate students will consist <strong>of</strong> the following:<br />

Available points<br />

-197-


Class Participation 15%<br />

Class Project 35%<br />

Exams 35%<br />

Assignments 15%<br />

5.3 Grading scale and criteria.<br />

The grading scale is as follows:<br />

GRADE POINT VALUE<br />

A 93%


6.2.6 “Mastering the Three Worlds <strong>of</strong> Information Technology.” McAfee, A. Harvard Business<br />

Review, Nov. 1, 2006.<br />

6.2.7 CASE: “Going Up Against Google.” Fitzgerald, M. Inc. Magazine, February 2006.<br />

6.2.8 “What’s Wrong with Being ‘Borderline Ethical’?” Liebowitz, B., Healthcare Financial<br />

Management, September 2003.<br />

6.2.9 CASE: “The End <strong>of</strong> Enron's Empire.” Wang, J., Chen, Q., Yao, J., and Xing, R. Idea Group<br />

Publishing, 2006.<br />

6.2.10 “Getting IT Right.” Charlie S. Feld and Donna B. Stoddard. Harvard Business Review, Vol.<br />

82 Issue 2, Feb 2004.<br />

6.2.11 “Chapter 1: The Information Systems Strategy Triangle”, Pearlson, K.E. and Saunders, C.S.<br />

Managing and Using Information Systems: A Strategic Approach, 2006.<br />

6.2.12 CASE: “MySQL Open Source Database in 2004.” Burgelman, Robert A. Graduate School <strong>of</strong><br />

Business Stanford <strong>University</strong>, 2004.<br />

6.2.13 CASE: “The True Meaning <strong>of</strong> Twitter.” Lashinksy, A. Fortune, August 7, 2008.<br />

6.2.14 “How to Hook the IT Pr<strong>of</strong>essionals you Need.” Overby, S. CIO.com, June 2007.<br />

6.2.15 “Closing the Geek Gap.” Zetlin, M. Pr<strong>of</strong>it Magazine, November 2006.<br />

6.2.16 CASE: “Lucent Technologies: Halting Information Technology Employee Turnover.”<br />

Schneberger, S.L. and Mark, K. Richard Ivey School <strong>of</strong> Business, 2001.<br />

6.2.17 CASE: “Micros<strong>of</strong>t.NET (Abridged).” MacCormack, A. and Herman, K. Harvard Business<br />

School Publishing, 2004.<br />

6.2.18 CASE: “Sealed Air Corporation: Globalization and Corporate Culture.” Paine, L.S. and<br />

Wruck, K.H. Harvard Business School Publishing, 2006.<br />

6.2.19 “Seeking Loyal, Devoted Workers? Let Them Stay Home” Coombes, A. Wall Street Journal,<br />

Sep. 11, 2007.<br />

6.2.20 “Creating and Sustaining Trust in Virtual Teams” Greenberg, P.S., Greenberg, R.H.,<br />

Lederer A.Y. Business Horizons, 2007.<br />

6.2.21 “Note on Innovation Diffusion: Rogers' Five Factors.” John T. Gourville. Harvard Business<br />

School Publishing, 2005<br />

6.2.22 “What to do when employees resist change.” Gregory J Iskat, Jay Liebowitz. SuperVision,<br />

Vol. 64, Iss. 8. Aug 2003.<br />

6.2.23 CASE: “Apple Inc., 2008.” Y<strong>of</strong>fie, D. and Slind, M. Harvard Business School Publishing;<br />

2008.<br />

6.3 Other suggested reading materials, if any.<br />

6.3.1 Schermerhorn, J. R., Jr. (2004 or current edition). Core Concepts <strong>of</strong> Management. John<br />

Wiley & Sons, Inc.<br />

6.4 Other sources <strong>of</strong> information.<br />

Guest speakers or other current articles from reputable journals, magazines, or media outlets.<br />

6.5 Current bibliography <strong>of</strong> resource for student’s information.<br />

Same as above.<br />

7.0 (Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category<br />

Content (class time in hours):<br />

-199-


CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 0 0<br />

Networking and telecommunications 0 0<br />

Modern programming language 0 0<br />

Analysis and Design 3 0<br />

Data management 0 0<br />

Role <strong>of</strong> IS in Organizations 6 30<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___7__ written reports (not including exams, tests, quizzes, or<br />

commented programs) <strong>of</strong> typically __2-3___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

Ethics is discussed as a course topic for a one week period. The first half <strong>of</strong> the week is devoted to lecture<br />

and discussion and students focus on the following learning objectives related to ethics:<br />

• Become familiar with the foundations <strong>of</strong> ethical managerial behavior and the issues/challenges<br />

that pertain to IS/T management<br />

• Define basic concepts related to ethical behavior<br />

• Become familiar with ethical codes for our pr<strong>of</strong>ession<br />

• Recognize ethical dilemmas and forces that create them<br />

• Identify different perspectives and approaches to resolve an ethical dilemma<br />

Students then apply these concepts to a case study in which ethical dilemmas are discussed in more detail<br />

and within the context <strong>of</strong> a specific situation. Students are graded based on class participation in this<br />

discussion and test questions.<br />

Social issues, as related to computing, are discussed throughout the semester. However, these topics are<br />

brought to the forefront when we discuss globalization, competitive advantage, and IS culture. Students<br />

are evaluated on their understanding <strong>of</strong> these issues via class participation, test questions, essay<br />

questions, and homework assignments.<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

-200-


Several theoretical concepts related to IS are discussed in this course, such as:<br />

10.1 The organization as a system – 1 week<br />

10.2 Ethical frameworks as they relate to IS – 1 week<br />

10.3 Business strategy frameworks – 1 ½ weeks<br />

10.4 Employee turnover and retention models – ½ week<br />

10.5 Motivational theories – 1 week<br />

10.6 Leadership theories – 1 week<br />

10.7 Change management and technology acceptance – 1 week<br />

11.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

Students read and discuss case studies throughout the semester. At least eight case studies are read and<br />

discussed in class. In these discussions, students identify problems occurring in organizations as it relates<br />

to concepts discussed in class.<br />

The class project, regardless <strong>of</strong> its format, requires students to analyze a problem using frameworks and<br />

ideas presented in class.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

Students develop solutions to problems identified from readings in case studies. These are discussed in<br />

small groups and as a class. Students are also expected to identify solutions to specific problems that<br />

occur in managing in a digital world via essay questions on exams.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

3/10/06 Syllabus created Khazanchi<br />

10/8/08 Revision <strong>of</strong> syllabus to reflect current<br />

course content. More detail<br />

provided in template to conform to<br />

ABET standards.<br />

Stacie<br />

Petter<br />

Lecture topics remained the<br />

same; however, readings<br />

reflect most current cases and<br />

articles used in the course.<br />

-201-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3420<br />

Course Title<br />

Managing in a Digital World<br />

Course Coordinator<br />

Stacie Petter<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/8/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

The goal <strong>of</strong> this course is to discuss and<br />

interpret management theory from an<br />

IS/T management lens.<br />

Increase awareness <strong>of</strong> how a dynamic<br />

and changing information-intensive<br />

environment affects IS managers.<br />

Appreciate challenges and opportunities<br />

<strong>of</strong> IS management in context <strong>of</strong> 21st<br />

century organizations.<br />

Understand the international aspects <strong>of</strong><br />

IS management to develop a global and<br />

multi-cultural view.<br />

Understand the importance <strong>of</strong> having a<br />

competitive advantage and the potential<br />

role <strong>of</strong> IT in developing a competitive<br />

advantage.<br />

Become familiar with environmental<br />

challenges that IS managers face in<br />

managing diversity, quality, information<br />

S X S X X X<br />

S X S X X X X<br />

S S X X X S<br />

S S X X X<br />

S S<br />

S X S X X X<br />

-202-


technology, and knowledge for<br />

competitive advantage in the 21st<br />

century.<br />

Become familiar with the foundations <strong>of</strong><br />

ethical managerial behavior, using<br />

information ethically, and<br />

issues/challenges as it pertains to IS/T<br />

management<br />

Understand IS planning processes as<br />

basic managerial responsibilities.<br />

Understand strategy formulation and<br />

business models in a competitive IS/T<br />

environment<br />

Understand controls and organizational<br />

systems for control for the IS/T function.<br />

Understand the challenges <strong>of</strong> attracting,<br />

developing, and maintaining a high<br />

quality IT workforce<br />

Understand ways <strong>of</strong> organizing the<br />

workplace, with special emphasis high<br />

performance work designs in IT<br />

organizations.<br />

Identify how work can be altered with the<br />

use <strong>of</strong> information system and<br />

technology.<br />

Understand the challenges <strong>of</strong> IS<br />

leadership, leadership theories and<br />

models, and the role <strong>of</strong> the Chief<br />

Information Officer.<br />

Understand issues affecting the<br />

management <strong>of</strong> global IS/T, particularly<br />

challenges <strong>of</strong> and best practices for<br />

managing teleworkers and virtual teams<br />

Appreciate the IT-enabled change<br />

process, including change strategies,<br />

resistance to change and the nature <strong>of</strong><br />

organization development.<br />

Understand models for technology<br />

adoption and diffusion <strong>of</strong> technological<br />

innovations.<br />

S S S<br />

S X X<br />

S S X X<br />

S X X X<br />

S S X<br />

S S X X<br />

S S X<br />

S S X X<br />

S S S S X X<br />

S S X X<br />

S X S X X X X<br />

-203-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-204-


ISQA 3520 Graphic User Interface Design<br />

Department and Course Number ISQA 3520<br />

Course Title<br />

Graphical User Interface Design<br />

Course Coordinator<br />

Sidney Davis<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The purpose <strong>of</strong> this course is to introduce the principles <strong>of</strong> interface design. In this course,<br />

students will learn principles that have been used successfully in the past and apply them to<br />

everyday examples from business and industry; students will become aware <strong>of</strong> the roles <strong>of</strong><br />

different disciplines (e.g., computer science, psychology, sociology, anthropology) and will<br />

understand how to begin to draw on them to create usable and useful computer s<strong>of</strong>tware;<br />

students will study formal methods <strong>of</strong> analysis that may be used to complement less structured<br />

aspects <strong>of</strong> design.<br />

1.2 For whom course is intended.<br />

This course is intended for the undergraduate MIS or CS majors who wish to study the principles<br />

<strong>of</strong> interface design. It is one <strong>of</strong> the specialization elective courses for the Bachelor <strong>of</strong> Science in<br />

Management Information Systems (<strong>BIS</strong>) degree.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 ISQA 3210 Advanced Technology for Personal Productivity (students should have at least<br />

a basic understanding <strong>of</strong> how to create Web-based applications)<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Introduction to Personal Computing<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Understand the principles <strong>of</strong> interface design.<br />

2.2 Understand that interface design requires the integration <strong>of</strong> multiple disciplines and skills and<br />

know how to draw on them to create usable and useful computer s<strong>of</strong>tware.<br />

-205-


2.3 Learn design principles and concepts that have been used successfully in the past and apply them<br />

to everyday examples from business and industry.<br />

3.0 Content and Organization:<br />

3.1 Introduction 1.5<br />

3.2 Framework for Design 7.0<br />

3.2.1 What is interaction design<br />

3.2.2 Understanding and conceptualizing interaction<br />

3.2.3 Designing for collaboration and communication<br />

3.3 Interactive System Design 9.0<br />

3.3.1 The process <strong>of</strong> interaction design<br />

3.3.2 Needs and requirements<br />

3.3.3 Design, prototyping, and construction<br />

3.4 System Evaluation 10.0<br />

3.4.1 Heuristic evaluation and walkthroughs<br />

3.4.2 Evaluation <strong>of</strong> design<br />

3.4.3 Predictive evaluation<br />

3.4.4 Requirements definition<br />

3.5 User Interface 9.0<br />

3.5.1 Interaction styles<br />

3.5.2 Affective aspects<br />

3.5.3 User’s mental model<br />

Contact Time<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures and in-class discussions.<br />

4.2 Student role in the course.<br />

The student will attend lecture, participate in discussion on assigned readings, complete quizzes,<br />

exams, the interface design project, and homework.<br />

4.3 Contact hours.<br />

Three (3) hours per week.<br />

-206-


5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will complete quizzes, homework assignments, individual interface design literature<br />

reports and presentations, team project assignments, participate in in-class discussions, and takehome<br />

exams. A team project will be assigned in 4 phases – with each phase taking from one to<br />

seven weeks to complete. Graduate students will be graded based on higher standards <strong>of</strong><br />

completeness, accuracy, and application <strong>of</strong> design principles on their design projects. Also,<br />

graduate students will be required to answer additional questions (over and above those <strong>of</strong> the<br />

undergraduates) on quizzes and exams.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Components<br />

Grading<br />

Quizzes 10%<br />

Homework 5%<br />

Class Participation 5%<br />

Exams 30%<br />

Team Project<br />

35%<br />

Assignments<br />

Interface Design<br />

5%<br />

Report and<br />

Presentation<br />

S<strong>of</strong>tware projects 10%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

95.5 – 100 A+<br />

92.5 – 95.4 A<br />

89.5 – 92.4 A-<br />

85.5 – 89.4 B+<br />

82.5 – 85.4 B<br />

79.5 – 82.4 B-<br />

75.5 – 79.4 C+<br />

72.5 – 75.4 C<br />

69.5 – 72.4 C-<br />

65.5 – 69.4 D+<br />

62.5 – 65.4 D<br />

59.5 – 62.4 D-<br />

59.4 or below F<br />

-207-


6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Sharp, H., Rogers, Y., Preece, J. (2007). Interaction Design, Second Edition, John Wiley &<br />

Sons, Ltd. (ISBN: 978-0-470-01866-8).<br />

6.2 Other suggested reading materials, if any.<br />

None<br />

6.3 Other sources <strong>of</strong> information.<br />

Web-based resources on computer interface design.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design 30<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Student teams (3-4 students each) are required to submit at least __3___ written reports (not including<br />

exams, tests, quizzes, or commented programs) to typically __8___ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __20___ minutes duration. Also, each student will write __1__ interface design<br />

literature report and will make __1__ presentation <strong>of</strong> typically __10___ minutes duration. Include only<br />

material that is graded for grammar, spelling, style, and so forth, as well as for technical content,<br />

completeness, and accuracy.<br />

Note: student teams will complete final reports and oral presentations for the interface design project.<br />

9.0 Social and Ethical Issues:<br />

No coverage.<br />

-208-


10.0 Theoretical content:<br />

This course deals mostly with the principles <strong>of</strong> interface design. It includes relevant theories and<br />

frameworks to analyze and solve problems.<br />

Hours<br />

10.1 Conceptual design models 1.5<br />

10.2 Users’ mental models 1.5<br />

10.3 Design principles for usability 1.0<br />

10.4 Design principles for user experience 1.0<br />

10.5 Evaluation framework 1.5<br />

10.6 Predictive models <strong>of</strong> usability 3.0<br />

10.7 Cognitive walkthrough 1.0<br />

10.8 Heuristic evaluation 1.0<br />

11.0 Problem analysis:<br />

Students learn to analyze and understand the problems associated with the design context. This course<br />

introduces formal methods <strong>of</strong> analysis that may be used to complement less structured aspects <strong>of</strong> design.<br />

12.0 Solution design:<br />

Students learn to apply relevant theories and frameworks to solving the problems that have been found<br />

in the process <strong>of</strong> problem analysis. This course also emphasizes the fact that interface design requires the<br />

integration <strong>of</strong> multiple disciplines and skills (from information systems analysis and design, human<br />

psychology, and computer science)<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

6/12/03 Change prerequisite from CIST 1100 and<br />

CIST 1400. Course Change Form<br />

5/15/03.<br />

Wild<br />

Prerequisites changed to match<br />

need <strong>of</strong> course content.<br />

6/25/03 ABET cleanup Wolcott<br />

10/12/08 Complete reworking <strong>of</strong> course content Davis Completely revamped course<br />

description to reflect most current<br />

content and teaching methods<br />

-209-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 3520<br />

Course Title<br />

Graphical User Interface Design<br />

Course Coordinator<br />

Sidney Davis<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the principles <strong>of</strong> good<br />

interface design.<br />

Understand that interface design requires<br />

the integration <strong>of</strong> multiple disciplines and<br />

skills and know how to draw on them to<br />

create usable and useful computer<br />

s<strong>of</strong>tware.<br />

Learn to apply design principles and<br />

concepts that have been used<br />

successfully in the past to everyday<br />

examples from business and industry.<br />

X S S S S<br />

S S S S S<br />

S S S S<br />

-210-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-211-


-212-


ISQA 4010 Business Intelligence<br />

Department and Course Number ISQA 4010<br />

Course Title<br />

Business Intelligence<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/02/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course focuses on the various topics on knowledge management by utilizing both<br />

behavioral approaches and information technology tools. It includes data collection and<br />

analysis, intelligent agents, business concerns on data warehousing and data mining,<br />

customer relationship management. The course will also cover information overload,<br />

human expert systems vs. artificial intelligent systems and intelligent decision making.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to<br />

understand the advanced Quantitative Analysis. It is one <strong>of</strong> elective courses for<br />

undergraduates who wish to pursue Knowledge Management, Knowledge Engineering<br />

and Decision Support Tracks.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 1400 Introduction to Computer Programming<br />

1.3.2 CIST 2500 Introduction to Applied Statistics for IS&T<br />

1.3.3 ISQA 3150 Principles <strong>of</strong> Quantitative Analysis<br />

1.3.4 ISQA 3210 Advanced Technology for Personal Productivity<br />

1.3.5 ISQA 3250 Intermediate Quantitative Analysis<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Introduction to Visual Basic Programming,<br />

1.4.2 Program development cycle<br />

1.4.3 Training in spreadsheets and database<br />

1.4.4 Statistics in information science and technology<br />

1.4.5 A well-known computer package being used to support the problem-solving<br />

process.<br />

1.5 1.4 Unusual circumstances <strong>of</strong> the course.<br />

-213-


None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 Data, Information, and Knowledge<br />

2.2 Knowledge Management vs. Knowledge Technology<br />

2.3 Knowledge represented by Data<br />

2.4 Artificial Intelligence, Expert system vs. Data Mining<br />

2.5 Analytic Customer Management<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Introduction 3<br />

3.2 Data Collection and Information 6<br />

3.3 Information Overload 6<br />

3.4 Information and Knowledge 8<br />

3.5 Knowledge Management 6<br />

3.6 Knowledge Technology 4<br />

3.7 Business Intelligence 6<br />

3.8 Analytic Customer Relation Management 6<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures and group discussions.<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week<br />

-214-


5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The student will attend lectures, participate in discussion, complete required<br />

examinations, homework and the class project.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Components<br />

Grading<br />

Exams 60%<br />

Class Project 25%<br />

Class Participation / Homework 15%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

96 – 100% A+<br />

90 – 95.9% A<br />

86 – 89.9% B+<br />

80 – 85.9% B<br />

76 – 79.9% C+<br />

70 – 75.9% C<br />

66 – 69.9% D+<br />

60 – 65.9% D<br />

< 60% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Amrit Tiwana, Knowledge Management Toolkit, Prentice Hall, 2002. (or more<br />

recent text)<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 T. Sowell, Knowledge and Decisions, Basic Books, 1980.<br />

6.2.2 J. W. Cortada and J. A. Woods, The Knowledge Management Yearbook,<br />

Butterworth-Heinemann, 1999.<br />

-215-


6.3 Other sources <strong>of</strong> information.<br />

6.3.1 Y. Shi, “Humancasting: A Fundamental Method to Overcome User Information<br />

Overload,” Information – International Inter-discipline Journal, Vol. 3, 127-143,<br />

2000.<br />

6.3.2 M. Zeleny, “Knowledge <strong>of</strong> Enterprise: Knowledge Mangement or Knowledge<br />

Technology,” International Journal <strong>of</strong> Information Technology and Decision<br />

Making, Vol.1, 181-208, 2002<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 4<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design 6<br />

Data management 26<br />

Role <strong>of</strong> IS in Organizations 6<br />

8.0 Oral and Written Communications<br />

Every student is required to submit at least ___3__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically ___30__ pages and to make _1____ oral<br />

presentations <strong>of</strong> typically ___10__ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

10.1 Data Mining<br />

10.2 Expert System<br />

-216-


11.0 Problem analysis:<br />

Students learn the advanced models <strong>of</strong> Quantitative Analysis, a scientific approach to decision<br />

making that involves the operations <strong>of</strong> organizational systems. They learn to solve the conflicts<br />

<strong>of</strong> interest among the components <strong>of</strong> the organization in a way that is best for the organization<br />

as a whole.<br />

12.0 Solution design:<br />

Students learn to develop a solution that yields an optimal value <strong>of</strong> the organizational system<br />

measure <strong>of</strong> desirability, or compare alternative courses <strong>of</strong> action by evaluating their measure <strong>of</strong><br />

desirability.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

6/12/03 Change prerequisites as needed. Wild<br />

Course change form 5/15/03.<br />

10/2/08 Review completed Shi<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4010<br />

Course Title<br />

Business Intelligence<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

-217-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Course objective<br />

Data, Information, and Knowledge S S S<br />

Knowledge Management vs. Knowledge S S X<br />

Technology<br />

Knowledge represented by Data S X S<br />

Artificial Intelligence, Expert system vs. S<br />

S<br />

Data Mining<br />

Analytic Customer Management S S S<br />

-218-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-219-


-220-


ISQA 4100 Information Systems Architecture and Organization<br />

Department and Course Number ISQA 4100<br />

Course Title<br />

Information Systems Architecture & Organization<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course examines the frameworks and tools used to develop an organization's<br />

information system architecture. It provides the analytical skills and conceptual<br />

frameworks with which to make recommendations and decisions regarding the<br />

integration <strong>of</strong> information technology components into an information system<br />

architecture.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors and graduate MIS<br />

majors who wish to study advanced topics pertaining to an organization's information<br />

system architecture.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 3100 - Organizations, Applications, and Technology<br />

1.3.2 ISQA 3310 - Managing the Database Environment<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Working knowledge <strong>of</strong> business foundations.<br />

1.4.2 Working knowledge <strong>of</strong> computer information systems.<br />

1.4.3 Working knowledge <strong>of</strong> information systems development.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Understand the issues involved in architecting the information systems infrastructure in<br />

medium- and large-sized organizations.<br />

-221-


2.2 Understand the frameworks and tools used to develop an organization's information<br />

systems architecture.<br />

2.3 Understand and apply the conceptual frameworks developed for managing information<br />

systems architectures.<br />

2.4 Understand the Unified Modeling Language (UML) as a tool for modeling the various<br />

aspects <strong>of</strong> information systems architectures.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 The Role <strong>of</strong> IS in the Enterprise & the Problems <strong>of</strong> Large/Complex IS 3.0<br />

3.2 The Concept <strong>of</strong> Information Systems Architecture 1.0<br />

3.3 Initial Attempts at IS Architecture 2.0<br />

3.4 Heuristics and Conceptual Building Blocks <strong>of</strong> ISA 2.0<br />

3.5 Technical Building Blocks <strong>of</strong> IS Architecture 2.0<br />

3.6 Builder-Architected Systems 1.0<br />

3.7 The Zachman Information Systems Architecture Framework 2.0<br />

3.8 Manufacturing Systems 1.0<br />

3.9 The Data Warehouse Architecture Framework 2.0<br />

3.10 Social Systems 1.0<br />

3.11 S<strong>of</strong>tware Systems 1.0<br />

3.12 Collaborative Systems 1.0<br />

3.13 Representation Models and System Architecting 1.0<br />

3.14 The Architecture Process 3.0<br />

3.15 Integrated Modeling Methodologies 1.0<br />

3.16 Architecture Frameworks 1.0<br />

3.17 The Political Process <strong>of</strong> Systems Architecting 2.0<br />

3.18 The pr<strong>of</strong>essionalization <strong>of</strong> Systems Architecting 2.0<br />

3.19 Architecture Management, Measurement, and Maintenance 2.0<br />

3.20 Overview <strong>of</strong> the Unified Modeling Language (UML) 1.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will include lectures, discussion, and guidance on the<br />

group project.<br />

4.2 Student role in the course.<br />

-222-


Students will attend lectures, participate in the in-class discussion, complete the<br />

individual presentation assignment, complete individual assignments, and participate in<br />

the group project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Students will participate in the in-class discussions. Students will conduct an individual<br />

presentation on a research topic related to the course; graduate students will also<br />

complete an accompanying written report. Students will participate in the completion <strong>of</strong><br />

a group project which brings together analysis, design, modeling, communications, and<br />

research skills.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

Presentation 30%<br />

Individual Assignments 30%<br />

Team Project 30%<br />

Class Participation 10%<br />

5.3 Grading scale and criteria.<br />

Points<br />

Grade<br />

96% - 100% A+<br />

92% - 95% A<br />

89% - 91% A-<br />

86% - 88% B+<br />

82% - 85% B<br />

79% - 81% B-<br />

76% - 78% C+<br />

72% - 75% C<br />

69% - 71% C-<br />

66% - 68% D+<br />

-223-


62% - 65% D<br />

59% - 61% D-<br />

< 59% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Eberhardt Rechtin & Mark W. Maier. The Art <strong>of</strong> Systems Architecting, 2nd Edition<br />

CRC Press, 2000 (or more recent text)<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 On-line: Intranet Architecture - Integrating Information Design with Business<br />

Planning (http://www.intrack.com/intranet/iarchi.shtml)<br />

6.2.2 On-line: The IntraNet Architecture: Managing information in the new paradigm<br />

(http://www.iorg.com/papers/amdahl/infra.html)<br />

6.2.3 On-line: Intranet Cost<br />

Calculator(http://www.intrack.com/intranet/costs/index.shtml)<br />

6.2.4 On-line: Complexity problems: the IRS<br />

(http://cnnfn.com/1999/03/01/economy/irs/)<br />

6.2.5 On-line: Multi-vendor problems: MCI<br />

6.2.6 (http://cnn.com/TECH/computing/9908/23/network.nono.idg/index.html)<br />

6.2.7 On-line: Definition <strong>of</strong> Architecture, as per the <strong>University</strong> <strong>of</strong> Leuven<br />

(http://www.mech.kuleuven.ac.be/pma/project/goa/extracts/architec.htm)<br />

6.2.8 On-line: How Do You Define S<strong>of</strong>tware Architecture? as per the S<strong>of</strong>tware<br />

Engineering Institute at Carnegie Mellon <strong>University</strong><br />

(http://www.sei.cmu.edu/architecture/definitions.html)<br />

6.2.9 On-line: What an Information Architect Does (PDF file)<br />

(http://www.jjg.net/ia/iadoes0700.pdf)<br />

6.2.10 On-line: The power <strong>of</strong> standardization: A Brief Overview <strong>of</strong> GSM (http://kbs.cs.tuberlin.de/~jutta/gsm/js-intro.html)<br />

6.2.11 On-line: The power <strong>of</strong> heuristics: Usability Heuristics for the Web<br />

(http://www.webreview.com/1997/10_10/strategists/10_10_97_2.shtml)<br />

6.2.12 On-line: The power <strong>of</strong> patterns: Essential Concepts and Terminology<br />

(http://www.enteract.com/~bradapp/docs/patterns-intro.html)<br />

6.2.13 On-line: Technology: Computer User's High-Tech Dictionary<br />

(http://www.computeruser.com/resources/dictionary/dictionary.html)<br />

6.2.14 On-line: Technology: Information Technology Association <strong>of</strong> America<br />

(http://www.itaa.org/)<br />

6.2.15 On-line: UML: Rational S<strong>of</strong>tware's UML site (http://www.rational.com/uml/)<br />

6.2.16 On-line: UML: UML Dictionary (http://s<strong>of</strong>tdocwiz.com/UML.htm)<br />

-224-


6.2.17 On-line: UML: A Unified Object Modeling Approach<br />

(http://www.iconixsw.com/Spec_Sheets/UnifiedOM.html)<br />

6.2.18 On-line: Explore the Zachman Architecture<br />

6.2.19 On-line: John Zachman's Homepage<br />

(http://www.ozemail.com.au/~ieinfo/zachman.htm)<br />

6.2.20 On-line: Getting Beyond the "Legacy," by John A. Zachman.<br />

(http://www.ies.aust.com/~visible/papers/zachman1.htm)<br />

6.2.21 On-line: The Challenge is Change: A Management Paper, by John A. Zachman<br />

(http://www.ies.aust.com/~visible/papers/zachman2.htm)<br />

6.2.22 On-line: Framework S<strong>of</strong>tware (http://www.frameworks<strong>of</strong>t.com/)<br />

6.2.23 On-line: The Zachman Framework: An Introduction, by David C. Hay<br />

(http://www.essentialstrategies.com/publications/methodology/zachman.htm)<br />

6.2.24 On-line: The Framework for Enterprise Architecture, by the Zachman Institute for<br />

Framework Advancement (http://www.zifa.com/zifajz02.htm)<br />

6.2.25 On-line: An overview <strong>of</strong> the Zachman Framework, by Momentum Systems, Inc.<br />

(http://www.momentumsystems.com/zframework.html)<br />

6.2.26 On-line: Pattern Based Reengineering, Michael A. Beedle Ph. D. (This article<br />

combines the topics <strong>of</strong> object-oriented s<strong>of</strong>tware engineering, patterns, the<br />

Zachman Framework, and the UML.)<br />

6.2.27 On-line: Implementing the Zachman Framework for Enterprise Architecture, by<br />

Alan Perkins. (http://www.ies.aust.com/~visible/papers/Zachman.html)<br />

6.2.28 On-line: The Zachman Framework, by Dr. John K. Sharp (By the way, note the 7th<br />

reference <strong>of</strong> this article - a reference to an earlier version <strong>of</strong> this course.)<br />

(http://www.inconcept.com/JCM/February1999/print/sharp.html)<br />

6.2.29 On-line: The Zachman Framework for the Data Administration function, as used by<br />

the Forest Service <strong>of</strong> British Columbia.<br />

(http://www.for.gov.bc.ca/isb/datadmin/framewrk.htm)<br />

6.2.30 On-line: The Zachman Framework for Healthcare Informatics Standards<br />

(http://www.ansi.org/rooms/room_41/public/documents/zach_isa.pdf)<br />

6.2.31 On-line: The Zachman Framework for Enterprise Architecture by Andrew Faulkner<br />

(http://www.datagruven.com/CIPS/Zachman.html)<br />

6.2.32 On-line: Formalization <strong>of</strong> Multi-level Zachman Frameworks by Richard Martin and<br />

Edward L. Robertson ( ftp://ftp.cs.indiana.edu/pub/techreports/TR522.pdf)<br />

6.2.33 On-line: Explore the Data Warehousing Architecture<br />

6.2.34 On-line: Data Warehousing resources on the World Wide Web<br />

(http://www.datawarehousing.com/)<br />

6.2.35 On-line: Data Warehousing Overview<br />

(http://www.sas.com/rnd/warehousing/dwo_web.html)<br />

6.2.36 On-line: Introduction to Business Modeling Using the Unified Modeling Language<br />

(UML) (http://www.therationaledge.com/content/mar_01/m_uml_jh.html)<br />

6.2.37 On-line: Use Case Modeling Introduction<br />

(http://www.zoo.co.uk/~z0001039/PracGuides/pg_use_cases.htm)<br />

-225-


6.2.38 On-line: Top Ten Use Case Mistakes<br />

(http://www.sdmagazine.com/documents/s=815/sdm0102c/)<br />

6.2.39 On-line: Use case modeling tips (http://www-<br />

106.ibm.com/developerworks/java/library/tip-uml2.html)<br />

6.2.40 On-line: Use and Abuse Cases, by Martin Fowler (PDF Format)<br />

(http://www.awl.com/cseng/titles/0-201-89542-0/articles/abuse.pdf)<br />

6.2.41 On-line: 7 tips for writing better use cases<br />

(http://www.class.com.au/newsletr/97sep/usecases.htm)<br />

6.2.42 On-line: Use Case Fundamentals, by Alistair Cockburn<br />

(http://members.aol.com/acockburn/papers/AltIntro.htm)<br />

6.2.43 On-line: Formalizing Use Cases with Message Sequence Charts, a Masters Thesis<br />

by Michael Andersson & Johan Bergstrand<br />

(http://www.efd.lth.se/~d87man/EXJOBB/ExBookTOC.doc.html)<br />

6.2.44 On-line: Why Are Use Cases So Painful?<br />

(http://www.evanetics.com/Articles/ObjectModeling/why_are_use_cases_so_pai<br />

nful.htm)<br />

6.2.45 On-line: Worldwide Institute <strong>of</strong> S<strong>of</strong>tware Architects (http://www.wwisa.org/)<br />

6.2.46 On-line: Introduction to Objects (incl. Java code examples)<br />

(http://www.comp.nus.edu.sg/~hengak/IC1101J/IC1101/content/ch8p1.html)<br />

6.2.47 On-line: Object-Oriented Computing - What's the Big Deal?<br />

(http://www.firststep.com.au/education/solid_ground/oo.html)<br />

6.2.48 On-line: The Object-Oriented Advantage<br />

(http://www.firststep.com.au/education/solid_ground/oo_dev.html)<br />

6.2.49 On-line: What is Object-Oriented<br />

S<strong>of</strong>tware?(http://catalog.com/s<strong>of</strong>tinfo/objects.html)<br />

6.2.50 On-line: A collaborative systems example: CORBA<br />

(http://www.cs.wustl.edu/~schmidt/corba.html)<br />

6.2.51 On-line: State-Transition diagram<br />

(http://cobra.csc.calpoly.edu/~gfisher/projects/work/inferno/documentation/uml<br />

/notation/notation9a.html#9.1)<br />

6.2.52 On-line: An Atlas <strong>of</strong> Cyberspaces - visual modeling at its finest<br />

(http://www.cybergeography.org/atlas/atlas.html)<br />

6.2.53 On-line: Sample Sequence Diagrams<br />

(http://web.dis.unimelb.edu.au/undergrad/1997/cuc/245Project/Sequence3.htm)<br />

6.2.54 On-line: Collaboration Diagrams<br />

(http://193.174.33.104:7776/UMT/notation_guide_ch7.html)<br />

6.2.55 On-line: Architecting for Business: An Executive Overview, by Unisys<br />

6.2.56 (http://www.corp.unisys.com/UNISYS/ACEweb.NSF/LookupView/Executive+Overv<br />

iew?OpenDocument#apoverview)<br />

6.2.57 On-line: Building Blocks and the Architecture Development Method, by The Open<br />

Group (http://www.opengroup.org/public/arch/p4/bbs/bbs_adm.htm)<br />

6.2.58 On-line: The Hatley-Pirbhai Methodology<br />

(http://www.turbocase.com/method.html)<br />

-226-


6.2.59 On-line: Quality Function Deployment Institute (http://www.qfdi.org/)<br />

6.2.60 On-line: UML Resource Center (http://www.rational.com/uml/index.jtmpl)<br />

6.2.61 On-line: The Zachman Architecture<br />

6.2.62 On-line: U.S. Department <strong>of</strong> Energy Information Systems Architecture - a vast online<br />

resource (http://cio.doe.gov/iap/)<br />

6.2.63 On-line: ZDNet's Net.Politics site<br />

(http://www.zdnet.com/products/netpolitics.html)<br />

6.2.64 On-line: HotWired News' Politics site (http://www.wired.com/news/politics/)<br />

6.2.65 On-line: INCOSE - International Council on Systems Engineering<br />

(http://www.incose.org/)<br />

6.2.66 On-line: INCOSE Systems Architecting Working Group<br />

(http://www.incose.org/cmtes/sawg.html)<br />

6.2.67 On-line: IEEE S<strong>of</strong>tware Engineering Standards Committee Architecture Working<br />

Group (http://www.pithecanthropus.com/~awg/index.html)<br />

6.2.68 On-line: TiAC - The Information Architects Cooperative<br />

(http://www.infoed.com/default.htm)<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional handouts may be used when deemed necessary by the instructor.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 12<br />

Networking and telecommunications 6<br />

Modern programming language<br />

Analysis and Design 6<br />

Data management 12<br />

Role <strong>of</strong> IS in Organizations 18<br />

8.0 Oral and Written Communications:<br />

As part <strong>of</strong> the group term project assignment, the students are required to submit 5 written<br />

reports which are typically 5-15 pages long. Individually, each student makes 1 oral presentation<br />

<strong>of</strong> typically 25 minutes duration. This presentation includes research, development <strong>of</strong> original<br />

presentation materials, and oral presentation skills.<br />

-227-


1.0 Social and Ethical Issues:<br />

Students are presented with problems that arise from poorly developed and/or managed<br />

information systems, and discuss potential solutions. A chapter on Social Systems specifically<br />

addresses the impact <strong>of</strong> information systems on social structures.<br />

9.0 Theoretical content:<br />

Zachman Framework for Information Systems/Enterprise Architecture (4 hours)<br />

10.0 Problem analysis:<br />

Students will explore the need for information system architectures in medium and large-sized<br />

organizations. Students will explore the conceptual frameworks developed for managing<br />

information systems architectures. Students will explore the Unified Modeling Language as a<br />

tool for architecture representation.<br />

11.0 Solution design:<br />

The students will develop and apply analytical skills, as well as their understanding <strong>of</strong><br />

architectural frameworks and the Unified Modeling Language. The students will combine these<br />

new skills with existing knowledge and skills in the area <strong>of</strong> information systems development in<br />

order to design an integrative architecture for a real-world organization.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

4/8/2003 Added prerequisites: CIST 2110 and<br />

ISQA 3310. Course Change Form<br />

4/22/03.<br />

Paul van<br />

Vliet<br />

Prerequisites suggested by ISQA<br />

faculty undergraduate curriculum<br />

review.<br />

6/25/03 ABET cleanup Wolcott<br />

9/13/2007 Updated syllabus contents; changed Van Vliet<br />

prerequisite from CIST 2110 to CIST<br />

3100 as this course was renumbered.<br />

10/12/2008 Updated section 5.1 to more accurately Van Vliet<br />

reflect the current term project<br />

10/12/2008 Updated section 8.0 to more accurately Van Vliet<br />

reflect course administration<br />

10/12/2008 Updated section 9.0 to reflect current Van Vliet<br />

course content<br />

10/12/2008 Updated section 10 to reflect change in Van Vliet<br />

nomenclature <strong>of</strong> theoretical model<br />

-228-


-229-


14. Local and global role <strong>of</strong> iS<br />

15. Knowledge <strong>of</strong> computing<br />

16. Analysis and design<br />

17. Communication<br />

18. Computer-based tools<br />

19. Work on a team<br />

20. Pr<strong>of</strong>essional, legal, ethical standards<br />

21. Model processes and data<br />

22. Design, implement, evaluation IS<br />

23. Manage projects<br />

24. Manage IS within application env.<br />

25. Manage change<br />

26. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4100<br />

Course Title<br />

Information Systems Architecture & Organization<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the issues involved in<br />

architecting the information systems<br />

infrastructure in medium- and large-sized<br />

organizations.<br />

Understand the frameworks and tools<br />

used to develop an organization's<br />

information systems architecture.<br />

Understand and apply the conceptual<br />

frameworks developed for managing<br />

information systems architectures.<br />

Understand the Unified Modeling<br />

Language (UML) as a tool for modeling<br />

the various aspects <strong>of</strong> information<br />

systems architectures.<br />

S S S S X S X<br />

S S S X X<br />

S S S X X<br />

S S S<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

-230-


14. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

1. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

2. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

3. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

4. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

7. understand and model organizational processes and data.<br />

8. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

9. manage projects.<br />

10. manage information systems within a specific application environment.<br />

11. manage change.<br />

12. recognize the need for continuing pr<strong>of</strong>essional development<br />

-231-


-232-


ISQA 4110 Information Systems Analysis<br />

Department and Course Number ISQA 4110<br />

Course Title<br />

Information Systems Analysis<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 05/29/2009<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course presents an overview <strong>of</strong> information systems and the system development life<br />

cycle for the systems analyst. The course emphasis focuses on tools and techniques that<br />

the analyst, designer, and programmer can use to document information systems.<br />

The classical and structured tools for describing data flow, data structures, process flow,<br />

and logical design requirements will be applied to documenting systems. Emphasis will be<br />

placed on the integrated use <strong>of</strong> the classical and structured tools, requirements<br />

definition, project management, and cost/benefit analysis.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate MIS majors who wish to study topics on<br />

systems analysis and design.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 CIST 3100 - Organizations, Applications, and Technology<br />

1.3.2 ISQA 3210 - Advanced Technology for Personal Productivity (prior or concurrent<br />

enrollment)<br />

1.3.3 ISQA 3310 - Database Management (prior or concurrent enrollment)<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Types <strong>of</strong> Processing Systems<br />

1.4.2 Essential Concepts <strong>of</strong> Networks<br />

1.4.3 Essential Concepts in DSS, Artificial Intelligence and other technologies<br />

1.4.4 Essential Concepts in Systems Analysis, Design, and Databases<br />

1.4.5 Introduction to Data Modeling – ER Diagrams<br />

1.4.6 Essential techniques in Word, Excel, Access, and PowerPoint<br />

1.4.7 Understanding <strong>of</strong> Operating Systems (Windows and Unix)<br />

-233-


1.4.8 Essential Techniques in Technical Writing<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 asdfa<br />

2.2 The students will be able to develop a better understanding <strong>of</strong> the entire information<br />

system development process: from the identification <strong>of</strong> the business problems and needs<br />

to the design <strong>of</strong> an improved system to the writing <strong>of</strong> documentation.<br />

2.3 The students will improve their technical and group communication skills. The students’<br />

ability to communicate with both technical and non-technical people should be improved<br />

through the proper use <strong>of</strong> the tools. Their writing and speaking skills may also be<br />

enhanced as they learn how to present their documentation to the instructor.<br />

2.4 The student systems analyst will learn how to utilize critical thinking skills, problem<br />

solving, change management, and project management. These essential skills will enable<br />

them to work with their clients and define the client project. This process includes ethical<br />

decision making and determine appropriate solutions for their client.<br />

2.5 The students will apply technical and theoretical knowledge to the client project.<br />

Students will be able to apply their specific strategies and methodologies such as cost<br />

benefit analysis, process modeling, use diagrams, and documentation to their project.<br />

2.6 The student will apply their technical knowledge to the client project. This knowledge<br />

applies to the selection <strong>of</strong> hardware, s<strong>of</strong>tware, operating systems, and networking<br />

solutions.<br />

2.7 The student will have a better understanding <strong>of</strong> information systems in general. Students<br />

will learn many capabilities and characteristics <strong>of</strong> good information systems. This process<br />

will help students design more effective systems, encourage additional education and<br />

certification during their careers.<br />

3.0 Content and Organization:<br />

-234-<br />

Contact hours<br />

3.1 Introduction to ISQA 4110, The Systems Development Environment<br />

& Overview <strong>of</strong> S<strong>of</strong>tware Applications 3.0<br />

3.2 The Origins <strong>of</strong> S<strong>of</strong>tware 3.0<br />

3.3 Managing the Information Systems Project<br />

& Introduction to Micros<strong>of</strong>t Project 2007 3.0<br />

3.4 Identifying and Selecting Systems Development Project 3.0<br />

3.5 Initiating and Planning Systems Development Projects 3.0<br />

3.6 Information Security 3.0<br />

3.7 Risk Analysis for Information Systems 3.0<br />

3.8 Determining Systems Requirements 3.0


3.9 Structuring Systems Requirements: Process Modeling<br />

& Structuring Systems Requirements: Logic Modeling 3.0<br />

3.10 Rapid Application Development<br />

& Object-Oriented Analysis and Design 3.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods include lectures, in-class exercises, s<strong>of</strong>tware tutorials, and<br />

guidance on the semester project.<br />

4.2 Student role in the course.<br />

Students will attend lectures, complete in-class exercises and quizzes, complete two<br />

examinations, complete and present class projects.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Students will complete in-class exercises and quizzes, take two examinations, complete<br />

and present class projects.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

In-class Exercises and Quizzes 5%<br />

Examinations 40%<br />

Class Project 50%<br />

Class Presentation 5%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97% - 100% A+<br />

90% - 96% A<br />

87% - 89% B+<br />

80% - 86% B<br />

-235-


77% - 79% C+<br />

70% - 76% C<br />

67% - 69% D+<br />

60% - 66% D<br />

0% - 59% F<br />

-236-


6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Jeffrey A. H<strong>of</strong>fer, Joey F. George, and Joseph S. Valacich. Modern Systems Analysis<br />

and Design, Fifth Edition. Addison Wesley Longman. 2008.<br />

6.1.2 Rachel Biheller Bunin. Micros<strong>of</strong>t Project 2007, Introductory. Course Technology.<br />

2008.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Systems Analysis and Design Methods by Jeffrey Whitten and Lonnie Bentley,<br />

McGraw-Hill/Irwin, 7th Edition, 2005<br />

6.2.2 Systems Analysis and Design by Allan Dennis, Barbara Wixom, and Roberta Roth,<br />

Wiley Publishing, 2008.<br />

6.2.3 Systems Analysis and Design, Seventh Edition, by Gary Shelley, Thomas Cashman,<br />

and Harry Rosenblatt, Course Technology, 2007.<br />

6.2.4 Systems Analysis and Design, 7th Edition, by Kenneth Kendall and Julie Kendall,<br />

Prentice-Hall, 2007.<br />

6.2.5 Systems Analysis and Design with UML, by Allan Dennis, Barbara Wixom, and<br />

David Tegarden, Wiley Publishing, 2007.<br />

6.2.6 Systems Anlaysis and Design in a Changing World, by John Satzinger, Robert<br />

Jackson, and Stephen Burd, Course Technology, 2008.<br />

6.2.7 Essentials <strong>of</strong> Systems Analysis and Design, 4th Edition, by Jeffrey H<strong>of</strong>fer, Joey<br />

George, and Joseph Valacich, Prentice-Hall, 2009.<br />

6.2.8 Information Systems Methodologies by Olle, Addison-Wesley Publishing<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional course content, either with pages developed especially for this course or with<br />

links to additional course materials, will be provided during the semester.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None.<br />

-237-


7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 6<br />

Networking and telecommunications 3<br />

Modern programming language<br />

Analysis and Design 21<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___4__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically _5-25____ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __20___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

The course deals with information security and risk analysis for information systems. These<br />

topics will partly be concerning social and ethical issues. Students will be graded on their<br />

understanding <strong>of</strong> these topics by in-class exercises, quizzes or exams.<br />

10.0 Theoretical content:<br />

None.<br />

11.0 Problem analysis:<br />

Students select a project in which they will analyze a real-world organization and their<br />

information systems need. Students will review systems development requirements and identify<br />

the data that is required for the systems design. The students develop alternatives and present<br />

these solutions for the client.<br />

Student will learn the definition <strong>of</strong> systems planning, systems analysis and tools and techniques<br />

that the programmer or analyst can use to document information systems. Classical and<br />

structured tools about the problem analysis include ones for describing data flow, data structure,<br />

and process flow. Time permitting, the course will survey other important skills for the systems<br />

analyst such as data gathering and reporting, project management, and cost/benefit analysis.<br />

-238-


12.0 Solution design:<br />

Students will use the theory and established practices <strong>of</strong> information systems analysis and design<br />

to develop a functional design specification document and determine information systems<br />

security requirements. The project groups develop appropriate models (process models, state<br />

transition diagrams, use case diagrams, and logic modeling) and supporting documentation<br />

through the use <strong>of</strong> the above tools.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

11/2/02 Initial ABET version created Pietron<br />

6/25/03 ABET cleanup Wolcott<br />

7/10/03 Change Prerequisite (Course Change Wild Update course prerequisites.<br />

Form – 4-22-03)<br />

10/13/08 Update to course description and Pietron<br />

prerequisites<br />

4/05/2009 Update to course objectives Pietron Updated the course objectives<br />

to be in alignment ABET<br />

outcomes<br />

5/29/2009 Updating bibliography and<br />

assignments<br />

Pietron Updating references<br />

-239-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Work on a team<br />

6. Computer-based tools<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. Course Objectives<br />

Department and Course Number ISQA 4110<br />

Course Title<br />

Information Systems Analysis<br />

Course Coordinator<br />

Leah R. Pietron<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 05/29/2009<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

The students will be able to develop a S S S<br />

better understanding <strong>of</strong> the entire<br />

information system development<br />

process: from the identification <strong>of</strong> the<br />

business problems and needs to the<br />

design <strong>of</strong> an improved system to the<br />

writing <strong>of</strong> documentation<br />

The students will improve their technical S S S S S S X S S X X<br />

and group communication skills. The<br />

students’ ability to communicate with<br />

both technical and non-technical people<br />

should be improved through the proper<br />

use <strong>of</strong> the tools. Their writing and<br />

speaking skills may also be enhanced as<br />

they learn how to present their<br />

documentation to the instructor.<br />

The student systems analyst will learn X S S S S X S S S<br />

-240-


how to utilize critical thinking skills,<br />

problem solving, change management,<br />

and project management. These<br />

essential skills will enable them to work<br />

with their clients and define the client<br />

project. This process includes ethical<br />

decision making and determine<br />

appropriate solutions for their client<br />

The students will apply technical and<br />

theoretical knowledge to<br />

the client project. Students will be able<br />

to apply their specific<br />

strategies and methodologies such as<br />

cost benefit analysis, process<br />

modeling, use diagrams, and<br />

documentation to their project<br />

The student will apply their technical<br />

knowledge to the project. This<br />

knowledge applies to the selection <strong>of</strong><br />

hardware, s<strong>of</strong>tware, operating systems<br />

and networking solutions.<br />

The student will have a better<br />

understanding <strong>of</strong> information systems in<br />

general. Students will learn many<br />

capabilities and characteristics <strong>of</strong> good<br />

information systems. This process will<br />

help students design more effective<br />

systems, encourage additional education<br />

and certification during their careers.<br />

S S S X<br />

X X S<br />

S S X X S S<br />

-241-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

6. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-242-


ISQA 4120 System Design and Implementation<br />

Department and Course Number ISQA 4120<br />

Course Title<br />

Information Systems Design & Implementation<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This is the second course in a sequence in computer information systems analysis, design,<br />

and implementation. This course extends the basic foundations <strong>of</strong> systems development<br />

started in ISQA 4110 and examines the activities comprising the design, construction and<br />

implementation <strong>of</strong> information systems.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate MIS majors who wish to study advanced topics<br />

pertaining to information systems design and implementation. It is a required course for<br />

the Bachelor <strong>of</strong> Science in MIS degree.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 ISQA 4110 Information Systems Analysis<br />

1.3.2 ISQA 3310 Managing the Database Environment<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Data modeling using the relational database model<br />

1.4.2 Systems analysis<br />

1.4.3 Database development using Micros<strong>of</strong>t Access<br />

1.4.4 Project management basics<br />

1.4.5 Technical writing<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Complete the development <strong>of</strong> the projects started in the previous semester in ISQA 4110.<br />

2.2 Be able to successfully design and construct a s<strong>of</strong>tware application.<br />

-243-


2.3 Be able to critically assess systems development alternatives.<br />

2.4 Be able to develop high quality systems documentation.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Overview <strong>of</strong> Systems Design approaches 3.0<br />

3.2 Data Model Design 3.0<br />

3.3 Database Design 3.0<br />

3.4 User Interface Design 3.0<br />

3.5 Systems Architecture Design 3.0<br />

3.6 Systems Controls Design 3.0<br />

3.7 Process Design & Code Development 3.0<br />

3.8 Documentation Development 3.0<br />

3.9 Design <strong>of</strong> Testing Procedures 3.0<br />

3.10 Systems Installation Issues 3.0<br />

3.11 Distributed Systems Design 3.0<br />

3.12 System Maintenance 3.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will include lectures, discussion, and intense guidance on<br />

the systems development project.<br />

4.2 Student role in the course.<br />

Student will attend lectures, read assignment readings, complete exams, participate in<br />

the systems development project and take part in the formal presentation <strong>of</strong> the project.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Student will complete two individual exams. Students – in groups <strong>of</strong> 3 to 5 - will<br />

participate in the completion <strong>of</strong> the project milestones, the project application, the<br />

project documentation, and the presentation <strong>of</strong> the project.<br />

-244-


5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

Exams 33.3%<br />

Project milestones 33.3%<br />

Final project and presentation 33.3%<br />

5.3 Grading scale and criteria.<br />

6.0 Resource Material<br />

Points<br />

Grade<br />

96% - 100% A+<br />

92% - 95% A<br />

89% - 91% A-<br />

86% - 88% B+<br />

82% - 85% B<br />

79% - 81% B-<br />

76% - 78% C+<br />

72% - 75% C<br />

69% - 71% C-<br />

66% - 68% D+<br />

62% - 65% D<br />

59% - 61% D-<br />

00% - 58% F<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Modern Systems Analysis and Design - Fifth Edition, by Jeffrey A. H<strong>of</strong>fer, Joey F.<br />

George, and Joseph S. Valacich, Pearson/Prentice Hall, 2008.(or more recent text)<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 asdjaklsd<br />

6.2.2 On-Line: A Relational Model <strong>of</strong> Data for Large Shared Data Banks - Ed Codd's<br />

original article (http://www.acm.org/classics/nov95/)<br />

6.2.3 On-Line Tutorial: Getting Started with ERwin - A tutorial created by Dr. Wolcott<br />

(http://www.isqa.unomaha.edu/wolcott/tutorials/erwin/erwin.html)<br />

6.2.4 On-Line: Normalization Overview<br />

(http://www.troubleshooters.com/littstip/ltnorm.html)<br />

6.2.5 On-Line: Normalization beyond 3NF<br />

(http://www.utexas.edu/cc/database/datamodeling/rm/rm8.html)<br />

-245-


6.2.6 On-Line: The Interface Hall <strong>of</strong> Shame (http://www.iarchitect.com/shame.htm)<br />

6.2.7 On-Line: No<strong>of</strong>ace - in search <strong>of</strong> the post-PC interface (http://www.no<strong>of</strong>ace.net/)<br />

6.2.8 Special On-Line Reading: The Undead<br />

(http://www.wired.com/wired/archive/7.03/punchcards_pr.html)<br />

6.2.9 On-Line: Applicability <strong>of</strong> ISO 9001 to S<strong>of</strong>tware Development<br />

(http://www.tantara.ab.ca/iso90003.htm)<br />

6.2.10 On-Line: DevX - A s<strong>of</strong>tware developer resource portal (http://www.devx.com/)<br />

6.2.11 On-Line: High tech's missionaries <strong>of</strong> sloppiness - A great article on the need for<br />

s<strong>of</strong>tware quality.<br />

(http://www.salon.com/tech/feature/2000/12/06/bad_computers/index.html)<br />

6.2.12 On-Line: Implementation Pitfalls & Lessons (PDF file)<br />

(http://www.acu.ac.uk/chems/onlinepublications/930916507.pdf)<br />

6.2.13 On-Line: Mother Earth Mother Board, Neal Stephenson's lengthy chronicle <strong>of</strong> the<br />

laying <strong>of</strong> the longest wire on Earth.<br />

(http://www.wired.com/wired/archive/4.12/ffglass.html)<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional handouts may be used when deemed necessary by the instructor.<br />

6.4 Current bibliography <strong>of</strong> resources for student’s information.<br />

None.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 9<br />

Networking and telecommunications 3<br />

Modern programming language 3<br />

Analysis and Design 33<br />

Data management 1.5<br />

Role <strong>of</strong> IS in Organizations 12<br />

8.0 Oral and Written Communications:<br />

As part <strong>of</strong> the group term project, all students contribute to the submission <strong>of</strong> 5 written reports<br />

(not including exams, tests, quizzes, or commented programs) to typically 15-45 pages. In<br />

addition, all students participate in 2 oral presentations <strong>of</strong> typically 10 and 25 minutes respective<br />

duration.<br />

9.0 Social and Ethical Issues:<br />

-246-


The concept <strong>of</strong> ethical behavior in the role as system developer is discussed throughout.<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

No coverage<br />

11.0 Problem analysis:<br />

Students will continue their analysis <strong>of</strong> a real-world organization’s information system needs.<br />

Students will review systems design and development options so as to develop an appropriate<br />

systems solution for the target organization.<br />

12.0 Solution design:<br />

Students will use the theory and established practices <strong>of</strong> information systems design to develop a<br />

database design, a user interface design, a systems security and controls design, an application<br />

process design, a network design (if needed), as well as a complete set <strong>of</strong> systems and end user<br />

documentation for the real-world organization for which they undertake their systems<br />

development project.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

10/3/02 Initial ABET version van Vliet<br />

6/25/03 ABET cleanup Wolcott<br />

9/13/07 Document updated as needed Van Vliet<br />

10/12/2008 Updated Section 8.0 to more accurately Van Vliet<br />

reflect course administration<br />

-247-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4120<br />

Course Title<br />

Information Systems Design & Implementation<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Complete the development <strong>of</strong> the<br />

projects started in the previous semester<br />

in ISQA 4110.<br />

Be able to successfully design and<br />

construct a s<strong>of</strong>tware application.<br />

Be able to critically assess systems<br />

development alternatives.<br />

Be able to develop high quality systems<br />

documentation.<br />

S S S S S S S S S X<br />

S S S S X X S S S<br />

S S S S X S S X<br />

S X S S S X<br />

-248-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-249-


-250-


ISQA 4150 Advanced Statistical Methods for IS&T<br />

Department and Course Number ISQA 4150<br />

Course Title<br />

Advanced Statistical Methods for IS&T<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 03/31/09<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course emphasizes the application and interpretation <strong>of</strong> statistical methods including<br />

design <strong>of</strong> experiments, analysis <strong>of</strong> variance, multiple regression, and nonparametric<br />

procedures and the use <strong>of</strong> statistical computer packages. The intent is to develop<br />

quantitative abilities needed for quantitatively intensive jobs and for advanced study in<br />

management information systems, computer science and information technology.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to study<br />

advanced topics pertaining to the application <strong>of</strong> statistics. It is one <strong>of</strong> elective courses for<br />

undergraduates who wish to pursue Knowledge Engineering and Decision Support Track<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 CIST 2500 Introduction to Applied Statistics for IS&T<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Statistics in information science and technology including such topics as<br />

descriptive statistical measures, probability, discrete probability, sampling,<br />

estimation analysis, hypothesis testing, regression, and analysis <strong>of</strong> variance.<br />

1.4.2 A well-known computer package (e.g. SAS) will be used to support the problemsolving<br />

process.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Understand advanced statistical analysis and how to apply them in real life situation.<br />

2.2 Understand the sampling survey and how to collect the data, design the appropriate<br />

experimental design.<br />

-251-


3.0 Content and Organization:<br />

3.1 Review some topics from CIST2500 3<br />

3.2 Inferences about Population Variances 3<br />

3.3 Analysis <strong>of</strong> Variance and Experimental Design 6<br />

3.4 Simple Linear Regression 6<br />

3.5 Multiple Regression 6<br />

3.6 Regression Analysis: Model Building 3<br />

3.7 Tests <strong>of</strong> Goodness <strong>of</strong> Fit and Independence 3<br />

3.8 Nonparametric Statistics 6<br />

3.9 Sampling Survey 4<br />

3.10 Forecasting 4<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

Contact hours<br />

A combination <strong>of</strong> faculty and student lectures on textbook and journal research.<br />

4.2 Student role in the course.<br />

Students will attend the lectures, participate in discussions, complete projects and<br />

homework.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Students complete computer projects and homework.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

Projects 62.5%<br />

Homework 25.0%<br />

Attendance &Participation 12.5%<br />

-252-


5.3 Grading scale and criteria.<br />

Points Grade<br />

98 – 100% A+<br />

90 – 97% A<br />

87 – 89% A-<br />

84 – 86% B+<br />

80 – 83% B<br />

77 – 79% B-<br />

74 – 76% C+<br />

70 – 73% C<br />

67 – 69% C-<br />

64 – 66% D+<br />

60 – 63% D<br />

57 – 59% D-<br />


7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language 10<br />

Analysis and Design 6<br />

Data management 3<br />

Role <strong>of</strong> IS in Organizations 7<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___6__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically _10____ pages and to make ___1__ oral<br />

presentations <strong>of</strong> typically __15___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage.<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

Hours<br />

10.1 Simple Linear Regression 6<br />

10.2 Multiple Regression 6<br />

10.3 Regression Analysis: Model Building 3<br />

10.4 Tests <strong>of</strong> Goodness <strong>of</strong> Fit and Independence 3<br />

10.5 Nonparametric Statistics 6<br />

10.6 Forecasting. 4<br />

11.0 Problem analysis:<br />

Students as a team will study and analyze an organization, preferably their workplace. They use<br />

a sampling survey to collect the data in the areas <strong>of</strong> product quality, service quality, and<br />

information quality in order to pinpoint the areas <strong>of</strong> inefficiency.<br />

-254-


12.0 Solution design:<br />

Student design the appropriate experimental design using statistical models and a well known<br />

statistical s<strong>of</strong>tware such as SAS or MINITAB. Then the appropriate conclusions will be drawn from<br />

the results for a better decision-making.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

Spring Initial ABET version<br />

Najjar<br />

2003<br />

11/6/2002 Change <strong>of</strong> title from “Cases in Applied Najjar<br />

Statistics” to “Advanced Statistical<br />

Methods for IS&T”<br />

6/25/03 ABET cleanup Wolcott<br />

7/10/03 Change title & course description –<br />

Course Change Form – 12-6-02<br />

Wild Update course description and<br />

title to reflect focus <strong>of</strong> class<br />

03/31/09 Change title & course description –<br />

Course Change Form – 06/25/03<br />

Najjar Update course description and<br />

added bibliography<br />

-255-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4150<br />

Course Title<br />

Advanced Statistical Methods for IS&T<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand advanced statistical analysis<br />

and how to apply them in real life<br />

situation.<br />

Understand the sampling survey and how<br />

to collect the data, design the<br />

appropriate experimental design.<br />

X X X<br />

S<br />

S<br />

-256-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-257-


-258-


ISQA 4180 Electronic Commerce<br />

Department and Course Number ISQA 4180<br />

Course Title<br />

Electronic Commerce<br />

Course Coordinator<br />

Sajda Qureshi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 6/8/09<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course will <strong>of</strong>fer a critical examination <strong>of</strong> issues, technologies, standards, and business<br />

and social implications <strong>of</strong> electronic commerce in cyberspace. Some key topics will include<br />

history <strong>of</strong> the Internet, managing electronic commerce funds transfer, reinventing the future<br />

<strong>of</strong> business through electronic commerce, business opportunities in electronic commerce,<br />

electronic commerce Web site design, social, political and ethical issues associated with<br />

electronic commerce, and business plans for technology ventures. The fundamental goal <strong>of</strong><br />

this course is to educate a new generation <strong>of</strong> managers, planners, analysts, and programmers<br />

<strong>of</strong> the realities and potential for electronic commerce.<br />

1.2 For whom course is intended.<br />

This course is intended for students who wish to know the realities and potential for<br />

electronic commerce. It is one <strong>of</strong> elective courses for the Bachelor <strong>of</strong> Science in MIS degree.<br />

The fundamental goal <strong>of</strong> this course is to educate a new generation <strong>of</strong> managers, planners,<br />

analysts, and programmers <strong>of</strong> the realities and potential for electronic commerce.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 ISQA 3400 or equivalent.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 To learn about Electronic Commerce concepts and business models;<br />

2.2 To familiarize individuals with current and emerging Electronic Commerce technologies;<br />

2.3 To be able to apply electronic commerce practices by producing and presenting an e-business<br />

plan, and create a web site for a client organization.<br />

3.0 Content and Organization:<br />

Contact time<br />

-259-


3.1 Introduction to Electronic Commerce 6<br />

3.2 The Internet and the Web: infrastructure for Electronic Commerce 3<br />

3.3 Web-based tools for Electronic Commerce 3<br />

3.4 Electronic Commerce s<strong>of</strong>tware 3<br />

3.5 Security threats to Electronic Commerce 3<br />

3.6 Implementing security for Electronic Commerce 3<br />

3.7 Electronic payment systems 2<br />

3.8 Strategies for marketing, sales, and promotion 6<br />

3.9 Strategies for purchasing and support activities 6<br />

3.10 Strategies for Web auctions, virtual communities and Web portals 3<br />

3.11 International, legal, ethical and tax issues 3<br />

3.12 Implementing Electronic Commerce 3<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures and in-class discussions. A problem based<br />

learning approach is used through which students will 1) learn electronic commerce concepts<br />

and business models, 2) apply these in case study situations and 3) explain and resolve<br />

electronic commerce related issues through a problem solving process.<br />

4.2 Student role in the course.<br />

Students must complete all course requirements including, projects, discussions, and exams<br />

by their deadlines and to the satisfaction <strong>of</strong> the instructor. Students will work out several inclass<br />

and out-<strong>of</strong>-class exercises individually and in groups. Students must come prepared<br />

with the assigned readings so that students can initiate and participate in meaningful<br />

discussions.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Grades conform to the degree to which each <strong>of</strong> the requirements stressed in class is met in<br />

the various assignments and projects. To be eligible for a passing grade in the class, a student<br />

must complete all course requirements including, in-class assignments, homework, projects,<br />

discussions, and exams by their deadlines and to the satisfaction <strong>of</strong> the instructor.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

-260-


Your final grade is based on the percentage <strong>of</strong> points that you receive out <strong>of</strong> the total possible<br />

points for the course. A curve may be used to scale the entire class higher, if necessary, but<br />

scaling down will not be done.<br />

Component<br />

Grading<br />

Individual Assignments (case analysis) 40%<br />

Group Term Project (Proposal, E-business plan and commercial web site) 40%<br />

Group Project Presentation (Peer evaluation ) 10%<br />

Class Participation 10%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

98-100% A+<br />

92-97% A<br />

90-91% A-<br />

86-89% B+<br />

82-85% B<br />

80-81% B-<br />

76-79% C+<br />

72-75% C<br />

70-71% C-<br />

66-69% D+<br />

62-65% D<br />

60-61% D-<br />


6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 6<br />

Networking and telecommunications 6<br />

Modern programming language<br />

Analysis and Design 6<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 18<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __3___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __5-10___ pages and to make _1____ oral presentations <strong>of</strong> typically<br />

__15-20___ minutes duration. Include only material that is graded for grammar, spelling, style, and so<br />

forth, as well as for technical content, completeness, and accuracy.<br />

8.1 Two case analysis assignments: every student will complete a paper with 5 single-spaced pages or<br />

10 double-spaced pages (maximum).<br />

8.2 One Web site analysis project (group)<br />

8.3 One e-business plan and Web site project (group): every group will complete the business plan,<br />

the Web site implementation and the presentation lasting 20 minutes followed by a ten-minute<br />

question and answer session (All members <strong>of</strong> the group are expected to actively participate in the<br />

presentation.).<br />

9.0 Social and Ethical Issues:<br />

The course will cover international, legal, ethical and tax issues related to Electronic Commerce. Three (3)<br />

hours will be spent on the topic. The student in the course will be graded on their understanding <strong>of</strong> the<br />

topic in test questions.<br />

10.0 Theoretical content:<br />

The course deals with various concepts and terms <strong>of</strong> Electronic Commerce (12 contact hours).<br />

11.0 Problem analysis:<br />

Students learn to analyze issues, technologies, standards, and business and social implications <strong>of</strong><br />

electronic commerce in cyberspace. In topical analysis assignments, students will analyze current EC<br />

news events by applying/integrating concepts, models, and terminology learned in the chapters specified<br />

on the syllabus and related class discussion. In the case analysis assignment, students will analyze a<br />

"problem solving approach" or “educational ”case . In the Web site analysis project, students will analyze<br />

Web sites with two categories <strong>of</strong> criteria: the technical dimension and business evaluation. In the e-<br />

-262-


usiness plan and Web site project (group), every group will assess a client firm (or develop their own<br />

business) user needs, develop an e-business plan, and implement it in the form <strong>of</strong> a commercial Web site.<br />

12.0 Solution design:<br />

In the e-business plan and Web site project (group), every group will develop an e-business plan, and<br />

implement it in the form <strong>of</strong> a commercial Web site.<br />

CHANGE HISTORY<br />

Date Change By Whom Comments<br />

10/28/02 Initial ABET version Qureshi<br />

August<br />

2002<br />

Removed section on “Strategies for marketing, sales,<br />

and promotion”<br />

Sajda<br />

Qureshi<br />

Students do not have<br />

the background to be<br />

able to conduct a<br />

January<br />

2003<br />

January<br />

2003<br />

January<br />

2003<br />

Grade Weights: Class Participation weight reduced to<br />

5% and Peer evaluation made part <strong>of</strong> the Group Project<br />

grade. More weight has been given to the website<br />

analysis project. These changes are reflected in this<br />

course outline.<br />

Books: Saloner, G and A.M. Spence "Creating and<br />

Capturing Value. Perspectives and cases on Electronic<br />

Commerce". Wiley and Sons (2002) made required text<br />

along with Laudon and Travers (2002).<br />

Course outline: Changed the order <strong>of</strong> material: moved<br />

eCommerce models, technologies, infrastructure,<br />

Customer Relationship Management, Supply Chain<br />

Management, collaborative commerce, eMarkets,<br />

portals and auctions, and virtual communities to the<br />

first part <strong>of</strong> the course (weeks 1-9). Security, Electronic<br />

Payment Systems, Ethical Social and Political issues to<br />

the second part (weeks 10-15).<br />

-263-<br />

Sajda<br />

Qureshi<br />

Sajda<br />

Qureshi<br />

Sajda<br />

Qureshi<br />

6/25/03 ABET cleanup Wolcott<br />

January Pedagogy: Added hands on class exercises and incompany<br />

Qureshi<br />

2004<br />

projects<br />

August Content: Developed additional hands on class exercises Qureshi<br />

2004 and web assessment activities<br />

January<br />

2005<br />

Qureshi<br />

January<br />

2006<br />

Evaluation: Separated assignments for graduate and<br />

undergraduate component to reflect separate<br />

assessment<br />

Course Outline: Updated course content with class<br />

exercises involving eCommerce companies such as Ali<br />

Baba.<br />

Qureshi<br />

market analysis<br />

These weights more<br />

accurately reflect<br />

effort.<br />

Material from Saloner<br />

and Spence (2002) is<br />

used for assignments,<br />

exams and class<br />

discussion.<br />

Students need to<br />

understand and apply<br />

the specific material<br />

first.<br />

The groups remain<br />

comprised <strong>of</strong> graduate<br />

and undergraduate<br />

students to enhance<br />

learning.<br />

Students appear to<br />

learn better when they<br />

can see the


January<br />

2007<br />

January<br />

2008<br />

January<br />

2009<br />

Course content: Replaced SAP case with the Google<br />

case.<br />

Pedagogy: Conducted Teaching Assessment By<br />

Students. Changed format and delivery to reflect need<br />

for more hands on templates and assistance with<br />

students’ disposition.<br />

Course content: Created and used rubrics for all<br />

assignments. Made only one case compulsory for the<br />

undergraduate students. The second case and website<br />

assessment are <strong>of</strong>fered as extra credit.<br />

Qureshi<br />

Qureshi<br />

Qureshi<br />

components <strong>of</strong> the<br />

business online.<br />

The Google case also<br />

enables the legal and<br />

ethical concerns in<br />

eCommerce to be<br />

addressed.<br />

The templates<br />

increased the use <strong>of</strong><br />

class time to enhance<br />

learning.<br />

These changes were<br />

made to address the<br />

high workload that the<br />

students were facing.<br />

-264-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4180<br />

Course Title<br />

Electronic Commerce<br />

Course Coordinator<br />

Sajda Qureshi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

To learn about Electronic Commerce<br />

concepts and business models;<br />

To familiarize individuals with current and<br />

emerging Electronic Commerce<br />

technologies;<br />

To be able to apply electronic commerce<br />

practices by producing and presenting an<br />

e-business plan, and create a web site for<br />

a client organization.<br />

X<br />

X<br />

S X X S X<br />

S<br />

-265-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-266-


ISQA 4190 Process Reengineering with Information Technology<br />

Department and Course Number ISQA 8196<br />

Course Title<br />

Process Reengineering with Information Technology<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 03/31/09<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Business process reengineering issues are examined. Reengineering concepts and methods<br />

are introduced. Additional special project(s) are required. SAP will be introduced.<br />

1.2 For whom course is intended.<br />

This course is intended for students in management information systems, business or<br />

computer science who are interested in the use <strong>of</strong> technology to improve organizational<br />

efficiency and effectiveness.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 2500 Introduction to Applied Statistics for IS&T<br />

1.3.2 ISQA 4110 Information Systems Analysis or equivalent.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics):<br />

1.4.1 Introductory statistics<br />

1.4.2 principles <strong>of</strong> information systems analysis<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives:<br />

2.1 Understand the concept <strong>of</strong> cultural requirements for an organization to begin a process<br />

improvements<br />

2.2 Understand the concept <strong>of</strong> Total Quality Management<br />

2.3 Understand the concept <strong>of</strong> Benchmarking<br />

2.4 Understand the concept <strong>of</strong> Statistical Process Control<br />

2.5 Understand reengineering design<br />

2.6 Understand Process reengineering practices for IT enabled change<br />

2.7 Understand the process whereby process reengineering is accepted and supported throughout<br />

the organization<br />

2.8 Get familiar with SAP to integrate with the process improvements<br />

-267-


3.0 Content and Organization:<br />

List <strong>of</strong> topics to be covered in chronological sequence<br />

Contact Hours<br />

3.1 Quick Reference Guide to Process Redesign 1<br />

3.2 Process Management 1<br />

3.3 Leadership 1<br />

3.4 Organizational Assessment 1<br />

3.5 Define and Classify Process 1<br />

3.6 Identify Core Process 1<br />

3.7 Measure Performance 2<br />

3.8 Statistical Process Control 2<br />

3.9 Measure Efficiency 2<br />

3.10 Understanding the Customer 1<br />

3.11 Document Process 1<br />

3.12 Assesses the Process 2<br />

3.13 Planning the Improvement 1<br />

3.14 Continuous Improvement 1<br />

3.15 Understanding BPR for e-Business 1<br />

3.16 How To Redesign Enterprise Process with BPR s<strong>of</strong>tware 1<br />

3.17 Business process Modeling with BPR s<strong>of</strong>tware 1<br />

3.18 Analysis and Redesign <strong>of</strong> an Enterprise Process 1<br />

3.19 Designing Collaborative Supply Chain Processes for e-Business 1<br />

3.20 IT Integration Options for e-Business Processes 1<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used<br />

The primary teaching method will be discussion, case studies, lecture, guest speakers,<br />

using SAP, and demonstration.<br />

4.2 Student role in the course<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned projects and papers, and complete required examinations.<br />

4.3 Contact hours<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

-268-


5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Participation in class discussion:<br />

The students are required to prepare a discussion outline for the readings that has been assigned<br />

each week. The discussions outlines will be counted toward the class participation part <strong>of</strong> your<br />

grade. Please use a word processor to create your outlines.<br />

Exams:<br />

Three one-hour exams will be given covering the assigned readings, lectures, and in class<br />

discussion. The exams will not be cumulative.<br />

Presentations:<br />

Students are required to select a current journal article from the referred literature such as CAIS<br />

(online), JAIS (online), Communications <strong>of</strong> the ACM (digital library), IEEE (digital library), etc. The<br />

article must address some aspect <strong>of</strong> IT Process Reengineering. Students have to prepare a<br />

PowerPoint presentation <strong>of</strong> their articles for the class.<br />

Projects:<br />

Students are expected to select a process for reengineering. Using the tools and techniques<br />

taught in class they will describe the original process using process drawings and redesign the old<br />

processes for greater efficiency. Students will be looking for the elimination <strong>of</strong> paper, steps,<br />

useless processes, etc. They will create a reengineered process and a list <strong>of</strong> the costs savings and<br />

the productivity gains (quantified in dollars and hours) obtained from your process reengineering<br />

work.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Exam 1 100<br />

Exam 2 100<br />

Exam 3 100<br />

Assignments 100<br />

Journal Article Presentation 50<br />

Process Reengineering Project 100<br />

Class Participation 50<br />

-269-


Total 600<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

92-96% A<br />

90-91% A-<br />

86-89% B+<br />

82-85% B<br />

80-81% B-<br />

76-79% C+<br />

72-75% C<br />

70-71% C-<br />

66-69% D+<br />

62-65% D<br />

60-61% D-<br />


journals that are relevant to topics in systems analysis and design. The process<br />

is particularly important in keeping current with technology and new<br />

methodologies.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design 10<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 10<br />

8.0 Oral and Written Communication<br />

Every student is required to submit at least __3__ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically ___5__ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as<br />

well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues<br />

9.1 Emphasis on open and honest communication.<br />

9.2 Emphasis on understanding and honestly communicating and managing the impact and disruption<br />

to the organization<br />

9.3 Emphasis on the customers needs both explicit and requirements and implicit.<br />

9.4 Emphasis on accurate and consistent project tracking and reporting to management.<br />

10.0 Theoretical Content Hours<br />

10.1 Salience determination 3<br />

11.0 Problem Analysis<br />

11.1 Work flow analysis<br />

11.2 Analysis for redundancy, and unproductive and wasteful processes<br />

12.0 Solution Design<br />

Redesign organizational processes<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

11/11/02 Initial ABET version Dufner<br />

6/25/03 ABET cleanup Wolcott<br />

-271-


7/10/03 Change prerequisites – Course Change<br />

Form – 5-15-03<br />

11/22/05 Change prerequisites – Course Change<br />

Form – 7/10/03<br />

03/31/09 Change prerequisites – Course Change<br />

Form – 11/22/05<br />

Wild<br />

Najjar<br />

Najjar<br />

Update course prerequisites<br />

Update course prerequisites,<br />

Changing the text, and integration <strong>of</strong><br />

the course with SAP.<br />

Update course prerequisites and<br />

added Bibliography.<br />

-272-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4190<br />

Course Title<br />

Process Reengineering with Information Technology<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the concept <strong>of</strong> cultural<br />

requirements for an organization to begin<br />

a process improvements<br />

Understand the concept <strong>of</strong> Total Quality<br />

Management<br />

Understand the concept <strong>of</strong> Benchmarking<br />

Understand the concept <strong>of</strong> Statistical<br />

Process Control<br />

Understand reengineering design<br />

Understand Process reengineering<br />

practices for IT enabled change<br />

Understand the process whereby process<br />

reengineering is accepted and supported<br />

through out the organization<br />

Get familiar with SAP to integrate with<br />

the process improvements<br />

X<br />

X<br />

S<br />

X<br />

S<br />

S<br />

S<br />

S<br />

X X S S<br />

X S X<br />

-273-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-274-


ISQA 4200 Information and Data Quality Management<br />

Department and Course Number ISQA 4200<br />

Course Title<br />

Information and Data Quality Management<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 03/10/06<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course introduces the role and importance <strong>of</strong> data quality and information quality in<br />

databases and data warehouses. The intent <strong>of</strong> the course is to provide students with the concepts<br />

and tools necessary to effectively manage information and data quality .In particular, the course<br />

examines the various roles, responsibilities, and skills essential to manage databases and data<br />

warehouses.<br />

1.2 For whom course is intended.<br />

The course is intended for undergraduate students in Information Systems, Computer Science and<br />

related areas who are interested in managing information and data quality for better decision<br />

making.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 2500<br />

1.3.2 ISQA 3310<br />

1.4 Prerequisites <strong>of</strong> the course (Topics):<br />

1.4.1 Introductory statistics<br />

1.4.2 Managing the Data Base Environment<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None.<br />

2.0 Objectives:<br />

2.1 Develop in-depth understanding <strong>of</strong> Data and Information Quality (DQ and IQ)<br />

2.2 Understand and use DQ and IQ Concepts in Information Systems projects<br />

2.3 Be able to recognize various patterns <strong>of</strong> Data and Design Deficiencies in Systems<br />

2.4 Be able to suggest appropriate DQ and IQ improvement plans in light <strong>of</strong> known deficiencies in<br />

systems<br />

-275-


2.5 Develop an understanding <strong>of</strong> the role and importance <strong>of</strong> DQ and IQ in databases and Data<br />

warehouses<br />

2.6 Be able to discuss the role and importance <strong>of</strong> DQ in DSS<br />

3.0 Content and Organization:<br />

List <strong>of</strong> topics to be covered in chronological sequence<br />

3.1 Principles <strong>of</strong> information quality improvement<br />

Contact Hours<br />

3.1.1 Supplement (TQM) 1<br />

3.1.2 The high costs <strong>of</strong> low quality data 1<br />

3.1.3 Defining information quality 2<br />

3.1.4 Applying quality management principles to information 3<br />

3.2 Processes for improving information quality<br />

3.2.1 An overview <strong>of</strong> total quality data management 4<br />

3.2.2 Assigning data definition and information architecture quality 5<br />

3.2.3 Supplement (SPC) 4<br />

3.2.4 Information quality assessment 5<br />

3.2.5 Measuring nonquality information costs 5<br />

3.2.6 Information product improvement: data reeingineering<br />

and cleansing 4<br />

3.2.7 Improving information process quality: data defect prevention 6<br />

3.2.8 Information quality tools and techniques 5<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used<br />

The primary teaching methods will include class discussion, case study, lecture, and guest<br />

speakers.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned projects and papers, and complete required examinations.<br />

4.3 Contact hours<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

-276-


5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

5.1.1 Assignments<br />

5.1.2 Team Presentations: In teams <strong>of</strong> 2-3 members students are required to research a<br />

contemporary issue facing the information quality systems<br />

5.1.3 Mid-Term Examination<br />

5.1.4 Final Examination<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable<br />

5.2.1 Assignments (20%)<br />

5.2.2 Team Presentations: In teams <strong>of</strong> 2-3 members students are required to research a<br />

contemporary issue facing the information quality systems (20%)<br />

5.2.3 Mid-Term Examination (25%)<br />

5.2.4 Final Examination (25%)<br />

5.2.5 Participation (10%)<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

92-96% A<br />

90-91% A-<br />

86-89% B+<br />

82-85% B<br />

80-81% B-<br />

76-79% C+<br />

72-75% C<br />

70-71% C-<br />

66-69% D+<br />

62-65% D<br />

60-61% D-<br />


Additional articles that have been collected for various topics are available at the UNO Library.<br />

These articles are used to supplement topics presented in various chapters.<br />

6.3 Other sources for gathering information or equivalent<br />

Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />

relevant to DQ/IQ topics.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design<br />

Data management 17<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communication<br />

Every student is required to submit at least __3__ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically ___5__ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues<br />

9.1 Emphasis on open and honest communication.<br />

9.2 Emphasis on understanding and honestly communicating and managing the impact and disruption<br />

to the organization<br />

9.3 Emphasis on the customer’s needs both explicit and requirements and implicit.<br />

9.4 Emphasis on accurate and consistent project tracking and reporting to management.<br />

10.0 Theoretical Content Hours<br />

10.1 Salience determination 3<br />

11.0 Problem Analysis<br />

11.1 Work flow analysis<br />

11.2 Analysis for redundancy, and unproductive and wasteful processes<br />

12.0 Solution Design<br />

12.1 Redesign organizational processes<br />

-278-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

03/10/06 Initial ABET version Najjar<br />

ABET cleanup<br />

Wolcott<br />

-279-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4200<br />

Course Title<br />

Information and Data Quality Management<br />

Course Coordinator<br />

Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Develop in-depth understanding <strong>of</strong> Data<br />

and Information Quality (DQ and IQ)<br />

Understand and use DQ and IQ Concepts<br />

in Information Systems projects<br />

Be able to recognize various patterns <strong>of</strong><br />

Data and Design Deficiencies in Systems<br />

Be able to suggest appropriate DQ and IQ<br />

improvement plans in light <strong>of</strong> known<br />

deficiencies in systems<br />

Develop an understanding <strong>of</strong> the role and<br />

importance <strong>of</strong> DQ and IQ in databases<br />

and Data warehouses<br />

Be able to discuss the role and<br />

importance <strong>of</strong> DQ in DSS<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

S<br />

X X S<br />

S S S X<br />

X<br />

S<br />

X<br />

X<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

-280-


3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-281-


-282-


ISQA 4300 Database Administration<br />

Department and Course Number ISQA 4300<br />

Course Title<br />

Database Administration<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/3/07<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course is designed to give students an applied, practical introduction to database<br />

administration. Students will gain an understanding <strong>of</strong> the functioning <strong>of</strong> a database management<br />

system and its relationship to the computing environment in which it runs. They will learn the<br />

concepts, principles, and techniques necessary to carry out such functions as database object<br />

creation, storage management, capacity planning, performance tuning, backup and recovery, and<br />

security management. Each semester the course will focus on one commercial DBMS, such as<br />

Oracle.<br />

1.2 For whom course is intended.<br />

The course is intended for upper division undergraduate MIS or CS majors who wish to pursue the<br />

topic <strong>of</strong> database and data administration beyond the level <strong>of</strong> an introductory database course.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 ISQA 3300<br />

1.3.2 ISQA 3310 or CSCI 4850<br />

1.4 Prerequisites <strong>of</strong> the course (Topics)<br />

1.4.1 Relational Model<br />

1.4.2 Structured Query Language (SQL)<br />

1.4.3 Secondary storage & I/O<br />

1.4.4 Indexing<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Understand the roles, issues, and tasks associated with the database administration function.<br />

2.2 Understand computer system and DBMS architecture and how the DBMS stores and maintains<br />

data, executes queries, and performs other data management tasks.<br />

-283-


2.3 Create a variety <strong>of</strong> database objects, such as tablespaces, indexes, and user objects.<br />

2.4 Plan and implement the physical organization <strong>of</strong> a database.<br />

2.5 Understand and use the system catalog in a variety <strong>of</strong> database administration tasks.<br />

2.6 Gather, interpret, and act on database statistics to monitor database activity and tune for<br />

performance.<br />

2.7 Plan and execute backup and recovery activities.<br />

2.8 Secure the database and manage users.<br />

2.9 Develop good database management discipline<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Overview <strong>of</strong> Database Administration 1.5<br />

3.2 System architecture 4.5<br />

3.3 DBMS architecture 3.0<br />

3.4 Data Dictionary 1.0<br />

3.5 Control Files 1.0<br />

3.6 Redo log files 1.0<br />

3.7 Basic Storage Concepts 4.5<br />

3.8 Database object creation 4.5<br />

3.9 Concurrency Control and Lock management 6.0<br />

3.10 Query processing 1.5<br />

3.11 User administration and security 3.0<br />

3.12 Managing Data with exports, imports, and loading 1.5<br />

3.13 Network services 1.5<br />

3.14 Performance monitoring and tuning 3.0<br />

3.15 Backup & recovery 3.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lecture, in-class demonstrations, and in-class<br />

exercises<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstration, participate in discussion on assigned<br />

readings, complete assigned projects, and complete required examinations<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

-284-


5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will complete a sequence <strong>of</strong> assignments desired to provide hands-on exposure to<br />

the topics discussed in class, and take two examinations.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Component Grading<br />

Exams 35%<br />

Assignments 60%<br />

Participation 5%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

6.1.1 Watson, J. 2008. OCA Oracle Database 11g: Administration I Exam Guide. McGraw-Hill.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Greenwald, R., Stackowiak, R., and Stern, J. 2008. Oracle Essentials: Oracle Database 11g.<br />

Sebastopol, CA: O'Reilly Media, Inc.<br />

6.2.2 Powell, G., and McCullough-Dieter, C. 2007. Oracle 10g Database Administrator:<br />

Implementation & Administration. Boston, MA: Thomson Course Technology.<br />

6.2.3 Loney, K. and Bryla, B. Oracle Database 10g DBA Handbook, Oracle Press, 2005.<br />

6.2.4 Whalen, E. Oracle Database 10g Linux Administration, Oracle Press, 2005.<br />

-285-


6.3 Other sources <strong>of</strong> information.<br />

6.3.1 Oracle Technet: http://technet.oracle.com<br />

6.3.2 http://pipetalk.revealnet.com/~dba<br />

6.3.3 http://www.lazydba.com/<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

6.4.1 Bryla, Bob, and Kevin Loney. Oracle Database 11g Dba Handbook: The McGraw-Hill<br />

Companies, Inc., 2008.<br />

6.4.2 Fernandez, Iggy. Beginning Oracle Database 11g Administration: From Novice to<br />

Pr<strong>of</strong>essional: Apress, 2008.<br />

6.4.3 Afyouni, H.A. Database Security and Auditing: Protecting Data Integrity and Accessibility,<br />

Thomson Course Technology, Boston, MA, 2006.<br />

6.4.4 Morris-Murphy, L.L. Oracle9i Database Administrator II: Backup/Recovery & Network<br />

Administration, Thomson Course Technology, Boston, 2004.<br />

6.4.5 Oracle Security Handbook, by Marlene Theriault & Aaron Newman, Osborne/McGraw-<br />

Hill, 2001.<br />

6.4.6 Sharma, V. Bitmap Index vs. B-tree Index: Which and When?, Oracle Corp., 2005.<br />

http://www.oracle.com/technology/pub/articles/sharma_indexes.html, Current<br />

September 27, 2005.<br />

6.4.7 Morrison, J., Morrison, M. and Conrad, R. Guide to Oracle10g, Thomson Course<br />

Technology, Boston, 2006.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission Category Content (class time in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 27<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design<br />

Data management 15<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __0___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically _____ pages and to make ___0__ oral presentations <strong>of</strong> typically _____<br />

minutes duration. Include only material that is graded for grammar, spelling, style, and so forth, as well as<br />

for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage.<br />

-286-


10.0 Theoretical content:<br />

This course deals mostly with physical, not logical design, and includes a number <strong>of</strong> topics included in<br />

IS’97 Information Systems Theory and Practice:<br />

10.1 Implementation and evaluation <strong>of</strong> system performance 3<br />

10.2 Theory <strong>of</strong> concurrency control 4.5<br />

11.0 Problem analysis:<br />

Students learn to analyze the state <strong>of</strong> the database in three areas in particular: storage management,<br />

user administration, and performance management. In storage management, students learn to<br />

determine the placement <strong>of</strong> database objects within data files in order to be able to detect fragmentation<br />

<strong>of</strong> files and <strong>of</strong> database objects. In user administration, students learn to identify the privileges given to<br />

users to detect potential security issues. In performance management, students learn about key<br />

performance indicators and a process for isolating and resolving performance problems.<br />

12.0 Solution design:<br />

Students learn to make and implement a variety <strong>of</strong> physical design decisions, including: creation <strong>of</strong><br />

tablespaces and files <strong>of</strong> appropriate size with appropriate storage allocation patterns, determination <strong>of</strong><br />

block structure for tables and indexes, and creation <strong>of</strong> indexes. Students also learn to determine an<br />

appropriate basket <strong>of</strong> privileges for various types <strong>of</strong> users.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

5/21/02 Initial ABET version Wolcott<br />

6/25/03 ABET cleanup Wolcott<br />

10/3/07 Updated resource material<br />

Wolcott<br />

Minor updates to content & organization<br />

9/30/08 Update <strong>of</strong> the reading list & reference list Wolcott<br />

-287-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4300<br />

Course Title<br />

Database Administration<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the roles, issues, and tasks<br />

associated with the database<br />

administration function.<br />

Understand computer system and DBMS<br />

architecture and how the DBMS stores<br />

and maintains data, executes queries,<br />

and performs other data management<br />

tasks.<br />

Create a variety <strong>of</strong> database objects, such<br />

as tablespaces, indexes, and user objects.<br />

Plan and implement the physical<br />

organization <strong>of</strong> a database.<br />

Understand and use the system catalog in<br />

a variety <strong>of</strong> database administration<br />

tasks.<br />

Gather, interpret, and act on database<br />

statistics to monitor database activity and<br />

tune for performance.<br />

Plan and execute backup and recovery<br />

X<br />

X<br />

S<br />

S S S<br />

X<br />

S<br />

X<br />

-288-


activities.<br />

Secure the database and manage users.<br />

X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-289-


-290-


ISQA 4380 Distributed Technologies and Systems<br />

Department and Course Number ISQA 4380<br />

Course Title<br />

Distributed Technologies and Systems<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/09/2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

The course introduces students to concepts, issues and tools needed to develop distributed<br />

computing systems. Topics include distributed systems architecture, middleware, Internet-based<br />

systems development, security and performance. Hands-on systems development using current<br />

technologies is provided.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to study topics<br />

pertaining to the client/server environment. It is the capstone course course for the I-Business<br />

Application Development & Management concentration.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 ISQA 3400 - Business Data Communications<br />

1.3.2 ISQA 3310 - Managing the Data Base Environment<br />

1.3.3 ISQA 3210 - Advanced Technology for Personal Productivity<br />

1.3.4 CSCI 2850 - Programming on the Internet or equivalent<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 OSI reference model<br />

1.4.2 TCP/IP<br />

1.4.3 HTTP<br />

1.4.4 HTML<br />

1.4.5 Database design<br />

1.4.6 SQL<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

1.1 Define the terms Distributed Computing System and Internet Technology;<br />

-291-


1.2 Understand the concept <strong>of</strong> Middleware and types <strong>of</strong> middleware s<strong>of</strong>tware;<br />

1.3 Identify distributed computing objects and how they work;<br />

1.4 Develop a modest size web application with access to a database;<br />

1.5 Integrate a web application to available open web services;<br />

1.6 Develop a web service and consume it in a web application;<br />

1.7 Understand the architecture <strong>of</strong> web based systems;<br />

1.8 Describe transaction processing and how it works on the Internet;<br />

1.9 Decribe how businesses integrate with other businesses using modern forms <strong>of</strong> B2B integration<br />

1.10 Describe how to implement a modest size web application.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Overview <strong>of</strong> Client Server and the Internet 1.5<br />

3.2 Distributed System Fundamentals 1.5<br />

3.3 Introduction to Middleware 3.0<br />

3.4 Communications Middleware 3.0<br />

3.5 Database Middleware 3.0<br />

3.6 Web technologies and XML 6.0<br />

3.7 Distributed integration technologies and models 7.0<br />

3.7.1 COM/DCOM/.NET integration models<br />

3.7.2 Java Object and integration models<br />

3.7.3 Web Services<br />

3.7.4 REST/POX and Mashup Integration<br />

3.8 Service Oriented Architecture 5<br />

3.9 PHP 9.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be in-class lectures sample integration problems done in<br />

groups and demonstrations.<br />

4.2 Student role in the course.<br />

Students will attend the class, participate in the in-class discussion, solve integration problems in<br />

class as a group and present results, complete exams, assignments, and projects<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

-292-


5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will complete exams, assignments, and projects.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Components<br />

Grading<br />

Exams 40%<br />

Assignments 35%<br />

Project 22%<br />

Participation 3%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />


6.3 Other sources <strong>of</strong> information.<br />

None<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

6.4.1 R. Gleghorn, Enterprise Application Integration: A Manager’s Perspective, IT Pr<strong>of</strong>essional.<br />

November, 2005, pp 17-23.<br />

6.4.2 F. Leyman, D. Roller and M.Schmidt, Web Services and Business Process Management.<br />

IBM Systems Journal. Vol 41, No 2, 2002. pp 198-211.<br />

6.4.3 D. Margulius, Banking on SOA. Infoworld, July 17th, 2006. Pages 27-31<br />

6.4.4 J. Kobielus, Enterprise Service Bus: Web Services Meet Message-Oriented Middleware.<br />

Business Communications Review. April, 2006. pp 30-36.<br />

6.4.5 K. Braskasan, Websphere Business Integration: An Architectural Overview. Vol 43, No 2,<br />

2005. pp 238-254.<br />

6.4.6 T. Prushman, R. Alt. Process Portals – Architecture and Integration. Proceeding <strong>of</strong> the 37th<br />

Hawaii International Conference onSystems Sciences – 2004. pp 1-10.<br />

6.4.7 Anton Fricko, SOAs Require Culture Change and Service Reuse. Business Communications<br />

Review. May 2006. pp 58-64.<br />

6.4.8 Newcomer, Eric and Lomow, Greg, “Understanding SOA and Web Services” 2007. ISBN: 0-<br />

321-18086-0.<br />

6.4.9 Margolis, Ben, “SOA for the Business Developer” 2007. ISBN: 1-58347-065-4.<br />

6.4.10 Juneja, Girish, et al, “Service Oriented Architecture Demystified” 2007. ISBN: 1-934053-<br />

02-3.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time in<br />

hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 12<br />

Networking and telecommunications 6<br />

Modern programming language 9<br />

Analysis and Design 3<br />

Data management 9<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __1__ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __4-5___ pages and to make ___1__ oral presentations (podcast) <strong>of</strong><br />

typically _10-12____ minutes duration. Include only material that is graded for grammar, spelling, style,<br />

and so forth, as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

-294-


No coverage.<br />

10.0 Theoretical content:<br />

10.1 Distributed Systems Fundamentals 3.0<br />

11.0 Problem analysis:<br />

Hours<br />

The course involves learning to use various middleware and web-development tools. The students are<br />

challenged to apply the tools and techniques to solve specified problems rather than analyze the problem<br />

itself.<br />

12.0 Solution design:<br />

The course will allow students the opportunity to learn some <strong>of</strong> the development tools available for<br />

distributed systems application development. Students will have the opportunity to gain hands-on<br />

experience with some <strong>of</strong> these tools.<br />

-295-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

4/30/02 Updated course content section to<br />

deemphasize scripting and indicate switch<br />

to PHP as an implementation platform<br />

Wolcott<br />

ISQA 3210 covers the scripting<br />

portions well.<br />

10/28/02 ISQA 3210 added as a prerequisite Wolcott Students need to have had exposure<br />

to HTML and some scripting.<br />

10/28/02 Title changed from “Managing the<br />

Client/Server Environment” to “Distributed<br />

Technologies and Systems”<br />

Wolcott “Client/Server” is a somewhat<br />

outdated term. The new title is<br />

general enough to include both<br />

Internet and non-Internet<br />

5/15/03 CSCI 2850 added as a prerequisite. Course<br />

Catalog Management System change for<br />

5/15/03<br />

Wolcott<br />

6/25/03 ABET cleanup Wolcott<br />

7/10/03 ABET cleanup - Prerequisite course titles Wild<br />

added<br />

10/14/07 Updating to include objectives on web Royce<br />

services and service oriented concepts.<br />

Also updated content and organization and<br />

bibliography<br />

10/9/2008 Updated text and references Royce<br />

technologies<br />

CSCI 2850 gives students a start with<br />

PHP, which can be built upon in<br />

ISQA 4380<br />

-296-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4380<br />

Course Title<br />

Distributed Technologies and Systems<br />

Course Coordinator<br />

Peter Wolcott<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Define the terms Distributed Computing<br />

System and Internet Technology<br />

Understand the concept <strong>of</strong> Middleware<br />

and types <strong>of</strong> middleware s<strong>of</strong>tware<br />

Identify distributed computing objects<br />

and how they work<br />

Develop a modest size web application<br />

with access to a database<br />

Integrate a web application to available<br />

open web services<br />

Develop a web service and consume it in<br />

a web application<br />

Understand the architecture <strong>of</strong> web<br />

based systems<br />

Describe transaction processing and how<br />

it works on the Internet<br />

Decribe how businesses integrate with<br />

other businesses using modern forms <strong>of</strong><br />

B2B integration<br />

X<br />

S S X<br />

X X X<br />

S S S S<br />

S S S S<br />

S S S S<br />

X X X X<br />

X X<br />

X X X X<br />

-297-


Describe how to implement a modest size<br />

web application<br />

X<br />

X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-298-


ISQA 4590 IT Audit and Control<br />

Department and Course Number ISQA 4590/ISQA 8596<br />

Course Title<br />

IT Audit and Control<br />

Course Coordinator<br />

Deepak Khazanchi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/1/2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course explores organizational and managerial issues relevant to planning and conducting IT<br />

audit and control activities. The course covers the following conceptual areas: business risks and<br />

the management <strong>of</strong> business risk, IT risk as a component <strong>of</strong> business risk, the need to manage IT<br />

risks, and the basic type <strong>of</strong> controls required in a business system in order to control IT risks.<br />

Issues associated with new risks created by the use <strong>of</strong> the internet for business applications and<br />

electronic business are also covered.<br />

1.2 For whom course is intended.<br />

The course is intended for graduate and undergraduate students (juniors and seniors) in<br />

Information Systems or Business Administration or related areas who have an interest in IT audit<br />

and control issues.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

A solid understanding <strong>of</strong> business foundations such as accounting and introductory auditing and<br />

exposure to the IS discipline is essential for success in this course. Permission <strong>of</strong> instructor is<br />

required to enroll.<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Basic Accounting<br />

1.4.2 Introduction to Auditing<br />

1.4.3 Information Security and Policy<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

List <strong>of</strong> performance objectives stated in terms <strong>of</strong> the student educational outcomes.<br />

2.1 Understand the concept <strong>of</strong> business risks and the management <strong>of</strong> business risk<br />

-299-


2.2 Understand IT risk as a component <strong>of</strong> business risk<br />

2.3 Gain an appreciation <strong>of</strong> the need to manage IT risks<br />

2.4 Gain an understanding <strong>of</strong> the basic type <strong>of</strong> controls required in a business system in order to<br />

control IT risks<br />

2.5 Learn concepts and applications <strong>of</strong> the following types <strong>of</strong> IT controls: top management, system<br />

development, programming, data resource management, database, security, operations<br />

management, quality assurance, boundary controls, and communications.<br />

2.6 Gain an appreciation for the difficulties in assessing systems effectiveness and efficiency.<br />

2.7 Understand the new system control risks created by the use <strong>of</strong> the internet for business<br />

applications and electronic business.<br />

3.0 Content and Organization:<br />

List <strong>of</strong> major topics to be covered in chronological sequence (specify number <strong>of</strong> Contact Hours on each).<br />

Contact Hours<br />

3.1 Introduction 3<br />

3.2 Top Management Controls 3<br />

3.3 Systems Development Management Controls 3<br />

3.4 Programming Management Controls 3<br />

3.5 Data Resource Management Controls 3<br />

3.6 Security Management Controls 3<br />

3.7 Operations Management Controls 3<br />

3.8 Quality Assurance Management Controls 3<br />

3.9 Boundary Controls 3<br />

3.10 Communication Controls 3<br />

3.11 Database & ERP Controls 3<br />

3.12 Evaluating System Effectiveness & Efficiency 3<br />

3.13 Trust Services (AICPA/CICA/IIA Reports) 3<br />

3.14 B2B Assurance Framework (Khazanchi and Sutton) 3<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will include class discussion, case studies, lecture, guest speakers,<br />

and demonstration.<br />

4.2 Student role in the course.<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned projects and papers, and complete required examinations.<br />

4.3 Contact hours.<br />

3 hours<br />

-300-


5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will be evaluated on the following basis.<br />

Class participation: Students are expected to attend each and every class and be prepared to<br />

actively participate in the discussion. Much <strong>of</strong> the class will be conducted using an open<br />

discussion approach, and the success <strong>of</strong> the class will be dependent on students’ ability to identify<br />

and discuss relevant issues. Each student will choose a chapter from the text and lead the<br />

instruction <strong>of</strong> the rest <strong>of</strong> the class on that chapter. This includes a summary <strong>of</strong> key components <strong>of</strong><br />

the chapter, and facilitation <strong>of</strong> discussion <strong>of</strong> the chapter.<br />

Individual Case <strong>Study</strong>: Each student will complete three case studies which will involve reading a<br />

case study and preparing a 5-7 page evaluation <strong>of</strong> the case from the viewpoint <strong>of</strong> an IT Auditor. All<br />

cases will be graded for depth <strong>of</strong> analysis, originality, quality <strong>of</strong> writing, and pr<strong>of</strong>essional<br />

impression. Most questions will involve subjective issues for which multiple views can be<br />

defended. As in a pr<strong>of</strong>essional career, it is important to be both complete and concise.<br />

Group Case Presentation: Each person will be assigned to a learning group to complete a case<br />

study related to each topic. Students will choose one <strong>of</strong> the three required case studies and work<br />

in their team to provide a presentation to the class on that case. This 20-30 minute presentation<br />

should include a summary <strong>of</strong> the case, the challenge(s) facing the organization, and their<br />

interpretation and/or resolution <strong>of</strong> the challenges from an IT Audit perspective.<br />

Computer-aided Auditing Project (ACL Assignment): This project will provide students a chance<br />

to gain hands-on experience with computer assisted audit tools and techniques (CAATTS). The<br />

s<strong>of</strong>tware to be used in this assignment, ACL, comes with the textbook. Specifications for the<br />

project will be provided in class.<br />

Exams: There will be one comprehensive final examination.<br />

Current News Articles: Each class member will be responsible for summarizing and presenting<br />

two news articles during the course <strong>of</strong> the semester. These articles should relate in some fashion<br />

to risk and controls and should represent a current news event related to the subject to be<br />

covered in a given week. All students are required to participate on a regular basis in the<br />

discussion.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

The grade base for the course for undergraduate students will consist <strong>of</strong> the following:<br />

-301-


Available points<br />

Individual Case Studies (3) 45%<br />

Group Case <strong>Study</strong> 5%<br />

Comprehensive final exam 20%<br />

ACL project 15%<br />

Current news articles 5%<br />

Individual class participation 10%<br />

5.3 Grading scale and criteria.<br />

The grading scale is as follows:<br />

GRADE POINT VALUE<br />

A 92%


6.2.1 “To Caatch a Thief”. Paul R Brazina, Bruce A Leauby. Pennsylvania CPA Journal.<br />

Philadelphia: Spring 2004.Vol.75, Iss. 1; pg. 30, 4 pgs. To be referred to as ACL1 in<br />

syllabus.<br />

6.2.2 “Computer-assisted audit tools and techniques: analysis and perspectives.” Robert L<br />

Braun, Harold E Davis. Managerial Auditing Journal. Bradford: 2003.Vol.18, Iss. 9; pg.<br />

725, 7 pgs. Referred to as ACL2 in syllabus.<br />

6.2.3 “Trust Services Principles, Criteria and Illustrations for Security, Availability, Processing<br />

Integrity, Confidentiality, and Privacy (Including WebTrust® and SysTrust®)”. American<br />

Institute <strong>of</strong> Certified Public Accountants, Inc. and Canadian Institute <strong>of</strong> Chartered<br />

Accountants. Referred to as WebTrust in syllabus.<br />

6.2.4 “E-Commerce’s Impact on Audit Practices.” Michael D Harkness; Brian Patrick Green.<br />

Internal Auditing; Mar/Apr 2004; 19, 2; ABI/INFORM Global pg. 28. To be referred to as<br />

Harkness in syllabus.<br />

6.2.5 “The keys to effective IT auditing”. Mark Petterson. Journal <strong>of</strong> Corporate Accounting &<br />

Finance; Volume 16, Issue 5 , Pages 41 – 46. To be referred to as Petterson in syllabus.<br />

6.2.6 CobIT Generic Audit Guidelines & Process. To be provided by instructor on Blackboard. To<br />

be referred to as CobIT Guidelines & Process in syllabus.<br />

6.2.7 “Auditing in the E-Commerce Era.” Ning Zhao; David C Yen; I-Chiu Chang. Information<br />

Management & Computer Security; 2004; 12, 5; ABI/INFORM Global. pg. 389. To be<br />

referred to as Zhao in syllabus.<br />

6.2.8 “Risks, Benefits, and Challenges in Global IT Outsourcing: Perspectives and Practices.”<br />

Subhankar Dhar & Bindu Balakrishnan. Journal <strong>of</strong> Global Information Management, vol.<br />

14, issue 3. To be referred to as Dhar in syllabus.<br />

6.2.9 “Critical Risks in Outsourced IT Projects: The Intractable and the Unseen.” Hazel Taylor.<br />

Communications <strong>of</strong> the ACM; November 2006/Vol. 49, No. 11. To be referred to as Taylor<br />

in syllabus.<br />

6.2.10 “A Continuous View <strong>of</strong> Accounts” David Coderre. The Internal Auditor; Apr 2006; 63, 2;<br />

ABI/INFORM Global pg. 25. To be referred to as Coderre in syllabus.<br />

6.2.11 “Continuous Auditing: An Effective Tool For Internal Auditors.” J Donald Warren Jr; L<br />

Murphy Smith. Internal Auditing; Mar/Apr 2006; 21, 2; ABI/INFORM Global pg. 27. To be<br />

referred to as Warren in syllabus.<br />

Other references will be provided as needed. Students are also encouraged to bring related press articles<br />

to class for discussion.<br />

6.3 Other suggested reading materials, if any.<br />

6.3.1 Hollander, Denna, and Cherrington (1996). Accounting, IT and Business Solutions. Irwin.<br />

6.4 Other sources <strong>of</strong> information.<br />

6.4.1 AICPA/CICA/IIA web sites<br />

6.5 Current bibliography <strong>of</strong> resources for student’s information.<br />

6.5.1 Stoll, C. (1990). “The Cuckoo's Egg: Tracking a Spy through the Maze <strong>of</strong> Computer<br />

Espionage," New York, NY: Pocket Books.<br />

6.5.2 “Auditing Information Systems,” Jack Champlain, John Wiley & Sons, Inc., One Wiley<br />

Drive, Somerset, NJ 08875<br />

-303-


6.5.3 “An e-Risk Primer,” Xenia Ley Parker, CISA, CFSA, The Institute <strong>of</strong> Internal Auditors<br />

Research Foundation<br />

6.5.4 “Electronic Commerce, Control Issues for Securing Virtual Enterprises,” Albert J. Marcella,<br />

Jr., Ph.D., COAP, CSP, CQA, CFSA, CDP, CISA, Larry Stone, CISA, CCP; and William J.<br />

Sampias, CISA.<br />

6.5.5 “www.StopThief.net – Protecting Your Identity on the Web,” Albert J. Marcella Jr., Ph.D.,<br />

COAP, CSP, CQA, CDP, CFSA, CISA.<br />

7.0 (Fill out for ISQA and CIST courses) Estimate Computing Accreditation Commission (CAC) Category<br />

Content (class time in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 5<br />

Networking and telecommunications 5<br />

Modern programming language<br />

Analysis and Design 5<br />

Data management<br />

Role <strong>of</strong> IS in Organizations 15 15<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __5___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __5___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

__30___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

Please list the topics that address the social and ethical implications <strong>of</strong> computing covered in all course<br />

sections. Estimate the class time spent on each topic. In what ways are the students in this course graded<br />

on their understanding <strong>of</strong> these topics (e.g. test questions, essays, oral presentations, and so forth?).<br />

We will cover the standards for IT audit and control established by pr<strong>of</strong>essional associations such as ISACA<br />

and AICPA. (Time: 6 hours).<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

11.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

-304-


CHANGE HISTORY<br />

Date Change By whom Comments<br />

10/1/2008 Minor changes to description <strong>of</strong><br />

assignments, adjustments to readings<br />

list and required texts based on an<br />

implemented version <strong>of</strong> the original<br />

formal syllabus.<br />

Deepak<br />

Khazanchi<br />

-305-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4590<br />

Course Title<br />

IT Audit and Control<br />

Course Coordinator<br />

Deepak Khazanchi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the concept <strong>of</strong> business risks<br />

and the management <strong>of</strong> business risk<br />

Understand IT risk as a component <strong>of</strong><br />

business risk<br />

Gain an appreciation <strong>of</strong> the need to<br />

manage IT risks<br />

Gain an understanding <strong>of</strong> the basic type<br />

<strong>of</strong> controls required in a business system<br />

in order to control IT risks<br />

Learn concepts and applications <strong>of</strong> the<br />

following types <strong>of</strong> IT controls: top<br />

management, system development,<br />

programming, data resource<br />

management, database, security,<br />

operations management, quality<br />

assurance, boundary controls, and<br />

communications.<br />

Gain an appreciation for the difficulties in<br />

assessing systems effectiveness and<br />

X<br />

S<br />

X X S<br />

X X X S<br />

X S S S<br />

X X X<br />

X X X X<br />

-306-


efficiency.<br />

Understand the new system control risks<br />

created by the use <strong>of</strong> the internet for<br />

business applications and electronic<br />

business.<br />

S<br />

X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-307-


-308-


ISQA 4730 Decision Support Systems<br />

Department and Course Number ISQA 4730<br />

Course Title<br />

Decision Support Systems<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/2008<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course examines a set <strong>of</strong> information systems which specifically support managerial<br />

decision makers: Decision Support Systems, Group Decision Support Systems, Executive<br />

Information Systems, Data Warehouses, Expert Systems, and Neural Networks. This<br />

course explores the development, implementation, and application <strong>of</strong> these systems,<br />

how these systems can be applied to current business problems, as well as how<br />

organizational issues impact the implementation and usage <strong>of</strong> these systems.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors and graduate MIS<br />

majors who wish to understand a set <strong>of</strong> information systems which specifically support<br />

managerial decision.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CIST 3100 or equivalent<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Working knowledge <strong>of</strong> business foundations.<br />

1.4.2 Working knowledge <strong>of</strong> computer information systems.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Understand the nature <strong>of</strong> decision making and <strong>of</strong> decision makers, as well as the need for decision<br />

support.<br />

-309-


2.2 Investigate the application Decision Support Systems, Business Intelligence, Group Decision<br />

Support Systems, Executive Information Systems, Data Warehouses, Expert Systems, and Neural<br />

Networks to both common and unique organizational decision problems.<br />

2.3 Understand how organizational issues impact the implementation and usage <strong>of</strong> these systems.<br />

2.4 Apply course concepts in hands-on assignments with a strong real-world orientation.<br />

3.0 Content and Organization:<br />

Contact Hours<br />

3.1 Decision Support Systems and Business Intelligence 3.0<br />

3.2 Decision Making Systems, Modeling, and Support 3.0<br />

3.3 Modeling and Analysis 3.0<br />

3.4 Decision Support Systems Concepts, Methodologies and<br />

Technologies: An Overview 3.0<br />

3.5 System Development and Acquisition 3.0<br />

3.6 The Essentials <strong>of</strong> Business Intelligence 3.0<br />

3.7 Business Analytics and Data Visualization 3.0<br />

3.8 Data Warehousing 3.0<br />

3.9 Data, Text, and Web Mining 3.0<br />

3.10 Collaborative Computer-Supported Technologies and 3.0<br />

3.11 Group Support Systems<br />

3.12 Knowledge Management 3.0<br />

3.13 Business Performance Management 3.0<br />

3.14 Enterprise Systems 3.0<br />

3.15 Artificial Intelligence and Expert Systems 3.0<br />

3.16 Knowledge Acquisition, Representation and Reasoning 3.0<br />

3.17 Advanced Intelligent Systems 3.0<br />

3.18 Neural Networks for Data Mining 3.0<br />

3.19 Intelligent Systems over the Internet 3.0<br />

3.20 Integration, Impacts, and the Future <strong>of</strong> Management<br />

Support Systems 3.0<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The primary teaching methods will be lectures and the in-class discussion.<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in the discussion on assigned readings,<br />

complete the individual assignments and exams, and participate in a group project.<br />

4.3 Contact hours.<br />

Three (3) hours per week.<br />

-310-


5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The student will participate in the discussion on assigned readings. The student will<br />

complete a set <strong>of</strong> individual assignments as well as two individual exams. Students – in<br />

groups <strong>of</strong> 2 or 3 - will participate in the completion <strong>of</strong> a group project. Undergraduate<br />

students will construct a small decision support system to solve an actual decision<br />

problem. Graduate students will research a decision support implementation project and<br />

write a formal research paper on this topic.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component Grading<br />

Exams 33.3%<br />

Assignments 33.3%<br />

Team Project 33.3%<br />

5.3 Grading scale and criteria.<br />

Points<br />

Grade<br />

96% - 100% A+<br />

92% - 95% A<br />

89% - 91% A-<br />

86% - 88% B+<br />

82% - 85% B<br />

79% - 81% B-<br />

76% - 78% C+<br />

72% - 75% C<br />

69% - 71% C-<br />

66% - 68% D+<br />

62% - 65% D<br />

59% - 61% D-<br />

00% - 58% F<br />

6.0 Resource Material<br />

6.1 Textbooks and/or other required readings used in course.<br />

-311-


6.1.1 Turban, E., Aronson, J.E., Liang, T.P., & Sharda, R. (2007) Decision Support and<br />

Business Intelligence Systems, 8 th Edition, Upper Saddle River, NJ, Pearson-<br />

Prentice Hall.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 On-line: Different Drummers by David Keirsey<br />

(http://keirsey.com/Drummers.html)<br />

6.2.2 On-line: Keirsey Temperament Sorter<br />

(http://www.advisorteam.com/user/ktsintro1.asp)<br />

6.2.3 On-line: Decision Making overview (http://cognet.mit.edu/MITECS/Entry/shafir3)<br />

6.2.4 On-line: Problem Solving and Decision Making: Consideration <strong>of</strong> Individual<br />

Differences Using the Myers-Briggs Type Indicator<br />

(http://teach.valdosta.edu/whuitt/files/prbsmbti.html)<br />

6.2.5 On-line: Decision Making and Problem Solving, by Herbert A. Simon and Associates<br />

(http://www.die<strong>of</strong>f.org/page163.htm)<br />

6.2.6 On-line: Data Warehousing Technology, a White Paper by Ken Orr<br />

6.2.7 On-line: Linear Programming thwarts the Soviet Blockage <strong>of</strong> Berlin<br />

(http://members.fortunecity.com/jonhays/linear.htm)<br />

6.2.8 On-line: A primer on Linear Programming<br />

6.2.9 On-line: "As We May Think", a pivotal article by Vannevar Bush. The basic ideas<br />

which underly Hypertext and the World Wide Web as foretold in 1945.<br />

(http://www.theatlantic.com/unbound/flashbks/computer/bushf.htm)<br />

6.2.10 On-line: An Atlas <strong>of</strong> Cyberspaces - fine examples <strong>of</strong> data visualization.<br />

(http://www.cybergeography.org/atlas/atlas.html)<br />

6.2.11 On-line: Computer-Supported Cooperative Work<br />

(http://pespmc1.vub.ac.be/CSCW.html)<br />

6.2.12 On-line: Group Think, an article on groupware by Anne Field<br />

(http://www.inc.com/incmagazine/article/0,,ART1995,00.html)<br />

6.2.13 On-line: CSCW & Groupware index<br />

(http://www.usabilityfirst.com/groupware/cscw.txl)<br />

6.2.14 On-line: CIO Magazine(http://64.28.79.79/resources/)<br />

6.2.15 On-line: Knowledge Roles: The CKO and Beyond<br />

(http://www.cio.com/archive/040196_davenport_content.html)<br />

6.2.16 On-line: The Value Chain (http://www.informationweek.com/700/00iuer4.htm)<br />

6.2.17 On-line: Feds ponder CKO role<br />

(http://www.fcw.com/fcw/articles/1999/FCW_062899_694.asp)<br />

6.2.18 On-line: The CKO -- vision, strategy, ambassadorial skills, and a certain je ne sais<br />

quoi ( http://www.ktic.com/topic6/13_CKO.HTM)<br />

6.2.19 On-line: PC AI - Expert Systems<br />

(http://www.pcai.com/web/ai_info/expert_systems.html)<br />

6.2.20 On-line: Legal Liability for Expert System S<strong>of</strong>tware<br />

(http://www.daiglehancock.com/Strict.liability.htm)<br />

-312-


6.2.21 On-line: AI Timeline<br />

(http://www2.kenyon.edu/depts/biology/slonc/bio3/AI/timeline/timeline.html)<br />

6.2.22 On-line: JESS - a Java-based Expert System Shell<br />

(http://herzberg.ca.sandia.gov/jess/)<br />

6.2.23 On-line: WebGrid: Knowledge Modeling and Inference through the World Wide<br />

Web (http://ksi.cpsc.ucalgary.ca/KAW/KAW96/gaines/KMD.html)<br />

6.2.24 On-line: A list <strong>of</strong> Knowledge Representation resources<br />

(http://www.cs.man.ac.uk/~franconi/kr.html)<br />

6.2.25 On-line: A Manager's Guide to Neural Networks<br />

(http://www.zsolutions.com/amanager.htm)<br />

6.2.26 On-line: A short Introduction to Neural Networks<br />

6.2.27 On-line: Travelling Salesman Problem Using Genetic Algorithms<br />

(http://www.lalena.com/ai/tsp/)<br />

6.2.28 On-line: Genetic Algorithm: Maze Solver - Java-based<br />

(http://home.online.no/~bergar/mazega.htm)<br />

6.2.29 On-line: "Intelligent Agents" Make a Comeback<br />

(http://abcnews.go.com/sections/tech/CNET/cnet_intagents991028.html)<br />

6.2.30 On-line: Agents at your service (http://www.infoworld.com/cgibin/displayStory.pl?/features/980216agents.htm)<br />

6.2.31 On-line: Organizational Learning and Memory<br />

(http://trochim.human.cornell.edu/gallery/cho/cho.htm)<br />

6.2.32 On-line: Electronic Privacy Information Center (http://www.epic.org/)<br />

6.2.33 On-line: What Company Spies Really Want<br />

(http://www.wired.com/news/infostructure/0,1377,32672,00.html)<br />

6.2.34 On-line: Why the future doesn't need us, by Bill Joy<br />

(http://www.wired.com/wired/archive/8.04/joy_pr.html)<br />

6.3 Other sources <strong>of</strong> information.<br />

Additional handouts may be used when deemed necessary by the instructor.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

None<br />

1.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 12<br />

Networking and telecommunications<br />

Modern programming language 3<br />

Analysis and Design 9<br />

Data management 9<br />

-313-


Role <strong>of</strong> IS in Organizations 9<br />

7.0 Oral and Written Communications:<br />

Every student is required to submit at least 3 written reports (not including exams, tests, quizzes,<br />

or commented programs) to typically 4-20 pages. Due to time-constraints students do not make<br />

presentations in class. Students’ oral and other pr<strong>of</strong>essional communication skills are an<br />

important aspect <strong>of</strong> the group projects in which the students participate.<br />

8.0 Social and Ethical Issues:<br />

The course explores the impact <strong>of</strong> Decision Support Systems and Management Support Systems<br />

on the decisions in the organization. Among other issues, this course explores the ethical issue<br />

<strong>of</strong> the use <strong>of</strong> artificial intelligence and computer-based reasoning in decisions which affect<br />

individuals.<br />

9.0 Theoretical content:<br />

Hours<br />

9.1 Decision Theory 3<br />

9.2 Quantitative Analysis, basic statistics, linear programming. 3<br />

9.3 Principles <strong>of</strong> artificial intelligence 3<br />

10.0 Problem analysis:<br />

Please describe the analysis experiences common to all course sections.<br />

Students will examine case problems for the application <strong>of</strong> decision support methods. Students<br />

will investigate a specific decision problem in a real-world organization for the purpose <strong>of</strong><br />

designing a computer-based solution.<br />

11.0 Solution design:<br />

Student will gain practical experience with several s<strong>of</strong>tware packages for decision support system<br />

and expert system development. Students will develop a small decision support system for<br />

application to a specific decision problem in a real-world organization.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

10/10/02 Initial ABET version Van Vliet<br />

6/25/03 ABET cleanup Wolcott<br />

9/13/2007 Updated syllabus contents; changed Van Vliet<br />

-314-


prerequisite from CIST 2110 to CIST<br />

3100 as this course was renumbered.<br />

10/12/2008 Instructor reorganized course content<br />

for improved presentation to students;<br />

this reorganization is reflected in<br />

section 3.0<br />

10/12/2008 Updated section 8.0 to reflect current<br />

course more accurately<br />

Van Vliet<br />

Van Vliet<br />

-315-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4730<br />

Course Title<br />

Decision Support Systems<br />

Course Coordinator<br />

Paul J.A. van Vliet<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/12/08<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the nature <strong>of</strong> decision<br />

making and <strong>of</strong> decision makers, as well as<br />

the need for decision support.<br />

Investigate the application Decision<br />

Support Systems, Business Intelligence,<br />

Group Decision Support Systems,<br />

Executive Information Systems, Data<br />

Warehouses, Expert Systems, and Neural<br />

Networks to both common and unique<br />

organizational decision problems.<br />

Understand how organizational issues<br />

impact the implementation and usage <strong>of</strong><br />

these systems<br />

Apply course concepts in hands-on<br />

assignments with a strong real-world<br />

orientation.<br />

S X S<br />

S<br />

X<br />

S<br />

X<br />

X S S X X<br />

<strong>BIS</strong> Program Outcomes (2009)<br />

-316-


1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-317-


-318-


ISQA 4880 Systems Simulation and Modeling<br />

Department and Course Number ISQA 4880<br />

Course Title<br />

System Simulation and Modeling<br />

Course Coordinator<br />

Yong Shi and Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/09/07<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

Simulation modeling <strong>of</strong> manufacturing and service operations through the use <strong>of</strong> computer<br />

s<strong>of</strong>tware for operational analysis and decision making. This course is designed to provide the<br />

future engineers with an understanding <strong>of</strong> the analytical models <strong>of</strong> simulation. The underlying<br />

assumptions <strong>of</strong> these models are emphasized in order to critically ascertain their limitations and<br />

applicability. How models behave in practice under variety <strong>of</strong> manufacturing and service<br />

environments will also be examined.<br />

1.2 For whom course is intended.<br />

This course is intended for upper division undergraduate MIS majors who wish to understand the<br />

analytical models <strong>of</strong> simulation. It is one <strong>of</strong> elective courses for undergraduates who wish to<br />

pursue Knowledge Engineering and Decision Support Track<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 CIST 1400<br />

1.3.2 ISQA 3400<br />

1.3.3 CIST 2500 or equivalent<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 Basic computer programming<br />

1.4.2 Basic applied statistics for IS&T<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

2.1 Recognize situations where simulation can be used as a an analysis tool<br />

2.2 Answer questions by simulation analysis<br />

2.3 Analyze, design and develop appropriate and effective simulation models<br />

2.4 Design, develop and run efficient simulation experiments<br />

-319-


2.5 Evaluate and draw conclusions from a simulation output<br />

2.6 Formulate constructive opinions, and present the results in a practical manner<br />

2.7 Present the results clearly.<br />

3.0 Content and Organization:<br />

-320-<br />

Contact Hours<br />

3.1 Introduction to Locations, Entities, Arrivals, Processing,<br />

Output Editor, and Menus 3<br />

3.2 What is Simulation? 3<br />

3.3 Why Simulation? 6<br />

3.4 How Does Simulation Work? 6<br />

3.5 An Introduction to Promodel 3<br />

3.6 The Simulation Project 3<br />

3.7 Understanding Probability Distributions 3<br />

3.8 Finding the Right Distribution 3<br />

3.9 Extracting Values From Probability Distributions 3<br />

3.10 Output Analysis 3<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The teaching methods include lectures, discussions, and actual cases.<br />

4.2 Student role in the course.<br />

Students will attend the lectures, participate in in-class discussions, complete exams and projects.<br />

4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance, specifying<br />

distinction between undergraduate and graduate, if applicable. For Laboratory projects, specify<br />

the number <strong>of</strong> weeks spent on each project).<br />

Students will complete two regular take-home exams, class projects and reports.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards) specifying<br />

distinction between undergraduate and graduate, if applicable.<br />

Component<br />

Grading<br />

Exams 25.0%<br />

Class Projects 37.5%


Class Participation 12.5%<br />

Class Project Report 25.0%<br />

5.3 Grading scale and criteria<br />

Points Grade<br />

98 – 100% A+<br />

90 – 97% A<br />

87 – 89% A-<br />

84 – 86% B+<br />

80 – 83% B<br />

77 – 79% B-<br />

74 – 76% C+<br />

70 – 73% C<br />

67 – 69% C-<br />

64 – 66% D+<br />

60 – 63% D<br />

57 – 59% D-<br />


CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design 36<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___1_ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __10___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

__15___ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such coverage.<br />

Hours<br />

10.1 Simulation principles 15<br />

10.2 Probability Distributions 3<br />

11.0 Problem analysis:<br />

Students learn and understand simulation modeling <strong>of</strong> manufacturing and service operations through the<br />

use <strong>of</strong> computer s<strong>of</strong>tware for operational analysis and decision making. Student also examine the<br />

assumptions underlying these analytical models and how models behave in practice under a variety <strong>of</strong><br />

manufacturing and service environments.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

Spring 2002 Initial ABET version Ghahramani<br />

6/25/03 ABET cleanup Wolcott<br />

10/9/07 Update <strong>of</strong> resource material and course<br />

coordinator<br />

Shi<br />

-322-


-323-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4880<br />

Course Title<br />

System Simulation and Modeling<br />

Course Coordinator<br />

Yong Shi and Lotfollah Najjar<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Recognize situations where simulation<br />

S X<br />

can be used as a an analysis tool<br />

Answer questions by simulation analysis S X<br />

Analyze, design and develop appropriate<br />

S<br />

S<br />

and effective simulation models<br />

Design, develop and run efficient<br />

S X S<br />

simulation experiments<br />

Evaluate and draw conclusions from a<br />

X<br />

X<br />

simulation output<br />

Formulate constructive opinions, and<br />

S<br />

present the results in a practical manner<br />

Present the results clearly.<br />

S<br />

-324-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-325-


-326-


ISQA 4890 Data Warehousing and Data Mining<br />

Department and Course Number ISQA/CSCI 4890<br />

Course Title<br />

Data Warehousing and Data Mining<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/02/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course provides students theoretical issues as well as practical methods for designing<br />

and constructing data warehouse and implementing data mining. After covering the<br />

essential concepts, issues, techniques to build an effective data warehouse, this course<br />

emphasizes the various techniques <strong>of</strong> data mining, such as association, classification,<br />

clustering and prediction for on-line analyses within the framework <strong>of</strong> data warehouse<br />

architectures. This course also promotes students to conduct a real-life data analyzing<br />

project.<br />

1.2 For whom course is intended.<br />

This course is intended for undergraduate management information systems (MIS) and<br />

computer science (CS) majors who choose Data Mining and Business Intelligence<br />

concentration. It is also recommended to a senior undergraduate level in MIS or CS.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses)<br />

1.3.1 ISQA 3310 or CSCI 4850<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 The conceptual and practical foundation to database management systems<br />

1.4.2 Relational Database Systems<br />

1.4.3 The hierarchical models<br />

1.4.4 The network models<br />

1.4.5 Basic SQL<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

-327-


2.0 Objectives:<br />

2.1 Understand the fundamental principles <strong>of</strong> data warehousing and data mining<br />

2.2 Describe the difference between transactional databases and data warehouses<br />

2.3 Describe the relationship between OLAP and Data Warehousing<br />

2.4 Use SQL to manage data in data warehousing and data mining<br />

2.5 Build a data mart<br />

2.6 Design and implement a data warehouse<br />

2.7 Carry out data integration and transformation<br />

2.8 Use and create simple data mining algorithms<br />

2.9 Apply some commercial tools to conduct data mining<br />

2.10 Interpret <strong>of</strong> data mining results<br />

3.0 Content and Organization:<br />

3.1 Introduction to Data Warehousing and Data Mining 3<br />

3.2 Data Warehouse and OLAP 3<br />

3.3 Data Preprocessing 3<br />

3.4 Data Mining Basis 3<br />

3.5 Data Characterization and Comparison 4<br />

3.6 Mining Association Rules 4<br />

3.7 Classification and Prediction 6<br />

3.8 Cluster Analysis 4<br />

3.9 Integrated Methods <strong>of</strong> Data Mining 3<br />

3.10 Advances <strong>of</strong> Data Warehousing and Data Mining 3<br />

4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

Hours<br />

The basic teaching method will be lectures, discussion, real-life cases, guest speakers. The<br />

existing s<strong>of</strong>tware from the literature or produced by the instructor and commercial products<br />

will be used in the class.<br />

4.2 Student role in the course<br />

The students will attend lectures, participate in discussion in the class, complete<br />

assignments and projects, and complete all exams. The projects can be either individual<br />

or group work depending on the situation <strong>of</strong> each class.<br />

4.3 Contact hours.<br />

Three (3) hours per week.<br />

-328-


5.0 Evaluation:<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

The student products will be the assignments, group discussion, projects, examinations,<br />

and project presentations.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Components Grading<br />

Participation 5%<br />

Homework 10%<br />

Projects 35%<br />

Exams 50%<br />

5.3 Grading scale and criteria.<br />

Points Grade<br />

98-100 A+<br />

95-97 A<br />

90-94 A-<br />

88-89 B+<br />

85-87 B<br />

80-84 B-<br />

78-79 C+<br />

75-77 C<br />

70-74 C-<br />

68-69 D+<br />

65-67 D<br />

60-64 D-<br />


6.1.1 David Olson and Yong Shi, Introduction to Business Data Mining, McGraw-Hill,<br />

2007.<br />

6.1.2 J. Han and M. Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann,<br />

2001.<br />

6.2 Other suggested reading materials, if any.<br />

6.2.1 Agrawal, R., Imielinski, T. and Swami, A. (1993) ‘Data mining: A performance<br />

perspective’, IEEE Transactions on Knowledge and Data Engineering, Vol. 5, 914-<br />

925.<br />

6.2.2 Bajgier, S. M. and Hill, A. V. (1982) ‘An experimental comparison <strong>of</strong> statistical and<br />

linear programming approaches to the discriminant problems’, Decision Sciences,<br />

Vol.13, 604-618.<br />

6.2.3 Breiman, L., Friedman, J., Olshen, R. and Stone, C. (1984), Classification and<br />

Regression Trees, Wadswroth, Belmont.<br />

6.2.4 Carpenter, G.A., Grossberg, S., Reynolds, J.H., Markuzon, N., and Rosen, D.B.<br />

(1992) ‘Fuzzy ARTMAP: A Neural Network Architecture for Incremental<br />

Supervised Learning <strong>of</strong> Analog Multidimensional Maps’, IEEE Transactions on<br />

Neural Networks, 3, 698-713.<br />

6.2.5 Carpenter, G.A., Grossberg, S., and Rosen, D.B. (1991) ‘Fuzzy ART: Fast stable<br />

learning and categorization <strong>of</strong> analog patterns by an adaptive resonance system’,<br />

Neural Networks, 4, 759-771.<br />

6.2.6 Chen, M., Han, J. and Yu, P. (1996) ‘Data mining: An overview from a database<br />

perspective’, IEEE Transactions on Knowledge and Data Engineering, Vol. 8, 866-<br />

883.<br />

6.2.7 Freed, N. and Glover, F. (1981) ‘Simple but powerful goal programming models for<br />

discriminant problems’, European Journal <strong>of</strong> Operational Research, Vol. 7, 44-60.<br />

6.2.8 Freed, N. and Glover, F. (1986) ‘Evaluating alternative linear programming models<br />

to solve the two-group discriminant problem’, Decision Science, Vol. 17, 151-162.<br />

6.2.9 Glover, F. (1990) ‘Improve linear programming models for discriminant analysis’,<br />

Decision Sciences, Vol. 21, 771-785.<br />

6.2.10 Guo, H. and Gelfand, S.B. (1992) ‘Classification trees with neural network feature<br />

extraction’, IEEE Transactions on Neural Netwroks, Vol. 3, 923-933.<br />

6.2.11 Jang, J.-S. R., Sun, C.-T. and Mizutani, E. (1997), Neuro-Fuzzy and S<strong>of</strong>t Computing,<br />

Prentice Hall, Upper Saddle River, New Jersey.<br />

6.2.12 Joachimsthaler, E.A. and Stam, A. (1988) ‘Four approaches to the classification<br />

problem in discriminant analysis: An experimental study’, Decision Sciences,<br />

Vol.19, 322-333.<br />

6.2.13 Koehler, G. J. and Erenguc, S. S. (1990) ‘Minimizing misclassifications in linear<br />

discriminant analysis’, Decision Science, Vol. 21, 63-85.<br />

6.2.14 Kosko, B. (1992), Neural Networks And Fuzzy Systems: A Dynamical Systems<br />

Approach To Machine Intelligence, Prentice Hall, Englewood Cliffs, New Jersey.<br />

-330-


6.2.15 Markowski, E. P. and Markowski, C. A. (1985) ‘Some difficulties and improvements<br />

in applying linear programming formulations to the discriminant problem’,<br />

Decision Science, Vol. 16, 237-247.<br />

6.2.16 Pass, S. (1997) ‘Discovering in a value mountain <strong>of</strong> data’, ORMS Today, October,<br />

24-28.<br />

6.2.17 Quinlan, J. (1986) ‘Induction <strong>of</strong> decision trees’, Machine Learning, Vol. 1, 81-106.<br />

6.2.18 Rymon, R. (1993), Search through systematic set enumeration, Proceedings <strong>of</strong> the<br />

third international conference on principle <strong>of</strong> knowledge representation and<br />

reasoning. Cambridge, MA, 539-550.<br />

6.2.19 Shi, Y, Peng, Y., Xu, X and Tang, X. (2002) ‘Data mining via multiple criteria linear<br />

programming: Applications in credit card portfolio management’, International<br />

Journal <strong>of</strong> Information Technology and Decision Making, Vol. 1, 145-166.<br />

6.2.20 Shi, Y., Wise, M., Luo, M. and Lin, Y. (2001) ‘Data mining in credit card portfolio<br />

management: a multiple criteria decision making approach’, in M. Koksalan and S.<br />

Zionts, eds., Multiple Criteria Decision Making in the New Millennium, Springer,<br />

Berlin, 427-436.<br />

6.2.21 Shi, Y. (1999) ‘Data Mining’, in IEBM Handbook <strong>of</strong> Information Technology in<br />

Business, Edited by M. Zeleny, International Thomson Publishing Europe.<br />

6.3 Other sources <strong>of</strong> information.<br />

6.4 Current bibliography <strong>of</strong> resource for student’s information.<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language 3<br />

Analysis and Design<br />

Data management 36<br />

Role <strong>of</strong> IS in Organizations 3<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least ___9__ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically ___5__ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __10___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

-331-


No coverage<br />

10.0 Theoretical content:<br />

Please list the types <strong>of</strong> theoretical material covered, and estimate the time devoted to such<br />

coverage.<br />

This course provides students theoretical issues for designing and constructing data warehouse<br />

and implementing data mining.<br />

Hours<br />

10.1 The fundamental principles <strong>of</strong> Data Warehousing and Data Mining 5<br />

11.0 Problem analysis:<br />

Students learn theoretical and practical methods to design and construct data warehouse and<br />

implementing data mining. After covering the essential concepts, issues, techniques to build an<br />

effective data warehouse, this course emphasizes the various techniques <strong>of</strong> data mining, such as<br />

association, classification, clustering and prediction for on-line analyses within the framework <strong>of</strong><br />

a data warehouse architectures. This course also promotes students to conduct a real-life data<br />

analyzing project.<br />

12.0 Solution design:<br />

Please describe the design experiences common to all course sections.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

10/7/03 Initial ABET version Shi<br />

6/25/03 ABET cleanup Wolcott<br />

10/09/07 Update <strong>of</strong> resource material Shi<br />

10/2/08 Review completed Shi<br />

-332-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4890/ CSCI 4890<br />

Course Title<br />

Data Warehousing and Data Mining<br />

Course Coordinator<br />

Yong Shi<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the fundamental principles <strong>of</strong> X<br />

data warehousing and data mining<br />

Describe the difference between<br />

X<br />

transactional databases and data<br />

warehouses<br />

Describe the relationship between OLAP<br />

and Data Warehousing<br />

Use SQL to manage data in data<br />

X<br />

X<br />

warehousing and data mining<br />

Build a data mart<br />

S<br />

Design and implement a data warehouse X S<br />

Carry out data integration and<br />

X<br />

transformation<br />

Use and create simple data mining<br />

X<br />

algorithms<br />

Apply some commercial tools to conduct<br />

X<br />

data mining<br />

Interpret <strong>of</strong> data mining results X X<br />

-333-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-334-


ISQA 4900 Internet Systems Development<br />

Department and Course Number ISQA-4900/CSCI-4900<br />

Course Title<br />

Internet Systems Development<br />

Course Coordinator<br />

Matt Payne<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/13/08<br />

1.0 Course Description:<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course (Catalog description).<br />

This course focuses on contemporary techniques and technologies in the design,<br />

development, and integration <strong>of</strong> web-enabled information systems. Topics include:<br />

Multi-tiered systems architecture; rapid application development; object-oriented<br />

analysis and design; prototyping; testing, verification, and validation; lifecycle models;<br />

and component-based development. This is a rapidly moving, hands-on course that<br />

mirrors real-world development.<br />

1.2 For whom course is intended.<br />

Students pursing either a <strong>BIS</strong> or BCS degree with the Internet Technologies (iT)<br />

concentration who have achieved junior or senior standing.<br />

1.3 Prerequisites <strong>of</strong> the course (Courses).<br />

1.3.1 CSCI 2850 Programming on the Internet<br />

1.3.2 CSCI 2830 Java I<br />

1.3.3 Completion <strong>of</strong> two additional courses within the iT concentration<br />

1.4 Prerequisites <strong>of</strong> the course (Topics).<br />

1.4.1 The equivalent <strong>of</strong> one semester’s exposure to Java programming<br />

1.4.2 Introductory experience creating simple web-based applications using server-side<br />

technologies such as PHP, CGI, ASP, or Cold Fusion<br />

1.4.3 General understanding <strong>of</strong> networking concepts such as OSI reference model and<br />

TCP/IP.<br />

1.5 Unusual circumstances <strong>of</strong> the course.<br />

None<br />

2.0 Objectives:<br />

-335-


2.1 Manage change in the context <strong>of</strong> distributed systems development & maintenance;<br />

2.2 Define appropriate architectures for distributed applications systems and the<br />

infrastructure supporting them;<br />

2.3 Apply appropriate methodologies for distributed systems development;<br />

2.4 Conduct analysis, design, and implementation using an object-oriented paradigm; and<br />

2.5 Create Internet-based, distributed systems.<br />

3.0 Content and Organization:<br />

Contact hours<br />

3.1 Introduction 6<br />

3.1.1 Introduction : Speed, change, and integration:<br />

the impact <strong>of</strong> current trends on systems development.<br />

3.1.2 Technical Architectures<br />

3.1.3 Multi-tiered Architecture<br />

3.1.4 Client-server systems<br />

3.1.5 Internet-based architecture<br />

3.1.6 Object-based architecture<br />

3.2 Middleware 9<br />

3.2.1 Distributed Services<br />

3.2.2 Integration<br />

3.2.3 Web services<br />

3.3 Methodology 9<br />

3.3.1 Extreme Programming<br />

3.3.2 Other agile methodologies<br />

3.4 Object-oriented technologies 6<br />

3.4.1 Analysis<br />

3.4.2 Design<br />

3.4.3 Unified Modeling Language<br />

3.4.4 Use cases<br />

3.5 Modern Enabling Technologies 14<br />

3.5.1 Java<br />

3.5.2 J2EE<br />

3.5.3 Web Services & Service Oriented Architectures<br />

3.5.4 Wireless<br />

3.5.5 Component Models & Components<br />

3.5.6 Application Servers<br />

-336-


4.0 Teaching Methodology:<br />

4.1 Methods to be used.<br />

The course will employ a variety <strong>of</strong> teaching methods including lectures and hands-on<br />

guided projects. Assignments will include a combination <strong>of</strong> individual and group<br />

components. The course may be team taught by two or more pr<strong>of</strong>essors.<br />

4.2 Student role in the course.<br />

The student will attend lectures, participate in discussions, complete programming<br />

assignments, evaluate a web programming framework (e.g. struts, spring, etc) and<br />

complete both individual and group elements <strong>of</strong> a semester project.<br />

4.3 4.3 Contact hours.<br />

5.0 Evaluation:<br />

Three (3) hours per week.<br />

5.1 Type <strong>of</strong> student projects that will be the basis for evaluating student performance,<br />

specifying distinction between undergraduate and graduate, if applicable. For Laboratory<br />

projects, specify the number <strong>of</strong> weeks spent on each project).<br />

Students will work on a capstone systems development project throughout the semester.<br />

The project will be broken down into a number <strong>of</strong> modules that reflect the topics covered<br />

in the course, but will also draw on material learned in the prerequisite courses.<br />

5.2 Basis for determining the final grade (Course requirements and grading standards)<br />

specifying distinction between undergraduate and graduate, if applicable.<br />

Component Grading<br />

Exams 20%<br />

Homework 30%<br />

Final Exam 20%<br />

Project 30%<br />

5.3 Grading scale and criteria.<br />

-337-


Points Grade<br />

97-100% A+<br />

92-96% A<br />

89-91% A-<br />

86-88% B+<br />

82-85% B<br />

79-81% B-<br />

76-78% C+<br />

72-75% C<br />

69-71% C-<br />

66-68% D+<br />

62-65% D<br />

59-61% D-<br />


Affect Engineering Practice?” Internet Computing, IEEE, Piscataway: NJ. Vol. 1, No.<br />

1; January-February, pp. 30-38.<br />

6.4.4 Britton, C. (2001) “IT Architectures and Middleware: Strategies for Building Large,<br />

Integrated Systems,” Addison-Wesley, Upper Saddle River: NJ<br />

6.4.5 Christensen, M.J. and Thayer, R.H. (2002) The Project Manager's Guide to<br />

S<strong>of</strong>tware Engineering's Best Practices, IEEE, Piscataway: NJ.<br />

6.4.6 Cusumano, M. and Y<strong>of</strong>fie. D. (1998) Competing on Internet Time: Lessons from<br />

Netscape and Its Battle with Micros<strong>of</strong>t. Free Press/Simon & Schuster, New York.<br />

6.4.7 Cusumano, M. and Y<strong>of</strong>fie. D. (1999) “S<strong>of</strong>tware Development on Internet Time,”<br />

Internet Computing, IEEE, Piscataway: NJ. Vol. 32, No. 10; OCTOBER 1999, pp. 60-<br />

69<br />

6.4.8 Goldmann S. & Kötting, B. (July-August 1999) “Collaborative Work S<strong>of</strong>tware<br />

Engineering over the Internet” Internet Computing, IEEE, Piscataway: NJ. Vol. 3,<br />

No. 4; pp. 93-94.<br />

6.4.9 Guide to the S<strong>of</strong>tware Engineering Body <strong>of</strong> Knowledge SWEBOK (December 2001),<br />

Executive Editors: Alain Abran and James W. Moore, Editors: Pierre Bourque and<br />

Robert Dupuis. IEEE, Piscataway: NJ.<br />

6.4.10 Harmon, P, Rosen M, & Guttman, M. (2001) “Developing E-Business Systems and<br />

Architectures,” Morgan Kaufmann, San Francisco: CA.<br />

6.4.11 Ince, D. (2002), “Developing Distributed and E-Commerce Applications,” Addison-<br />

Wesley, Upper Saddle River: NJ.<br />

6.4.12 “Internet Watch: The Network Maturity Model for Internet Development<br />

Network Maturity Model Development Team,” (October 1999) Ed. Ron Vetter,<br />

Computer , IEEE, Piscataway: NJ Vol. 32, No. 10; pp. 117-118.<br />

6.4.13 Knoernschild, K. (2002). Java Design: Objects, UML, & Process. Addison Wesley.<br />

6.4.14 Linthicum, D. (2000), “Enterprise Application Integration,” Addison Wesley, Upper<br />

Saddle River: NJ.<br />

6.4.15 Matena, V & Stearns, B (2001) “Applying Enterprise JavaBeans(TM): Component-<br />

Based Development for the J2EE(TM) Platform,” Sun Microsystems.<br />

6.4.16 Szyperski, C (1999) “Component S<strong>of</strong>tware: Beyond Object-Oriented<br />

Programming,” Addison-Wesley, Harlow: England.<br />

6.4.17 Wampler, B.E. (2002). The essence <strong>of</strong> object-oriented programming with Java and<br />

UML. Addison-Wesley.<br />

6.4.18 Läufer, Konstantin“A Hike through Post-EJB J2EE Web Application Architecture”<br />

Computing in Science & Engineering Sept/Oct 2005. On 10/13/08 online at<br />

http://tinyurl.com/5xyo6y (which redirects to computer.org)<br />

7.0 (IS Program) Estimate Computing Accreditation Commission (CAC) Category Content (class time<br />

in hours):<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware 14<br />

Networking and telecommunications<br />

Modern programming language 6<br />

-339-


Analysis and Design 6<br />

Data management<br />

Role <strong>of</strong> IS in Organizations<br />

8.0 Oral and Written Communications:<br />

Every student is required to submit at least __1___ written reports (not including exams, tests,<br />

quizzes, or commented programs) to typically _____ pages and to make __1___ oral<br />

presentations <strong>of</strong> typically __15___ minutes duration. Include only material that is graded for<br />

grammar, spelling, style, and so forth, as well as for technical content, completeness, and<br />

accuracy.<br />

9.0 Social and Ethical Issues:<br />

No coverage.<br />

10.0 Theoretical content:<br />

Concepts <strong>of</strong> applications and infrastructure architecture, including physical and logical<br />

architecture, and component-based construction <strong>of</strong> s<strong>of</strong>tware systems (6 hours)<br />

11.0 Problem analysis:<br />

Students will learn to conduct analysis using an object-oriented paradigm.<br />

12.0 Solution design:<br />

Students will learn contemporary techniques and technologies in the design, development, and<br />

integration <strong>of</strong> web-enabled information systems. Specifically, students will learn to define<br />

appropriate architectures for distributed applications systems and the infrastructure supporting<br />

them, conduct design, and implementation using an object-oriented paradigm; and they will<br />

create Internet-based, distributed systems.<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

4/30/2003 In the methodologies unit, replace<br />

JAD, RAD, prototyping, and system<br />

life-cycle with agile methodologies,<br />

particularly extreme programming.<br />

Wolcott JAD, RAD, prototyping, and<br />

system life-cycle are covered<br />

adequately in ISQA 4110 and<br />

ISQA 4120.<br />

6/25/03 ABET clean-up Wolcott<br />

10/13/08 Added homework, presentation, and Matt<br />

textbook. Replaced ORBs with SOA. Payne<br />

-340-<br />

Currently, web services and<br />

SOA are more common than<br />

ORBs in the field.


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA-4900/CSCI-4900<br />

Course Title<br />

Internet Systems Development<br />

Course Coordinator<br />

Matt Payne<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Manage change in the context <strong>of</strong><br />

distributed systems development &<br />

maintenance;<br />

Define appropriate architectures for<br />

distributed applications systems and the<br />

infrastructure supporting them;<br />

Apply appropriate methodologies for<br />

distributed systems development;<br />

Conduct analysis, design, and<br />

implementation using an object-oriented<br />

paradigm; and<br />

Create Internet-based, distributed<br />

systems.<br />

X<br />

X<br />

S<br />

S<br />

S<br />

S<br />

S<br />

S<br />

-341-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-342-


ISQA 4910 Introduction to Project Management<br />

Department and Course Number ISQA 4910<br />

Course Title<br />

Introduction to Project Management<br />

Course Coordinator<br />

Donna Dufner<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 10/13/08<br />

1.0 Course Description<br />

1.1 Overview <strong>of</strong> content and purpose <strong>of</strong> the course<br />

This course will cover the basics <strong>of</strong> project planning, scheduling and control. Earned value<br />

management techniques and project quality will be covered. Risk management will also be<br />

covered. The student will be introduced to the IEEE Standards for Project Management. The<br />

purpose <strong>of</strong> the course is to provide students with an introduction to the tools and techniques<br />

used to manage projects to achieve successful completion. The project management methods<br />

taught are suitable for a wide variety <strong>of</strong> project types such as s<strong>of</strong>tware development or<br />

engineering projects (e.g. construction).<br />

1.2 For whom course is intended<br />

The course is intended for undergraduate students in the schools <strong>of</strong> IS&T, Business Administration<br />

and Engineering who need to learn the fundamentals <strong>of</strong> project management.<br />

1.3 Prerequisites <strong>of</strong> the course<br />

1.3.1 CIST 2500 Introduction to Applied Statistics for IS&T<br />

1.3.2 CIST 2110 Organizations, Applications, and Technology<br />

1.3.3 Or equivalent<br />

1.4 Unusual circumstances <strong>of</strong> the course<br />

2.0 Objectives<br />

None<br />

2.1 Understand the fundamentals <strong>of</strong> project planning, project scheduling, and project control,<br />

2.2 Understand earned value project management,<br />

2.3 Understand quality issues for project management,<br />

2.4 Understand the fundamentals <strong>of</strong> the management <strong>of</strong> risk<br />

2.5 Apply the fundamentals earned value project management tools and techniques,<br />

-343-


2.6 Create Work break down structures,<br />

2.7 Manage projects using the Critical Path Methodology,<br />

2.8 Manage projects using the Cost performance index (CPI) as a performance and forecasting metric,<br />

2.9 Manage projects using the Schedule performance index (SPI) as a performance and forecasting<br />

metric, and<br />

2.10 Calculate and evaluate the actual performance against baseline metrics for project management<br />

and control.<br />

3.0 Content and Organization<br />

List <strong>of</strong> topics to be covered in chronological sequence<br />

Contact Hours<br />

3.1 Fundamentals <strong>of</strong> project planning, scheduling and control<br />

3.1.1 Introduction to Project Management 2<br />

3.1.2 The role <strong>of</strong> the project manager 2<br />

3.1.3 Project Definition 1.5<br />

3.1.4 Project Planning 3<br />

3.1.5 Developing the Implementation Plan 2<br />

3.1.6 Managing Project Risk 3<br />

3.1.7 Project Scheduling 5<br />

3.1.8 Project Control 3<br />

3.1.9 Managing people and teams 3<br />

3.2 Introduction and overview <strong>of</strong> earned value project management 3<br />

3.3 The genesis and evolution <strong>of</strong> earned value and the earned value<br />

body <strong>of</strong> knowledge 3<br />

3.4 Project management as performed in a major <strong>Omaha</strong> corporation<br />

(guest Speaker) 2<br />

3.5 Establishing the earned value baseline 2<br />

3.6 Earned value baseline preparation and evaluation 2<br />

3.7 Performance Monitoring using the project baseline 2<br />

3.8 Forecasting final cost and schedule results 2<br />

3.9 Customer requirements and planning for quality 1<br />

3.10 Achieving project quality. 1<br />

4.0 Teaching Methodology<br />

4.1 Methods to be used<br />

The primary teaching method will be discussion, case studies, lecture, guest speakers, and<br />

demonstration.<br />

4.2 Student role in the course<br />

The student will attend lectures and demonstrations, participate in discussion on assigned<br />

readings, complete assigned projects and papers, and complete required examinations<br />

4.3 Contact hours<br />

Three (3) hours per week.<br />

-344-


5.0 Evaluation<br />

5.1 Types <strong>of</strong> student products<br />

The student products will be: two examinations (a midterm and final), a ten-page research paper,<br />

and an oral presentation.<br />

5.2 Basis for determining the final grade<br />

Grades will be determined on the basis <strong>of</strong> the student’s participation in class (10%) development<br />

<strong>of</strong> a ten page research paper based on readings from the trade and the empirical, peer reviewed<br />

literature (30%), and achievement on examinations (60 % <strong>of</strong> final grade). The specific weights<br />

shall be specified in the outline for the particular class.<br />

Component Grading<br />

Examinations 50%<br />

Research Report 30%<br />

Participation 10%<br />

Presentation 10%<br />

5.3 Grading Scale and Criteria<br />

Points Grade<br />

97-100% A+<br />

93-96% A<br />

90-92% A-<br />

87-89% B+<br />

83-86% B<br />

80-82% B-<br />

77-79% C+<br />

73-76% C<br />

70-72% C-<br />

67-69% D+<br />

63-66% D<br />

60-62% D-<br />


6.1.3 Guide to the Project Management Body <strong>of</strong> Knowledge (PMBOK Guide) by the Project<br />

Management Institute Standards Committee, Newton Square, PA. 2004.<br />

6.2 Other suggested reading materials or equivalent<br />

Additional articles that have been collected for various topics are available at the UNO Library.<br />

These articles are used to supplement topics presented in various chapters.<br />

6.3 Other sources for gathering information or equivalent<br />

Students are encouraged to collect articles in current pr<strong>of</strong>essional and trade journals that are<br />

relevant to topics in systems analysis and design. The process is particularly important in keeping<br />

current with technology and new methodologies.<br />

6.4 Current bibliography or equivalent.<br />

6.4.1 Adams, John, R., Principles <strong>of</strong> Project Management. Newtown Square, PA: Project<br />

Management Institute, 1997.<br />

6.4.2 Bicknill, D. The Politics <strong>of</strong> Failure. Computer Weekly. (July 6, 1995): 28-30.<br />

6.4.3 Garner, R. “Captain <strong>of</strong> Crunch.” Computerworld. 31, 40 (Oct. 6, 1997): 81-83.<br />

6.4.4 Gautschi, T. Three keys to successful design products. Design News. Aug. 11, 1997 v52<br />

n15 p188 (1).<br />

6.4.5 Hebert B., “Tracking progress: More companies are recognizing the value <strong>of</strong> project<br />

management as part <strong>of</strong> their overall strategy – particularly in times <strong>of</strong> changes”, CMA<br />

management, Feb. 2002, v75, i10, p. 24-27.<br />

6.4.6 Hillier F., Hillier M., Lieberman G., Introduction to management science, Chapter 7,<br />

McGraw Hill, Primis Online, 2000.<br />

6.4.7 Meyer A., Loch C., Pich M., “Managing project uncertainty: from variation to chaos;<br />

project managers can’t predict the future, but accurately gauging the degree <strong>of</strong><br />

uncertainty inherent in their projects can help them quickly adapt to it”, MIT Sloan<br />

Management Review, Winter 2002, v43, i2, p. 60-67.<br />

6.4.8 Mourier P., Smith M., “Restarting a stalled project”, Security Management, Oct. 2001,<br />

v45, i10, p. 32-35.<br />

6.4.9 O’Connell, E., & Saiedian, H. “Can You Trust S<strong>of</strong>tware Capability Evaluations.”<br />

Perspectives. Feb. 2000.<br />

6.4.10 Organizing projects for success. Project Management Institute, Inc., Newton Square, PA.<br />

2000.<br />

6.4.11 Pinto, J. and Kharbanda, O. “How to fail in project management.” Business Horizons. 39,<br />

4 (July-Aug. 1996): 45-54.<br />

6.4.12 PMI Standards Committee, Guide to the PMBOK. Newtown Square, PA: Project<br />

Management Institute, 2004.<br />

6.4.13 Robert, R.W. “Creating an Environment for Project Success.” Project Management. 1997.<br />

6.4.14 Verma, V., Organizing Projects for Success. Newtown Square, PA: Project Management<br />

Institute, 1995.<br />

6.4.15 Verma, V. Human Resource Skills for the Project Manager. Newtown Square, PA: Project<br />

Management Institute, 1996.<br />

6.4.16 Wideman, R. (ed.) Project & Program Risk Management. Newtown Square, PA: Project<br />

Management Institute, 1992.<br />

-346-


7.0 (IS Program) Estimate Computing Accreditation (CAC) Category<br />

CAC Category Core Advanced<br />

Hardware and s<strong>of</strong>tware<br />

Networking and telecommunications<br />

Modern programming language<br />

Analysis and Design 15<br />

Data Management<br />

Role <strong>of</strong> IS in Organizations 3<br />

8.0 Oral and Written Communication<br />

Every student is required to submit at least __1___ written reports (not including exams, tests, quizzes, or<br />

commented programs) to typically __10+___ pages and to make __1___ oral presentations <strong>of</strong> typically<br />

___20__ minutes duration. Include only material that is graded for grammar, spelling, style, and so forth,<br />

as well as for technical content, completeness, and accuracy.<br />

9.0 Social and Ethical Issues<br />

9.1 Emphasis on open and honest communication with all project stakeholders.<br />

9.2 Emphasis on the customer’s needs both explicit and requirements and implicit.<br />

9.3 Emphasis on accurate and consistent project tracking and reporting to management.<br />

10.0 Theoretical Content<br />

Hours<br />

10.1 Earned Value Analysis 2<br />

11.0 Problem Analysis<br />

11.1 Critical Path<br />

11.2 Earned Value Analysis<br />

12.0 Solution Design<br />

12.1 Project Plan<br />

12.2 Risk Assessment and control<br />

12.3 Project schedule control through earned value analysis<br />

12.4 Lifecycle development<br />

CHANGE HISTORY<br />

Date Change By whom Comments<br />

5/1/2003 Textbook added Dufner<br />

6/10/2003 Added CIST 2500 and CIST 2110 as<br />

prerequisites<br />

Wolcott These two courses were listed as<br />

prerequisites in the catalog, but not<br />

on the formal syllabus.<br />

-347-


7/10/03 Change course description – Course Change<br />

form 10-15-02<br />

10/16/08 Changed description, objectives. Updated<br />

reference list<br />

Wild<br />

Dufner<br />

-348-


1. Local and global role <strong>of</strong> iS<br />

2. Knowledge <strong>of</strong> computing<br />

3. Analysis and design<br />

4. Communication<br />

5. Computer-based tools<br />

6. Work on a team<br />

7. Pr<strong>of</strong>essional, legal, ethical standards<br />

8. Model processes and data<br />

9. Design, implement, evaluation IS<br />

10. Manage projects<br />

11. Manage IS within application env.<br />

12. Manage change<br />

13. Recognize need for pr<strong>of</strong>. develop.<br />

Mapping <strong>of</strong> IS Program Outcomes vs. course objectives<br />

Department and Course Number ISQA 4910<br />

Course Title<br />

Introduction to Project Management<br />

Course Coordinator<br />

Donna Dufner<br />

Total Credits 3<br />

Date <strong>of</strong> Last Revision 5/26/09<br />

S – Strong relationship<br />

X – Contributing relationship<br />

<strong>BIS</strong> Program Outcomes<br />

Course objective<br />

Understand the fundamentals <strong>of</strong> project<br />

X X S S<br />

planning, project scheduling, and project<br />

control<br />

Understand earned value project<br />

S S S<br />

management<br />

Understand quality issues for project<br />

X S S<br />

management<br />

Understand the fundamentals <strong>of</strong> the<br />

X X S S<br />

management <strong>of</strong> risk<br />

Apply the fundamentals earned value<br />

S S X<br />

project management tools and<br />

techniques<br />

Create Work break down structures X S S X<br />

Manage projects using the Critical Path<br />

S S S X S<br />

Methodology<br />

Manage projects using the Cost S S X S<br />

-349-


performance index (CPI) as a<br />

performance and forecasting metric<br />

Manage projects using the Schedule<br />

performance index (SPI) as a<br />

performance and forecasting metric<br />

Calculate and evaluate the actual<br />

performance against baseline metrics for<br />

project management and control<br />

S S X S<br />

S S X S<br />

-350-


<strong>BIS</strong> Program Outcomes (2009)<br />

1. understand the local and global role <strong>of</strong> information systems in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

2. have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to the discipline.<br />

3. apply traditional and contemporary analysis and design techniques to identify and analyze organizational<br />

problems or opportunities, formulate appropriate strategies and solutions using information<br />

technologies, and evaluate the effectiveness <strong>of</strong> proposed solutions<br />

4. communicate effectively to a range <strong>of</strong> audiences through listening and through oral, written, and visual<br />

presentation.<br />

5. understand and apply appropriate types <strong>of</strong> computer-based tools to support communication.<br />

6. work effectively in a team environment and collaborate with others to accomplish a common goal.<br />

7. understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

8. understand and model organizational processes and data.<br />

9. design, integrate, implement, and evaluate a computer-based system, process, component, or program to<br />

meet desired needs.<br />

10. manage projects.<br />

11. manage information systems within a specific application environment.<br />

12. manage change.<br />

13. recognize the need for continuing pr<strong>of</strong>essional development<br />

-351-


-352-


APPENDIX 3 – FACULTY VITAE<br />

On separate pages, please furnish the following information for all faculty members who teach courses allowed<br />

for the major, including those who have administrative positions in the department (chair, associate chair, etc.).<br />

Use the form given below as guidance. This form need not be followed exactly, but all requested information<br />

should be supplied. Use a common format for all faculty members. Limit information to no more than three<br />

pages per person, providing only the most recent information if needed to limit space. Place the form(s) for<br />

administrators first, followed by the others in alphabetical order.<br />

If you are having more than one program evaluated, particularly if the programs are on separate campuses,<br />

indicate clearly the program(s) and/or campus(es) to which an individual is assigned, and the percentage <strong>of</strong> time<br />

to each, if more than one.<br />

-353-


-354-


Hesham Ali, Dean<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Hesham H. Ali<br />

Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Associate Dean for<br />

Academic Affairs,<br />

College <strong>of</strong> Information<br />

Science and Technology<br />

Pr<strong>of</strong>essor, Department<br />

<strong>of</strong> Computer Science<br />

Associate Pr<strong>of</strong>essor,<br />

Department <strong>of</strong><br />

Computer Science<br />

Assistant Pr<strong>of</strong>essor,<br />

Department <strong>of</strong><br />

Computer Science<br />

Dates Held<br />

January 2000 – July 2006<br />

August 2000 – Present.<br />

August 1994 – August 2000.<br />

August 1988 – August 1994<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph. D Computer Science <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-Lincoln 1988<br />

M. Sc Computer Science Alexandria <strong>University</strong>, Egypt 1985<br />

B. Sc Computer Science Alexandria <strong>University</strong>, Egypt 1982<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

-355-


Dates Where Duties<br />

June 2000 –<br />

Present<br />

October 2001 –<br />

Present<br />

Department <strong>of</strong> Pathology and<br />

Microbiology, <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> Medical Center<br />

<strong>Nebraska</strong> Informatics Center<br />

for Life Sciences (NICLS)<br />

2002 – Present <strong>Nebraska</strong> Center for Biosecurity<br />

(NCB), <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong><br />

August 1996 -<br />

August 1997<br />

Department <strong>of</strong> Computer<br />

Science, SQU, Muscat, Oman<br />

Associate Pr<strong>of</strong>essor (courtesy)<br />

Deputy Director for Computational sciences<br />

Member<br />

Visiting Associate Pr<strong>of</strong>essor (Acting Department<br />

Head January 1997 – August 1997).<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Lee D. and Willa Seemann Distinguished Dean, College <strong>of</strong> Information Science and Technology,<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong><br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

-356-


P. Ciborowski and H. Ali, Bioinformatics In: Proteomics for Undergraduates. Book Chapter in A. Kraj and<br />

J. Silberring (eds.), Wiley Inc., 2008.<br />

H. Ali and N. Sherwani, Introduction to Graph Algorithms, to be published by Wiley & Sons, 2008.<br />

X. Deng , H. Geng and H. Ali, “A Hidden Markov Model Approach to Predicting Yeast Gene Function from<br />

Sequential Gene Expression Data,” The International Journal <strong>of</strong> Bioinformatics Research and<br />

Applications, 2008.<br />

X. Deng , H. Geng and H. Ali, “Cross-platform Analysis <strong>of</strong> Cancer Biomarkers: A Bayesian Network<br />

Approach to Incorporating Mass Spectrometry and Microarray Data,” Journal <strong>of</strong> Cancer Informatics,<br />

2007.<br />

A. Sadanandam, M. Varney, L. Kinarsky, H. Ali, R. Lee Mosley, R. Singh, “Identification <strong>of</strong> Functional Cell<br />

Adhesion Molecules with a Potential Role in Metastasis by a Combination <strong>of</strong> in vivo Phage Display and in<br />

silico Analysis,” OMICS: A Journal <strong>of</strong> Integrative Biology, Mar 2007, Vol. 11, No. 1: 41-57.<br />

X. Huang and H. Ali, “High Sensitivity RNA Pseudoknot Prediction,” Nucleic Acid Research, 2007.<br />

H. Geng, X. Deng and H. Ali, “MPC: a Knowledge-based Framework for Clustering under Biological<br />

Constraints,” Int. J. Data Mining and Bioinformatics, Volume 2, Number 2, 2007.<br />

A. Abdelaal, H. Ali and H. Sharif, A Coarse-Grain Analysis for the Performance <strong>of</strong> Measurement-based<br />

Admission Control Algorithms. Journal <strong>of</strong> Computational Methods in Science and Engineerning, Volume<br />

6, Number 5-6, pp. S349-S358, 2006.<br />

X. Deng, H. Geng, D. Bastola and H. Ali, “Link Test — A Statistical Method for Finding Prostate Cancer<br />

Biomarkers," Journal <strong>of</strong> Computational Biology and Chemistry, 2006.<br />

A. Churbanov, I. Rogozine, J. Deogun, and H. Ali, “Method <strong>of</strong> Predicting Splice Sites Based on Signal<br />

Interactions,” Biology Direct, 2006.<br />

X. Deng, H. Geng, and H. Ali, “Joint Learning <strong>of</strong> Gene Functions--A Bayesian Network Model Approach".<br />

Journal <strong>of</strong> Bioinformatics and Computational Biology, Vol. 4, No. 2, pp. 217-239, 2006.<br />

X. Deng and H. Ali, EXAMINE, “A Computational Approach to Reconstructing Gene Regulatory<br />

Networks,” Journal <strong>of</strong> BioSystems, 81:125-136, 2005.<br />

A. Churbanov, M. Pauley, D. Quest and H. Ali, “A method <strong>of</strong> precise mRNA/DNA homology-based gene<br />

structure prediction,” BMC Bioinformatics, 6:261, 2005.<br />

A. Mohamed, D. Kuyper, P. Iwen, H. Ali, D. Bastola and S. Hinrichs, “Computational approach for the<br />

identification <strong>of</strong> Mycobacterium species using the internal transcribed spacer-1 region,” Journal <strong>of</strong><br />

Clinical Microbiology, Vol. 43, No. 8: 3811-3817, 2005.<br />

-357-


A. Churbanov, I. Rogozin, V. Babenko, H. Ali and E. Koonin, Evolutionary conservation suggests a<br />

regulatory function <strong>of</strong> AUG triplets in 5'UTRs <strong>of</strong> eukaryotic genes, Nucleic Acid Research, 33(17), pp.<br />

5512-20, Sep 2005.<br />

D. Plum and H. Ali, An Evolutionary Approach to Vehicle Routing Problem with dynamic time and<br />

Precedence Relationships. Journal <strong>of</strong> Computational Methods in Science and Engineerning, Volume 5,<br />

Number1, pp. S57-S66, 2005.<br />

N. Sharma, J. Youn, N. Shrestha and H. Ali, “Direction Finding Signage System using RFID for Healthcare<br />

Applications,” Proceedings <strong>of</strong> The International Conference on BioMedical Engineering and Informatics<br />

(BMEI2008), Sanya, Hainan, China, May 27-30, 2008.<br />

J. Uher, D. Sad<strong>of</strong>sky, J. Youn, H. Ali, H. Sharif, J. Deogun, and S. Hinrichs, “I2MeDS: Intelligent Integrated<br />

Medical Data System,” Proceedings <strong>of</strong> The International Conference on BioMedical Engineering and<br />

Informatics (BMEI2008), Sanya, Hainan, China, May 27-30, 2008.<br />

H. Geng, H. Ali and J. Chan, “A Hidden Markov Model Approach for Prediction <strong>of</strong> Genomic Alterations from<br />

Gene Expression Pr<strong>of</strong>iling,” Proceedings <strong>of</strong> the fourth International Symposium on Bioinformatics Research<br />

and Applications (ISBRA), Atlanta, Georgia, May 6-9, 2008.<br />

D. Qwest, K. Dempsey, D. Bastola and H. Ali, “A Parallel Architecture for Regulatory Motif Algorithm<br />

Assessment,” Proceedings <strong>of</strong> the Seventh IEEE International Workshop on High Performance Computational<br />

Biology (HiCOMP 2008), in conjunction with IPDPS 2008. Miami, Florida, April 24-30, 2008.<br />

S. Pawaskar and H. Ali, “Dynamic Energy Aware Task Scheduling for Periodic Tasks using Expected<br />

Execution Time Feedback,” Proceedings <strong>of</strong> the International Conference on Parallel Computing and<br />

Networks (PDCN 2008), Innsbruck, Austria, Feb 12-14, 2008.<br />

Y. Mohsenin and H. Ali, “A New Genetic Algorithm for Resource Constrained Project Scheduling,”<br />

Proceedings <strong>of</strong> the International Conference on Artificial Intelligence and Applications (AIA 2008),<br />

Innsbruck, Austria, Feb 11-13, 2008.<br />

D. Bastola, S. Chandio, P. Iwen, S. Hinrichs and H. Ali, “RFLP-WAVE Analysis for Rapid Identification <strong>of</strong><br />

Medically Important Fungi,” Proceedings <strong>of</strong> the 2008 Hawaii International Conference on System Sciences<br />

(HICSS-41), Kona, January 7-10, 2008.<br />

S. Kanapuram and H. Ali, “On the Impact <strong>of</strong> configuration <strong>of</strong> Access Points on the Performance <strong>of</strong> Wireless<br />

Networks,” Proceedings <strong>of</strong> the International Conference on Parallel and Distributed Computing and Systems<br />

(PDCS 2007), Cambridge, November 19-21, 2007.<br />

X. Huang and H. Ali, “Reducing Folding Scenario Candidates in Pseudoknots Detection Using Highly<br />

Sensitive PLMM_DPSS Algorithm Integrated With Energy Filters,” Proceedings <strong>of</strong> the 7th IEEE<br />

International Conf on Bio-Informatics and Bio-Engineering (BIBE 2007), pp. 1299 -1303, Boston, October<br />

14-17, 2007.<br />

J. Youn, H. Ali, H. Sharif, J. Deogun, J. Uher and S. Hinrichs, “WLAN-based Real-time Tracking System in<br />

Healthcare,” Proceedings <strong>of</strong> IEEE Wireless and Mobile Computing, Networking and Communications<br />

(WiMob 2007), White Plain, New York, October 8-10, 2007.<br />

S. Mudundi and H. Ali, “A Robust Scalable Cluster-Based Multihop Routing Protocol for Wireless Sensor<br />

Networks,” Proceedings <strong>of</strong> the Fifth International Symposium on Parallel and Distributed Processing and<br />

Applications (ISPA07), Niagara Falls, Canada, August 29-31, 2007.<br />

D. Quest, W. Tapprich and H. Ali, “A Grammar Based Methodology for Structural Motif Finding in ncRNA<br />

Database Search, Proceedings <strong>of</strong> the 2007,” IEEE Computer Society Bioinformatics Conference (CSB 2007),<br />

-358-


<strong>University</strong> <strong>of</strong> California, San Diego, USA, August 13-17, 2007.<br />

A. Abdelaal and H. Ali, “A Typology for Community Wireless Networks Business Models,” Proceedings <strong>of</strong><br />

2007 Americas Conference on Information Systems (AMCIS-13 2007), Keystone, Colorado, August 9-12,<br />

2007.<br />

S. Mudundi and H. Ali, “A New Robust Genetic Algorithm for Dynamic Cluster Formation in Wireless<br />

Sensor Networks,” Proceedings <strong>of</strong> the International Conference on Wireless and Optical Communication<br />

(WOC 2007), Montréal, Canada, May 30- June 01, 2007.<br />

S. Pawaskar and H. Ali, “Dynamic Energy Aware Task Scheduling using Run-Queue Peek,” Proceedings <strong>of</strong><br />

the International Conference on Parallel Computing and Networks (PDCN 2007), Innsbruck, Austria, Feb 13-<br />

15, 2007.<br />

H. Geng, J. Iqbal, X. Deng, W. Chan and H. Ali, “Virtual CGH: Prediction <strong>of</strong> Novel Regions <strong>of</strong><br />

Chromosomal Alterations in Natural Killer Cell Lymphoma from Gene Expression Pr<strong>of</strong>iling,” Proceedings <strong>of</strong><br />

the 2007 Hawaii International Conference on System Sciences (HICSS-40), Kona, January 3-6, 2007.<br />

S. Kanapuram, H. Ali and G. de Vreede, “On Effective Utilization <strong>of</strong> Wireless Networks in Collaborative<br />

Applications,” Proceedings <strong>of</strong> the Second International Conference on Collaborative Computing<br />

(CollaborateCom 2006), Atlanta, Georgia, November 17-20, 2006.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

“CCLI: Integrating Bioinformatics into the Life Sciences,” Co-PI, National Science Foundation (NSF), total<br />

Award at UNO: $149,807, January 15, 2008 – December 31, 2009.<br />

“Design and Development <strong>of</strong> Secure and Robust Network Infrastructure for Critical Medical<br />

Applications,” PI, <strong>Nebraska</strong> Research Initiative (NRI), total Award at UNO: $367,671, July 1, 2006 – June<br />

30, 2008.<br />

“Center for Mobile Computing,” PI, NSF EPSCoR, total Award at UNO: $500,000, February 1, 2004 –<br />

January 31, 2007.<br />

“<strong>Nebraska</strong> High Performance Wireless Research and Education Network,” PI, <strong>Nebraska</strong> Research<br />

Initiative (NRI), total Award at UNO: $681,232, July 1, 2004 – June 30, 2006.<br />

“IDeA Networks for Biomedical Research Excellence,” Co-I: (PI <strong>of</strong> UNO component), NIH INBRE, total<br />

Award at UNO: $1,382,586, June 1, 2004 – May 31, 2009.<br />

“Center for Mobile Computing,” PI, Supplement Grant, NSF EPSCoR, total Award at UNO: $35,000,<br />

February 1, 2005 – January 31, 2006.<br />

“The Development <strong>of</strong> Med-IT Cancer Data Management System,” MaCallie & Associates, PI, $44,000,<br />

March 1, 2005 – May 5, 2006.<br />

“<strong>Study</strong> <strong>of</strong> Innovative Approaches for Efficient Satellite Communications,” Co-PI, A Joint IST and CET (PKI)<br />

-359-


Project, L-3 Compcept, $300,000, March 25, 2005 – March 25, 2006.<br />

“<strong>Nebraska</strong> Research Network in Functional Genomics,” Co-I (PI <strong>of</strong> UNO Component), Supplement Grant,<br />

NIH, total Award at UNO: $195,190, June 1, 2005 – April 30, 2006.<br />

“High-Technology Workforce Support for Baccalaureate Degree Seeking Students,” Co-PI, NSF STEP,<br />

total Award at UNO: $1,999,416, June 1, 2004 – May 31, 2009.<br />

“Construction <strong>of</strong> a Targeted Rhesus Macaque Microarray,” Co-PI (PI <strong>of</strong> UNO Component), NIH, total<br />

Award at UNO: $239,282, June 18, 2003 – April 30, 2006.<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number<br />

Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009<br />

Fall 2008<br />

CSCI<br />

4150/8156<br />

MATH<br />

4150/8156<br />

BIO<br />

4860/8866<br />

Graph Theory and Applications 3 17<br />

Graph Theory and Applications 3 4<br />

Bioinformatics Algorithms 3 11<br />

Summer 2008 CSCI 8325 Data Structures 3 1<br />

Spring 2008<br />

CSCI<br />

4150/8156<br />

MATH<br />

4150/8156<br />

Graph Theory and Applications 3 23<br />

Graph Theory and Applications 3 13<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

-360-


14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-361-


-362-


Deepak Khazanchi, Associate Dean<br />

Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Deepak Khazanchi<br />

Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Associate Pr<strong>of</strong>essor <strong>of</strong> Information Systems and Quantitative Analysis 7/2000 - 7/2001<br />

Full Pr<strong>of</strong>essor <strong>of</strong> Information Systems and Quantitative Analysis<br />

8/2001 - till date<br />

Associate Pr<strong>of</strong>essor <strong>of</strong> Information Systems and Quantitative Analysis 7/2000 – 7/ 2001<br />

Interim Department Chair, Information Systems and Quantitative Analysis 6/2001 - 4/2002<br />

Peter Kiewit Distinguished Pr<strong>of</strong>essor (Discontinued due to the move to an<br />

8/2005 - 11/ 2006<br />

administrative position)<br />

Department Chair, Information Systems and Quantitative Analysis 4/2002 -11/2006<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. Management Information Systems Texas Tech <strong>University</strong>, Lubbock 1991<br />

M.B.A Southern Illinois <strong>University</strong>- Carbondale, Carbondale 1988<br />

B. Tech<br />

(Honors)<br />

Civil Engineering Indian Institute <strong>of</strong> Technology, Kharagpur, India 1981<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

N/A<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Abdelaal, A., Ali, H. and Khazanchi, D. (2009, Jan 5-8). “The Role <strong>of</strong> Social Capital in the Creation <strong>of</strong><br />

Community Wireless Networks.” Proceedings <strong>of</strong> the forty-second Annual Hawaii International<br />

Conference on Systems Sciences (HICSS-42). [PDF]<br />

Davis, A. and Khazanchi, D. (2008, June 9-11). An exploratory investigation <strong>of</strong> the development <strong>of</strong><br />

mutual knowledge in global virtual project teams. Proceedings <strong>of</strong> the 16th European Conference on<br />

Information Systems (ECIS-16), Galway, Ireland.<br />

Khazanchi, D., Murphy, John and Petter, S. (2008, May 23-24). "Guidelines for Evaluating Patterns in<br />

-363-


the IS Domain", Proceedings <strong>of</strong> the 2nd Midwest United States Association for Information Systems<br />

Conference (MWAIS08), Eau Claire, Wisconsin.<br />

Petter, S., Khazanchi, D. and Murphy, J. (2008, May 7-9). "A Design Science Based Evaluation<br />

Framework for Patterns", In: V. Vaishnavi & R. Baskerville (Eds). Proceedings <strong>of</strong> the Third<br />

International Conference on Design Science Research in Information Systems and Technology<br />

(DESRIT 2008), May 7- 9, 2008, Atlanta, Georgia: Georgia State <strong>University</strong>.<br />

Davis, A. and Khazanchi, D. (2007, August 9-12). The influence <strong>of</strong> online word <strong>of</strong> mouth on product<br />

sales in retail e-commerce: An empirical investigation . Proceedings <strong>of</strong> the 13th Annual Americas<br />

Conference on Information Systems (AMCIS-13), Keystone, Colorado.<br />

Murphy, J. D. and Khazanchi, D. (2007, May 18-19th). "The Effects <strong>of</strong> Pairing Participants in<br />

Facilitated Group Support Systems Sessions." Proceedings <strong>of</strong> the 2nd Midwest United States<br />

Association for Information Systems Conference (MWAIS07), Springfield, Illinois. Awarded 2nd Best<br />

Paper.<br />

Davis, A. and Khazanchi, D. (2007, May 18-19th). "The Influence <strong>of</strong> Transactive Memory on Mutual<br />

Knowledge in Virtual Teams: A Theoretical Proposal." Proceedings <strong>of</strong> the 2nd Midwest United States<br />

Association for Information Systems Conference (MWAIS07), Springfield, Illinois.<br />

Zigurs, I. and Khazanchi, D. (2007, May 18-19, 2007). Panel on “Transforming education in<br />

information systems and technology,” the 2nd Midwest United States Association for Information<br />

Systems Conference (MWAIS 2007), Springfield, Illinois. Also participated as a panelist.<br />

Peng, Y., Kou, G., Sabatka, A., Matza, J., Chen, Z., Khazanchi, D. and Shi, Y. (2007, May 27-30).<br />

"Application <strong>of</strong> Classification Methods to Individual Disability Income Insurance Fraud Detection".<br />

International Conference on Computational Science (ICCS 2007), Beijing, China.<br />

Yan, Nian and Khazanchi, D. (2007, May 27-30). "Concept Level Web Search via Semantic<br />

Clustering". International Conference on Computational Science (ICCS 2007), Beijing, China.<br />

Khazanchi, D. and Zigurs, I. (2007, January 3-7). "An Assessment Framework for Developing and<br />

Using Patterns for the Effective Management <strong>of</strong> Virtual Projects." Proceedings <strong>of</strong> the Hawaii<br />

International Conference on System Sciences (HICSS-40).<br />

Arnold, V., Hampton, C., Khazanchi, D. and Sutton, S. (2006; September 7-8th). "Risk Analysis in<br />

Extended Enterprise Environments: Identification <strong>of</strong> Critical Risk Factors in B2b E-Commerce<br />

Relationships". Proceedings <strong>of</strong> the Fourth Annual CABIT (Center for Advancing Business through<br />

Information Technology) Symposium, Phoenix, AZ, http://symposium.cabit.wpcarey.asu.edu.<br />

Ni, Jinlan and Khazanchi, D. (2006; November 18-21). "Asymmetric Information and New IT<br />

Investment", Proceedings <strong>of</strong> the Decision Sciences Institute's 37th Annual Meeting, San Antonio, TX.<br />

Peng, Y., Kou, G., Sabatka, A., Chen, Z., Khazanchi, D. and Shi, Y. (2006, October 25-27th).<br />

"Application <strong>of</strong> Clustering Methods to Health Insurance Fraud Detection", Proceedings <strong>of</strong> the IEEE<br />

International Conference on Services Systems and Services Management (ICSSSM06), Université de<br />

Technologie de Troyes, France (http://www.utt.fr/icsssm06/).<br />

Martin, A. and Khazanchi, D. (2006, August 4-6th). "Information Availability and Security Policy".<br />

Proceedings <strong>of</strong> the Americas Conference on Information Systems (AMCIS 2006), Acapulco, Mexico.<br />

Tarmizi, H., Khazanchi, D. and Noteboom, C. (2006, May 5-6th). "Electronic Medical Records:<br />

Barriers to Adoption and Diffusion." Proceedings <strong>of</strong> the 1st Midwest United States Association for<br />

Information Systems Conference (MWAIS06), Grand Rapids, Michigan.<br />

Davis, A. and Khazanchi, D. (2006, May 5-6th). "Mutual Knowledge and its Impact on Virtual Team<br />

Performance." Proceedings <strong>of</strong> the 1st Midwest United States Association for Information Systems<br />

Conference (MWAIS06), Grand Rapids, Michigan.<br />

Attended AMCIS 2004 NYC as a delegate and AMCIS 2005 conference co-chair<br />

-364-


Khazanchi, D. and Zigurs, I. (2005, May 21st, 2005). "Patterns <strong>of</strong> Virtual Projects", PMI Project<br />

Management Research Programme Working Session", Edinburgh, Scotland, UK (part <strong>of</strong> the PMI<br />

Global Congress-EMEA).<br />

V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton (2005, August 7-10th). "B2B E-Commerce<br />

Assurance: The Influence <strong>of</strong> Partner Risk on Assurance Desirability & Relationship Satisfaction."<br />

American Accounting Association (AAA) Annual Meeting, San Francisco, California.<br />

V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton. (2004, August 8-11th). "Risk Analysis in an<br />

Extended Enterprise Environment: Identification <strong>of</strong> Key Risk Factors in B2B E-Commerce<br />

Relationships." Proceedings <strong>of</strong> the American Accounting Association (AAA) Annual Meeting,<br />

Orlando, Florida.<br />

V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton (2004, November 5-6th). "B2B E-Commerce<br />

Assurance: The Influence <strong>of</strong> Partner Risks On Continuous Assurance Desirability & Relationship<br />

Satisfaction." The Eighth Rutgers Continuous Auditing & Reporting Symposium<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

N/A<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

N/A<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Committee membership – 5 hours/week<br />

Advising – 3 hours/week<br />

Associate Dean for Academic Affairs – 20 hours/week (carries an additional stipend)<br />

Grant Administration, Writing and Development – 5 hours/week<br />

Supervision <strong>of</strong> Graduate students (including MS and PhD)– 3 hours/week<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

UNMC Interoperability Standards Task Force (2009-).<br />

Chair, IS&T Scholarship Committee (2009-).<br />

Chair, IA Faculty Search Committee (2009-)<br />

Peter Kiewit Institute (PKI) Executive Director Search Committee (2008-09).<br />

UNMC Clinical Data Standards (CDR) Committee (2007-08)<br />

Chancellor Search Committee (2006-07)<br />

-365-


IS&T ABET Steering Committee (2003-till date)<br />

General Education Think Tank (2006-till date)<br />

College <strong>of</strong> IST Grant Writer Search Committee, 2006<br />

General Education Review Task Force (2006-till date)<br />

Scott Scholarship Selection Committee (2003-until date)<br />

Academy <strong>of</strong> Excellence Selection Committee (2004-till date)<br />

Walter Scott Entrepreneurship Award Committee (2005-2007; Committee Chair, 2006)<br />

Peter Kiewit Institute Student Entrepreneurship Award Committee (2005-2007; Committee Chair, 2006)<br />

PKI Chairs Committee (2001-2005)<br />

IS&T Academic Prioritization Report Task Force, (2005)<br />

IS&T IT Steering Committee (2005-2006)<br />

IS&T Dean's Expanded Executive Committee (2001-till date)<br />

Academy <strong>of</strong> Excellence (AOE) Committee (2005-till date)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Owens, D., Davis, A., Murphy, J., Khazanchi, D. and Zigurs, I. (2009, March-April). "Moving First Life into<br />

Second Life: Real World Opportunities for Virtual Teams and Virtual World Project Management." IT<br />

Pr<strong>of</strong>essional (a IEEE Publication), Volume 11, Issue 2, pp. 34-41.<br />

Davis, A., Owens, D., Murphy, J., Khazanchi, D. and Zigurs, I. (2009, February). "Avatars, People, and Virtual<br />

Worlds: Foundations for Research in Metaverses." Journal <strong>of</strong> the Association for Information Systems, Volume<br />

10, Issue 2 , Article 2, pp. 90-117.<br />

Ni, J. and Khazanchi, D. (2009, March, Forthcoming). "Information Technology (IT) Investment Decisions<br />

Under Asymmetric Information: A Modified Rational Expectation Model." International Journal <strong>of</strong> Information<br />

Technology and Decision Making (IT&DM), Volume 8, Issue 1. [Pre-Print Draft PDF].<br />

Murphy, J. and Khazanchi, D. (2008, Fall). "Synergistic Ideation through Pairing Participants in Facilitated<br />

Group Support Systems Sessions." American Journal <strong>of</strong> Business, Volume 23, No. 2, pp. 27-35. [PDF].<br />

Davis, A. and Khazanchi, D. (2008, May). "An Empirical <strong>Study</strong> <strong>of</strong> Online Word <strong>of</strong> Mouth as a Predictor for<br />

Multi-product Category E-commerce Sales", Electronic Markets, Volume18, Issue 2, pp. 130-141. [PDF]<br />

Zigurs, I. and Khazanchi, D. (2008, Spring). "From Pr<strong>of</strong>iles to Patterns: A New View <strong>of</strong> Task-Technology Fit."<br />

Information Systems Management, Volume 25 Issue 1, pp. 8 –13. [PDF].<br />

Sutton, S., Khazanchi, D., Hampton, C. and Arnold, V. (2008, Special Issue). "Risk Analysis in Extended<br />

Enterprise Environments: Identification <strong>of</strong> Critical Risk Factors in B2B E-Commerce Relationships." Journal <strong>of</strong><br />

the Association <strong>of</strong> Information Systems (JAIS), Volume 9, Issue 3/4, Article 4, pp. 151-174. [PDF].<br />

Davis, A. and Khazanchi, D. (2007, Fall). "Does Mutual Knowledge Affect Virtual Team Performance?<br />

Theoretical Analysis and Anecdotal Evidence." American Journal <strong>of</strong> Business (AJB), Volume 22, No. 2, pp. 57-<br />

65. [PDF].<br />

Khazanchi, D. and Zigurs, I. (2006, July-September). "Patterns for Effective Management <strong>of</strong> Virtual Projects:<br />

Theory and Evidence." International Journal <strong>of</strong> electronic Collaboration (IJeC) -- Special Issue on Collaborative<br />

Project Management, Volume 2, No. 3, pp. 25-49. [PDF].<br />

Dasgupta, P. and Khazanchi, D. (2005). "An Adaptive Decision Support System for Academic Course<br />

Scheduling Using S<strong>of</strong>tware Agents." International Journal <strong>of</strong> Technology in Teaching and Learning (IJTTL),<br />

Volume 1, Issue 2, 63-78. [PDF].<br />

Khazanchi, D. (2005, Spring). "Information Technology (IT) Appropriateness: The Contingency Theory <strong>of</strong> “Fit”<br />

-366-


and IT Implementation in Small and Medium Enterprises". Journal <strong>of</strong> Computer Information Systems, Volume<br />

XLV, No. 3, pp. 88-95.<br />

Owens, D. and Khazanchi, D. (2009; Forthcoming). "S<strong>of</strong>tware Quality Assurance." In: Kidd, T.T. (2009),<br />

Handbook <strong>of</strong> Research on Technology Project Management, Planning and Operations, Hershey, PA:<br />

Information Science Reference (an imprint <strong>of</strong> IGI Global).<br />

Khazanchi, D. and Martin, A. (2009). "Information Availability." In: Gupta, J.D. and Sharma, S. Editors (2009),<br />

Handbook <strong>of</strong> Research on Information Security and Assurance, Hershey, PA: IGI Global, Chapter XIX, pp. 230-<br />

239.<br />

Zigurs, I. and Khazanchi, D. (2008). "Applying Pattern Theory in the Effective Management <strong>of</strong> Virtual Projects."<br />

In: Kock, N., Editor (2008), E-Collaboration in Modern Organizations: Initiating and Managing Distributed<br />

Projects, Advances in e-Collaboration Series, Volume 2, Hershey, PA: IGI Global, Chapter VII, pp. 93-112.<br />

Zigurs, I., Khazanchi, D. and Mametjanov, A. (2007). "The Practice and Promise <strong>of</strong> Virtual Project<br />

Management." In: Kock, N., Editor (2007, December), Encyclopedia <strong>of</strong> E-Collaboration, Hershey, PA:<br />

Information Science Reference (an imprint <strong>of</strong> IGI Global), ISBN: 978-1-59904-000-4, Chapter 116, pp. 1-7.<br />

[PDF]. Also published in Kisielnicki, J., Editor (2008, June), Virtual Technologies: Concepts, Methodologies,<br />

Tools, and Applications, Hershey, PA: Information Science Reference (an imprint <strong>of</strong> IGI Global), ISBN: 978-1-<br />

59904-955-7, Chapter 1.13, pp. 177-184.<br />

Khazanchi, D. and Zigurs, I. (2008). "Patterns for Effective Management <strong>of</strong> Virtual Projects: Theory and<br />

Evidence." Also published in Kisielnicki, J., Editor (2008, June), Virtual Technologies: Concepts, Methodologies,<br />

Tools, and Applications, Hershey, PA: Information Science Reference (an imprint <strong>of</strong> IGI Global), ISBN: 978-1-<br />

59904-955-7, Chapter 7.2, pp. 1368-1389.<br />

Khazanchi, D. & Zigurs, I. (2005). Patterns <strong>of</strong> effective management <strong>of</strong> virtual projects: An exploratory study.<br />

Newtown Square, PA: Project Management Institute. ISBN: 1930699832.<br />

V. Arnold, C. Hampton, D. Khazanchi and S.G. Sutton. (2004). Enterprise Risk Management: Identifying Risk in<br />

B2B E-Commerce Relationships. Altamonte Springs, Fl: The Institute <strong>of</strong> Internal Auditors (IIA) Research<br />

Foundation. ISBN: 0-89413-554-6. [To purchase this book, please visit the IIA book store]. 102 pages.<br />

Khazanchi, D. and Reich, B.H. (2008, October). "Achieving IT project success through control, measurement,<br />

managing expectations, and top management support," (Guest Editorial), International Journal <strong>of</strong> Project<br />

Management (IJPM). Volume 26, Issue 7 , pp. 699.<br />

Davis, A. , Khazanchi, D., Murphy, J., Owens, D., & Zigurs, I. (2008). "Challenges and lessons learned from<br />

virtual world research," Midwest Association for Information System (MWAIS) Newsletter, 2 (2), pp. 3.<br />

Khazanchi, D. and Petter, S. (2006; Fall). "The Need for Improved IT Project Manegemnet in e-Service Projects<br />

and Beyond" (Guest Editors' Column), e-Service Journal (e-SJ), 5:1, pp. 1-3.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

Gouttierre, T. (PI) and Khazanchi, D. (IT-coordinator) (1/1/2009-12/31/2010; In progress). "US-Russia Partnership<br />

for Technology, Language, and Cultural Exchange", $398,103 grant from the US Department <strong>of</strong> Education.<br />

Khazanchi, D. and Zigurs, I. (2008). "Metaverse Research Lab", funded by the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Foundation<br />

for $20,000.<br />

Khazanchi, D., Najjar, L. and Wolcott, P. (1/1/2008-3/2009). "Business Database Competitive Audit Project".<br />

Awarded a grant <strong>of</strong> $17,603 for conducting a comparative business database audit for InfoUSA.<br />

Munkvold, B.E., Moe, C.E, Khazanchi, D. and Zigurs, I. (2008-2011; In progress). " Partnerships in Higher Education<br />

Norway - North America 2008-2011". <strong>University</strong> <strong>of</strong> Agder (UiA), Kristiansand, Norway and UNO's IS&T<br />

-367-


collaborated to obtain a grant <strong>of</strong> nearly $100,000 per year for 3.5 years from the Norwegian Centre for<br />

International Cooperation in Higher Education (an agency under the Ministry <strong>of</strong> Education and Research) to<br />

continue and extend the partnership between UiA and UNO. Khazanchi will serve as the Project Director for<br />

administering the grant on the UNO campus. The grant will fund large student exchanges between the two<br />

universities (35 students each way) and allow faculty and researchers to visit each campus for workshops and to<br />

establish and expand research collaborations.<br />

Davis, A., Zigurs, I., Khazanchi, D. and Munkvold, B. (June – August 2007). "Teaching and learning virtual<br />

collaboration across cultures and technologies,” funded by <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> Institute for<br />

Collaboration Science (ICS) Summer Seed Grant, $1000.<br />

Khazanchi, D. (3/2007). "infoUSA: Spring Break in India " Awarded $45,000 by infoUSA for UNO/UNL students visit<br />

to India to learn about Indian businesses, culture and educational workshops at UNO's sibling university, IIT<br />

Kharagpur.<br />

Buchanan, L. (PI; 2007) and Khazanchi, D. (Consultant). "Follow-up Relationships Intended to END Smoking<br />

(Portable Electronic Device <strong>Study</strong>)". $40,000 award from <strong>Nebraska</strong> Dept <strong>of</strong> Health and Human Services Cancer and<br />

Smoking Grants (LB 506).<br />

Khazanchi, D. (2006). UNMC (<strong>University</strong> Medical Center - College <strong>of</strong> Nursing) sub-grant for $3000 to develop a<br />

"Portable Electronic Device Application" for Buchanan, L. (2006) for her "Follow-up Relationships Intended to END<br />

Smoking (Portable Electronic Device <strong>Study</strong>)" research initiative.<br />

Khazanchi, D., Chen, Z. and Shi, Y. (6/26/2006 to 7/26/2006; Completed). "Mutual <strong>of</strong> <strong>Omaha</strong> Special Investigation<br />

Department (SID) Data Mining Project – Individual Disability Income Product". Awarded $23,900 by Mutual <strong>of</strong><br />

<strong>Omaha</strong>.<br />

de Vreede, Gert-Jan, Jones, E., Khazanchi, D., Rilett, L. and Zigurs, I. (2005; Completed). "Applying Patterns <strong>of</strong><br />

Technology-Enabled Distributed Collaboration: Improving Multi-Actor Decision-Making in Traffic Systems."<br />

Awarded $10,000 by the PKI Coordinating Council, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>.<br />

Khazanchi, D. and Shi, Y. (7/1/2005 to 8/31/2005; Completed). "SID-Data Classification for Disability Income<br />

Product". Awarded $22,500 by Mutual <strong>of</strong> <strong>Omaha</strong>.<br />

Khazanchi, D. (7/1/2005-7/12006). "infoUSA: PKI-IIT-VGSOM Student/Faculty Exchange Grant." Awarded $35,000<br />

by infoUSA.<br />

Najjar, L., Khazanchi, D., and Wolcott, P. (1/1/2005 to 3/1/2005; Completed). "Business Database Competitive<br />

Audit Project". Awarded a grant <strong>of</strong> $14,575 for conducting a business database audit for InfoUSA. This project is<br />

being conducted under the auspices <strong>of</strong> the PKI Technology Development Corp (PKITDC).<br />

Harvey, D. and Khazanchi, D. (11/2004 to 7/2005; Completed). “Union Pacific -- Engineering Management Group<br />

Systems Project.” Awarded a grant <strong>of</strong> $94,655 for the systems analysis for EMG's information systems needs. This<br />

project was conducted with the assistance <strong>of</strong> a Scott incubator partner, DOCenter Inc. under the auspices <strong>of</strong> the<br />

PKI Technology Development Corp (PKITDC).<br />

Khazanchi, D. and Zigurs I. (October 1st-April 15th, 2005; Completed). "Mutual <strong>of</strong> <strong>Omaha</strong> Simulation Project --<br />

Phase II." Awarded $16,100 by Mutual <strong>of</strong> <strong>Omaha</strong>.<br />

Khazanchi, D. (9/1/2004-8/2007). "Web-based Reentry Case Management System." Award for $70,910 as a as a<br />

part (sub-grant) <strong>of</strong> the <strong>Nebraska</strong> Department <strong>of</strong> Corrections grant to Sample, L and Spohn, C. (2004), "<strong>Nebraska</strong>'s<br />

Serious and Violent Offender Reentry Program".<br />

Khazanchi, D. (7/1/2004; Completed). "infoUSA: PKI-IIT-VGOSM Student/Faculty Exchange Grant." Awarded<br />

$30,000 by infoUSA.<br />

Khazanchi, D. and Zigurs, I. (1/2004-12/2004; Completed). “Patterns <strong>of</strong> Virtual Projects: Identifying Effective<br />

Blueprints for Virtual Project Management”. Report submitted in fulfillment <strong>of</strong> a grant sponsored by the Project<br />

Management Institute’s (PMI) Project Management Research Program. The total grant was for $63,000 ($30,000<br />

from PMI and the remainder in matching funds in the form <strong>of</strong> computing resources and faculty time from the<br />

-368-


College <strong>of</strong> IS&T, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>).<br />

Harvey, D. and Khazanchi, D. (3/2004 to 7/2004; Completed). “Union Pacific -- Medical Systems Project.” Awarded<br />

a grant <strong>of</strong> $75,240 for the systems analysis <strong>of</strong> medical systems integration with HR at Union Pacific. This project<br />

was conducted with the assistance <strong>of</strong> a Scott incubator partner, DOCenter Inc. under the auspices <strong>of</strong> the PKI<br />

Technology Development Corp (PKITDC).<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number<br />

Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall/2007 ISQA 9900 Advanced Research in Virtual Project Management 3 4<br />

(Doctoral Seminar)<br />

Spring/2008 ISQA 9010 Foundations <strong>of</strong> IS Research (Doctoral Seminar) 3 5<br />

Fall/2008 ISQA 9020 Technical and Process Issues in IS Research (Doctoral 3 5<br />

Seminar)<br />

Spring/2009 ISQA 9010 Foundations <strong>of</strong> IS Research (Doctoral Seminar) 3 1<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __33___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Business to Business (B2B) Electronic Commerce & Risk Management<br />

o EDI Impacts on Small and Medium Sized Enterprises (SMEs)<br />

o B2B Risk Management<br />

o B2B Assurance<br />

o Risk Management in the Extended Enterprise Environment<br />

IT Project Management<br />

o Virtual Project Management/Virtual World Project Management<br />

o Best Practices in Project Management<br />

o Project Management Training<br />

o Project Management Assurance<br />

Application <strong>of</strong> Philosophy Science to IS/T Research<br />

o Relevance <strong>of</strong> IS Research<br />

o Scientific Realism in IS Research<br />

o Truth in IS Research<br />

o Patterns Theory and Design Science<br />

o Validation <strong>of</strong> Concepts<br />

Mutual Knowledge in Virtual Teams<br />

Metaverses, Virtual Worlds and Other Reality Environments<br />

-369-


14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-370-


Ilze Zigurs, ISQA Department Chair<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Ilze Zigurs<br />

Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Pr<strong>of</strong>essor<br />

Dates Held<br />

August 2001 - Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. Business<br />

<strong>University</strong> <strong>of</strong> Minnesota 1987<br />

Administration/ MIS<br />

M.B.A. <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> 1981<br />

B.A. English Literature <strong>University</strong> <strong>of</strong> Washington, Seattle 1971<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Teaching Circles, "Chairs & Directors Teaching Circle", UNO, <strong>Omaha</strong>, NE, USA. (October 2008 - May<br />

2009). Served as coordinator <strong>of</strong> teaching circle.<br />

Teaching Circles Participant, "Web Collaboration", UNO, <strong>Omaha</strong>, NE, USA. (October 2008 - May 2009).<br />

Workshop Attended, "The Pedagogical Potential <strong>of</strong> Second Life for Higher Education", UNO Faculty<br />

Development, <strong>Omaha</strong>, NE, USA. (September 25, 2008).<br />

Conference Attendance, "International Conference on Information Systems". (December 2008).<br />

Conference Attendance, "<strong>Nebraska</strong> Research and Innovation Conference", EPSCoR, Lincoln, NE, USA.<br />

(October 28, 2008).<br />

Conference Attendance, "CRIWG 2008", <strong>Omaha</strong>, NE, USA. (September 14, 2008 - September 18, 2008).<br />

-371-


Seminar, "XBRL: Opportunities and Challenges", Creighton <strong>University</strong>, <strong>Omaha</strong>, NE, USA. (September 8,<br />

2008).<br />

Conference Attendance, "Americas Conference on Information Systems". (August 2008).<br />

Conference Attendance, "MWAIS Third Annual Conference", Eau-Claire, Wisconsin, USA. (May 2008).<br />

Attended ICAN Women's Leadership Conference, Qwest Center, April 2006<br />

Attended Americas Conference on Information Systems (AMCIS), August 2006<br />

Attended International Conference on Information Systems (ICIS), December 2006<br />

Attended Special Interest Group in Project Management, all-day workshop prior to ICIS Conference,<br />

December 2006<br />

Attended sessions at 11 th Annual Americas Conference on Information Systems, <strong>Omaha</strong>, <strong>Nebraska</strong>,<br />

August 11-14, 2005<br />

Attended sessions at International Conference on Information Systems, Las Vegas, Nevada, December 9-<br />

13, 2006<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

PKI Executive Director Search Committee, Committee Member, 1 hour<br />

College Representatives Committee, Center for Collaboration Science, Committee Chair, 1 hour<br />

Statewide EPSCoR Committee, Committee Member, 1 hour<br />

Adobe Connect Pilot Project, Program Coordinator, 1 hour<br />

Selection Committee for IDEA award, Committee Chair, 0.5 hours<br />

Twelve-Month Operational Plan Task Force Committee, Committee Member, 0.5 hours<br />

ABET Steering Committee, Committee Member, 2 hours<br />

Distance Education Steering Committee, Ex-<strong>of</strong>ficio member, 1. hour<br />

Women in IT, Faculty Mentor, 1 hour<br />

CIST Roundtable, Co-coordinator <strong>of</strong> CIST Roundtable series, 1 hour<br />

Workshop on Partnership Opportunities, UiA/UNO, Co-Coordinator <strong>of</strong> workshop, 1 hour<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Chair, ISQA Pr<strong>of</strong>essional Development and Concerns Committee, Spring 2006<br />

-372-


<strong>Nebraska</strong> EPSCoR Committee, appointed by Governor <strong>of</strong> State <strong>of</strong> <strong>Nebraska</strong>, through November 2007<br />

College Representatives Committee, Institute for Collaboration Science, 2006 - present<br />

Search Committee for Dean <strong>of</strong> College <strong>of</strong> IS&T, 2006<br />

Selection Committee for Award for Distinguished Research or Creative Activity, 2006 - 2007<br />

<strong>University</strong> Pr<strong>of</strong>essorship Committee, 2005-2006<br />

College Personnel Committee, 2005-2006<br />

ISQA Graduate Program Committee through December 2005<br />

ISQA Recruiting Committee, Summer and Fall 2005<br />

Department personnel committee, 2005-2006<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Davis, A., & Zigurs, I. (forthcoming). Trust in virtual teams: Solved or still a mystery? Database for<br />

Advances in Information Systems.<br />

Owens, D., Davis, A., Murphy, J., Khazanchi, D., & Zigurs, I. (2009). Moving first life into Second Life: Real<br />

world opportunities for virtual teams and virtual world project management, IT Pr<strong>of</strong>essional, May/June,<br />

27-34.<br />

Davis, A., Murphy, J., Owens, D., Khazanchi, D., & Zigurs, I. (February 2009). Avatars, people, and<br />

metaverses: Foundations for research in virtual worlds, Journal <strong>of</strong> the Association for Information<br />

Systems, 10(2), Article 2, 90-117.<br />

Germonprez, M., & Zigurs, I. (January 2009). Task, technology, and tailoring in communicative action: An<br />

in-depth analysis <strong>of</strong> group communication, Information and Organization, 19(1), 22-46.<br />

DeSanctis, G., Poole, M.S., Zigurs, I., DeSharnais, G., D’On<strong>of</strong>rio, M., Gallupe, B., Holmes, M., Jackson, B.,<br />

Jackson, M., Lewis, H., Limayem, M., Lee-Partridge, J., Niederman, F., Sambamurthy, V., Vician, C.,<br />

Watson, R., Billingsley, J., Kirsch, L., Lind, R., and Shannon, D., (Special Issue 2008). The Minnesota GDSS<br />

research project: Group support systems, group processes, and outcomes, Journal <strong>of</strong> the Association for<br />

Information Systems, 9(10/11), 551-608.<br />

Zigurs, I., and Khazanchi, D. (2008). From pr<strong>of</strong>iles to patterns: A new view <strong>of</strong> task-technology fit.<br />

Information Systems Management, 25(1), 8-13.<br />

Cousins, K., Robey, D., & Zigurs, I. (2007). Managing strategic contradictions in hybrid teams, European<br />

Journal <strong>of</strong> Information Systems, 16(4), 460-478.<br />

Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., de Vreede, G.-J., & Zigurs, I. (2007).<br />

Collaboration engineering in distributed environments, e-Service Journal, 6(1), 76-97.<br />

Munkvold, B.E., & Zigurs, I. (2007). Process and technology challenges in swift-starting virtual teams,<br />

Information & Management, 44, 287-299.<br />

Tarmizi, H., de Vreede, G-J., & Zigurs, I. (January-March, 2007). Leadership challenges in communities <strong>of</strong><br />

practice: Supporting facilitators via design and technology, International Journal <strong>of</strong> e-Collaboration, 3(1),<br />

18-39.<br />

Khazanchi, D. & Zigurs, I. (July-Sept 2006). Patterns for effective management <strong>of</strong> virtual projects: Theory<br />

and evidence, International Journal <strong>of</strong> e-Collaboration, 2(3), 25-48.<br />

Munkvold, B. E. & Zigurs, I. (April-June 2005). Integration <strong>of</strong> e-collaboration technologies: Research<br />

opportunities and challenges, International Journal <strong>of</strong> e-Collaboration, 1(2), 1-24 (invited paper,<br />

-373-


editorially reviewed).<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

“Applying Patterns <strong>of</strong> Technology-Enabled Distributed Collaboration: Improving Multi-Actor Decision-<br />

Making in Traffic Systems,” funded by <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, Research Collaboration Seed Grant,<br />

$10,000, April – December, 2005.<br />

“Mutual <strong>of</strong> <strong>Omaha</strong> Simulation Project – Phase Two,” funded by Mutual <strong>of</strong> <strong>Omaha</strong> Corporation through<br />

The Peter Kiewit Institute Technology Development Corporation, $16,160, September 27 – December<br />

20, 2004 (with D. Khazanchi).<br />

“Patterns <strong>of</strong> Virtual Projects: Identifying Effective Blueprints for Virtual Project Management,” funded by<br />

Project Management Institute, $30,000, January – December, 2004 (with D. Khazanchi).<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Course<br />

Term/year number<br />

Fall 2008 CIST 1010-<br />

001<br />

Fall 2008 CIST 1010-<br />

002<br />

Spring ISQA<br />

2008 9030-001<br />

Fall 2007 ISQA<br />

9900-001<br />

Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Foundations <strong>of</strong> Information Science and<br />

1 35<br />

Technology<br />

Foundations <strong>of</strong> Information Science and<br />

1 29<br />

Technology<br />

Behavioral/Organizational Issues 3 2<br />

Advanced Research in Information Systems 3 3<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

-374-


40%<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _n/a___%.<br />

-375-


-376-


John Clark<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

John W. Clark<br />

Instructor<br />

n/a<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Instructor<br />

Dates Held<br />

January 1999-Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

B.S.<br />

Computer<br />

Science<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> September 1994 -<br />

May 1998<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

-377-


5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

December<br />

1994-present<br />

Clark S<strong>of</strong>tware Solutions <strong>Self</strong> employed as a s<strong>of</strong>tware consultant / programmer<br />

Designing and writing s<strong>of</strong>tware mostly for the<br />

Department <strong>of</strong> Defense, and the Department <strong>of</strong> the<br />

Army, as well as NASA. This has ranged from large scale<br />

Java database applications to embedded C and C++ for<br />

handheld devices. This work has included several<br />

applications <strong>of</strong> graph theory as well as image and video<br />

processing in real-time. This business grew from doing<br />

desktop support, networking and troubleshooting for<br />

individuals and small business.<br />

August 1997 -<br />

December<br />

1998<br />

July 1995-<br />

August 1997<br />

Technical Support Inc.<br />

HKS Medical Information<br />

Systems<br />

S<strong>of</strong>tware Engineer<br />

Duties included consultant programming to customer<br />

specifications, design and recommendation on custom<br />

s<strong>of</strong>tware, project management, and customer relations.<br />

Part-time programmer<br />

Duties include writing data-feed parsers, web pages used<br />

for remote patient tracking, dynamically generated<br />

patient reports, Unix system administration, database<br />

management, on site and remote technical support for<br />

several hospitals, and Intel based hardware repair and<br />

construction.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

See Item #6 above.<br />

-378-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Course<br />

Semester Class<br />

Term/year number<br />

Course title<br />

hrs size<br />

Spring 2009 CSCI 1620- Introduction to Computer Science II 3 11<br />

001<br />

CSCI 1620- Introduction to Computer Science II 3 18<br />

002<br />

CSCI 2840 C++ & Object Oriented Programming 3 6<br />

CSCI 3320 Data Structures 3 20<br />

Fall 2008 CSCI 1620- Introduction to Computer Science II 3 26<br />

001<br />

CSCI 1620- Introduction to Computer Science II 3 29<br />

002<br />

CSCI 1840 Advanced Topics in C 3 32<br />

-379-


CSCI 3320 Data Structures 3 29<br />

Summer 2008 CSCI 1620 Introduction to Computer Science II 3 15<br />

CSCI 3320 Data Structures 3 22<br />

Spring 2008 CSCI 1620- Introduction to Computer Science II 3 23<br />

001<br />

CSCI 1620- Introduction to Computer Science II 3 28<br />

002<br />

CSCI 1620- Introduction to Computer Science II 3 14<br />

003<br />

CSCI 2840 C++ & Object Oriented Programming 3 13<br />

Fall 2007 CSCI 1620- Introduction to Computer Science II 3 22<br />

001<br />

CSCI 1620- Introduction to Computer Science II 3 30<br />

002<br />

CSCI 1840 Advanced Topics in C 3 25<br />

CSCI 3320 Data Structures 3 24<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __0___%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: 50% CIST core; 50% CS.<br />

-380-


Sidney Davis<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Sidney Davis<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Assistant Pr<strong>of</strong>essor August 2000 – March 2003<br />

Associate Pr<strong>of</strong>essor March 2003 -- present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

B.M. Music Indiana <strong>University</strong> 1974<br />

MBA Business Southern Illinois <strong>University</strong> -- Carbondale 1983<br />

Ph.D. MIS Indiana <strong>University</strong> 1989<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

December 2005, HCI Research in MIS Workshop, Las Vegas Nevada<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

-381-


7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Committee member Undergraduate Program Committee 1.5 hours every 2 weeks<br />

Thesis committee for Thomas Bronieki, Master’s student, 3-4 hours prior to defense (Spring 2009)<br />

Senior editor, eService Journal, 3-4 hours for each paper that I receive for review<br />

Editorial Review Board member, Journal <strong>of</strong> Database Mgt., 2-3 hours for each review<br />

Ad hoc reviewer for Behaviour and Information Technology, 2-3 hours for each review<br />

Associate Editor for HCI track <strong>of</strong> ICIS 2009 (10-12 hours total)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Graduate Council 2003-2004 (Committee B, Courses, Programs, and Evaluations)<br />

Writing Across the Curriculum Committee (WAC, Fall 2007 – Fall 2008)<br />

College <strong>of</strong> IS&T RP&T Committee, 2005-2008<br />

College <strong>of</strong> IS&T Technology Committee, 2006 - 2007<br />

ISQA Dept. PD&C Committee, 2005-2008<br />

Undergraduate Program Committee, 2005-2008<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

-382-


12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall 2007 ISQA 3520 User Interface Design 3 11<br />

Fall 2007 ISQA 8525 User Interface Design 3 5<br />

Fall 2007 CIST 2910 Multimedia Systems 3 6<br />

Spring 2008 ISQA 3400 Data Communications 3 11<br />

Spring 2008 ISQA 3520 User Interface Design 3 11<br />

Spring 2008 ISQA 8525 User Interface Design 3 5<br />

Fall 2008 ISQA 3520 User Interface Design 3 16<br />

Fall 2008 ISQA 8525 User Interface Design 3 2<br />

Fall 2008 CIST 3100 Organizations, Applications, and Technology 3 24<br />

Spring 2009 ISQA 3400 Data Communications 3 23<br />

Spring 2009 ISQA 3520 User Interface Design 3 10<br />

Spring 2009 ISQA 8525 User Interface Design 3 3<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __15___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Editor and reviewer for 3 journals. Ad hoc reviewer for some journals. Served as committee chair for<br />

Master’s student.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-383-


-384-


G J de Vreede<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Gert-Jan de Vreede<br />

Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Pr<strong>of</strong>essor<br />

Dates Held<br />

2002-Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

PhD Delft <strong>University</strong> <strong>of</strong> Technology 1991-1995<br />

MSc Information Delft <strong>University</strong> <strong>of</strong> Technology 1986-1991<br />

Systems<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Program chair <strong>of</strong> GDN2010 (2008-2009)<br />

Co-chair <strong>of</strong> ECIS2010, Research in Progress track (2008-2009)<br />

Co-chair <strong>of</strong> Center for Collaboration Science’s 3rd Research Seminar, <strong>Omaha</strong>, NE. (2008-2009)<br />

Co-chair <strong>of</strong> HICSS09 & HICSS10 minitrack on Designing Collaboration Processes and Systems.<br />

Co-chair <strong>of</strong> GDN09 sessions on Collaborative Requirements Engineering in Group Decision Making &<br />

Negotiation (2008-2009)<br />

Co-chair <strong>of</strong> EuroPLOP’s 2008 Thematic track on Patterns<br />

Program committee member <strong>of</strong> ISD2008, CRIWG08-09, GDN2009<br />

Organization committee chair for CRIWG 2008, <strong>Omaha</strong>, NE<br />

Co-chair <strong>of</strong> ICS 2nd Research Seminar, <strong>Omaha</strong>, NE. (2007-2008)<br />

Co-chair <strong>of</strong> HICSS08 & HICSS09 minitrack on Designing Collaboration Processes and Systems.<br />

-385-


Co-chair <strong>of</strong> GDN08 sessions on Facilitation in Group Decision Making & Negotiation<br />

Co-chair <strong>of</strong> EuroPLOP’s Thematic track on Patterns (2007-2008)<br />

Program committee member <strong>of</strong> ISD2007-2008, CRIWG07-08, Group Decision & Negotiation (GDN2007-<br />

2008), ICGSE 2007 workshop on “Tools for Globally Distributed S<strong>of</strong>tware Development”<br />

Organization committee chair for CRIWG 2008, <strong>Omaha</strong>, NE.<br />

Co-chair <strong>of</strong> HICSS06 & HICSS07 minitrack on Designing Collaboration Processes and Systems.<br />

Co-chair <strong>of</strong> AMCIS06 & AMCIS07 minitrack on Collaboration Engineering.<br />

Co-chair <strong>of</strong> GDN06 sessions on Facilitation and Collaboration Engineering <strong>of</strong> Group Decision Making &<br />

Negotiation<br />

Co-chair <strong>of</strong> GDN07 sessions on Facilitation in Group Decision Making & Negotiation<br />

Program committee member <strong>of</strong> ISD2006-2007, CRIWG06-07, Group Decision & Negotiation (GDN2006-<br />

2007),<br />

Member <strong>of</strong> International Association <strong>of</strong> Science and Technology for Development (IASTED) Technical<br />

Committee on Information Systems (2006-2007)<br />

Co-chair <strong>of</strong> HICSS05 & HICSS06 minitrack on Designing Collaboration Processes and Systems.<br />

Co-chair <strong>of</strong> AMCIS05 & AMCIS06 minitrack on Collaboration Engineering.<br />

Co-chair <strong>of</strong> GDN05 sessions on Facilitation Support in GSS<br />

Co-chair <strong>of</strong> GDN06 sessions on Facilitation and Collaboration Engineering <strong>of</strong> Group Decision Making &<br />

Negotiation<br />

Program committee member <strong>of</strong> ISD2006, CRIWG05-06, Context2005, International Conference on<br />

Knowledge Sharing and Collaborative Engineering (KSCE 2004), Group Decision & Negotiation<br />

(GDN2005-2006), ISCRAM2006, 1st International Conference on “Future Challenges And Current Issues<br />

In Business Information, Organisation And Process Management”.<br />

Member <strong>of</strong> International Association <strong>of</strong> Science and Technology for Development (IASTED) Technical<br />

Committee on Information Systems (2005-2006)<br />

Program co-chair <strong>of</strong> CRIWG2004 conference, Costa Rica, September 2004.<br />

Co-chair <strong>of</strong> HICSS05 minitrack on Research Methods and Approaches in Organizational Systems<br />

Research.<br />

Co-chair <strong>of</strong> HICSS05 & HICSS06 minitrack on Designing Collaboration Processes and Systems.<br />

Co-chair <strong>of</strong> AMCIS05 minitrack on Collaboration Engineering.<br />

Co-chair <strong>of</strong> GDN05 sessions on Facilitation Support in GSS<br />

Program committee member <strong>of</strong> International Conference on Electronic Commerce (ICEC2004), ISD2005,<br />

CRIWG05, Context2005, International Conference on Knowledge Sharing and Collaborative Engineering<br />

(KSCE 2004), Group Decision & Negotiation (GDN2005).<br />

Member <strong>of</strong> International Association <strong>of</strong> Science and Technology for Development (IASTED) Technical<br />

Committee on Information Systems (2004-2005)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

2006- Director, Center for<br />

Collaboration Science<br />

2006 <strong>University</strong> <strong>of</strong> Pretoria Visiting Pr<strong>of</strong>essor<br />

-386-


7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

1997-1999 Multimedia Skills Part time senior consultant<br />

1991 Hoogovens Simulation study to evaluate the maintenance process in<br />

the Oxy-2 factory <strong>of</strong> the Hoogovens steel mill factory<br />

1991 Sint Franciscus Gasthuis Analysis <strong>of</strong> the design, development, and<br />

implementation <strong>of</strong> a maintenance information system at<br />

a Rotterdam hospital<br />

1991 Heineken Bierbrouwerijen Analysis <strong>of</strong> the design, development, and<br />

implementation <strong>of</strong> a maintenance information system at<br />

Heineken Breweries in Zoeterwoude<br />

1991 Hoogovens Analysis <strong>of</strong> the design, development, and<br />

implementation <strong>of</strong> a maintenance information system at<br />

the Hoogovens steel mill factory<br />

1989 Rijnconsult Design, development, and implementation <strong>of</strong> an<br />

information system for analyzing the organization <strong>of</strong><br />

maintenance departments<br />

1989 Van Nelle Evaluation <strong>of</strong> the maintenance processes at Van Nelle<br />

Rotterdam, a c<strong>of</strong>fee, tea, and tabacco factory<br />

1987 Dr. Neher Laboratories <strong>of</strong><br />

the PTT<br />

Design and implementation <strong>of</strong> an information system for<br />

managing book orders in a library<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Director <strong>of</strong> UNO’s Center for Collaboration Science, a multi-college, multi-disciplinary effort involving<br />

about 40 researchers across all UNO’s colleges.<br />

Member <strong>of</strong> the CBA Recruiting Committee for Marketing & Management.<br />

Facilitator for Vice Chancellor Hynes’ Budget Task Force<br />

Member <strong>of</strong> the IS&T Executive Committee<br />

Coordinated the re-design <strong>of</strong> PKI279 (ongoing)<br />

Facilitator for IS&T Advisory Board Strategic Planning<br />

Member <strong>of</strong> the ISQA Graduate Program Committee<br />

Member <strong>of</strong> the ISQA Pr<strong>of</strong>essional Development Committee<br />

-387-


9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Director <strong>of</strong> UNO’s Institute for Collaboration Science, a multi-college, multi-disciplinary efforts involving<br />

faculty across all UNO’s colleges. (2006-)<br />

Member <strong>of</strong> the ISQA Pr<strong>of</strong>essional Development Committee (2006-)<br />

Coordinated the re-design <strong>of</strong> PKI279 (2006-)<br />

Member and secretary <strong>of</strong> the IS&T Doctoral Program Committee (2003-)<br />

Member <strong>of</strong> the ISQA Graduate Program Committee (2003-)<br />

Member <strong>of</strong> the IS&T Executive Committee (2002-)<br />

Director <strong>of</strong> the Peter Kiewit Institute’s Program on Collaboration Engineering (2002-)<br />

Designed collaborative grant writing workshop for the College <strong>of</strong> Public Health (2007-2008)<br />

General Education Task Force: Designed and executed various workshops for the General Education<br />

task force. Point <strong>of</strong> contact: Associate Vice Chancellor Smith-Howell. (2006-2008)<br />

Facilitator for strategic discussions <strong>of</strong> Grad Council A. (2007-2008)<br />

Member <strong>of</strong> the ISQA Recruiting Committee (2006-2007)<br />

Designed and facilitated workshop for the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Federal Team to identify and discuss<br />

ways to achieve their priority goals concerning federal funding, 1 September 2005<br />

Designed and facilitated workshop for the School <strong>of</strong> Communication to prepare their self-study report,<br />

6 October 2005<br />

Honors Program contact for the ISQA Department (2005-2006)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Agres, A., Vreede, G.J. de, Briggs, R.O. (2005), A Tale <strong>of</strong> Two Cities – Case Studies on GSS Transition in<br />

Two Organizations, Group Decision & Negotiation, 14(4), 267-284.<br />

Briggs, R.O., Reinig, B., Vreede, G.J. de (2006), Meeting Satisfaction for Technology Supported Groups:<br />

An Empirical Validation <strong>of</strong> a Goal-Attainment Model, Small Group Research, 37(6), 1-26.<br />

Briggs, R.O., Reinig, B., Vreede, G.J. de (2008), The Yield Shift Theory <strong>of</strong> Satisfaction and its Application to<br />

IS/IT Domain, Journal <strong>of</strong> the Association for Information Systems, 9(5), 267-293.<br />

Davison, R., Vreede, G.J. de, Briggs, R.O. (2005), On Peer Review Standards for the Information Systems<br />

Literature, Communications <strong>of</strong> the AIS, 16(49), 967-980.<br />

Deokar, A., Kolfschoten, G.L., Vreede, G.J. de (2008), Prescriptive Workflow Design for Collaborationintensive<br />

Processes using the Collaboration Engineering Approach, Global Journal <strong>of</strong> Flexible Systems<br />

Management, 9(4), 13-24.<br />

Fruhling, A.L., Vreede, G.J. de (2006), Field Experiences with eXtreme Programming: Developing an<br />

Emergency Response System, Journal <strong>of</strong> Management Information Systems, 22(4), 39-68.<br />

Giaglis, G.M., Hlupic, V., Vreede, G.J. de, Verbraeck, A. (2005), Synchronous Design <strong>of</strong> Business Processes<br />

and Information Systems Using Dynamic Process Modelling, Business Process Management Journal,<br />

11(5), 488-500.<br />

Hengst, M. den, Vreede, G.J. de (2004), Collaborative Business Engineering: A Decade <strong>of</strong> Lessons from<br />

the Field, Journal <strong>of</strong> Management Information Systems, 20, 4, 87-115.<br />

Hengst, M. den, Vreede, G.J. de, Maghnouji (2007), R., Using S<strong>of</strong>t OR Principles for Collaborative<br />

-388-


Simulation: A Case <strong>Study</strong> in the Dutch Airline Industry, Journal <strong>of</strong> the OR Society advance online<br />

publication, 7 February 2007, (DOI 10.1057/palgrave.jors.2602353).<br />

Hlupic, V., Vreede, G.J. de (2005), Business Process Modelling using Discrete-Event Simulation: Current<br />

Opportunities and Future Trends, International Journal <strong>of</strong> Simulation and Process Modelling, 1(1/2), 72-<br />

81.<br />

Hlupic, V., Vreede, G.J. de, Orsoni, A. (2006), Modelling and Simulation Techniques for Business Process<br />

Analysis and Re-Engineering, International Journal <strong>of</strong> Simulation Systems, Science & Technology, 7(4-5),<br />

1-8.<br />

Kolfschoten, G.L., Briggs, R.O., Vreede, G.J., de, Jacobs, P.H.M., and Appelman, J.H. (2006). Conceptual<br />

Foundation <strong>of</strong> the ThinkLet Concept for Collaboration Engineering, International Journal <strong>of</strong> Human<br />

Computer Science 64, 611-621.<br />

Kolfschoten, G.L., Hengst, M. den, Vreede, G.J. de (2007), Issues in the Design <strong>of</strong> Facilitated<br />

Collaboration Processes, Group Decision & Negotiation, 16, 347-361.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), A social simulation game to explore future network<br />

coordination at the Amsterdam Police Force, Journal <strong>of</strong> Production, Planning, and Control, 17(6), 558-<br />

568.<br />

Niederman, F., Briggs, R.O., Vreede, G.J. de, Kolfschoten, G.L. (2008), Purposive Adaptive Structuration:<br />

The role <strong>of</strong> conscious agents in creating and utilizing new structures in collaboration, Journal <strong>of</strong> the<br />

Association for Information Systems, 9(10).<br />

Reinig, B., Briggs, R.O., Vreede, G.J. de (2009), A Cross-cultural study <strong>of</strong> the Relationship between<br />

Perceived Changes in Likelihood <strong>of</strong> Goal Attainment and Satisfaction with Technology Supported<br />

Collaboration, International Journal for e-Collaboration, 5(2), 61-74.<br />

Santanen, E., Briggs, R.O., Vreede, G.J. de (2004), Causal Relationships in Creative Problem Solving: The<br />

role <strong>of</strong> active facilitation in EBS, Journal <strong>of</strong> Management Information Systems, 20, 4 169-200.<br />

Smith, P.W., Anderson, A.O., Christopher, G.W., Cieslak, T.J., De Vreede, G.J., Fosdick, G.A., Greiner, C.B.,<br />

Hauser, J.M., Hinrichs, S.H., Huebner, K.D., Iwen, P.C., Jourdan, D.R., Kortepeter, M.G., Landon, V.P.,<br />

Lenaghan, P.A., Leopold, R.E., Marklund, A., Martin, J.W., Medcalf, S.J., Mussack, R.J., Neal, R.H., Ribner,<br />

B.S., Richmond, J.Y., Rogge, C., Roselle, G.A., Rupp, M.E., Sambol, A.R., Schaefer, J.E., Sibley, J., Streifel,<br />

A.J., Von Essen, S.G., Warfield, K.L. (2006), Designing a Biocontainment Unit to Care for Patients with<br />

Serious Communicable Diseases: A Consensus Statement, Biosecurity and Bioterrorism: Biodefense<br />

Strategy, Practice and Science, 4(4), 351-365.<br />

Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2007), Leadership Challenges In Communities Of Practice:<br />

Supporting Facilitators Via Design And Technology, International Journal <strong>of</strong> e-Collaboration, 3(1), 18-39.<br />

Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.J. de, Zigurs, I. (2007),<br />

Collaboration Engineering in Virtual Teams, e-Services Journal, 76-97.<br />

Topi, H., Valacich, J.S., Kaiser, K., Nunamaker, J.F. Jr., Sipior, J.C., Vreede, G.J. de, Wright, R.T. (2007),<br />

Revising the IS Model Curriculum: Rethinking the Approach and the Process, Communications <strong>of</strong> the AIS,<br />

(20), 728-740.<br />

Topi, H., Valacich, J.S., Wright, R.T., Kaiser, K., Nunamaker, J.F. Jr., Sipior, J.C., Vreede, G.J. de (2008),<br />

Revising Undergraduate IS Model Curriculum: New Outcome Expectations, Communications <strong>of</strong> the<br />

Association for Information Systems, 23, 591- 602.<br />

Vreede, G.J. de, Kolfschoten, G.L., Briggs, R.O. (2006), ThinkLets: A Collaboration Engineering Pattern<br />

Language, International Journal <strong>of</strong> Computer Applications in Technology, 25(2/3), 140-154.<br />

Vreede, G.J. de, Koneri, P.G., Dean, D.L., Fruhling, A.L., Wolcott, P. (2006), Collaborative S<strong>of</strong>tware Code<br />

Inspection: The Design and Evaluation <strong>of</strong> a Repeatable Collaborative Process in the Field, International<br />

Journal <strong>of</strong> Cooperative Information Systems, 15(2), 205-228.<br />

-389-


Vreede, G.J. de, Mgaya, R.J.S. (2006), Technology Supported Collaborative Learning for Higher<br />

Education: Comparative Case Studies in Tanzania, Information Technology for Development, 12(2), 113-<br />

130.<br />

Vreede, G.J. de, Mgaya, R.J.S., Qureshi, S. (2004), Field Experiences with Collaboration Technology: A<br />

Comparative <strong>Study</strong> in Tanzania and South Africa, Information Technology for Development, 10(3), 201-<br />

219.<br />

Agres, A., Vreede, G.J. de, Briggs, R.O. (2004), A Tale <strong>of</strong> Two Cities –Case Studies on GSS Transition in<br />

Two Organizations, Proceedings <strong>of</strong> the 37th Hawaiian International Conference on System Sciences, Los<br />

Alamitos: IEEE Computer Society Press. (Best paper finalist)<br />

Ali, H., Vreede, G.J. de, Ramachandra, K., Sidahmed, E., Sreenivas, H. (2004), Evaluating Wireless<br />

Architectures for GDS Applications, Proceedings <strong>of</strong> the 37th Hawaiian International Conference on<br />

System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Briggs, R.O., Kolfschoten, G.L, Vreede, G.J. de (2005), Toward a Theoretical Model <strong>of</strong> Consensus Building,<br />

Proceedings <strong>of</strong> AMCIS 2005, <strong>Omaha</strong>, NE.<br />

Briggs, R.O., Kolfschoten, G.L., Vreede, G.J. de, Dean, D.L. (2006), Defining Key Concepts for<br />

Collaboration Engineering, in: Irma Garcia, Raúl Trejo (eds.), Proceedings <strong>of</strong> the 12th Americas<br />

Conference on Information Systems, Acapulco, Mexico, August 4th-6th 2006, 121-128.<br />

Briggs, R.O., Reinig, B.R., Vreede, G.J. de (2006), Satisfaction with groupware-supported work practices,<br />

in: Bongsik Shin (ed.), Proceedings <strong>of</strong> the San Diego International Systems Conference, San Diego, July<br />

14-16, 2006.<br />

Dao, V., Chidambaram, L., Vreede, G.J. de (2006), The Invisible Pilot in Virtual Teams: An Investigation <strong>of</strong><br />

the Impact <strong>of</strong> Facilitation on Virtual Teams, Proceedings <strong>of</strong> AMCIS2006, Acapulco, Mexico, August 2006.<br />

Davis, A., Kamal, M., Schoonover, T., Nabukenya, J., Pietron, L.R., Vreede, G.J. de, Incident Response<br />

Planning Using Collaboration Engineering Process Development and Validation, WISA: SIGSEC Workshop<br />

2006, Milwaukee, WI, 10 December 2006.<br />

Davis, A., Badura, V., Vreede, G.J. de (2008), Understanding Methodological Differences to <strong>Study</strong><br />

Convergence in Group Support System Sessions, CRIWG 2008, September 14-18, <strong>Omaha</strong>, <strong>Nebraska</strong>.<br />

Fruhling, A.L., Sambol, A., Hinrichs, S., Vreede, G.J. de (2006), Designing An Emergency Response System<br />

for Electronic Laboratory Diagnostics Consultation, Proceedings <strong>of</strong> the 39th Hawaiian International<br />

Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Fruhling, A., Tyser, K., Vreede, G.J. de (2005), Experiences with Extreme Programming in Telehealth:<br />

Developing and Implementing a Biosecurity Health Care Application, Proceedings <strong>of</strong> the 38th Hawaiian<br />

International Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Hlupic, V., Vreede, G.J. de, Orsoni, A. (2006), The Role <strong>of</strong> Discrete Event Simulation in Business Process<br />

Analysis and Re-Engineering, Proceedings <strong>of</strong> the 9th International Conference on Computer Modelling<br />

and Simulation (UKSim06), Oxford, April 2006.<br />

Kamal, M., Davis, A.J., Nabukenya, J., Schoonover, T.V., Pietron, L.R., Vreede, G.J. de, (2007),<br />

Collaboration Engineering for Incident Response Planning: Process Development and Validation,<br />

Proceedings <strong>of</strong> the 40th Hawaiian International Conference on System Sciences, Los Alamitos: IEEE<br />

Computer Society Press.<br />

Kanapuram, S., Ali, H.H., Vreede, G.J. de (2006), On Effective Utilization <strong>of</strong> Wireless Networks in<br />

Collaborative Applications, Proceedings <strong>of</strong> the 2nd International Conference on Collaborative<br />

Computing: Networking, Applications and Worksharing, Atlanta, November 2006.<br />

Kolfschoten, G.L., Appelman, J.H., Briggs, R.O., Vreede, G.J. de (2004), Recurring Patterns <strong>of</strong> Facilitation<br />

Interventions in GSS Sessions, Proceedings <strong>of</strong> the 37th Hawaiian International Conference on System<br />

Sciences, Los Alamitos: IEEE Computer Society Press.<br />

-390-


Kolfschoten, G.L, Briggs, R.O., Appelman, J.H., Vreede, G.J. de (2004), ThinkLets as Building Blocks for<br />

Collaboration Processes: A Further Conceptualization, Lecture Notes in Computer Science, Berlin,<br />

Springer Verlag, 2004.<br />

Kolfschoten, G.L., Duivenvoorde, G., Briggs, R.O., Vreede, G.J. de (2009), Towards an instrument to<br />

measure Successfulness <strong>of</strong> collaborative effort from a participant perspective, Proceedings <strong>of</strong> the 42nd<br />

Hawaiian International Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Kolfschoten, G.L., Duivenvoorde, G., Briggs, R.O., Vreede, G.J. de (2009), Practitioners vs Facilitators a<br />

comparison <strong>of</strong> participant perceptions on success, Proceedings <strong>of</strong> the 42nd Hawaiian International<br />

Conference on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Kolfschoten, G.L., Niederman, F., Briggs, R.O., Vreede, G.J. de (2006), Understanding the Job<br />

Requirements for Collaboration Technology Support through a Hybrid IT-End User Job Classification<br />

Model: The Case <strong>of</strong> Collaboration Engineering and Facilitation, SIGCPR Conference.<br />

Kolfschoten, G.L., Niederman, F., Briggs, R.O., Vreede, G.J. de (2008), Role Separation in Strategies for<br />

Collaboration Support, Proceedings <strong>of</strong> the 41st Hawaiian International Conference on System Sciences,<br />

Los Alamitos: IEEE Computer Society Press.<br />

Kolfschoten, G.L., Valentin, E., Verbraeck, A., Vreede, G.J. de (2006), Cognitive load reduction through<br />

the use <strong>of</strong> building blocks in the design <strong>of</strong> decision support systems, Proceedings <strong>of</strong> AMCIS2006,<br />

Acapulco, Mexico, August 2006.<br />

Kolfschoten, G.L., Hengst, M. den, Vreede, G.J. de (2005), Issues in the Design <strong>of</strong> Facilitated<br />

Collaboration Processes, Proceedings <strong>of</strong> Group Decision & Negotiation 2005, Vienna, Austria, July 10-13,<br />

1-17.<br />

Kolfschoten, G.L., Vreede, G.J. de, Pietron, L.R. (2006), A training approach for the transition <strong>of</strong><br />

repeatable collaboration processes to practitioners, Proceedings <strong>of</strong> Group Decision & Negotiation 2006,<br />

Karlsruhe, June 2006.<br />

Kolfschoten, G.L., Vreede, G.J. de, The Collaboration Engineering Approach for Designing Collaboration<br />

Processes, Proceedings <strong>of</strong> CRIWG 2007, Bariloche, Argentina, September 16-20.<br />

Kolfschoten, G.L., Vreede, G.J. de, Briggs, R.O., Computer Aided Pattern-Based Collaboration Process<br />

Design: A Computer Aided Collaboration Engineering Tool, Proceedings <strong>of</strong> CRIWG 2007, Bariloche,<br />

Argentina, September 16-20.<br />

Koneri, P.G., Vreede, G.J. de, Dean, D.L., Fruhling, A.L., Wolcott, P. (2005), The Design and Field<br />

Evaluation <strong>of</strong> a Repeatable Collaborative S<strong>of</strong>tware Code Inspection Process, in: Fuks, H., Lukosch, S.,<br />

Salgado, A.C. (eds.), Proceedings <strong>of</strong> CRIWG 2005, LNCS3706, pp. 325-340, Springer Verlag Berlin<br />

Heidelberg.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2004), Exploring new coordination scenarios for workflows in the<br />

Amsterdam Police Force: Simulation-games as organizational change instruments, Proceedings <strong>of</strong> IFIP<br />

WG 5.7 8th workshop on Experiential learning in chains and networks', Wageningen, the Netherlands,<br />

24-27 May 2004.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2005), A Coordination Framework for Analysis and Improvement<br />

<strong>of</strong> ICT Supported Distributed Work, Proceedings <strong>of</strong> the IRIS28, Kristiansand, Norway, August 6-9.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), Designing simulation-games for organizational<br />

prototyping, in: A.G. Nilsson et al (eds), Advances in information systems development – Bridging the<br />

gap between academia and practice, Proceedings <strong>of</strong> ISD 2005 (the fourteenth international conference<br />

on Information Systems Development), August 15-17, Karlstad, Sweden, 373-385.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2005). Dealing with Paradox in business engineering, simulationgames<br />

as learning environments. In Backlund, P., Carlsson S. and Söderstrom S. (eds.), Proceedings <strong>of</strong><br />

the forum poster session in conjunction with Business Informatics Research (BIR) 2005, Skövde, 3-4<br />

-391-


October, 2005, pp. 59-68.<br />

Laere, J. van, Vreede, G.J. de, Sol, H.G. (2006), Developing paradoxical guidelines for communities <strong>of</strong><br />

practice in organizations, Proceedings <strong>of</strong> the European Conference on Information Systems, Göteborg,<br />

Sweden, 2006.<br />

Noteboom, C., Zhang, C., Tarmizi, H., Steinhauser, L., Payne, M., Vreede, G.J. de, Zigurs, I. (2006),<br />

Research as Teaching and Teaching as Research: Reflections on a Virtual Team Project, Mid-West<br />

Association <strong>of</strong> Information Systems Conference.<br />

Read, A.S., Renger, D.R.M., Briggs, R.O., Vreede, G.J. de (2009), Fundamental Topics <strong>of</strong> Organizing: A<br />

Research Agenda, Proceedings <strong>of</strong> the 42nd Hawaiian International Conference on System Sciences, Los<br />

Alamitos: IEEE Computer Society Press.<br />

Reinig, B., Briggs, R.O., Vreede, G.J. de (2008), A cross-cultural investigation <strong>of</strong> the goal-attainmentlikelihood<br />

construct and its effect on satisfaction with technology supported collaboration, Proceedings<br />

<strong>of</strong> the 41st Hawaiian International Conference on System Sciences, Los Alamitos: IEEE Computer Society<br />

Press.<br />

Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Patterns in Collaborative Modeling: A Literature<br />

Review, in: Costa, J. (ed.), Proceedings <strong>of</strong> Group Decision & Negotiation 2008, Coimbra, Portugal.<br />

Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Challenges with Collaborative Modeling: A<br />

Literature Review, in: Jan L.G. Dietz, Antonia Albani, Joseph Barjis, Peter Rittgen (eds), Advanced<br />

Enterprise Engineering, Lecture Notes in Business Information Processing, Berlin: Springer-Verlag (AIS<br />

SIGMAS Best Paper Award).<br />

Renger, M., Kolfschoten, G.L., Vreede, G.J. de (2008), Using Interactive Whiteboard Technology to<br />

Support Collaborative Modeling, CRIWG 2008, September 14-18, <strong>Omaha</strong>, <strong>Nebraska</strong>.<br />

Santanen, E., Vreede, G.J. de, (2004) Creative Approaches to Measuring Creativity: Comparing the<br />

Effectiveness <strong>of</strong> Four Divergence thinkLets, Proceedings <strong>of</strong> the 37th Hawaiian International Conference<br />

on System Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Steinhauser, L., Read, A., Vreede, G.J. de (2008), <strong>Study</strong>ing the Adoption <strong>of</strong> Collaborative Work Practices<br />

Using the Value Frequency Model, in: Germonprez, M., Iversen, J. (eds), Proceedings <strong>of</strong> the Midwest<br />

United States Association for Information Systems 3rd Annual Conference, Eau Claire, Wisconsin, May<br />

2008.<br />

Tarmizi, H., Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.J. de, Zigurs, I. (2006),<br />

Technical and Environmental Challenges <strong>of</strong> Collaboration Engineering in Distributed Environments,<br />

Proceedings <strong>of</strong> CRIWG 2006, Medina del Campo, Spain, September 2006, 38-53.<br />

Tarmizi, H., Vreede, G.J. de (2005), A Facilitation Task Taxonomy for Communities <strong>of</strong> Practice,<br />

Proceedings <strong>of</strong> AMCIS 2005, <strong>Omaha</strong>, NE.<br />

Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2006), Identifying Challenges in communities <strong>of</strong> practice<br />

facilitation, Proceedings <strong>of</strong> the 39th Hawaiian International Conference on System Sciences, Los<br />

Alamitos: IEEE Computer Society Press.<br />

Tarmizi, H., Zigurs, I., Vreede, G.J. de (2006), Understanding E-Leadership In Distributed Crisis Response<br />

Teams, Gallup Leadership Institute Summit, Washington DC, October.<br />

Tarmizi, H., Vreede, G.J. de, Zigurs, I. (2007). A Facilitators’ Perspective on Successful Virtual<br />

Communities <strong>of</strong> Practice. The thirteenth Americas Conference on Information Systems, August 9-12,<br />

Keystone, Colorado.<br />

Vreede, G.J. de, Briggs, R.O. (2005), Collaboration Engineering: Designing Repeatable Processes for High-<br />

Value Collaborative Tasks, Proceedings <strong>of</strong> the 38th Hawaiian International Conference on System<br />

Sciences, Los Alamitos: IEEE Computer Society Press.<br />

Vreede, G.J. de, Briggs, R.O. Reinig, B. (2008), e-Collaboration Satisfaction: Empirical Field Studies <strong>of</strong><br />

-392-


Disconfirmation Theory Across Two Countries, Proceedings <strong>of</strong> AMCIS.<br />

Vreede, G.J. de, Fruhling, A., Chakrapani, A. (2005), A Repeatable Collaboration Process for Usability<br />

Testing, Proceedings <strong>of</strong> the 38th Hawaiian International Conference on System Sciences, Los Alamitos:<br />

IEEE Computer Society Press.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 8950 Capstone MIS 3 12<br />

ISQA 9900 Advanced Research in Collaboration Science 3 3<br />

Fall 2008 ISQA8080 Facilitation <strong>of</strong> Collaborative Problem Solving 3 6<br />

with Groupware<br />

ISQA9900 Facilitation <strong>of</strong> Collaborative Problem Solving 3 3<br />

with Groupware<br />

Spring 2008 ISQA 8220 Advanced System Analysis & Design 3 18<br />

ISQA 8950 Capstone MIS 3 10<br />

Fall 2007 ISQA 8080 Seminar: Facilitation <strong>of</strong> Collaboration 3 7<br />

ISQA 8220 Advanced System Analysis & Design 3 25<br />

ISQA 9900 Facilitation <strong>of</strong> Collaborative Problem Solving<br />

with Groupware<br />

3 4<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-393-


-394-


Ken Dick<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Kenneth L. Dick<br />

Senior Research Fellow<br />

Not tenure track<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Bachelor <strong>of</strong><br />

Science<br />

Master <strong>of</strong><br />

Science<br />

Doctor <strong>of</strong><br />

Philosophy<br />

Mathematics <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Lincoln 1972<br />

Guidance and<br />

Counseling<br />

Administration,<br />

Curriculum and<br />

Instruction<br />

Creighton <strong>University</strong> 1975<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Lincoln 1983<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

-395-


Dates Where Duties<br />

1998-Present <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Senior Research Fellow in Telecommunications<br />

<strong>Omaha</strong><br />

1994-1998 PKS / MFS / WorldCom, <strong>Omaha</strong>,<br />

NE<br />

Director,-Strategic Enterprise Direction /<br />

Architecture & Standards<br />

1989-1994 First Data Corp, <strong>Omaha</strong>, NE Director-Management Information Systems<br />

1979-1984 Creighton <strong>University</strong> Adjunct Pr<strong>of</strong>essor<br />

1979-1989 USWest, <strong>Omaha</strong>, NE Systems Manager<br />

1975-1979 Papillion Public Schools Director-Alternative School<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

David City Hospital<br />

communications<br />

City Stream<br />

CLEC / DLEC IP networking<br />

Odin Capital<br />

MCIWorldcom<br />

IT Architecture for local deployment<br />

Orillion<br />

IT Architecture for next generation OSS<br />

Alvine & Associates<br />

telecommunications practice<br />

Engineering<br />

Union Pacific Railroad<br />

Communications<br />

Odin Financial<br />

Due Diligence<br />

Telesuite<br />

Technical Architecture<br />

Quantum Dynamics<br />

IT Architectural Review<br />

<strong>Omaha</strong> Police Department System & Communications Review<br />

<strong>Omaha</strong> Public Schools<br />

Network Infrastructure<br />

Relapoint<br />

System Standards<br />

DiscoverWhy<br />

Operational Standards<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

IS & T, Executive Committee<br />

IST & E, New Building Committee<br />

IST & E, Joint Chair Committee<br />

IS&T / Metropolitan Community College Collaboration<br />

-396-


9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

IS & T, Executive Committee (1998-Present)<br />

IST & E, New Building Committee, (1998-Present)<br />

IST & E, Joint Chair Committee, (1999-Present)<br />

IS&T / Metropolitan Community College Collaboration, (2000-Present)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

UNMC Smoking Cessation PDA program. (2006-2007)<br />

Teaching American History, DOE grant for Web site development. $50,000 over three years. (2004-2007)<br />

National Park Service, Lewis and Clark Bicentennial Web site, $1,000,000 over four years plus an<br />

additional $3-5M in hardware & services donations. (2002-2007)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 CSCI 3550 Communication Networks 3 23<br />

CSCI 8220 Telecommunications Management 3 9<br />

CSCI 8555 Communication Networks 3 8<br />

ISQA 8310 Data Communications 3 17<br />

Fall 2008 CSCI 8210 Advanced Communication Networks 3 9<br />

ISQA 8310 Data Communications 3 28<br />

Summer 2008 CSCI 3550 Communication Networks 3 11<br />

CSCI 8555 Communication Networks 3 1<br />

ISQA 3400 Business Data Communications 3 3<br />

-397-


Spring 2008 CSCI 8220 Telecommunications Management 3 6<br />

CSCI 8410 Distributed Systems and Network Security 1.5 8<br />

ISQA 8230 Telecommunications Management 3 7<br />

Fall 2007 CSCI 8210 Advanced Communication Networks 3 16<br />

ISQA 8310 Data Communications 3 25<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-398-


Donna Dufner<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Donna Dufner<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Assistant Pr<strong>of</strong>essor Jan. 2000 – Aug. 2003<br />

Associate Pr<strong>of</strong>essor Aug 2003 - present<br />

Distinguished Teacher<br />

Ad Perpetuum<br />

Pr<strong>of</strong>essional Project<br />

Manager (PMP® )<br />

Senior Member IEEE Advanced 2007<br />

Title is given in perpetuity to recipients <strong>of</strong><br />

the <strong>University</strong>-wide Outstanding Teaching<br />

and Instructional Creativity Award (OTICA)<br />

2008<br />

2004 – current<br />

2007 – Completed recertification<br />

successfully1<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. Computer and Information Science Rutgers <strong>University</strong>,<br />

1995<br />

Management<br />

M.S. Computer and Information Science The New Jersey Institute <strong>of</strong> 1995<br />

Technology<br />

M.B.A. Market Research The <strong>University</strong> <strong>of</strong> Chicago, 1977<br />

Graduate School <strong>of</strong> Business<br />

B.A. Sociology DePaul <strong>University</strong> 1975<br />

1 To maintain PMP certification each certified PMP must go through a recertification process. The objective is maintain and<br />

improve skills through learning about new and changing best practices in the field <strong>of</strong> project management.<br />

-399-


5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Pr<strong>of</strong>essional Development in Chronoligical Order:<br />

2005 - present: Volunteer Training at the Douglas County Department <strong>of</strong> Corrections<br />

Attend Volunteer Training at the Douglas County Department <strong>of</strong> Corrections each semester with my<br />

students in preparation for the Service-Learning Course I teach at the Douglas County Department <strong>of</strong><br />

Correction, Teaching Computer Basics to Inmates. I attend the training each semester to refresh and<br />

reinforce my preparation to work with inmates and my UNO students in the jail environment. I also<br />

want to begin the course by demonstrating that I will be available to my UNO students at all times<br />

during this very intensive, demanding, and extremely rewarding growth experience. The training is<br />

conducted once per semester on the Saturday morning before the semester begins.<br />

2009 - Conference: American Jail Association JA's 28th Annual Training Conference & Jail Expo, April 26 -<br />

29, Louisville, Kentucky.<br />

2008 - Teaching Circle: to evaluate and adopt advanced educational techniques.<br />

2007 - Conference: CUMU Conference, Florida International <strong>University</strong>, Miami FL, October 21-24.<br />

2007 - Project Management Pr<strong>of</strong>essional (PMP®) Re-certification: successfully completed as required by<br />

the Project Management Institute.<br />

2004 - Project Management Pr<strong>of</strong>essional (PMP®) Certification: “The PMP Certification is the project<br />

management pr<strong>of</strong>ession’s most recognized and respected global credential. To obtain PMP certification,<br />

an individual must satisfy education and experience requirements, agree to adhere to a Pr<strong>of</strong>essional<br />

Code <strong>of</strong> Conduct and pass the PMP Certification Examination. The Project Management Institute (PMI)<br />

Certification Department is the first pr<strong>of</strong>essional certification program <strong>of</strong> its kind in the world to receive<br />

the ISO 9001 certification, a globally recognized mark <strong>of</strong> a quality management system (Project<br />

Management Institute).”<br />

2004-2005 - Leadership <strong>Omaha</strong>: One person from the <strong>University</strong> is nominated by the chancellor and a<br />

team <strong>of</strong> community leaders selects those who will constitute that year’s class. Leadership <strong>Omaha</strong>, then<br />

in its 27th year, is one <strong>of</strong> the oldest and most respected community leadership programs in the nation.<br />

The program consisted <strong>of</strong> once per month meetings from 7:30 AM to 7:30 PM during which,<br />

economic, social, educational, health, etc. issues were covered. We learned about <strong>Omaha</strong> and <strong>Nebraska</strong><br />

and the cultural and community service opportunities available. The program also exposed the class to<br />

the services made available such as homeless shelters, dental clinics, nursing home facilities for those<br />

with disabilities; and, to the need for additional services for those in need in <strong>Omaha</strong> and <strong>Nebraska</strong>. In<br />

addition we were taught about the political promise, the inequities and political issues, and the<br />

economic and political challenges in <strong>Nebraska</strong>.<br />

As a part <strong>of</strong> the program I also served on a team with other members <strong>of</strong> the Leadership <strong>Omaha</strong><br />

Class. We were charged with performing a project that would contribute to the health <strong>of</strong> <strong>Omaha</strong>. The<br />

team elected to perform a sustainable project and develop a Web based service to enable citizens,<br />

visitors and individuals who might relocate to <strong>Omaha</strong> to easily find entertainment and cultural<br />

opportunities at a glance. The objective <strong>of</strong> our project is demonstrate that <strong>Nebraska</strong> can be fun and<br />

<strong>of</strong>fers wonderful cultural opportunities. KETV sponsored the project and IN-The-O continues to benefit<br />

<strong>Nebraska</strong>. The project was launched at the Peter Kiewit Institute in the Atrium in the spring <strong>of</strong> 2005 (I<br />

served as the hostess). Several hundred people attended. You can view KETV.com –In-the-O located at<br />

the following URL: http://www.ketv.com/intheo/index.html<br />

Summer 2005 - Leadership <strong>Omaha</strong> –Gazing and Grazing Program<br />

-400-


Participated in the Gazing and Grazing Program with my class from Leadership <strong>Omaha</strong>. We traveled all<br />

over <strong>Nebraska</strong> by bus. The program is designed to teach about the economic drivers, educational,<br />

political, cultural, etc. issues confronting <strong>Nebraska</strong>ns. We also we shown and given the opportunity to<br />

enjoy the immense beauty and amazing natural resources <strong>of</strong> <strong>Nebraska</strong>. As the bus traveled throughout<br />

the state over a period <strong>of</strong> several days, speakers would board and give lectures and answer questions.<br />

We visited ranches, natural resources, and schools to mention a few.<br />

2004-2005 - Women’s Leadership Institute: Selected by the chancellor to participate in the Women’s<br />

Leadership Institute at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> (UNO). Candidates from various educational<br />

institutions are nominated for participation by the Deans <strong>of</strong> their schools and selected by the Chancellor<br />

from the pool <strong>of</strong> nominees. The Institute gave me the opportunity to learn about the <strong>University</strong>. Since I<br />

spent approximately 15 years <strong>of</strong> my career in the business world at major corporations such as AT&T,<br />

Chemical Bank Corp., ARDIS (a joint venture <strong>of</strong> IBM and Motorola), Bell Atlantic Nynex, before coming to<br />

academia; learning about inner workings <strong>of</strong> the <strong>University</strong> was especially important for me.<br />

2005 - Research Triangle: “UNO Government Information Systems Management,” <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> at <strong>Omaha</strong>, <strong>Omaha</strong>, NE.<br />

2005 - Conference: XVII Asian Pacific Conference on International Accounting Issues, Wellington, New<br />

Zealand, November 20-23.<br />

2005-Conference: 38th Annual Hawaii International Conference on System Sciences.<br />

2004-Conference: Human Factors in Computing Systems, Special Interest Groups (SIGs), SIGCHI ACM,<br />

April 24-29, Vienna, Austria.<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

2009-on-going Project<br />

Management for the Douglas<br />

County Department <strong>of</strong><br />

Corrections<br />

community outreach<br />

Serve as the Project Manager<br />

<strong>of</strong> a multi-million dollar<br />

project for the Douglas<br />

County Department <strong>of</strong><br />

Corrections with the support<br />

<strong>of</strong> student interns.<br />

2008 – present<br />

Prospect Hills Cemetery<br />

Board<br />

Board Member<br />

community outreach<br />

The project is an Enterprise-wide Information<br />

Technology development and implementation for<br />

the Douglas County Department <strong>of</strong> Corrections.<br />

My work is Pro Bono2. Field work provides an<br />

opportunity for me to keep my practical skills up to<br />

date and for students to work in the field with a<br />

seasoned project manager on a system <strong>of</strong><br />

substantial impact and importance.<br />

Prospect Hills Cemetery is one <strong>of</strong> the oldest and<br />

most historic cemeteries in the nation.<br />

Provide technical support and advice as a board<br />

member.<br />

The project is<br />

providing<br />

funding <strong>of</strong><br />

approximately<br />

$59,364 for<br />

student<br />

internships. One<br />

summer intern<br />

and two fall and<br />

spring 2009-<br />

2010.<br />

2007 South Korea<br />

Invited Expert in Project<br />

Title <strong>of</strong> my talk: “Practical Applications in Project<br />

Management: Knowing What Questions to Ask.”,<br />

Only nine<br />

individuals were<br />

-401-


Management<br />

Conference all Korean Universities Hosted by the<br />

Government <strong>of</strong> South Korea, Nov. 2. (All travel<br />

expenses paid by the host).<br />

invited from all<br />

over the world<br />

to present at<br />

this event. I was<br />

the only woman<br />

and the only<br />

American.<br />

2005 Mutual <strong>of</strong> <strong>Omaha</strong><br />

community outreach<br />

2007 Booz, Allen and<br />

Hamilton<br />

community outreach<br />

Teaching at Mutual <strong>of</strong> <strong>Omaha</strong><br />

Taught a session for the PMP <strong>Study</strong> Group at<br />

Mutual <strong>of</strong> <strong>Omaha</strong>, <strong>Omaha</strong>, NE. Project<br />

Communications Management and Human<br />

Resource Management<br />

Intensive Project Management Course)<br />

Developed and taught a four day (8 hours per day)<br />

intensive project management course for<br />

managers working on contracts at USSTRATCOM.<br />

Contractors will be expected to use the Project<br />

Management Institute best practices and be<br />

certified. The Department <strong>of</strong> Defense uses the IEEE<br />

Standards coupled with the PMI best practices<br />

embodied in the Project Management Body <strong>of</strong><br />

Knowledge (PMBOK) for s<strong>of</strong>tware engineering. In<br />

all <strong>of</strong> my courses I teach Best Practices using the<br />

PMBOK, the IEEE Standards, and the mathematical<br />

foundation <strong>of</strong> project management based on<br />

Management Science using Hillier, Hillier and<br />

Lieberman, Introduction to OR/MS.<br />

-402-<br />

Taught PMP<br />

study group<br />

hosted by<br />

Mutual but<br />

open to the<br />

community <strong>of</strong><br />

<strong>Omaha</strong> Pro<br />

Bono<br />

The course was<br />

provided Pro<br />

Bono as out<br />

reach to the<br />

business<br />

community.<br />

"Rave Reviews”<br />

were received<br />

from the<br />

students.<br />

Assistant Pr<strong>of</strong>essor, MIS <strong>University</strong> <strong>of</strong> Illinois at Springfield 07/96-01/00<br />

Taught twenty-four Management Information Systems, Systems Analysis and Design, CASE,<br />

Telecommunications and COBOL at the graduate and undergraduate level.<br />

Supervised approximately 10 graduate projects, served on the project committees <strong>of</strong> 6 students,<br />

served as the sole academic advisor for approximately 40 students.<br />

Assistant Pr<strong>of</strong>essor, MIS Polytechnic <strong>University</strong> 01/95-07/96<br />

Taught Information Technology (IT), IT Strategy, Telecommunications, MIS, DSS, at the graduate and<br />

Executive Program level.<br />

Project Manager<br />

ARDIS, (a joint venture <strong>of</strong> IBM and Motorola 07/91-11/93<br />

specializing in wireless data transmission)<br />

Project manager responsible for determining economic, technical, and organizational feasibility <strong>of</strong><br />

wireless access to production systems data in a diversity <strong>of</strong> hardware, s<strong>of</strong>tware, and<br />

telecommunications environments. Managed all stages <strong>of</strong> systems design, development, and<br />

implementation for customers such as UNISYS and Bell Atlantic Business Systems.<br />

Assistant Vice President,<br />

Information and Technology<br />

Chemical New York Corporation 03/85-12/88


Management Division<br />

Responsible for: providing financial systems support for the controller <strong>of</strong> the Information and<br />

Technology Management Division; and providing on-site <strong>of</strong>fice systems support to all senior<br />

executives, their staffs, and executive support groups (training, programming, hardware and<br />

operations support, etc.).<br />

Project Manager/Systems AT&T 01/79-11/83<br />

Analyst<br />

Responsible for: applications s<strong>of</strong>tware development, selection <strong>of</strong> s<strong>of</strong>tware packages and computer<br />

hardware, and installation <strong>of</strong> hardware and s<strong>of</strong>tware. Held both line and staff positions in various<br />

subsidiaries within the company.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Honors Coordinator including, Honors advising and honors colloquia planning for the college: 10 hrs<br />

Thesis advising: 10 hrs per week<br />

Independent studies: 10 hrs per week<br />

Committee work: Graduate Committee, Graduate Committee A, Honors Committee work: 4 hours per<br />

week.<br />

Course Coordination for ISQA 4910, ISQA 8820 and ISQA 8810: 3 hour per week<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

2004-2005: Chair <strong>of</strong> the Faculty Search Committee<br />

2004-2007: Serve on the Undergraduate Program Committee for ISQA:<br />

2004- present: Honors Committee –<br />

2003-2007: Faculty Senate Pr<strong>of</strong>essional Conduct Committee<br />

2006-2009: Graduate Council<br />

2006-2009: Graduate Council Committee B<br />

2007: Chancellor’s Commission on Multi-cultural Affairs<br />

2004 – present: Honor’s Coordinator for the College<br />

2007- present: AAUP Executive Board<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

-403-


Book Chapters<br />

Dufner, D. Alavi, M. and Caroline Howard (2009) “Evolving Technologies Supportive <strong>of</strong> Collaborative<br />

Learning”, (Eds) Caroline Howard, Judith V. Boettecher, Lorraine Justice, Karen D. Schenk, Gary A. Berg,<br />

Patricia L. Rogers, Encyclopedia <strong>of</strong> Distance Learning, Hershey, PA: Idea Group Publishing.<br />

Reed, B.J., Holley, L. and Dufner, D. (2007) “The Performance Challenge: Integrating Uncoupled<br />

Government Information Technology”, In Government Performance Project Findings, Jessica M.<br />

Crawford, Ed, Baltimore, MD: Johns Hopkins <strong>University</strong> Press.<br />

Alavi, M., D. Dufner, and C. Howard, (2005) "Collaborative Learning Technologies". (Eds) Caroline<br />

Howard, Judith V. Boettecher, Lorraine Justice, Karen D. Schenk, Gary A. Berg, Patricia L. Rogers,<br />

Encyclopedia <strong>of</strong> Distance Learning, Hershey, PA: Idea Group Publishing.<br />

Alavi, M. and Dufner, D. (2004) “Technology-Mediated Collaborative Learning: A Research Perspective”,<br />

S. R. Hiltz and R. Goldman, Eds. In Learning Together Online: Research on Asynchronous Learning<br />

Networks. Mahwah, NJ: Lawrence Erlbaum Associates, Inc., 191-213.<br />

Refereed Journal Articles:<br />

Holley, L., Dufner, D., and Reed, B.J. (2004) “Strategic Information Systems Planning (SISP) in US County<br />

Governments”, Public Performance and Management Review. March, 27 (3): 102-126.<br />

Presentations:<br />

Foxall, Mark and Dufner, Donna (2009) “Building Strategic Opportunities through <strong>University</strong> Service-<br />

Learning Programs and Volunteerism”, American Jail Association JA's 28th Annual Training Conference &<br />

Jail Expo, April 26 - 29, Louisville, Kentucky. Presentation and panel discussion.<br />

Dufner, D. (2008) “Play Ball! - Hitting Home Runs Using Project Management Techniques”, ProDev, A<br />

Conference for Project Pr<strong>of</strong>essionals, September 22, Scott Conference Center, <strong>Omaha</strong>, NE.<br />

Dufner, D. (2007) “Practical Applications in Project Management: Knowing What Questions to Ask.”,<br />

Conference Hosted by the Government <strong>of</strong> South Korea, Nov. 2. (All expenses paid by the host).<br />

Dufner, D. (2007) “Service-Learning: Catching the Attention <strong>of</strong> the IPod Generation”, Midwest<br />

Consortium for Service-Learning in Higher Education, Fourth Annual Conference, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong><br />

at Kearney, Sept. 27-29.<br />

Dufner, D. (2007) “Service-Learning in Jail: Bridging the Digital Divide”, Institute for Metropolitan Affairs,<br />

Roosevelt <strong>University</strong>, 430 S. Michigan Avenue, Chicago, IL. (Oct. 18).<br />

Dufner, D. and Kelsey, J. (2006) Service Learning: IT Projects for Micro Businesses in South <strong>Omaha</strong>, South<br />

<strong>Omaha</strong> Seminar, <strong>Omaha</strong>, NE , May 8-12.<br />

Dufner, D. (2005) “Risk Management: Looking Back at the Challenger Disaster, Enron’s Collapse, and the<br />

Anthrax Clean-up at the State Department”, Graduate School <strong>of</strong> Business, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> –<br />

<strong>Omaha</strong>, <strong>Omaha</strong>, NE. October.<br />

Schwer, A., Dufner, D., Morcous G., (2005) Project Management Informatics, Conference proceedings <strong>of</strong><br />

the Midwest Section <strong>of</strong> the American Society for Engineering Education, Fayetteville, AR. Sept.<br />

Dufner, D. Holley, L., and Reed, B.J. (2005) “Using Strategic Information Systems Planning (SISP) to<br />

Bridge the Gap between State Resources and the Needs <strong>of</strong> Aging Americans”, In Proceedings <strong>of</strong> the 38th<br />

Annual Hawaii International Conference on System Sciences, IEEE Computer Society Press: Los Alamitos,<br />

California.<br />

Shah, P., Peters, J. and Dufner, D. (2005): “The Mayor’s Hotline”, Poster Session, The Spring Strategic<br />

Planning Advance, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> – <strong>Omaha</strong>, April. (Attendees included Lt. Gov. Sheehy,<br />

President Milliken, Mayor Fahey, and other dignitaries).<br />

Dufner, D. (2005) “Risk Management: Looking Back at the Challenger Disaster, Enron’s Collapse, and the<br />

Anthrax Clean-up at the State Department”, Graduate School <strong>of</strong> Business, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> –<br />

<strong>Omaha</strong>, <strong>Omaha</strong>, NE. October.<br />

-404-


Hiltz, S.R., Alavi, M. and Dufner, D. (2004) Asynchronous Learning Networks (“ALN’s”) for E-Learning:<br />

Priorities for Future S<strong>of</strong>tware Development, Panel Discussion, Conference on Human Factors in<br />

Computing Systems, Special Interest Groups (SIGs), SIGCHI ACM, April 24-29, Vienna, Austria.<br />

Dufner, D. (2004) “Information Systems Tips for Social Workers”, School <strong>of</strong> Social Work, <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> at <strong>Omaha</strong>, Nov. 2.<br />

Other<br />

Dufner, D. (2007) “Teaching Computer Basics at the Jail: Outcomes”, Presentation to the Douglas<br />

County Board <strong>of</strong> Corrections, City-County Building, <strong>Omaha</strong>, NE,. (Invited, January 9).<br />

http://www.co.douglas.ne.us/boardmeetings.php<br />

Dufner, D. (2006) “Teaching Computer Basics at the Jail”, Presentation to the Douglas County Board <strong>of</strong><br />

Corrections, City-County Building <strong>Omaha</strong>, NE,. (Invited, October 17).<br />

http://www.co.douglas.ne.us/boardmeetings.php<br />

KFAB Radio Interview Spring 2007<br />

Dufner, D. with M. Foxall. Interviewed on KFAB, Husker Radio, (Invited to speak about “Community<br />

Outreach – UNO Students Teaching Computer Basics at the Douglas County Jail”. KFAB Radio reaches all<br />

<strong>of</strong> <strong>Nebraska</strong> and on Husker game day most people in <strong>Nebraska</strong> are listening. Also, invited to the NU<br />

President Milliken’s Tailgate Party and given Husker Tickets for the community out reach performed for<br />

the Douglas Couny Department <strong>of</strong> Corrections.<br />

Interviewed on KETV 5 PM News, Students, Inmates Are Improving Futures 1 Keystroke At A Time : A<br />

program helping to rehabilitate inmates at the Douglas County Correctional Facility puts students inside<br />

the jail to do some teaching <strong>of</strong> their own.<br />

http://www.ketv.com/news/10121088/detail.html, Oct. 20, 2006.<br />

Dufner, D. (January 2007) “PKI Students Debunk Myth that Technical People are not People, People”, PKI<br />

Newsletter, Peter Kiewit Institute, <strong>Omaha</strong>, NE.<br />

Dufner, D. (January 2007) “UNO Students Teach Computer Basics at the Douglas County Department <strong>of</strong><br />

Corrections”, Honors Program Newsletter, <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, <strong>Omaha</strong>, NE.<br />

2007 Developed an external research lab at the Douglas County Department <strong>of</strong> Corrections<br />

Editorial Work<br />

Served on the Editorial Board <strong>of</strong> Communications <strong>of</strong> the Association <strong>of</strong> Information Systems (CAIS) and<br />

as an Associate Editor (Ranked 18th <strong>of</strong> the top 50 IS Journals by CACM) Sept. 2001 to 2005<br />

Pr<strong>of</strong>essional Memberships<br />

IEEE, PMI<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

2009 Information Technology Development and Implementation Douglas County Department <strong>of</strong><br />

Corrections Enterprise-wide Information Technology Development and Implementation, Graduate<br />

Student Internships for 2009-2010 $ $59,364<br />

2009 Information Technology Development and Implementation Douglas County Department <strong>of</strong><br />

Corrections Enterprise-wide Information Technology Development and Implementation, Graduate<br />

Student Summer Internship $9,000<br />

Dufner, D., Morcous, M., and Schwer, A. (2005) “Project Management Informatics for Engineering,” PKI-<br />

UNL-UNO Collaborative Research Grants, $5,000.<br />

Dufner, D. (2005) “Cross-cultural Collaboration: Extending the Reach and Scope <strong>of</strong> Immigrant Owned<br />

-405-


Businesses in South <strong>Omaha</strong> through Web and Computer Based Technologies,” Faculty Course<br />

Development Sub-grant, Midwest Consortium for Service-Learning in Higher Education, A Learn & Serve<br />

America Grant from the Corporation for National Service, $2,000.<br />

Holley, L.M., Reed, B.J., and Dufner, D., (2005) “UNO Government Information Systems Management<br />

Research Triangle,” <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, <strong>Omaha</strong>, NE. $300.<br />

2004-2005 Obtained funding from the Mayor’s <strong>of</strong>fice for a graduate internship to develop and<br />

implement the Mayor’s Hotline System Hotline system. The Hotline System enables citizens <strong>of</strong> <strong>Omaha</strong> to<br />

have fast and easy Web based access to the Mayor and city departments for problem resolution. At the<br />

invitation <strong>of</strong> the Mayor attended with graduate intern, Piyush Shah, a press conference where the new<br />

Hotline was presented by the Mayor and Piyush. $16,442<br />

2005 Learn & Serve America Grant entitled Cross-cultural Collaboration: Extending the Reach and Scope<br />

<strong>of</strong> Immigrant Owned Businesses through Web and Computer Based Technologies, to the Midwest<br />

Consortium for Service-Learning in Higher Education for funds to assist in developing a service learning<br />

course over the summer. $2,000<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Spring<br />

2007<br />

Spring<br />

2007<br />

Course<br />

Semester Class<br />

number Course title<br />

hrs size<br />

ISQA 8820 Project Risk Management 3 8<br />

ISQA 4000-<br />

001<br />

002<br />

098<br />

099<br />

Teaching Computer Basics at the Douglas<br />

County Department <strong>of</strong> Corrections3<br />

3 12<br />

Fall 2007 ISQA 8810 Introduction to Project Management 3 11<br />

Fall<br />

3 10<br />

2007<br />

ISQA 4000-<br />

001<br />

002<br />

098<br />

099<br />

Teaching Computer Basics at the Douglas<br />

County Department <strong>of</strong> Corrections (see<br />

footnote 3)<br />

Spring ISQA 8810 Introduction to Project Management 3 15<br />

3 Teach two sections at the Douglas County Department <strong>of</strong> Corrections (DCDC), one for the males and the other for the<br />

females. Each semester the classes are taught from 8:00 AM- 9:30 Monday and Wednesday and from 10:00 – 11:30.<br />

Students are assigned to the early class or the later class. I teach at the DCDC from 8 -11:30 Monday and 8 -11:30 Wednesday<br />

approximately 6 hours every week in order to be in class with my students and to be able to <strong>of</strong>fer the class to both male and<br />

female inmates.<br />

-406-


2008<br />

Spring<br />

2008<br />

Fall 2008<br />

ISQA<br />

4000-001<br />

and 099<br />

Service<br />

Learning<br />

ISQA 4000-<br />

99<br />

Honors<br />

Colloquium<br />

Teaching Computer Basics at the Douglas<br />

County Department <strong>of</strong> Corrections (see<br />

footnote 3)<br />

Teaching Computer Basics at the Douglas<br />

County Department <strong>of</strong> Corrections (see<br />

footnote 3)<br />

3<br />

3<br />

3<br />

3<br />

5<br />

4<br />

Service-<br />

Learning<br />

Fall 2008 ISQA 8820 Project Risk Management 3 6<br />

Spring ISQA 8810 Introduction to Project Management 3 18<br />

2009<br />

Spring<br />

3<br />

8<br />

ISQA<br />

2009<br />

3<br />

4000-001<br />

and 099<br />

Service<br />

Learning<br />

Teaching Computer Basics at the Douglas<br />

County Department <strong>of</strong> Corrections (see<br />

footnote 3)<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __25%___%. Please<br />

give a brief description <strong>of</strong> your major research and scholarly activities:<br />

Project Management (domain <strong>of</strong> expertise ― S<strong>of</strong>tware Engineering and Telecommunications), Service-<br />

Learning; and Private and Public Sector Information Technology.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: __IS 100_%.<br />

-407-


-408-


Robert Fulkerson<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Robert A. Fulkerson<br />

Assistant Instructor<br />

Not Applicable<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Assistant Instructor 8/1995<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

BS CompSci Creighton <strong>University</strong> 5/1993<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

Additional work toward MS in Computer Science at Creighton <strong>University</strong>, 1993 - 1995. All coursework<br />

completed except for 6 hours.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Learn Perl for CGI Programming / O’Reilly School <strong>of</strong> Technology / July 2006<br />

Learn SQL for Database Programming / O’Reilly School <strong>of</strong> Technology / July 2006<br />

Learn PHP / O’Reilly School <strong>of</strong> Technology / July 2006<br />

Linux/Unix 1 : The Unix File System / O’Reilly School <strong>of</strong> Technology / July 2006<br />

-409-


6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Course Coordinator : CIST 1400, Introduction to Computer Programming (5 hours/week)<br />

Course Coordinator : CIST 1300, Introduction to Web Programming (2 hours/week)<br />

Course Coordinator : CIST 1404, Introduction to Computer Programming Lab (1 hour/week)<br />

Course Coordination for CIST 1400 and CIST 1404 carries additional compensation<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Computer Science Undergraduate Programming Committee, Fall 2004 – Spring 2008<br />

Computer Science Merit Raise Committee, Spring 2008<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

Maintenance and development <strong>of</strong> websites at http://morpo.com/ and http://morpo.com/movies/.<br />

Research and development <strong>of</strong> distance learning course, CIST 1400, for delivery in Spring 2009.<br />

-410-


12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall 2007 CIST 1300 Intro to Web Development 3 25<br />

Fall 2007 CIST 1400 Intro to Computer Programming 3 56<br />

Fall 2007 CSCI 2850 Programming on the Internet 3 19<br />

Spring 2008 CIST 1300 Intro to Web Development 3 27<br />

Spring 2008 CIST 1400 Intro to Computer Programming 3 47<br />

Spring 2008 CSCI 2850 Programming on the Internet 3 21<br />

Fall 2008 CIST 1300 Intro to Web Development 3 27<br />

Fall 2008 CIST 1400 Intro to Computer Programming 3 56<br />

Fall 2008 CSCI 2850 Programming on the Internet 3 32<br />

Spring 2009 CIST 1300 Intro to Web Development 3 14<br />

Spring 2009 CIST 1400 Intro to Computer Programming 3 24<br />

Spring 2009 CSCI 2850 Programming on the Internet 3 37<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _10__%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

I am working with Drs. Wolcott, Haworth and Pietron researching the use <strong>of</strong> rubrics in grading CIST 1400<br />

programs.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-411-


-412-


Ann Fruhling<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Ann L. Fruhling<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Instuctor Fall, 1998<br />

Assistant Pr<strong>of</strong>essor Fall, 2003<br />

Associate Pr<strong>of</strong>essor Fall, 2008<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph. D., Major: MIS Minors: <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> – Lincoln, 2003<br />

Computer Science,<br />

Marketing, Strategy<br />

M.B.A. Thesis: “Comprehensive <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<strong>Omaha</strong> 1991<br />

Business <strong>Study</strong> and<br />

Strategic Plan for a Rural<br />

Dentist Practice”<br />

B.S. BUS. ADMIN Colorado State <strong>University</strong> 1983<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Hawaiian International Conference for System Sciences – 2003-2009<br />

-413-


America Conferences for Information Systems – 2002 – 2009<br />

International Conference for Information Systems 2006, 2008<br />

American Medical Informatics Association conference 2005<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

1983-1986 Texas Instruments Programmer Analyst<br />

1986-1987 Mutual <strong>of</strong> <strong>Omaha</strong> Programmer Analyst<br />

1987-1988 Commercial Federal Bank Sr. Programmer Analyst<br />

1988-1990 AT&T Member Technical Staff<br />

1990-1998 College <strong>of</strong> Saint Mary Director, Computer Information Management and<br />

Telecommunications Systems Management programs,<br />

Associate Pr<strong>of</strong>essor<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

2004-2008 Northrup Grumman USSTRATCom C2SES – Innovation Team – Research<br />

Scholar<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Undergraduate Program Committee<br />

Doctoral Program Committee<br />

Chair, First IS&T Graduation Honors Ceremony<br />

Academic Committee<br />

Technology Committee<br />

RPT Committee<br />

ADROCA, ORTICA<br />

-414-


9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Undergraduate Program Committee<br />

Doctoral Program Committee<br />

Academic Committee<br />

UCAT<br />

<strong>University</strong> – wide Gender Equity committee<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Fruhling, A, Siau, K. (2007) Assessing Organizational Innovation Capability and Its Effect on E-Commerce<br />

Initiatives, Journal <strong>of</strong> Computer Information Systems, 47(4), pp. 91-104.<br />

Fruhling, A. (2006). Examining the Critical Requirements, Design Approaches and Evaluation Methods for<br />

a Public Health Emergency Response System, Communications <strong>of</strong> the Association for Information<br />

Systems, 18, pp. 431-450.<br />

Fruhling, A., Vreede, G. J., de. (2006). Field Experiences with eXtreme Programming: Developing an<br />

Emergency Response System, Journal <strong>of</strong> Management Information Systems, 22(4).<br />

Fruhling, A., Lee, S. (2006).The Influence <strong>of</strong> User Interface Usability on Rural Consumers’ Trust <strong>of</strong> e-<br />

Health Services, International Journal <strong>of</strong> Electronic Health Care, 2(4), pp.305-321, ISSN Print: 1741-8453,<br />

ISSN: 1741-8461.<br />

Vreede, G.J. de, Koneri, P.G., Dean, D.L., Fruhling, A.L., Wolcott, P. (2006). A Collaborative S<strong>of</strong>tware Code<br />

Inspection: The Design and Evaluation <strong>of</strong> a Repeatable Collaboration Process in the Field, International<br />

Journal <strong>of</strong> Cooperative information Systems, 15(2), pp. 205-228.<br />

http://www.worldscinet.com/ijcis/ijcis.shtml.<br />

Fruhling, A., McDonald, P., Dunbar, C. (2008). A Case <strong>Study</strong>: Introducing eXtreme Programming in a<br />

Command and Control System for the US Military, Fortieth-first Hawaii International Conference System<br />

Sciences (85% contribution).<br />

Fruhling, A., Zhang, D. (2007). An Empirical <strong>Study</strong> Examining the Usage and Perceived Importance <strong>of</strong> XP<br />

Practices, Proceedings <strong>of</strong> the Twelfth Americas Conference on Information Systems, AMCIS (85%<br />

contribution).<br />

Fruhling, A., Steinhauser, L., H<strong>of</strong>f, G. (2007). Designing and Evaluating Collaborative Processes for<br />

Requirements Elicitation and Validation, Fortieth Hawaii International Conference System Sciences.<br />

(85% contribution).<br />

Johnson, N., Fruhling, A., Sambol, A., Hinrichs, S. (2006). Towards an Evaluation <strong>of</strong> a Microbiology<br />

Laboratory Electronic Diagnostic System for Public Health, Proceedings <strong>of</strong> the Twelfth Americas<br />

Conference on Information Systems. (40% contribution).<br />

Johnson, N., Fruhling, A. (2006). Development and Assessment <strong>of</strong> the STATPack Emergency Response<br />

System, International Conference Information Systems for Crisis Response and Management (ISCRAM),<br />

-415-


Newark, New Jersey, NJIT (50% contribution).<br />

Fruhling, A., Sambol, A., Hinrichs, S., Vreede, G.J. de. (2006). Designing an Emergency Response System<br />

for Electronic Laboratory Diagnostics Consultation, Thirty-ninth Hawaii International Conference System<br />

Sciences (95% contribution).<br />

Koneri, P.G., Vreede, G.J. de, Dean, D.L., Fruhling, A.L., Wolcott, P. (2005). “The Design and Field<br />

Evaluation <strong>of</strong> a Repeatable Collaborative S<strong>of</strong>tware Code Inspection Process” in Fuks, H., Lukosch, S.,<br />

Salgado, A.C. (eds.), Proceedings <strong>of</strong> CRIWG 2005, LNCS3706, pp. 325-340, Springer Verlag Berlin<br />

Heidelberg, (20% contribution).<br />

Press, L., Qureshi, S., Wolcott, P., Fruhling, A. (2005). A Grand Challenge: Connecting the World’s Rural<br />

Villages (panel), Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems, AMCIS (25%<br />

contribution).<br />

Fruhling, A., Lee, S. (2005). Assessing the Reliability, Validity, and Adaptability <strong>of</strong> PSSUQ, Proceedings <strong>of</strong><br />

the Eleventh Americas Conference on Information Systems, AMCIS (95% contribution).<br />

Fruhling, A, Tyser, K, Vreede, G.J. de. (2005). Experiences with Extreme Programming in Telehealth:<br />

Developing and Implementing a Biosecurity Health Care Application, Thirty-eighth Hawaii International<br />

Conference System Sciences (88% contribution).<br />

deVreede, G.J., Fruhling, A., Chakrapani, A. (2005). A Repeatable Collaboration Process for Usability<br />

Testing, Thirty-eighth Hawaii International Conference System Sciences (40% contribution).<br />

Fruhling, A., and Lee, S. M. (2004). Designing Trustworthy e-Health Services for Rural Consumers,<br />

American Medical Informatics Association Proceedings (95% contribution).<br />

Fruhling, A., deVreede, G.J., Chakrapani, A. (2004). A Repeatable Collaboration Process for Usability<br />

Testing, CORS/INFORMS International Joint Meeting Proceedings (40% contribution).<br />

Fruhling, A., and Lee, S. M. (2004). Examining HCI Usability Factors Affecting Consumers’ Trust in E-<br />

health Services, Hawaii International Conferences on Computer Sciences Proceedings (95%<br />

contribution).<br />

Fruhling, A., Vreede, G.J. de. (2005). Collaborative Usability Testing to Facilitate Stakeholder<br />

Involvement in S. Biffle, A. Aurum, B. Boehm, H. Erdogmus, P. Gruenbacher (eds), Value Based S<strong>of</strong>tware<br />

Engineering, Berlin: Springer-Verlag (in press) (50% contribution).<br />

Fruhling, A. (2007). “Best Practices in Implementing and Managing Agile Information System<br />

Development Processes for Command and Control Operations”, IBM Center for the Business <strong>of</strong><br />

Government (proposal accepted), paper in-progress.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

3.5.1 Internal to UNO<br />

PI Co-PIs Title <strong>of</strong> Grant Amount <strong>of</strong><br />

Grant<br />

X<br />

Improving System<br />

Requirement<br />

Elicitation and<br />

Traceability <strong>of</strong><br />

System Test Plan<br />

Development –<br />

-416-<br />

Funding Entity<br />

Your<br />

Contribution<br />

(%)<br />

Outcomes from the<br />

Award<br />

$9,800 NASA Research 100% 1 Graduate Student,<br />

Research Paper


2006<br />

3.5.2 External to UNO<br />

PI<br />

X<br />

Co-<br />

PIs<br />

Title <strong>of</strong> Grant<br />

Amount <strong>of</strong><br />

Grant<br />

Funding Entity<br />

Oklahoma, STATPack, Laboratory $23,000 Oklahoma<br />

Response<br />

Health and<br />

Project continuation -2007<br />

Human Services<br />

Your<br />

Contribution<br />

(%)<br />

100%<br />

Outcomes from the<br />

Award<br />

X<br />

X<br />

KSU STATPack,<br />

Laboratory Response<br />

project – 2006<br />

Kansas STATPack,<br />

Laboratory Response<br />

project - 2006<br />

$25,700 KSU Veterinary 100%<br />

$211,907 Kansas Health<br />

and Human<br />

Services<br />

100%<br />

X<br />

X<br />

Oklahoma STATPack, Laboratory $185,000 Oklahoma<br />

Response<br />

Health and<br />

project - 2006<br />

Human Services<br />

<strong>Nebraska</strong> STATPack, Laboratory $37,500 <strong>Nebraska</strong> Health<br />

Response<br />

and Human<br />

project -2006<br />

Services<br />

100% 5 students and two FTE I<br />

IT pr<strong>of</strong>essionals,<br />

100% STATPack, Laboratory<br />

Response project<br />

X<br />

Northrup Gruman C2SES<br />

DoD Research – 4 years<br />

(Fruhling & Zhu) – 2005<br />

$555,466 Northrup<br />

Gruman<br />

50% 2 graduate/PhD<br />

students for 4 years,<br />

stipend and tuition<br />

2 Research Papers<br />

completed<br />

X<br />

X<br />

STATPack Laboratory<br />

Response project – 2005<br />

continuation<br />

STATPack Laboratory<br />

Response project –<br />

Expansion. - 2005<br />

$82,500 <strong>Nebraska</strong> Health<br />

and Human<br />

Services<br />

$3,700 <strong>Nebraska</strong> Health<br />

and Human<br />

Services<br />

2 Research Studies<br />

presented to<br />

STRATCOM Colonels<br />

100% STATPack Laboratory<br />

Response project – 2006<br />

continuation<br />

100% STATPack Laboratory<br />

-417-


X<br />

X<br />

X<br />

X Research Proposal –<br />

(Fruhling, deVreede,<br />

Henninger) “Collaborative<br />

Test Plan Creation to<br />

Accomodate Stakeholders’<br />

Value Propositions in Value-<br />

Based S<strong>of</strong>tware Engineering”<br />

– Spring, 2005<br />

STATPack Laboratory<br />

Response project – Aug 2004<br />

STATPack Laboratory<br />

Response project – Sept<br />

2004<br />

Information Technology in<br />

Sustaining Rural Health<br />

Delivery Systems - 2002<br />

$25,000 UNO/UNL<br />

Research<br />

Collaboration<br />

Proposal<br />

Request from<br />

UNL Vice<br />

Chancellor Prem<br />

Paul<br />

$132,250 <strong>Nebraska</strong> Health<br />

and Human<br />

Services<br />

$36,200 Association<br />

Public Health<br />

Labs grant<br />

$412,538 <strong>Nebraska</strong><br />

Research<br />

Initiative<br />

50% Supported research<br />

funding for two<br />

graduate students<br />

100%<br />

100%<br />

100% 39 proposals were<br />

submitted, 12 proposals<br />

were selected.<br />

2 years funding – year 1<br />

funding for 8<br />

undergraduate and<br />

graduate students each<br />

year.<br />

Provided a prototype to<br />

continue to get grant<br />

funding.<br />

See portfolio<br />

Funded dissertation<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 8080 Seminar: Public Health Informatics 3 6<br />

ISQA 8950 Capstone Management Information Systems 12<br />

Fall 2008 ISQA 8950 Capstone Management Information Systems 7<br />

Spring 2008 ISQA 8040 An Overview <strong>of</strong> System Development 3 8<br />

ISQA 8950 Capstone Management Information Systems 10<br />

-418-


Fall 2007 CIST 3100 Organizations, Applications, and Technology 3 22<br />

ISQA 8040 An Overview <strong>of</strong> System Development 3 16<br />

Supervise – 6 to 8 research students every year<br />

through my grants.<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __50___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Grant, NPHL STATPack - Ongoing Research and System Support, UNMC, Fruhling, A., $98,837, Funded,<br />

(October 1, 2008 - September 30, 2009).<br />

Contract, Kansas STATPack - Research, Development and Support, Kansas Department <strong>of</strong> Health and<br />

Environment, Fruhling, A., $25,000, Funded, (August 8, 2008 - August 8, 2009).<br />

Grant, Empirical Research on the Transition to an Agile System Development Environment, NASA,<br />

Fruhling, A., $7,500, Funded, (October 2008 - July 31, 2009).<br />

Financial support is requested to support a half-time graduate student to work on a research study to<br />

explore and examine the best practices the transition to agile system development methods namely,<br />

eXtreme Programming (XP) and SCRUM. This research is important because it will help practitioners<br />

successfully introduce and implement the principles and practices <strong>of</strong> Agile methods into traditional<br />

s<strong>of</strong>tware development environments.<br />

Grant, Public/Private Laboratory Integration Oklahoma STATPack, Oklahoma, State <strong>of</strong>, Fruhling, A.,<br />

$24,150, Funded, (April 1, 2008 - May 31, 2009).<br />

Grant, Center for Public Health Informatics, NU Foundation, Fruhling, A., $136,000, Funded, (July 2008 -<br />

July 2009).<br />

The Center will create a <strong>Nebraska</strong>-focused information portal designed to provide real time, interactive<br />

access to public health data. This publicly available web site and database will be designed in accordance<br />

with the needs <strong>of</strong> a wide array <strong>of</strong> potential users including public health policy makers, public health<br />

workers, academics, and the general public. Members <strong>of</strong> the UNMC CoPH have developed a number <strong>of</strong><br />

important relationships with public health data holders, both in state government and private industry.<br />

Those relationships will allow UNMC to negotiate the appropriate access to information in forms that<br />

would meet the needs <strong>of</strong> the user community while continuing to satisfy the security and confidentiality<br />

requirements <strong>of</strong> the original data stewards.<br />

CPHI will conduct a formalized information analysis and data availability assessment to support<br />

current/emerging public health issues. This will include a needs analysis, cataloging existing data<br />

sources, identifying gaps therein, and developing proposals to address those gaps. Focus groups<br />

comprised <strong>of</strong> stakeholders and potential users will be conducted to determine the level <strong>of</strong> interest,<br />

-419-


technical ability, and desired scope <strong>of</strong> content. This will be a critical step to the design <strong>of</strong> a useful<br />

system. In addition, the CPHI will research appropriate tools, including data formats, and visualization<br />

and reporting tools, to maximize the flexibility and utility <strong>of</strong> the information portal. The Center will then<br />

pursue national grants (e.g. NIH, NSF, etc.) to gain assistance in addressing both data and technology<br />

voids.<br />

The Center will provide access to a think tank <strong>of</strong> UNO/UNMC IT, GIS and Public Health researchers and<br />

experts. This human infrastructure will provide assistance on how IT and GIS capabilities can be used to<br />

integrate, visualize, analyze, and disseminate public health information and further research. Both, UNO<br />

and UNMC strategic plans have major outreach components that can be easily incorporated into these<br />

activities.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%. Not applicable<br />

-420-


Martina Greiner<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Martina E. Greiner<br />

Assistant Pr<strong>of</strong>essor<br />

Non-tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Assistant Pr<strong>of</strong>essor<br />

Dates Held<br />

8/18/2008 - Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

PhD<br />

Dipl.<br />

Oec<br />

Business<br />

Administration<br />

Business<br />

Administration<br />

and Economics<br />

The <strong>University</strong> <strong>of</strong> Georgia 2008<br />

The <strong>University</strong> <strong>of</strong> Hohenheim, Germany 2000<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Joined Clicker-Circle, UNO Academic Year 2008-2009<br />

Evaluating and Learning Adobe Connect for use in the Classroom/ Virtual Office Hours<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

-421-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

ISQA Pr<strong>of</strong>essional Development Committee (2009)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

“The Business <strong>of</strong> Open Source”, Richard T. Watson, Marie-Claude Boudreau, Donald Wynn, Martina<br />

Greiner, Paul York; Communications <strong>of</strong> the ACM, 51 (4), 2008, 41-46<br />

“Opening the Classroom”, Richard T. Watson, Marie-Claude Boudreau, Paul York, Martina Greiner,<br />

Donald Wynn; Journal <strong>of</strong> IS Education, 19 (1), 2008, 75-85<br />

“A Strategy for Knowledge Management”, Martina Greiner, Thilo Böhmann, Helmut Krcmar; Journal <strong>of</strong><br />

Knowledge Management, 11 (6), 2007, 3-15<br />

“A Research Agenda for <strong>Study</strong>ing Open Source I: A Multi-Level Framework”, Fred Niederman, Ashley<br />

Davis, Martina E. Greiner, Donald Wynn, Paul T. York; Communications <strong>of</strong> the AIS, 18, 2006, 129-149<br />

“A Research Agenda for <strong>Study</strong>ing Open Source II: View Through the Lens <strong>of</strong> Referent Discipline<br />

Theories”, Fred Niederman, Ashley Davis, Martina E. Greiner, Donald Wynn, Paul T. York;<br />

Communications <strong>of</strong> the AIS, 18, 2006, 150-175<br />

“Governance and Global Communities”, Richard T. Watson, Marie-Claude Boudreau, Martina Greiner,<br />

Donald Wynn, Paul York, Rusen Gul; Journal <strong>of</strong> International Management, 11, 2005, 125-142<br />

“Understanding Music Sharing Behavior in China: Development <strong>of</strong> an Instrument”, Donald Amoroso;<br />

Pamila Dembla; Hui Wang; Martina Greiner; Pengpeng Liu; Americas Conference on Information<br />

Systems (AMCIS) 2008<br />

“Building Consumer-to-Consumer Trust in e-Finance Marketplaces”, Martina Greiner, Hui Wang;<br />

Americas Conference on Information Systems (AMCIS) 2007<br />

“The Benefits <strong>of</strong> Transaction Cost Economics: The Beginning <strong>of</strong> a New Direction”, Marie-Claude<br />

Boudreau, Richard T. Watson, Adela J.W. Chen, Martina Greiner, and Peter Sclavos; European<br />

Conference on Information Systems (ECIS) June 07-09, 2007<br />

“Make-or-Buy in the Age <strong>of</strong> Open Source: A Transaction Cost Analysis”, Martina Greiner, Dale Goodhue;<br />

International Conference on Information Systems (ICIS) Dec 11-14, 2005<br />

“Governance and Global Communities”, Richard T. Watson, Marie-Claude Boudreau, Martina Greiner,<br />

Donald Wynn, Paul York, Rusen Gul; The fifth Annual International Business Research Forum, March 27,<br />

2004<br />

“Governance, Leadership, And Management In Adaptive And Inventive Digital Communities: A Research<br />

Agenda To Reduce Waste In Graduate Education”, Richard T. Watson, Marie-Claude Boudreau, Martina<br />

Greiner, Donald Wynn, Paul York, Rusen Gul; Seventh Bled Conference, June 21-23, 2004<br />

“Leadership Behavior in Virtual Communities”, Martina Greiner; Seventh Annual Conference <strong>of</strong> the<br />

-422-


Southern Association for Information Systems (SAIS) Feb 27-28, 2004<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 8220 Advanced Systems Analysis and Design 3 27<br />

Fall 2008 ISQA 3310 Managing the Database Environment 3 18<br />

ISQA 8220 Advanced Systems Analysis and Design 3 28<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __60___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

I am currently working on two research streams. The first research stream includes applying<br />

organizational theories to IS issues. In particularly, I am refining Transaction Cost Theory to gain insights<br />

into s<strong>of</strong>tware procurement decisions. The second research stream is concerned about people-to-people<br />

lending marketplaces and the unique IS and management challenges <strong>of</strong> these marketplaces.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-423-


-424-


Dwight Haworth<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Dwight A. Haworth<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Associate Pr<strong>of</strong>essor<br />

Dates Held<br />

1990-Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. MIS Texas Tech <strong>University</strong> 1990<br />

B.S. General United States Air Force Academy, Colorado 1963<br />

Science<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Eighth Annual IBER & TLC Conference, 2008<br />

Distance-Education Workshop, Fall 2007<br />

Teaching and Learning Conference, Oahu, Hawaii, January 2-6<br />

Teaching and Learning Conference, Cancun, Mexico, March 20-25, 2006<br />

Teaching and Learning Conference, Puerto Vallarta, Mexico, March 12-19, 2005<br />

-425-


6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

1986-1990 College <strong>of</strong> Business<br />

Administration, Texas Tech<br />

<strong>University</strong><br />

1984-1986 College <strong>of</strong> Business<br />

Administration, Texas Tech<br />

<strong>University</strong><br />

1982-1984 Central Texas College<br />

Overseas, Yongsan Garrison,<br />

Korea<br />

1982-1984 Far East District, Corps <strong>of</strong><br />

Engineers, Seoul, Korea<br />

Teaching assistant. Taught business communication,<br />

introductory management science, and file structures<br />

courses.<br />

Teaching assistant. Assisted faculty with grading,<br />

proctoring, and preparation for audio-visual materials<br />

for undergraduate business communication.<br />

Instructor. Instructed in computer programming,<br />

systems analysis and design, and computer operating<br />

systems.<br />

Programmer-analyst. Automated the preparation and<br />

update <strong>of</strong> Current Working Estimates for major and<br />

minor military construction projects throughout Korea.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

1981-1982 Gyeong-Gi, Seoul, Korea<br />

Technical Education<br />

Research Center<br />

Curriculum Consultant. Designed and assisted with<br />

implementation <strong>of</strong> undergraduate computer information<br />

systems curriculum.<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Member <strong>of</strong> Faculty Senate<br />

Member <strong>of</strong> Faculty Senate Pr<strong>of</strong>essional Development Committee<br />

Member <strong>of</strong> Faculty Academic Policy Committee <strong>of</strong> the division <strong>of</strong> Continuing Studies<br />

Working Member <strong>of</strong> NUCIA<br />

Member <strong>of</strong> Distance Education Steering Committee<br />

Member <strong>of</strong> the Academic Committee<br />

Member <strong>of</strong> the ABET Steering Committee<br />

Chairman <strong>of</strong> UPC for Bachelors in MIS<br />

-426-


Library Representative for Department<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Library Representative for Department (2004- )<br />

Member <strong>of</strong> Distance Education Steering Committee (2007- )<br />

Member <strong>of</strong> the ABET Steering Committee (2007- )<br />

IA Undergraduate Program Committee (2007-2008)<br />

NDU MOU (2007-2008)<br />

Faculty Academic Policy Committee (2004-2008)<br />

ISQA Undergraduate Program Committee (2004-2008)<br />

Library and Learning Resources Committee (2005-2007)<br />

<strong>University</strong> Committee on Research (2004-2007)<br />

Recruiting Committee Member (2004-2005)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Haworth, D.A. and Pietron, L.R. Sarbanes-Oxley: Achieving compliance by starting with ISO 17799.<br />

Information Systems Management, 23 (2006), 1, 73-87<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 3300 File Structures for Information Systems 3 25<br />

ISQA 8546 Computer Security Management 3 8<br />

-427-


ISQA 8560 Information Warfare & Security 3 3<br />

CIST 4540 Computer Security Management 3 6<br />

Fall 2008 ISQA 3300 File Structures for Information Systems 3 13<br />

ISQA 8546 Computer Security Management 3 13<br />

ISQA 8560 Information Warfare & Security 3 12<br />

CIST 4540 Computer Security Management 3 5<br />

Summer CIST 2500 Intro to Appliet Stats for IS & T 3 11<br />

2008<br />

Spring 2008 ISQA 3300 File Structures for Information Systems 3 4<br />

ISQA 8546 Computer Security Management 3 4<br />

ISQA 8560 Information Warfare & Security 3 10<br />

CIST 4540 Computer Security Management 3 10<br />

Fall 2007 ISQA 3300 File Structures for Information Systems 3 7<br />

ISQA 8546 Computer Security Management 3 7<br />

ISQA 8560 Information Warfare & Security 3 12<br />

CIST 4540 Computer Security Management 3 9<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-428-


Mary Levesque<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Mary L. Levesque<br />

Assistant Instructor<br />

NA<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Temporary Assistant<br />

Instructor<br />

Assistant Instructor<br />

Dates Held<br />

01/01/2000 – 08/31/2002<br />

09/01/2002 – present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

BA Music Duchesne College <strong>of</strong> the Sacred Heart, <strong>Omaha</strong> Aug. 1968<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

15 years <strong>of</strong> programming and instruction at Mutual <strong>of</strong> <strong>Omaha</strong><br />

Completed CIST 1100 (C++ version) at UNO<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

None<br />

-429-


6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

1972-1973 Mutual <strong>of</strong> <strong>Omaha</strong> S<strong>of</strong>tware Development<br />

1974-1978 Mutual <strong>of</strong> <strong>Omaha</strong> Teaching; developing custom courses related to<br />

mainframe programming – use <strong>of</strong> utilities, JCL,<br />

debugging<br />

1983-1985 Various for-pr<strong>of</strong>it schools Taught COBOL<br />

1985-1994 Mutual <strong>of</strong> <strong>Omaha</strong> Developed and taught PC courses<br />

1994-1996 Mutual <strong>of</strong> <strong>Omaha</strong> Production support<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

Act as informal consultant for colleagues regarding Excel<br />

and Word formatting problems, as well as for an<br />

occasional outside person who calls UNO for help.<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Course Coordinator for CIST 1100<br />

Course Coordinator for CSCI 1000<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

-430-


None<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

None, although I authored one article for a genealogy magazine and assisted with another.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

None<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year Course number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall 2007 CIST 1100 001 Introduction to Computing 3 22<br />

Fall 2007 CIST 1100 002 Introduction to Computing 3 39<br />

Fall 2007 CIST 1100 003 Introduction to Computing 3 16<br />

Fall 2007 CSCI 1000 004 Computer Literacy with Applications 3 14<br />

Spring 08 CIST 1100 001 Introduction to Computing 3 18<br />

Spring 08 CIST 1100 850 Introduction to Computing 3 14<br />

Spring 08 CSCI 1000 004 Computer Literacy with Applications 3 15<br />

Spring 08 CSCI 1000 005 Computer Literacy with Applications 3 19<br />

Fall 2008 CIST 1100 001 Introduction to Computing 3 24<br />

Fall 2008 CIST 1100 002 Introduction to Computing 3 21<br />

Fall 2008 CIST 1100 850 Introduction to Computing 3 13<br />

Fall 2008 CSCI 1000 006 Computer Literacy with Applications 3 30<br />

Spring 09 CIST 1100 001 Introduction to Computing 3 14<br />

Spring 09 CIST 1100 850 Introduction to Computing 3 9<br />

Spring 09 CSCI 1000 004 Computer Literacy with Applications 3 7<br />

Spring 09 CSCI 1000 005 Computer Literacy with Applications 3 10<br />

Spring 09 CSCI 1000 850 Computer Literacy with Applications 3 15<br />

-431-


13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 10%. Please give a brief<br />

description <strong>of</strong> your major research and scholarly activities:<br />

I use my computer skills to help others research their genealogy. Most <strong>of</strong> this is done after hours,<br />

however.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-432-


Lotfollah Najjar<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Lotfollah Najjar<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Instructor 8/89-8/99<br />

Lecturer 8/99-8/01<br />

Assistant Pr<strong>of</strong>essor 08/01 – 08/07<br />

Associate Pr<strong>of</strong>essor 08/07- Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D.<br />

Major: Industrial Engineering and<br />

Management Systems<br />

Minor: MIS and Operation<br />

Management<br />

Statistics and Mathematics<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />

Lincoln<br />

Ph.D.<br />

Student<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />

Lincoln<br />

MS Statistics and Mathematics <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />

Lincoln<br />

BS Industrial Engineering and Management <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>-<br />

Systems<br />

Lincoln<br />

08/2002<br />

01/1988-<br />

5/1992<br />

05/1987<br />

05/1984<br />

-433-


4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

PhD. with major in Industrial Engineering and Management Systems and minor in MIS (took 7 courses in<br />

MIS field) Have taken 21 hours MIS courses: System Analysis and Design, Database, Decision Support<br />

Systems, Data Communications, Management Information Systems, Seminar in MIS, and Artificial<br />

Intelligence.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Kamal, M., Qureshi, S. , and Najjar, L. (2008).“ a Global Analysis <strong>of</strong> the Effect <strong>of</strong> IT Capacity on<br />

Development-Undrestanding Sourcing <strong>of</strong> Skills.” International Conference on Information Resources<br />

Management (Conf-IRM) May 18-20, 2008 .Niagara Falls, Ontario, Canada.<br />

Tarmizi H. and Najjar, L. (2007). “Rethinking E-Comerce Research by Connecting IT to Activities on Line<br />

Community”. MWAIS, May 18-19, Springfield, IL.<br />

Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. (2007). “Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support.” Second Annual Midwest United States<br />

Association for Information Systems Conference (MWAIS-02), May 18-19, Springfield, Illinois.<br />

Kamal M., Zhang C., Najjar, L. and Qureshi S. (2007). “Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support”. MWAIS, May 18-19, Springfield, IL.<br />

Tarmizi H. and Najjar, L. (2006). “Empirical study on Communities <strong>of</strong> Practice and E-commerce: influence<br />

<strong>of</strong> community <strong>of</strong> practice on pricing on eBay”. (AMCIS 2006), August 10-13, Acapulco, Mexico.<br />

Uttamchandani, R, Najjar, L, and Bishu, R.R. (2005) “Alternate Training Methods for an Optically<br />

Measuring Inspection Device: A Comparative <strong>Study</strong>.” In the Proceedings <strong>of</strong> the 10th Annual International<br />

Conference on Industrial Engineering – Theory, Applications and Practice Clearwater, Florida, USA.<br />

December 7-9. pp. 474-478.<br />

Najjar, L.and Bishu, R. (2005).” Information Quality in the Banking Industries”. Proceedings <strong>of</strong> the<br />

Eleventh American Conference on Information Systems (AMCIS), August 10-13. <strong>Omaha</strong>, <strong>Nebraska</strong>, pp.<br />

3190-3198.<br />

Najjar, L. Eftekari, H. (2005). “Consumers’ Perception <strong>of</strong> the Quality Internet Banking”. Midwest<br />

Economics Association Meetings, 69th Annual Meetings, Milwaukee, WI. March 14-17.<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

-434-


08/96-08/02 Department <strong>of</strong> Industrial Engineering<br />

and Management Systems, <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong>-Lincoln<br />

2/95-6/95 Department <strong>of</strong> Biometry, <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong>-Lincoln<br />

2/89-8/89 Veterinary Diagnostic Center,<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>- Lincoln<br />

Guest Lecturer:<br />

Courses taught have included Quality Control<br />

(821), and Applied Statistics (822).<br />

SAS Programmer:<br />

Performed SAS programs for statistical<br />

analysis for faculty and client research.<br />

Involved in many projects for the College <strong>of</strong><br />

Dentistry and College <strong>of</strong> Agriculture.<br />

Consulted on and performed projects<br />

(statistical analysis and SAS programming)<br />

for private industry in conjunction with<br />

faculty <strong>of</strong> Biometry Department.<br />

Analyst III:<br />

Performed statistical analysis in<br />

toxicology lab using Experimental<br />

design, regression analysis (linear and<br />

nonlinear) and non-parametric analysis<br />

to test and validate the specific effects<br />

<strong>of</strong> different substances on cattle.<br />

Involved in many projects in<br />

conjunction with Pharmaceutical<br />

College at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong><br />

Medical Center.<br />

January 2005 Baton Rouge, LA Attending 6-day class (SAP s<strong>of</strong>tware on<br />

Business Process Reengineering). LSU<br />

June 2004<br />

Scott Center Hall, PKI<br />

Project Management Institute (PMI).<br />

Project Management Institute (PMI).<br />

Work Shop on :<br />

“Business Process Reengineering with IT”<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

1996 and<br />

2000<br />

<strong>Nebraska</strong> Printing and<br />

Lithography. Fremont <strong>Nebraska</strong><br />

Quality improvement and data analysis.<br />

-435-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Course Coordinator for :<br />

CIST 2500 and ISQA 4150/8206<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Committee Position Date<br />

Library Dean Search Committee Member 2004-2007<br />

Technology Committee Member 2003-2007<br />

UNO Judicial Committee Member 2002-2006<br />

IS&T Academic Committee Member 2002-2005<br />

ISQA Undergraduate Program Committee Member 2002-2006<br />

UNO Pr<strong>of</strong>essional Development & Concerns Committee Member Chair 2002-2005<br />

2006-2008<br />

ISQA Undergraduate Program Committee Member 2009-present<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

10.1 Refereed Journals<br />

Aghazadeh M., Najjar L., and Huq, Z. “Environment and Resolutions to Avoid Discontinuity in Supply<br />

Chain Management” International Journal <strong>of</strong> Risk Assessment and Management. Forthcoming, 2008.<br />

Azadmanesh A., A. Farahani, L. Najjar, “Fault Tolerant Weighted Voting Algorithms”, Int’l Journal <strong>of</strong><br />

Network Security, Forthcoming, 2008.<br />

Luo, Mingchu , Najjar, L and Huang, Wenmin. “The Impact <strong>of</strong> Chinese Student School Performanceon<br />

their Perceptions <strong>of</strong> School Ethical Climate”. Journal <strong>of</strong> Moral Education. Accepted with minor revision.<br />

(August 2006).<br />

Najjar, L., Schniederjans, Marc. J. (2006). “Information Quality Benchmarking: A Banking Industry Case<br />

<strong>Study</strong> in the Product and Service Performance.” Quality and Quantity, International Journal <strong>of</strong><br />

Methodology. Vol. 40, No. 3, pp. 419-434.<br />

-436-


Luo, Mingchu , Najjar, L (2006). “The Chinese Principal Leadership Capacities as Perceived by Master<br />

Teachers.” The Academic Leadership Journal, 4(3). Summer 2006.<br />

Najjar, L.and Bishu, R. (2005). “Service Quality in Banking Industries”. Quality Management Journal.<br />

Volume 12(3), pp 35-44.<br />

Liu, L., Bishu, R., and Najjar, L. (2005). “Using the Analytical Hierarchy Process as a Tool for Assessing<br />

Service Quality.” International Journal <strong>of</strong> Industrial Engineering and Management Systems. Vol. 4(2),<br />

pp.129-135.<br />

10.2 Refereed Proceedings:<br />

Kamal, M., Qureshi, S. , and Najjar, L. (2008).“ a Global Analysis <strong>of</strong> the Effect <strong>of</strong> IT Capacity on<br />

Development-Undrestanding Sourcing <strong>of</strong> Skills.” International Conference on Information Resources<br />

Management (Conf-IRM) May 18-20, 2008 .Niagara Falls, Ontario, Canada.<br />

Tarmizi H. and Najjar, L. (2007). “Rethinking E-Comerce Research by Connecting IT to Activities on Line<br />

Community”. MWAIS, May 18-19, Springfield, IL.<br />

Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. (2007). “Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support.” Second Annual Midwest United States<br />

Association for Information Systems Conference (MWAIS-02), May 18-19, Springfield, Illinois.<br />

Kamal M., Zhang C., Najjar, L. and Qureshi S. (2007). “Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support”. MWAIS, May 18-19, Springfield, IL.<br />

Tarmizi H. and Najjar, L. (2006). “Empirical study on Communities <strong>of</strong> Practice and E-commerce: influence<br />

<strong>of</strong> community <strong>of</strong> practice on pricing on eBay”. (AMCIS 2006), August 10-13, Acapulco, Mexico.<br />

Uttamchandani, R, Najjar, L, and Bishu, R.R. (2005) “Alternate Training Methods for an Optically<br />

Measuring Inspection Device: A Comparative <strong>Study</strong>.” In the Proceedings <strong>of</strong> the 10th Annual International<br />

Conference on Industrial Engineering – Theory, Applications and Practice Clearwater, Florida, USA.<br />

December 7-9. pp. 474-478.<br />

Najjar, L.and Bishu, R. (2005).” Information Quality in the Banking Industries”. Proceedings <strong>of</strong> the<br />

Eleventh American Conference on Information Systems (AMCIS), August 10-13. <strong>Omaha</strong>, <strong>Nebraska</strong>, pp.<br />

3190-3198.<br />

Najjar, L. Eftekari, H. (2005). “Consumers’ Perception <strong>of</strong> the Quality Internet Banking”. Midwest<br />

Economics Association Meetings, 69th Annual Meetings, Milwaukee, WI. March 14-17.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

11.1 Sabbatical:<br />

Fall 2008-Present: <strong>University</strong> <strong>of</strong> Jibail, Saudi Arabia. Department <strong>of</strong> Business Administration. Teaching<br />

courses in MIS.<br />

-437-


11.2 Manuscript Reviewer<br />

Year Journal’s (or Conference) Name Topic <strong>of</strong> the articles<br />

March 2009<br />

March 2009<br />

March 2009<br />

July 2007<br />

May 2007<br />

May 2007<br />

May 2007<br />

March 2006<br />

March 2006<br />

June 2005<br />

July 2004<br />

June 2004<br />

2009 International Conference on<br />

Information Resources Management (Conf-<br />

IRM)<br />

2009 International Conference on<br />

Information Resources Management (Conf-<br />

IRM)<br />

2009 International Conference on<br />

Information Resources Management (Conf-<br />

IRM)<br />

Journal <strong>of</strong> Management Information<br />

Systems (JMIS)<br />

International Conferences On Information<br />

Systems (ICIS 2007)<br />

American Conferences On Information<br />

Systems (AMCIS 2007)<br />

American Conferences On Information<br />

Systems (AMCIS 2007)<br />

American Conferences On Information<br />

Systems (AMCIS 2006)<br />

American Conferences On Information<br />

Systems (AMCIS 2006)<br />

IEEE Transactions on Engineering<br />

Management<br />

International Journal <strong>of</strong> Information<br />

Technology and Decision Making<br />

IEEE Transactions on Engineering<br />

Management<br />

Affect and Aesthetics in ICT Design and Use.<br />

Inter Process Communication & Prioritization to Enable Deskt<br />

Advertisement Mechanism.<br />

The Challenges in Establishing a Government Interoperability<br />

Framework: The e-PING Brazilian Case<br />

A Principal Component Analysis Approach to Web Page<br />

Categorization.<br />

Participants’ Repeat-Visiting Behavior in an Online Community<br />

<strong>of</strong> Practice.<br />

Reliability Generalization <strong>of</strong> Perceived Ease <strong>of</strong> use, Usefulness<br />

and Behavioral Intentions.<br />

Context, Process and Outcomes <strong>of</strong> ISD: An Allegorical Tale.<br />

The News: Examining perceptions <strong>of</strong> information product<br />

quality (IPQ).<br />

Paradox <strong>of</strong> Information Quality: Do Consumers Pay More for<br />

Premium Information on Products on E-commerce Sites?<br />

Information-Centric Assessment <strong>of</strong> S<strong>of</strong>tware Metrics Practices<br />

(second revision).<br />

SFTIS: A Decision Support System for Tourism Demand Analys<br />

and Forecasting.<br />

Information-Centric Assessment <strong>of</strong> S<strong>of</strong>tware Metrics Practices<br />

May 2004 2004 DSI Annual Meeting 1. An Implication <strong>of</strong> using Open S<strong>of</strong>tware (OSS): an<br />

overview <strong>of</strong> OSS, and users’ and developers’<br />

benefits and challenges.<br />

2. Effect <strong>of</strong> Interface Style on User Perception and<br />

Behavioral Intention.<br />

3. Electronic Payment Systems: Foundations,<br />

Taxonomies and Implementation Issues.<br />

4. Personal Web Usage at the workplace: Can<br />

it improve job satisfaction?<br />

5. Two approaches to extract related information<br />

from Web pages.<br />

11.3 Research and Development Grants funded and/or completed:<br />

-438-


Najjar, L., Khazanchi, D., and Wolcott, P. (3/1/2008 to 3/20/2009; Completed) ."Business Database<br />

Competitive Audit Project". Awarded a grant <strong>of</strong> $20,000 for conducting a business database audit for<br />

InfoUSA. This project is being conducted under the auspices <strong>of</strong> the PKI Technology Development Corp<br />

(PKITDC).<br />

Najjar, L., Khazanchi, D., and Wolcott, P. (1/1/2005 to 3/1/2005; Completed) "Business Database<br />

Competitive Audit Project". Awarded a grant <strong>of</strong> $14,575 for conducting a business database audit for<br />

InfoUSA. This project is being conducted under the auspices <strong>of</strong> the PKI Technology Development Corp<br />

(PKITDC).<br />

11.4 Research Grants submitted and under review:<br />

Azad Azadmanesh, Computer Science, College <strong>of</strong> IST, UNO, Lotfollah Najjar, Information Systems &<br />

Quantitative Analysis (ISQA), College <strong>of</strong> IST, UNO. “Electronic Student Companion.” (<strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> Foundation and Student Technol;ogy Fees). February, 2007.<br />

Azad Azadmanesh, Computer Science, College <strong>of</strong> IST, UNO, Lotfollah Najjar, Information Systems &<br />

Quantitative Analysis (ISQA), College <strong>of</strong> IST, UNO , and Krings , director <strong>of</strong> the Survivability Laboratory<br />

Testing at <strong>University</strong> <strong>of</strong> Idaho . “Consensus in Wireless Networks.” (NSF). March, 2006.<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Year/term Course number Course title<br />

Credit<br />

s<br />

2006/Fall ISQA 9130 Multivariate Data Analysis 3 9<br />

2007/ Spring ISQA 8196 Process Reengineering with IT 3 7<br />

2007/Spring ISQA 4190 // 3 4<br />

2007/Spring ISQA 8340 Advanced Regression Analysis 3 3<br />

2007/Spring ISQA 8206 Information Quality and data 3 2<br />

management<br />

2007/Spring ISQA 4200 // 3 5<br />

2007/Spring ISQA 9080 Research Directions in<br />

3 8<br />

Information Technology<br />

2007/Summer ISQA 9120 Application Of Design <strong>of</strong><br />

Experiment<br />

3 3<br />

No. <strong>of</strong><br />

students<br />

-439-


2007/Fall ISQA 9130 Multivariate Data Analysis 3 4<br />

2007/Fall Cist 2500 Introduction to Applies Statistics 3 21<br />

for IS&T<br />

2008/Spring CIST 2500 // (Distancd Education) 3 6<br />

2008/Spring ISQA 9080 Research Directions in<br />

3 15<br />

Information Technology<br />

2008/Spring ISQA 8196 Process Reengineering with IT 3 10<br />

2008/Spring ISQA 4190 // 3 3<br />

2008/Summer ISQA 9120 Application Of Design <strong>of</strong><br />

Experiment<br />

3 3<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: ____50_%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Information Quality, Quality Management, Data Mining, and Process Reengineering.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-440-


Stacie Petter<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Stacie Petter<br />

Assistant Pr<strong>of</strong>essor<br />

Untenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Assistant Pr<strong>of</strong>essor<br />

Dates Held<br />

2006 – Current<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D.<br />

M.B.A.<br />

B.S.<br />

Computer<br />

Information<br />

Systems<br />

Computer<br />

Information<br />

Systems<br />

Computer<br />

Science<br />

Georgia State <strong>University</strong> 5/2006<br />

Georgia State <strong>University</strong> 8/2002<br />

Berry College 12/1999<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Americas Conference on Information Systems (8/2004)<br />

Americas Conference on Information Systems (8/2005)<br />

Seattle Innovation Symposium (10/2005)<br />

-441-


International Conference on Information Systems (12/2005)<br />

International Conference on Information Systems (12/2006)<br />

International Research Workshop on IT Project Management (12/2006)<br />

Clicker Teaching Circle (AY 2007-2008)<br />

Americas Conference on Information Systems (8/2007)<br />

Project Management Institute Heartland Chapter ProDev (9/2007)<br />

International Research Workshop on IT Project Management (12/2007)<br />

International Conference on Information Systems (12/2007)<br />

Clicker Teaching Circle (AY 2008-2009)<br />

International Conference on Design Science and Information Systems & Technology (5/2008)<br />

Midwest Conference for the Association <strong>of</strong> Information Systems (5/2008)<br />

International Research Workshop on IT Project Management (12/2008)<br />

International Conference on Information Systems (12/2008)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

6/2003 – Georgia State <strong>University</strong> Graduate Teaching Assistant – responsible for teaching<br />

3/2006<br />

undergraduate and graduate courses; teaching assistant<br />

8/2002 –<br />

5/2006<br />

6/2000 –<br />

4/2002<br />

11/1999 –<br />

5/2000<br />

1/1999 –<br />

10/1999<br />

Georgia State <strong>University</strong><br />

Vista IT<br />

Network One<br />

Berry College<br />

for graduate and executive MBA course<br />

Graduate Research Assistant – responsible for<br />

conducting research, performing literature reviews, and<br />

writing papers with various pr<strong>of</strong>essors in the area <strong>of</strong><br />

computer information systems<br />

Senior Consultant – developed applications for clients,<br />

performed requirements analysis and system design<br />

Application Developer – developed and maintained<br />

applications for internal use, performed requirements<br />

analysis and system design<br />

Help Desk Coordinator – managed a help desk for<br />

centralized IT department, developed applications and<br />

processes to support help desk<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

-442-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

ISQA Graduate Program Committee (0.5 hours/week)<br />

Graduate Council (0.5 hours/week)<br />

Graduate Council Committee B (0.5 hours/week)<br />

Graduate Council Scholarship Committee (0.5 hours/week)<br />

ISQA Reappointment, Promotion, and Tenure Committee (0.1 hours/week)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

ISQA Graduate Program Committee (2008 – Current)<br />

ISQA Reappointment, Promotion, and Tenure Committee (2006 – 2008)<br />

ISQA Faculty Recruitment Committee (2007-2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Petter, S. (2008) Managing User Expectations on S<strong>of</strong>tware Projects: Lessons from the Trenches,<br />

International Journal <strong>of</strong> Project Management, 26(7).<br />

Petter, S., DeLone, W. and McLean, E. (2008) Measuring Information Systems Success: Models,<br />

Dimensions, Measures, and Interrelationships, European Journal <strong>of</strong> Information Systems, 17(3).<br />

Petter, S. and Vaishnavi, V. (2008) Facilitating Experience Reuse among S<strong>of</strong>tware Project Managers,<br />

Information Sciences. 178(7).<br />

Khazanchi, D., Murphy, J.D., and Petter,S. (2008) Guidelines for Evaluating Patterns in the IS Domain,<br />

Midwest Association for Information Systems Conference, Eau Claire, WI.<br />

Murphy, J.D., Petter, S., Cheng, K., and Briggs, R.O. (2008) Hitting the Collaboration Target: Computer-<br />

Guided thinkLet Selection, International Conference on Design Science Research in Information Systems<br />

and Technology, Atlanta, GA.<br />

Petter, S. Khazanchi, D., and Murphy, J.D. (2008) A Design Science Based Evaluation Framework for<br />

Patterns, International Conference on Design Science Research in Information Systems and Technology,<br />

Atlanta, GA.<br />

Randolph, A. and Petter, S. (2008) Is it Who You Know or What You Know: Social Capital Theory in IT<br />

Project Management, International Research Workshop on IT Project Management, Paris, France.<br />

Petter, S., Straub, D., and Rai, A. (2007) Specifying Formative Constructs in Information Systems<br />

Research, MIS Quarterly, 31(4).<br />

Petter, S., Mathiassen, L, and Vaishnavi, V. (2007) Five Keys to Project Knowledge Sharing, IT<br />

-443-


Pr<strong>of</strong>essional, May/June.<br />

Petter, S. (2007) Managing User Expectations on S<strong>of</strong>tware Projects: Lessons from the Trenches,<br />

International Research Workshop on IT Project Management, Montreal, Quebec, Canada.<br />

Petter, S. (2007). A Process to Reuse Experiences via Written Narratives among S<strong>of</strong>tware Project<br />

Managers, A Design Science Research Proposal Improving and Innovating Information & Communication<br />

Technology: Design Science Research Methods and Patterns, V. Vaishnavi and W. Kuechler (Eds.), Taylor<br />

and Francis.<br />

Petter, S. and Vaishnavi, V. (2007) A Generic Process for Individual Knowledge Reuse: Potential<br />

Problems and Solutions, Americas Conference on Information Systems, Keystone, CO.<br />

Khazanchi, D. and Petter, S. (2006). “The Need for Improved IT Project Management in e-Service<br />

Projects and Beyond,” e-Service Journal, (5:1).<br />

DeLone, W., McLean, E., and Petter, S. (2005). Success <strong>of</strong> Information Systems: Measuring the<br />

Effectiveness <strong>of</strong> Information Systems, Blackwell Encyclopedia <strong>of</strong> Management, 2nd edition, G.B. Davis<br />

(Ed.), Blackwell Publishing.<br />

Kuechler, W., Vaishnavi, V. and Petter, S. (2005). The Aggregate General Design Cycle as a Perspective<br />

on the Evolution <strong>of</strong> Computing Communities <strong>of</strong> Interest, Computing Letters, 1(3).<br />

Petter, S., Sevcik, G. and Straub, D. (2005). Transferring Technology to the Developing World,<br />

Encyclopedia <strong>of</strong> Information Science and Technology, M. Khosrow-Pour (Ed.), Idea Group Publishing.<br />

Petter, S. and Gallivan, M. (2004). Toward a Framework for Classifying and Guiding Mixed Method<br />

Research in Information Systems, Hawai'i International Conference on System Sciences, Waikoloa, HI.<br />

Petter, S. and Vaishnavi, V. (2004) Towards a Model to Support Knowledge Transfer among S<strong>of</strong>tware<br />

Project Managers, Americas Conference on Information Systems, New York, NY.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

Managing in a Digital World STEM Grant for $4500 (2007)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall/2007 ISQA 3420 Managing in a Digital World 3 17<br />

Fall/2007 ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 21<br />

Spring/ ISQA 3420 Managing in a Digital World 3 26<br />

2007<br />

Spring/ ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 24<br />

2007<br />

Fall/2008 ISQA 3420 Managing in a Digital World 3 19<br />

Fall/2008 ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 27<br />

-444-


Spring/<br />

2009<br />

Spring/<br />

2009<br />

ISQA 3420 Managing in a Digital World 3 22<br />

ISQA 8210 Management <strong>of</strong> S<strong>of</strong>tware Development 3 26<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __45___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Conducting research related to sharing experiences related to s<strong>of</strong>tware project management.<br />

Examining measures and predictors <strong>of</strong> information system success.<br />

Developing approaches and guidelines for research methods.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: ___IS - 100__%.<br />

-445-


-446-


Leah Pietron<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Leah R. Pietron<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Associate Pr<strong>of</strong>essor Fall 1991 to Present<br />

Assistant Pr<strong>of</strong>essor Fall 1985 to Fall 1991<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

PhD<br />

MBA<br />

MS<br />

BS<br />

Business Education/<br />

Information Systems<br />

Business Administration/<br />

Economics<br />

Business Education/<br />

Vocational Education<br />

Comprehensive Business<br />

Education/ Physical<br />

Education<br />

<strong>University</strong> <strong>of</strong> North Dakota<br />

August<br />

1979<br />

Northwest Missouri State <strong>University</strong> August<br />

1985<br />

<strong>University</strong> <strong>of</strong> North Dakota May 1977<br />

Mayville State College May 1972<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

Advanced Information Systems Faculty Development Institute, Indiana <strong>University</strong>, Bloomington, IN. July<br />

7-July 31, 1989. Certificate <strong>of</strong> Attendance. Sponsored by the American Assembly <strong>of</strong> Collegiate Schools<br />

<strong>of</strong> Business (AACSB).<br />

Information Systems Faculty Development Institute, St. Paul, MN. July 6-August 7, 1987. Certificate <strong>of</strong><br />

Attendance. Sponsored by the American Assembly <strong>of</strong> Collegiate Schools <strong>of</strong> Business (AACSB).<br />

Continuous enrollment in courses at UNO, SANs Security Training, Seminars, etc<br />

-447-


5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Teaching Circles, "Web Collaboration". (2008 - 2009).<br />

Rubrics Research Triangle (2008 to Current)<br />

Completed the CISSP Certification Examination on November 18, 2006<br />

Attempting the CISA Certification Examination on December 10, 2006<br />

Attended CISSP Certification Session at PKI, Summer 2006<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

Summer<br />

2007<br />

Lockheed Martin<br />

Worked on a Service-Oriented Architecture project. My<br />

focus was on IT Goverance and SOA Policy.<br />

May 2006 StatPak, UNO Conducting a vulnerability assessment with Dwight<br />

Haworth on the application.<br />

Summer/Fall Union Pacific Railroad Sarbanes-Oxley Compliance Review – worked with<br />

2004<br />

Company<br />

Dwight Haworth on evaluation <strong>of</strong> the ISO/IEC<br />

17799 evaluation and identifying deficiencies in their<br />

documentation and controls for Sarbanes-Oxley<br />

compliance.<br />

Summer<br />

2002<br />

City <strong>of</strong> <strong>Omaha</strong><br />

Created the Geographical Information Systems Strategic<br />

Plan for <strong>Omaha</strong> Police Department<br />

Fall 2001 Pamida and ShopKo PeopleS<strong>of</strong>t Security Tree Manager - Faculty Internship<br />

December<br />

2000<br />

MSI Systems Integrators Consultant – worked on the PeopleS<strong>of</strong>t installation –<br />

focused on Human Resources application<br />

Summer<br />

2003<br />

Fall and<br />

Spring 2000<br />

Fall 1999 and<br />

Spring 2000<br />

College <strong>of</strong> IS & T<br />

Faculty Internship with Steve Stock developing Security<br />

Policies and Procedures for the<br />

CASE Training for PMIC – user training for analysts on<br />

the use <strong>of</strong> Excelerator<br />

Created and delivered faculty development workshops<br />

on the use <strong>of</strong> media in classrooms for the College <strong>of</strong><br />

Business Administration<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

Summer-Fall Union Pacific<br />

Completed Sarbanes-Oxley Compliance Asssessment<br />

2005<br />

Spring 2004 Werner Trucking Company Conducted a Physical Security Review<br />

-448-


Spring 2002-<br />

Fall 2002<br />

Fall 2000-<br />

Spring 2001<br />

Fall 2000-<br />

Spring 2001<br />

<strong>Omaha</strong> Police Department Developed Strategic Plan for the Geographical<br />

Information Systems<br />

Developed a Security Model for PeopleS<strong>of</strong>t<br />

Pamida and ShopKo<br />

Worked a faculty internship and created the security<br />

tree<br />

PeoplePlus<br />

PeopleS<strong>of</strong>t Consulting – created documentation for the<br />

Project Management<br />

City <strong>of</strong> <strong>Omaha</strong><br />

Worked with Peter Wolcott, Donna Dufner, and Ilze<br />

Zigurs defining the project for the City <strong>of</strong> <strong>Omaha</strong>’s<br />

Mayor’s Hotline – this project became a service learning<br />

project<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Online Worldwide Instructional Designers and Faculty Steering Committee<br />

<strong>University</strong> Committee on the Advancement <strong>of</strong> Teaching<br />

MIS Graduate Program Committee<br />

Undergraduate Program Committee<br />

Academic Program Committee<br />

Proposed MS in Information Assurance<br />

Distance Education Steering Committee<br />

Information Assurance Undergraduate Program Committee<br />

Information Assurance Undergraduate Program Committee<br />

IS&T ABET Committee<br />

Information Assurance Recruitment Committee<br />

ISQA Assistant Pr<strong>of</strong>essor Recruitment Committee<br />

UNO ISACA Education Advocate<br />

Educational Policy Advisory Committee<br />

Distance Education Advisory Committee<br />

Academic Planning Council<br />

Academic Program Review for the Computer Science Department<br />

Distance Education Director's Forum<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

IS & T Technology Committee (2003-Present)<br />

Dean’s Expanded Executive Committee (2002-Present)<br />

<strong>University</strong> Committee on the Excellence Teaching Award (2005-2007)<br />

-449-


Computer Usage and Technology Committee (2002-2005)<br />

UNO Athletic Committee (2002-2005)<br />

Academic Subcommittee <strong>of</strong> the Computer Usage Committee (2002-2005)<br />

Strategic Planning Committee (2005-2008)<br />

Accreditation and Program Committee (2005-Current)<br />

IS & T Dean’s Search Committee (2005-2008)<br />

ISQA Undergraduate Program Committee (2002-2007)<br />

ISQA Graduate Program Committee (2004-2008)<br />

ISQA Faculty Recruitment Committee (2005-2008)<br />

Member, Colloquium for Integrative Media (2004-2005)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

"Synchronous Collaboration in Systems Development Education – Issues and Recommendations for the<br />

Virtual Classroom.", Van Vliet, P., Pietron, L., Decision Sciences Institute.<br />

Structured Systems Analysis, Information Warfare Journal, March 2006, by Dwight A. Haworth and Leah<br />

R. Pietron.<br />

Sarbanes-Oxley: Achieving Compliance by Starting with ISO 17799 by Dwight A. Haworth and Leah R.<br />

Pietron, Published in Information Systems Management, Vol.23, No. 1, pp. 73-87. Refereed.<br />

Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan<br />

de Vreede, Collaboration Engineering For Incident Response Planning: Process Development and<br />

Validation, HICCS Conference, Refereed publication, January 2007.<br />

Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan<br />

de Vreede, Incident Response Planning Using Collaboration Engineering Process Development and<br />

Validation, ICIS Conference, WISA 2006 Workshop, Refereed publication December 2006.<br />

Gwendolyn Kolfschoten, Gert-Jan de Vreede, and Leah Pietron, "A Training Approach for the Transition<br />

<strong>of</strong> RepeatableCollaboration Processes to Practitioners", Refereed Proceedings for the Conference, GDN<br />

Conference, Karlsruhe, Germany, June 2006.<br />

Alanah J. David, Mehruz Kamal, Terrance V. Schoonover, Josephine Nabukenya, Leah R. Pietron, Gert-Jan<br />

de Vreede, Collaboration Engineering For Incident Response Planning: Process Development and<br />

Validation, Journal <strong>of</strong> Information Security, Refereed publication, January 2008.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

Grant, UNO Technology Grant, Development <strong>of</strong> a HDTV Classroom, $50,000, College <strong>of</strong> Information<br />

Technology & Science, Funded ($25,000)<br />

Grant, Distance Education Development Grant, College <strong>of</strong> Information Technology & Science, Pietron, L.,<br />

$1,000.00, Funded, (January 11, 2009 - May 9, 2009).<br />

Grant, Distance Education Development Grant, College <strong>of</strong> Information Technology & Science, Pietron, L.,<br />

$1,000.00, Funded, (January 11, 2009 - May 9, 2009).<br />

-450-


12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 CIST 3600 Information Security and Policy 3 24<br />

ISQA 8570 Info Security, Policy, and Ethics 3 11<br />

ISQA 8580 Security Risk Management and Assessment 3 10<br />

Fall 2008 ISQA 4110- Information System Analysis 3 20<br />

001<br />

ISQA 4110- Information System Analysis 3 26<br />

002<br />

ISQA 8040 An Overview <strong>of</strong> System Development 3 14<br />

Summer 2008 ISQA 4110 Information System Analysis 3 10<br />

Spring 2008 CIST 3600 Information Security and Policy 3 17<br />

ISQA 8570 Info Security, Policy, and Ethics 3 12<br />

ISQA 8580 Security Risk Management and Assessment 3 10<br />

Fall 2007 CIST 3600 Information Security and Policy 3 13<br />

ISQA 4110- Information System Analysis 3 18<br />

001<br />

ISQA 4110-<br />

002<br />

Information System Analysis 3 30<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 25__%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

My research focus is on pedagogical issues in systems development and information security. I have<br />

been working on two distance education articles, one virtual communities for information security, and<br />

use <strong>of</strong> rubrics in programming classes.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%<br />

-451-


-452-


Sajda Qureshi<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Sajda Qureshi<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Associate Pr<strong>of</strong>essor<br />

Dates Held<br />

2002-Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D London School <strong>of</strong> Economics and Political Science 1991-95<br />

M.S Analysis, Design London School <strong>of</strong> Economics and Political Science 1989-91<br />

and<br />

Management <strong>of</strong><br />

Information<br />

Systems<br />

Postgrad MIS London School <strong>of</strong> Economics and Political Science 1988-89<br />

uate<br />

Diploma<br />

MBA Business John Cabot <strong>University</strong> 1985-88<br />

Administration<br />

GCE Ordinary<br />

Level (10<br />

Subjects),<br />

GCE Advanced<br />

Level (3<br />

Subjects).<br />

St. Georges English School 1980-85<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

-453-


5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Teaching Assessment By Students, Spring 2008<br />

Teaching Circle: Continuous Improvement in Teaching Fall 2007<br />

HICSS 2008<br />

HICSS 2006-2007<br />

HICSS 2005-2006<br />

WSIS 2005<br />

HICSS 2004-2005<br />

AMCIS 2005<br />

ICIS 2005<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

2009 <strong>University</strong> <strong>of</strong> Washington Visiting Scholar, the Information School<br />

2005 Westminster Business<br />

School<br />

Visiting Scholar, Department <strong>of</strong> Business Information<br />

Management and Operations<br />

1997-2004 Erasmus <strong>University</strong>.<br />

Rotterdam School <strong>of</strong><br />

Management<br />

Assistant Pr<strong>of</strong>essor, Department <strong>of</strong> Information and<br />

Decision Sciences. Taught MSc Information Management<br />

and PhD courses, research and thesis supervision.<br />

Visiting Pr<strong>of</strong>essor, Rotterdam School <strong>of</strong> Management.<br />

Taught MIS related courses for the MBA/MBI program.<br />

Fellow, Erasmus Research in Management (ERIM).<br />

1996 <strong>University</strong> <strong>of</strong> Arizona, School<br />

<strong>of</strong> Business and Public<br />

Administration<br />

1996 Erasmus <strong>University</strong>.<br />

Rotterdam School <strong>of</strong><br />

Responsibility for research and publication.<br />

Visiting Pr<strong>of</strong>essor<br />

Research Fellow<br />

Management<br />

1992-1995 Commonwealth Secretariat Supported electronic communication, supervised and<br />

managed projects implementing computer networks,<br />

and the development and application <strong>of</strong> electronic group<br />

support.<br />

1990-1992 London School <strong>of</strong> Economics<br />

and Political Science<br />

1988-1989 F.S. Tyabji Chartered<br />

Accountants<br />

Research Assistant, LSE Research and Consultancy.<br />

Worked on an MRC-EEC project developing an<br />

organisational modelling tool using Coloured Petri-nets.<br />

Information Technology Consultant. Designed<br />

accounting system<br />

-454-


1986-1987 John Cabot <strong>University</strong> Manager, <strong>University</strong> Library. Supervised and trained<br />

library assistants. General administration and<br />

accounting. Developed library computer system.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

2001-2007 V.O.F. Innovative Group Director. Collaborative work consulting<br />

Support<br />

1988 ITALSTAT Consultant, Finance Department. Implemented Monte<br />

Carlo simulation as a method <strong>of</strong> risk analysis on the<br />

capital budgeting system <strong>of</strong> an investment project.<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Dean's Executive Committee<br />

Doctoral Program Committee<br />

College Personnel Committee<br />

Reappointment and Tenure Committee<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Graduate Council Committee B, 2005-2008<br />

Dean's Executive Committee, 2007-2008<br />

Doctoral Program Committee, 2007-2008<br />

College Personnel Committee, 2006-2008<br />

Reappointment and Tenure Committee, 2005-2008<br />

Member Pr<strong>of</strong>essional Development Committee, 2002-2005<br />

Member Chancellor’s Strategic Planning Committee, 2004-2005<br />

Chair Academic Excellence Sub-Committee, 2004-2005<br />

Facilitator and Presenter Strategic Planning Advance, 2004-2005<br />

Member <strong>University</strong> Committee on Research , 2004-2005<br />

-455-


10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Qureshi, S., Kamal, M., and P. Wolcott “Information Technology Therapy for Competitiveness in Micro-<br />

Enterprises.” International Journal <strong>of</strong> E-Business Research. Idea Group International. Vol. 5, Issue 1.<br />

January 2009.<br />

Wolcott, P., Kamal, M. and S. Qureshi ”Meeting the Challenges <strong>of</strong> ICT Adoption by Micro-enterprises“.<br />

Journal <strong>of</strong> Enterprise Information Management. Emerald. Volume 21, Issue 6. 2008.<br />

Qureshi, S., Briggs, B. and V. Hlupic. “Value Creation from Intellectual Capital: Convergence <strong>of</strong><br />

Knowledge Management and Collaboration in the Intellectual Bandwidth Model”. Group Decision and<br />

Negotiation. Vol 15, No 3. Pp:197-220. 2006.<br />

Qureshi, S., Liu, M. and D. Vogel, "The Effects <strong>of</strong> Electronic Collaboration in Distributed Project<br />

Management". Group Decision and Negotiation. Vol 15, No1. Pp55-75 2006.<br />

Qureshi, S. and P. Keen. “Activating Knowledge through Electronic Collaboration: Vanquishing the<br />

Knowledge Paradox”. IEEE Transactions in Pr<strong>of</strong>essional Communication. Vol 48, Issue 1. Pp: 40- 54 2005.<br />

de Vreede, G.J., Mgaya, R. and S. Qureshi. “Field Experiences with Collaboration Technology: A<br />

Comparative <strong>Study</strong> in Tanzania and South Africa” Journal <strong>of</strong> Information Technology for Development.<br />

Vol 10, no 3. 2004.<br />

Qureshi, S. “Social and Economic Perspectives on the role <strong>of</strong> Information and Communication<br />

Technology on Development.” Journal <strong>of</strong> Information Technology for Development. Vol 15, No 1. 2009.<br />

Qureshi, S. “Assessing the Effects <strong>of</strong> Information and Communication Technologies on Development.”<br />

Journal <strong>of</strong> Information Technology for Development. Vol 14, No 4. 2008.<br />

Qureshi, S. " Information technology innovations for development" Journal <strong>of</strong> Information Technology<br />

for Development. Vol 13, No 4. (p 311-313) 2007.<br />

Qureshi, S. "Information Technology Application in Emerging Economies" Journal <strong>of</strong> Information<br />

Technology for Development. Vol 13, No 2. 2007.<br />

Qureshi, S. "Collaboration for knowledge networking in development." Journal <strong>of</strong> Information<br />

Technology for Development. Vol 12, No 2. (p 87-89) 2006.<br />

Qureshi, S. "Why is the information society important to us? The World Summit on the Information<br />

Society in Tunis." Journal <strong>of</strong> Information Technology for Development. Vol 12, No 1. 2006.<br />

Qureshi, S. “Off-Shore Outsourcing Across the Digital Divide”. Journal <strong>of</strong> Information Technology for<br />

Development. Vol 11, No 1. 2005.<br />

Qureshi, S. “E-Government and IT Policy: Choices for government outreach and policy making”. Journal<br />

<strong>of</strong> Information Technology for Development. Vol 11, No 2. 2005.<br />

Qureshi, S. “Movement in the Information Technology for Development Debate: How can it meet the<br />

challenges <strong>of</strong> global competition?”. Journal <strong>of</strong> Information Technology for Development. Vol 10, No 3.<br />

2004.<br />

Qureshi, S., Kamal, S., and P. Keen “Knowledge Networking to overcome the Digital Divide” in King, B.<br />

“Knowledge Management and Organizational Learning” Series on Annals <strong>of</strong> Information System<br />

Springer. Forthcoming.<br />

Qureshi, Sajda, and Vogel, Doug, Information Technology Application in Emerging Economies: A<br />

Monograph <strong>of</strong> a Symposium at HICSS-40, January 2007, 72 pp ISBN TBA.<br />

http://www.hicss.hawaii.edu/reports.htm<br />

Qureshi, S. and P. Keen "Organizational Transformation by Activating Knowledge: The Mediating Role <strong>of</strong><br />

Collaboration Technologies" in Handbook <strong>of</strong> Information Technology in A. Salazar and S. Sawyer (Eds)<br />

Organizations and Electronic Markets. World Scientific Press. Accepted for publication. 2006.<br />

-456-


Qureshi, S. "The Role <strong>of</strong> Information Technology for Development: Global Development Through Local<br />

Empowerment" in Networking the Commonwealth for Development: Moving from Digital Divide to<br />

Digital Opportunity. NDD New Media. November 2005. Pp49-52.<br />

Davison, R.M., Harris, R.H., Qureshi, S., Vogel, D.R. and Vreede, G.J. de (Eds) Information Systems in<br />

Developing Countries: Theory and Practice, City <strong>University</strong> <strong>of</strong> Hong Kong Press. 2005.<br />

Qureshi, S., “Information Technology Infrastructures for Developing Countries: Key Concepts and Cases”<br />

in Davison, R.M., Harris, R.H., Qureshi, S., Vogel, D.R. and Vreede, G.J. de (Eds) Information Systems in<br />

Developing Countries: Theory and Practice, City <strong>University</strong> <strong>of</strong> Hong Kong Press. 2005.<br />

Qureshi, S., Hlupic, V. and B. Briggs, “On the Convergence <strong>of</strong> Knowledge Management and Groupware”.<br />

In: Vreede, de. G.J., Guerrero, L.A. and G.M. Raventos (Eds). Groupware: Design, Implementation, and<br />

Use. Springer. 2004. pp25-34.<br />

Kamal, M., Good, T.G., & Qureshi, S. Development Outcomes from IT adoption in Micro-Enterprises.<br />

Proceedings <strong>of</strong> the 42nd Annual Hawaii International Conference on System Sciences (HICSS-42),<br />

Waikoloa, Hawaii. January 5 – 8. 2009.<br />

Qureshi, S., Kamal, M., and Good, T.G.. Adoption <strong>of</strong> Information Technology by Micro-enterprises:<br />

Insights from a rural community. Proceedings <strong>of</strong> the 14th Annual Americas Conference on Information<br />

Systems (AMCIS-14), Toronto, Canada. August 14-17, 2008.<br />

Kamal, M., Qureshi, S. and L. Najjar “A Global Analysis <strong>of</strong> the Effect <strong>of</strong> IT Capacity on Development –<br />

Understanding Sourcing <strong>of</strong> Skills”. 2008 International Conference on Information Resources<br />

Management (Conf-IRM). May 18-20, 2008. Niagara Falls, Ontario, Canada.<br />

Qureshi, S., Wolcott, P. and M. Kamal “Information Technology Therapy for Micro-enterprise Success:<br />

Directions for Sustainable Development”. 41th Annual Hawaii International Conference on System<br />

Sciences (HICSS'08), 2008.<br />

Qureshi, S. and A. York, “IT Adoption by Small Businesses in Underserved Communities”. 41th Annual<br />

Hawaii International Conference on System Sciences (HICSS'08), 2008.<br />

Qureshi, S. and T. Lamsam-Trumbly, “Transcending the Digital Divide in Native America: A Framing<br />

Analysis <strong>of</strong> the Effects <strong>of</strong> Information and Communication Technologies and Media on Empowerment<br />

and Development”. 41th Annual Hawaii International Conference on System Sciences (HICSS'08), 2008.<br />

Qureshi, S. and A. Laure-Fayard, “Virtual Teams and Development: A Language Games Perspective”.<br />

41th Annual Hawaii International Conference on System Sciences (HICSS'08), 2008.<br />

Qureshi, S., Keen, P. and M. Kamal." Knowledge Networking across the Social Divide: A Model for<br />

Distributed Decision Making " Proceedings <strong>of</strong> the Thirteenth Americas Conference on Information<br />

Systems, Keystone, USA August 9th-12th 2007.<br />

Wolcott, P., Qureshi, S. and M. Kamal " An Information Technology Therapy Approach to Microenterprise<br />

Adoption <strong>of</strong> ICTs". Proceedings <strong>of</strong> the Thirteenth Americas Conference on Information<br />

Systems, Keystone, USA August 9th-12th 2007. Nominated for Best Paper Award.<br />

Kamal, M., Zhang, Chi, Najjar, L., & Qureshi, S. Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support. Paper presented at the Second Annual<br />

Midwest United States Association for Information Systems Conference (MWAIS-02), Springfield, Illinois.<br />

May 18-19. 2007.<br />

Qureshi, S. and A. Davis, "Managing Resistance to Organizational Change: How GSS Can Reveal Role<br />

Related Resistance Behaviors," hicss, p. 248b, 40th Annual Hawaii International Conference on System<br />

Sciences (HICSS'07), 2007. Nominated for Best Paper Award.<br />

Qureshi, S., and A. Davis, " Overcoming the Digital Divide through Electronic Commerce: Harnessing<br />

opportunities in IT for Development" 40th Annual Hawaii International Conference on System Sciences<br />

(HICSS'07), 2007.<br />

-457-


Qureshi, S., Keen, P. and M. Kamal. "Knowledge Networking for Development: Building Bridges across<br />

the Digital Divide" hicss, p. 226c In (eds) R. Sprague and J. Nunamaker The Fortieth Annual Hawaii<br />

International Conference on Systems Sciences. IEEE Computer Society Press.2007.<br />

Qureshi, S. and A. Davis. "The Effect <strong>of</strong> e-Commerce Development". Proceedings <strong>of</strong> the Twelfth<br />

Americas Conference on Information Systems, Acapulco, Mexico, August 4th-6th 2006.<br />

Qureshi, S. and A. Davis. "Assessing Resistance to Change in a Multinational Organization Using a GSS<br />

Game". Proceedings <strong>of</strong> the Twelfth Americas Conference on Information Systems, Acapulco, Mexico,<br />

August 4th-6th 2006.<br />

Qureshi, S. and A. de Leeuwe., "Mobilizing Intellectual Bandwidth in a Distributed Virtual Organization:<br />

The Missing Links." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii International<br />

Conference on Systems Sciences. IEEE Computer Society Press. 2006.<br />

Keen, P. and S. Qureshi, "Organizational Transformation through Business Models: A Framework for<br />

Business Model Design." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii<br />

International Conference on Systems Sciences. IEEE Computer Society Press. Best Paper Award. 2006.<br />

Qureshi, S. and C. "Noteboom. Adaptation in Distributed Projects: Collaborative Processes in Digital<br />

Natives and Digital Immigrants." In (eds) R. Sprague and J. Nunamaker The Thirty Ninth Annual Hawaii<br />

International Conference on Systems Sciences. IEEE Computer Society Press. 2006.<br />

Qureshi, S. and C. Noteboom. "An Investigation <strong>of</strong> Episodes <strong>of</strong> Global Interactivity: What Collaborative<br />

Processes Effect the Success <strong>of</strong> Distributed Projects?." Proceedings <strong>of</strong> the Eleventh Americas Conference<br />

on Information Systems, <strong>Omaha</strong>, NE, USA August 11th-14th 2005.<br />

Qureshi, S. "How does Information Technology Effect Development? Integrating Theory and Practice<br />

into a Process Model." Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems,<br />

<strong>Omaha</strong>, NE, USA August 11th-14th 2005.<br />

Qureshi, S. and P. Keen, “How to Overcome the Knowledge Paradox: Activate Knowledge Identity, Not<br />

Just Organize Information.” In (eds) R. Sprague and J. Nunamaker The Thirty Eight Annual Hawaii<br />

International Conference on Systems Sciences. IEEE Computer Society Press. 2005.<br />

Qureshi, S., Liu, M. and D. Vogel, “A Grounded Theory Analysis <strong>of</strong> E-Collaboration Effects for Distributed<br />

Project Management ”. In (eds) R. Sprague and J. Nunamaker The Thirty Eight Annual Hawaii<br />

International Conference on Systems Sciences. IEEE Computer Society Press. 2005.<br />

Verhoef, R. and S. Qureshi, “Collaborative Infrastructures for Mobilizing Intellectual Resources:<br />

Assessing Intellectual Bandwidth in a Knowledge Intensive Organization.”In (eds) R. Sprague and J.<br />

Nunamaker The Thirty Eigth Annual Hawaii International Conference on Systems Sciences. IEEE<br />

Computer Society Press. 2005.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year Course Course title Semester Class<br />

-458-


number hrs size<br />

Spring 2009 ISQA Electronic Commerce 3 20<br />

4180/8186<br />

ISQA 8420 Managing the IS Function 3 24<br />

Fall 2008 ISQA 4000 Information Technology for Development 3 5<br />

ISQA 8080 Independent <strong>Study</strong><br />

ISQA 8420 Managing the IS Function 3 8<br />

Spring 2008 ISQA 8060 Research Methods in MIS 3 20<br />

ISQA Electronic Commerce 3 19<br />

4180/8186<br />

Fall 2007 ISQA 8060 Research Methods in MIS 3 22<br />

ISQA 8080 Independent <strong>Study</strong><br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-459-


-460-


Maury Scho<strong>of</strong><br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Maury Scho<strong>of</strong>f<br />

Lecturer<br />

n/a<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Instructor 1996 - 2002<br />

Lecturer<br />

2002 - present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

MS Operations Naval Postgraduate School 1970<br />

Research and<br />

Systems<br />

Analysis<br />

BS Chemistry Utah State <strong>University</strong> 1959<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

Fifteen <strong>of</strong> twenty-five years <strong>of</strong> Army career using and teaching the use <strong>of</strong> computers<br />

Eleven years as a manager in a corporate information systems department<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

-461-


6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

1995 - 1996 Bellevue <strong>University</strong> Adjunct Faculty<br />

1993 - 1995 Embry-Riddle Aeronautical Instructor<br />

<strong>University</strong>, Offutt Air Force<br />

Base Campus<br />

1978 - 1982 Kansas City Community Instructor<br />

College, Fort Leavenworth<br />

Campus<br />

1977 - 1978 <strong>University</strong> <strong>of</strong> Maryland, Adjunct Faculty<br />

Korea Campus<br />

1985 – 1996 Fortune 50 company,<br />

<strong>Omaha</strong><br />

Senior operations research analyst / Director <strong>of</strong><br />

Operations Analysis /<br />

Internal consultant /<br />

1960 -1985 Army Command and<br />

General Staff<br />

College<br />

Director <strong>of</strong> Strategic Information and Financial Systems<br />

Career Army Officer<br />

Division Finance Officer<br />

Installation Finance and<br />

Accounting Officer<br />

Deputy Director <strong>of</strong><br />

War Games and Analysis<br />

Chairman, Management Committee<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

11 years <strong>of</strong> consulting in applications <strong>of</strong> information<br />

systems to real world business problems including<br />

s<strong>of</strong>tware design, systems integration, installation <strong>of</strong><br />

systems, selection <strong>of</strong> hardware, selection <strong>of</strong> commercial<br />

s<strong>of</strong>tware. Consulting was done both domestically and<br />

internationally<br />

-462-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Course<br />

Term/year number<br />

Spring 2009 CIST 3100-<br />

001<br />

CIST 3110-<br />

001<br />

CIST 3110-<br />

002<br />

CIST 3110-<br />

850<br />

Fall 2008 CIST 3110-<br />

001<br />

CIST 3110-<br />

002<br />

CIST 3110-<br />

003<br />

Spring 2008 CIST 3100-<br />

850<br />

CIST 3110-<br />

001<br />

CIST 3110-<br />

002<br />

Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Organizations, Applications, and Technology 3 20<br />

Information Technology Ethics 3 27<br />

Information Technology Ethics 3 28<br />

Information Technology Ethics 3 11<br />

Information Technology Ethics 3 29<br />

Information Technology Ethics 3 22<br />

Information Technology Ethics 3 22<br />

Organizations, Applications, and Technology 3 26<br />

Information Technology Ethics 3 25<br />

Information Technology Ethics 3 31<br />

-463-


ISQA 8420 Managing the I.S. Function 3 26<br />

Fall 2007 CIST 1010- Foundation <strong>of</strong> IS & T 1 24<br />

001<br />

CIST 1010- Foundation <strong>of</strong> IS & T 1 11<br />

002<br />

CIST 3100- Organizations, Applications, and Technology 3 22<br />

002<br />

CIST 3100-<br />

003<br />

Organizations, Applications, and Technology 3 25<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-464-


Yong Shi<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Yong Shi<br />

Charles W. and Margre H. Durham Distinguished<br />

Pr<strong>of</strong>essor <strong>of</strong> Information Technology<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Charles W. and Margre H. Durham Distinguished August 1999<br />

Pr<strong>of</strong>essor <strong>of</strong> Information Technology<br />

Pr<strong>of</strong>essor August 1998<br />

Associate Pr<strong>of</strong>essor August 1996<br />

Assistant Pr<strong>of</strong>essor August 1991<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. Management Science <strong>University</strong> <strong>of</strong> Kansas 1991<br />

with minor in Computer<br />

and Production System<br />

Design<br />

B.S. Mathematics Southwest Petroleum Institute,<br />

Sichuan, China<br />

1982<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

May 27-30, 2007, organized and co-chaired the 7th International Conference on Computational Science,<br />

-465-


Beijing, where more than 600 scholars have participated from 48 different countries.<br />

Oct. 28-31, 2007, organized and co-chaired the 2007 IEEE International Conference on Data Mining<br />

(ICDM 2007), <strong>Omaha</strong>, NE, USA, where more than 350 scholars have participated from 47 different<br />

countries.<br />

May 24-26, 2009, organized and co-chaired the International Conference on Linear Programming<br />

Algorithms and Extensions, Haikou, Hainan, where more than 25 international leading scholars in the<br />

field will participate.<br />

June 21-26, 2009, organized and co-chaired the 20th International Conference on Multiple Criteria<br />

Decision Making, where more than 250 scholars participants<br />

Chaired Workshop on “Optimization-based Data Mining Techniques and Applications” at IEEE<br />

International Conference on Data Mining, 2005, 2006, 2007.<br />

Chaired Workshop on “Computational Finance and Business Intelligence” at International Conference on<br />

Computational Science, 2004, 2005, 2006, 2007, 2008.<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

September 2003- Consulting Northrop Information Intrusion and detection<br />

Oct. 2005 Grumman Corporation<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Committee <strong>of</strong> Doctoral Program in IT<br />

Organized 14 committee meetings<br />

Admitted 2 new Ph.D. students<br />

Managed the Comps Exams<br />

Organized committee meeting to revise the Plan <strong>of</strong> <strong>Study</strong> for the program. (Spring 2009)<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

-466-


Doctoral Program Committee (2003-present)<br />

Graduate Program Committee (2006-2007)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Zhang, W. R., J. H. Zhang, Y. Shi and S. S. Chen, “Bipolar Linear Algebra and YinYang-N-Element Cellular<br />

Networks for Equilibrium-Based Biosystem Simulation and Regulation”, Journal <strong>of</strong> Biological Systems,<br />

(Forthcoming) 2009. Refereed Journal. 33% contribution.<br />

Yan, N., Z. Chen, Y. Shi and R. Liu “An Optimization-Based Classification Approach with the Non-additive<br />

Measure”, International Journal <strong>of</strong> Operations and Quantitative Management, (Forthcoming) 2009.<br />

Refereed Journal. 33% contribution.<br />

Zhang, Z., P. Zhang and Y. Shi “A Rough Set-based Multiple Criteria Linear Programming Approach for<br />

Improving Classification Performance”, International Journal <strong>of</strong> Operations and Quantitative<br />

Management, (Forthcoming) 2009. Refereed Journal. 33% contribution.<br />

Zhang, P., Y. Tian, Z. Zhang, X. Li and Y. Shi “Supportive instances for Regularized Multiple Criteria Linear<br />

Programming Classification”, International Journal <strong>of</strong> Operations and Quantitative Management,<br />

(Forthcoming) 2009. Refereed Journal. 33% contribution.<br />

Zhang P., Z. Zhang, A. Li, Y. Shi, “Global and Local (Glocal) Bagging Approach for Classifying Noisy<br />

Dataset”, International Journal <strong>of</strong> S<strong>of</strong>tware and Informatics, Vol.2, No.2, 181-197, 2008. Refereed<br />

Journal. 33% contribution.<br />

Zheng, X., L. Zhang, G. Nie and Y. Shi, “A Way to Accelerate Knowledge Management: from the<br />

Perspective <strong>of</strong> Knowledge Potential,” Journal <strong>of</strong> Service Science and Management (Forthcoming) 2008.<br />

Refereed Journal. 33% contribution.<br />

Peng, Y., Kou, G., Shi, Y., and Chen, Z.,A Descriptive Framework for the Field <strong>of</strong> Data Mining and<br />

Knowledge Discovery , International Journal <strong>of</strong> Information Technology and Decision Making, Vol. 7,<br />

No.4, 639-682, 2008. Refereed Journal. 33% contribution.<br />

Kou, G., Y. Peng, Z. Chen and Y. Shi “Multiple Criteria Mathematical Programming for Multi-Class<br />

Classification and Application in Network Intrusion Detection,” Information Sciences, Vol. 179, 371–<br />

381, 2009. Refereed Journal. 33% contribution.<br />

Li., X., L. Zhang, P. Zhang and Y. Shi “Problems and Systematic Solutions in Data Quality,” International<br />

Journal <strong>of</strong> Services Sciences, (Forthcoming) 2008. Refereed Journal. 33% contribution.<br />

Peng, Y., G. Kou, Y. Shi, and Z. Chen “A Multi-Criteria Convex Quadratic Programming Model for Credit<br />

Data Analysis,” Decision Support Systems, Vol. 44, 1016-1030, 2008. Refereed Journal. 33% contribution.<br />

Zhang, Y., L. Chen, Z. Zhou and Y. Shi, “A Geometrical Method on Multidimensional Dynamic Credit<br />

Evaluation”, International Journal <strong>of</strong> Information Technology and Decision Making, Vol. 7, No. 1, 103-<br />

114, 2008. Refereed Journal. 33% contribution.<br />

Liu, G., Z. Zhou and Y. Shi, “A Multi-Dimensional Forward Selection Method for Firms’ Credit Sale,”<br />

Computers & Mathematics with Applications, Vol. 54, 1228-1233, 2007. Refereed Journal. 33%<br />

contribution.<br />

Shi, Y., X. Zhang, J. Wan, G. Kou, Y. Peng, and Y. Guo, “Comparison study <strong>of</strong> two kernel-based learning<br />

algorithms for predicting the distance range between antibody interface residues and antigen surface”,<br />

-467-


International Journal <strong>of</strong> Computer Mathematics, Vol.84, 690-707,2007. Refereed Journal. 33%<br />

contribution.<br />

Shi, Y., X. Zhang, J. Wan, Y. Wang, W. Ying, Z. Cao, Y. Guo, “Predicting the Distance between Antibody’s<br />

Interface Residue And Antigen To Recognize Antigen Types By Support Vector Machine”, Neural<br />

Computing & Applications, Vol.16, 481-490, 2007. Refereed Journal. 33% contribution.<br />

Zhang, L., Y. Shi, and X. Yang, “Association-Rule Knowledge Discovery by Using A Fuzzy Mining<br />

Approach,” International Journal <strong>of</strong> Data Mining and Business Intelligence, (Forthcoming), Refereed<br />

Journal. 33% contribution.<br />

Kwak, W., Y. Shi, S. Eldridge and G Kou, “Bankruptcy Prediction for Japanese Firms: Using Multiple<br />

Criteria Linear Programming Data Mining Approach,” International Journal <strong>of</strong> Data Mining and Business<br />

Intelligence, (Forthcoming), Refereed Journal. 33% contribution.<br />

Shi, Y, Y. Peng, G. Kou and Z. Chen, “Classifying Credit Card Accounts for Business Intelligence and<br />

Decision Making: A Multiple-Criteria Quadratic Programming Approach,” International Journal <strong>of</strong><br />

Information Technology and Decision Making, Vol. 4, 581-600, 2005, Refereed Journal (SCI). 33%<br />

contribution.<br />

Zhou, Z., T. Mou and Y. Shi, “The Mathematical Structure <strong>of</strong> Credit Evaluation,” Far East Journal <strong>of</strong><br />

Applied Mathematics, Vol. 20, 113-119, 2005, Refereed Journal. 33% contribution.<br />

Shi, Y., H. Yang and L. Zhang, “Promoting China’s National Competitiveness by Using Knowledge<br />

Management and Data Mining,” China S<strong>of</strong>t Science, Vol. 176, 46-51, 2005 (in Chinese), Refereed Journal.<br />

33% contribution.<br />

Shi, Y., J. He, L. Wang and W. Fan, “Computer-based Algorithms for Multiple Criteria and Multiple<br />

Constraint Levels Integer Linear Programming,” Computers & Mathematics with Applications, Vol. 49,<br />

903-921, 2005, Major Refereed Journal (SCI). 50% contribution.<br />

Kou, G., Y. Peng, Y. Shi, M. Wise and W. Xu, "Discovering Credit Cardholders’ Behavior by Multiple<br />

Criteria Linear Programming", Annals <strong>of</strong> Operations Research, Vol.135, 261-274, 2005, Major Refereed<br />

Journal (SCI). 30% contribution.<br />

Shi, Y., R. Liu, N. Yan, and Z. Chen, “A Family <strong>of</strong> Optimization Based Data Mining Methods,” Zhang, Y<br />

(eds.), ApWeb 2008, Progress in WWW Research and Development, LNCS 4976, pp. 26-38, 2008.<br />

Shi, Y., R. Liu, N. Yan, and Z. Chen, “Multiple Criteria Mathematical Programming and Data Mining,” ICCS<br />

2008, Part I: 7-17. (EI, ISTP)<br />

Zhang, P., Y. Tian, X. Li, Z. Zhang, and Y. Shi, “Select Representative Samples for Regularized Multiple-<br />

Criteria Linear Programming Classification,” ICCS 2008, Part II: 436-440. (EI, ISTP).<br />

Yan, N., Z. Chen, R. Liu, and Y. Shi, “An Optimization-Based Classification Approach with the Non-additive<br />

Measure,” ICCS 2008, Part II: 450-458. (EI, ISTP).<br />

Zhang, Y., Z. Zhou, and Y. Shi, “A Selection Method <strong>of</strong> ETF’s Credit Risk Evaluation Indicators ,” ICCS 2008,<br />

Part II: 459-465. (EI, ISTP).<br />

Zhang, Z., Y. Shi, P. Zhang, and G. Gao, “A Rough Set-Based Multiple Criteria Linear Programming<br />

Approach for Classification,” ICCS 2008, Part II: 476-485. (EI, ISTP).<br />

Zhang, J. and Y. Shi “A Framework <strong>of</strong> Optimization Method for Classification,” Lecture Notes in OR: The<br />

First International Symposium on Optimization and Systems Biology (OSB’07), Beijing, China, August 8–<br />

10, 2007, 391–396. (ISPT).<br />

Liu, R. and Y. Shi “Succinct Matrix Approximation and Efficient k-NN Classification,” IEEE ICDM 2007<br />

Proceedings, 213-222. (EI).<br />

Zhu, X., P. Zhang, X. Lin and Y. Shi “Active Learning from Data Streams,” IEEE ICDM 2007 Proceedings,<br />

757-762. (EI).<br />

He, J., G. Huang, Y. Zhang and Y. Shi “Cluster Analysis and Optimization in Color-Based Clustering for<br />

-468-


Image,” Workshop on Knowledge Discovery and Data Mining from Multimedia Data and Multimedia<br />

Applications, Workshop at IEEE ICDM 2007, 213-218. (EI).<br />

Gang, K., Y.Peng, Y. Shi, and Z. Chen, “Epsilon-Support Vector and Large-Scale Data Mining Problems”,<br />

ICCS 2007, Part III: 874-881. (EI, ISTP)<br />

Zhou, L., Y. Liu, J. Wang and Y. Shi “Utility-based Web Path Traversal Pattern Mining,” Workshop at IEEE<br />

ICDM 2007, 373-378. (EI).<br />

He, J., Y. Zhang, Y Shi, G. Huang “A Multi-criteria Decision Support System <strong>of</strong> Water Resource Allocation<br />

Scenarios, KSEM2007. (Accepted) (LNAI) (EI, ISTP, DBLP)<br />

He, J., G. Huang, Y. Zhang and Y. Shi “Cluster Analysis and Optimization in Color-Based Clustering for<br />

Image,” Workshop on Knowledge Discovery and Data Mining from Multimedia Data and Multimedia<br />

Applications, ICDM 2007. (IEEE conference)<br />

He, J., Y. Zhang, G. Huang, Y. Shi, “Network Lifetime <strong>of</strong> Application-Specific Randomly Deployed Wireless<br />

Sensor Networks in Arbitrary Sensor Density,” ACIS-ICIS 2007: 352-357. (EI, ISTP, DBLP)<br />

Shi, Y., Y. Tian, X. Chen and P. Zhang “A Regularized Multiple Criteria Linear Program for Classification,”<br />

Workshop at IEEE ICDM 2007, 253-258. (EI).<br />

Shi, Y. and X. Li "Knowledge Management Plantforms and Intelligence Knowledge beyond Data Mining,"<br />

in Y. Shi, D. Olson and A. Stam, eds., Advance in Multiple Criteria Decision Making and Human Systems<br />

Management, IOS Press, Amsterdam, 272-288, 2007.<br />

Peng, Z., Zhang , J., and Y. Shi, “A New Multi-Criteria Quadratic-Programming Linear Classification Model<br />

for VIP E-Mail Analysis”, ICCS 2007, Part II: 499-502. (EI, ISTP)<br />

Meihong ,Z., Y. Shi, A. Li and J. He, “A Dynamic Committee Sheme on Multiple-Criteria Linear<br />

Programming Classification Method”, ICCS 2007, Part II: 401-480. (EI, ISTP)<br />

Yaohui, C., A. Li, Y. Shi, “Kimberlites Identification by Classification Methods”, ICCS 2007, Part II: 409-414.<br />

(EI, ISTP)<br />

Zhiwang, Z., Y. Shi, “The Characteristic Analysis <strong>of</strong> Web User Clusters based on Frequent Browsing<br />

Patterns”, ICCS 2007, Part II: 490-493. (EI, ISTP)<br />

Jing W., Y. Liu, L. Zhou, Y. Shi, “Pushing Frequency Constraint to Utility Mining Model”. ICCS 2007, Part<br />

III: 689-692. (EI, ISTP)<br />

Zhan, Z., Y.Tian and Y. Shi, “Feature Selection for VIP E-Mail Accounts Analysis”, ICCS 2007, Part III: 493-<br />

700. (EI, ISTP)<br />

Peng,Y., G. Kou, J. Matza, Z. Chen, D. Khazanchi and Yong Shi, “Application <strong>of</strong> Classification Methods to<br />

Individual Disability Income Insurance Fraud Detection”, ICCS 2007, Part III: 852-858. (EI, ISTP)<br />

Li., X, L.Zhang, M. Ding, Y. Shi, J. Li, “A Combined Web Mining Model and Its Application in Crisis<br />

Management”, ICCS 2007, Part III: 906-910. (EI, ISTP)<br />

Li., G., Z. Zhou, X. Song, and Y. Shi, “A Fuzzy Comprehensive Evaluation Method on Firms' Credit Sale<br />

Risk”, ICCS 2007, Part III:1062-1068. (EI, ISTP)<br />

Zhang, L., J. Li and Y. Shi “<strong>Study</strong> on Improving Efficiency <strong>of</strong> Knowledge Sharing in Knowledge-Intensive<br />

Organization,” WINE 2005: 816-825. 30% contribution.<br />

Li, A. and Y. Shi “An Integrated Classification Method: Combination <strong>of</strong> LP and LDA,” WINE 2005: 758-767.<br />

50% contribution.<br />

Kou, G., N. Yan, Y. Peng, N. Yan, Y. Shi and Z. Chen "Network Surveillance and Multi-Group Intrusion<br />

Classification," in J. Chen, ed., IEEE Service Systems and Service Management, International Academic<br />

Publishers, Beijing, 841-848, 2005. 20% contribution.<br />

Li, J. , W. Xu and Y. Shi "Credit Scoring via PCALWM" in V. S. Sunderam et al, eds., ICCS 2005, LNCS 3516,<br />

Springer, Berlin, 531-538, 2005. 30% contribution.<br />

Peng, Y. , G. Kou, Y. Shi, and Z. Chen "Improving Clustering Analysis for Credit Card Accounts<br />

-469-


Classification" in V. S. Sunderam et al, eds., ICCS 2005, LNCS 3516, Springer, Berlin, 548-553, 2005. 30%<br />

contribution.<br />

Peng, Y., G. Kou, Y. Shi, Z. Chen and H. Yang, ``A Comparison <strong>Study</strong> <strong>of</strong> Multiclass Classification between<br />

Multiple Criteria Mathematical Programming and Hierarchical Method for Support Vector Machines,"<br />

2005 ICDM Workshop: Optimization-based Data Mining Techniques with Applications, pp. 30-36, U.S.A.,<br />

2005.<br />

He, J., W. Yue and Y. Shi, ``Pattern Recognition for Multimedia Communication Networks Using New<br />

Connection Models," 2005 ICDM Workshop: Optimization-based Data Mining Techniques with<br />

Applications, pp. 37-42, U.S.A., 2005.<br />

He, J., W. Yue and Y. Shi, ``Identification Mining <strong>of</strong> Unusual Patterns for Multimedia Communication<br />

Networks," Abstract Proc. <strong>of</strong> Autumn Conference 2005 <strong>of</strong> Operations Research Society <strong>of</strong> Japan, pp.<br />

262-263, 2005.<br />

He, J., W.Yue and Y. Shi, ``A Double Helix Architecture <strong>of</strong> Knowledge Discovery System Based on Data<br />

Grid and Knowledge Grid for Multimedia Communication Networks," Proc. <strong>of</strong> 1st Intel. Cong. <strong>of</strong> the<br />

Intel. Federation for Systems Research, pp. 123-124, Japan, 2005<br />

He, J., W. Yue and Y. Shi, ``Data Mining Systems <strong>of</strong> QoS Integrated Evaluation for Multimedia<br />

Communication Networks," Proc. <strong>of</strong> IICT Symposium, Konan <strong>University</strong>, pp. 14-pp. 21, 2005.<br />

Wang, M., J. Zheng, Z. Chen, and Y. Shi, “Classification Methods for HIV-1 Medicated Neuronal Damage,”<br />

IEEE CSB 2005 Workshops and Poster Abstracts, Aug. 8-11, 2005, Stanford <strong>University</strong>, California, 31-32.<br />

Pi, J., Y. Shi and Z. Chen, “Similarity and Cluster Analysis Algorithms for Microarrays Using R*-Trees,”<br />

IEEE CSB 2005 Workshops and Poster Abstracts, Aug. 8-11, 2005, Stanford <strong>University</strong>, California, 91-92.<br />

Peng, Y, N. Yan, G. Kou, Z. Chen and Y. Shi “Document Clustering in Antimicrobial Peptides Research,”<br />

Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems, <strong>Omaha</strong>, NE, USA August<br />

11th-14th 2005, 878-887.<br />

Peng, Y, G. Kou, Y. Shi and Z. Chen “Using Optimization-Based Classification Method for Massive<br />

Datasets,” Proceedings <strong>of</strong> the Eleventh Americas Conference on Information Systems, <strong>Omaha</strong>, NE, USA<br />

August 11th-14th 2005, 1446-1452.<br />

Zhang, L., Y. Shi and X. Yang “A Fuzzy Mining Algorithm for Association-Rule Knowledge Discovery,”<br />

Proceedings <strong>of</strong> the Eleventh America Conference on Information Systems, <strong>Omaha</strong>, NE, USA August 11th-<br />

14th 2005, 1487-1496.<br />

Shi, Y., W. Xu and Z. Chen, Chinese Academy <strong>of</strong> Sciences Symposium on Data Mining and Knowledge<br />

Management (CASDMKM 2004), LNAI 3327, Springer-Verlag, 2004, 263 pages. 33% contribution.<br />

Shi, Y., J. He, L. Wang and W. Fan, “Computer-based Algorithms for Multiple Criteria and Multiple<br />

Constraint Levels Integer Linear Programming,” Computers & Mathematics with Applications<br />

(forthcoming). Major Refereed Journal (SCI). 50% contribution.<br />

Kou, G., Y. Peng, Y. Shi, M. Wise and W. Xu, "Discovering Credit Cardholders’ Behavior by Multiple<br />

Criteria Linear Programming", Annals <strong>of</strong> Operations Research (forthcoming). Major Refereed Journal<br />

(SCI). 40% contribution.<br />

He, J., X. Liu, Y. Shi, W. Xu and N. Yan "Classifications <strong>of</strong> Credit Cardholder Behavior by using Fuzzy Linear<br />

Programming", International Journal <strong>of</strong> Information Technology and Decision Making, Vol. 3, No. 4, 633-<br />

650, 2004. Refereed Journal (SCI). 40% contribution.<br />

Zheng, J., W. Zhuang, N. Yan, G. Kou, D. Erichsen, C. McNally, H. Peng, A. Cheloha, C.Shi, and Y. Shi,<br />

"Classification <strong>of</strong> HIV-1 Mediated Neuronal Dendritic and Synaptic Damage Using Multiple Criteria Linear<br />

Programming," Neuroinformatics, Vol. 2, 303-326, 2004. Major Refereed Journal (SCI). 30%<br />

contribution.<br />

Tang, X., Z. Zhou, C. Zhang and Y. Shi, "Multi-Objective Constrained Nonlinear Optimization: An ODE<br />

-470-


Approach," Information – International Inter-discipline Journal, Vol. 7, 487-495, 2004. Refereed Journal.<br />

30% contribution.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

“Data Mining for Petroleum Exploration-Phase II,” $300,000, by BHP Billiton Co., Australia, 2008-2010.<br />

“The attributes Structure and Measurements in the Process <strong>of</strong> Building Trust-worth S<strong>of</strong>tware” $100,000,<br />

by National Science Foundation <strong>of</strong> China, Key Project,#73662243, 2008-2010.<br />

“Revolving Charge Accounts Receivable Retrospective Analysis,” $64,959, by <strong>Nebraska</strong> Furniture Market<br />

- a unit <strong>of</strong> Berkshire Hathaway Investment Co., <strong>Omaha</strong>, <strong>Nebraska</strong> 2008-2009.<br />

“Data Mining for Petroleum Exploration-Phase II,” $300,000, by BHP Billiton Co., Australia, 2008-2010.<br />

“Data Mining and Intelligent Knowledge Management: Theory and Applications,” $1,423,077, by<br />

National Science Foundation <strong>of</strong> China, Innovative Grant,#70621001, 2007-2015.<br />

“Data Mining and Optimization,” $150,000, by National Science Foundation <strong>of</strong> China, Key Project,<br />

#70531040, 2006-2009.<br />

“Data Mining for Petroleum Exploration-Phase I,” $54,500, by BHP Billiton Co., Australia, 2005-2007.<br />

“Multiple Criteria Non-linear based Data Mining Methods and Applications,” $25,000, by National<br />

Science Foundation <strong>of</strong> China, #70472074, 2005-2007.<br />

“Bio-informatics <strong>Study</strong> in the Process and Changes <strong>of</strong> Antigen and Antibody,” (with Z. Cao et al.)<br />

$316,000, by 973 Project, Chinese Department <strong>of</strong> Science and Technology, #2004CB720103, 2005-2009.<br />

"Proactive and Predictive Information Assurance for Next Generation Systems (P2INGS),"(with J. Huff, Z.<br />

Chen and Q. Zhu) $800,000, US Air Force Research Laboratory, Contract # F30602-03-C-0247, October<br />

2003-April 2005.<br />

“Data Mining and Data Warehousing: Theory and Applications in Financial Fields”, $158,536 (1.3 million<br />

Chinese Yuan) by Chinese Department <strong>of</strong> Science and Technology, #01C26225120981, 2002-2004.<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 CIST 9990 Dissertation 1 13<br />

ISQA 8700 Data Warehousing: Theory and Practice 3 22<br />

Fall 2008 CIST 9040 Colloquium on IT Pr<strong>of</strong>ession 1 5<br />

CIST 9050 Colloquium on IT Pr<strong>of</strong>ession 1 5<br />

CIST 9060 Colloquium on IT Pr<strong>of</strong>ession 1 5<br />

CIST 9990 Dissertation 1 13<br />

ISQA 4890 Data Warehousing and Data Mining 3 11<br />

-471-


Spring 2008 ISQA 8700 Data Warehousing: Theory and Practice 3 6<br />

Fall 2007 ISQA 4010 Business Intelligence 3 12<br />

ISQA 4890 Data Warehousing and Data Mining 3 6<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __50___%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-472-


Paul van Vliet<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Paul J.A. van Vliet<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Associate Pr<strong>of</strong>essor (8/01 – present)<br />

Assistant Pr<strong>of</strong>essor (1/95 – 8/01)<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. MIS Oklahoma State <strong>University</strong> 1994<br />

M.B.A. Business Moorhead State <strong>University</strong>, Moorhead 1990<br />

Administration<br />

B.BI. Business<br />

Informatics<br />

Gelders Instituut voor HEAO, Arnhem, The<br />

Netherlands<br />

June 1987<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Van Vliet, P.J.A. & Pietron, L.R. (2008) Synchronous Collaboration in Systems Development Education –<br />

Issues and Recommendations for the Virtual Classroom. 39th Annual Meeting <strong>of</strong> the Decision Sciences<br />

Institute, Baltimore, November 22-25, 2008.<br />

October 31, 2008: Presented at the CIST Roundtable "Using Adobe Connect for Distance and Hybrid<br />

Courses" with Ilze Zigurs and Leah Pietron.<br />

-473-


August 23, 2008: Taught guest lecture titled “Overview <strong>of</strong> Decision Support Systems” to graduate<br />

students enrolled in the Executive MBA program. Contact: Dr. Birud Sindhav, Assistant Pr<strong>of</strong>essor <strong>of</strong><br />

marketing, Department <strong>of</strong> Marketing & Management, College <strong>of</strong> Business Administration.<br />

October 22, 2008: Taught guest lecture titled “Student Groupwork: Building, Nurturing and Managing<br />

Team Projects” to doctoral students enrolled in CIST 9050 - Colloquium on IT Teaching.<br />

Pietron, L.R. & Van Vliet, P.J.A. (2008) Converting A Project-Based Class to An Online Class: The Dilemma<br />

<strong>of</strong> Systems Analysis and Design. Clute Institute For Academic Research - College Teaching & Learning<br />

Conference, Orlando, Florida, January 2-5, 2008.<br />

Van Vliet, P.J.A. (2007) Zachman in the Classroom - Incorporating the Zachman Framework into<br />

Information Systems Education. 38th Annual Meeting <strong>of</strong> the Decision Sciences Institute, Phoenix,<br />

November 17-20, 2007.<br />

March 16, 2007: Presented "Distance Education in Practice - Teaching CIST 3100" at distance education<br />

workshop sponsored by IS&T Distance Education Steering Committee.<br />

December 7, 2007: Presented "Succeeding (in Distance Education) with Blackboard" with Dwight<br />

Haworth at distance education workshop sponsored by IS&T Distance Education Steering Committee.<br />

June 20, 2007 – Guest lecturer in PSCI 8926 Advanced Topics in Political Science, Pr<strong>of</strong> Steve Bullock.<br />

Presented “The History <strong>of</strong> the Internet.”<br />

Van Vliet, P.J.A. (2006) The Benefits <strong>of</strong> Using Real-World Projects for Systems Development Courses -<br />

Experience & Assessment. 37th Annual Meeting <strong>of</strong> the Decision Sciences Institute, San Antonio,<br />

November 18-21, 2006.<br />

On April 15, 2006, in collaboration with Dr. Leah Pietron, presented a workshop on Student Groupwork<br />

to IS&T and CBA faculty.<br />

Van Vliet, P.J.A. (2005) Information Systems Development Courses as Preparation for the Workplace -<br />

An Assessment. 36th Annual Meeting <strong>of</strong> the Decision Sciences Institute, San Francisco, November 19-22,<br />

2005.<br />

On November 8, 2005, presented “Student Groupwork: Building, Nurturing, and Managing Team<br />

Projects” to IS&T doctoral students.<br />

Paul J.A. van Vliet (2004) Maintaining the Relevance <strong>of</strong> Information Systems Development Education.<br />

35th Annual Meeting <strong>of</strong> the Decision Sciences Institute, Boston, MA, November 20-23, 2004.<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

(8/91-12/94) Oklahoma State <strong>University</strong> Teaching Assistant<br />

(1/91-12/93) Oklahoma State <strong>University</strong> Research Assistant<br />

(8/86-6/87) KLM - Royal Dutch Airlines,<br />

Amsterdam<br />

Data Management Intern<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

-474-


8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Laboratory Director, PKI Group Decision Support Laboratory, located in PKI 279<br />

Invited by Lanyce Keel to serve on UNO Distance Education Mini-Grant Evaluation Committee.<br />

Member and Chair, IS&T Academic Committee. Re-elected as Chair, Spring 2009.<br />

Member, IS&T Distance Education Steering Committee.<br />

Participated in the Peter Kiewit Institute open house in February 21, 2009 by representing ISQA faculty<br />

and programs and MIS Student Organization.<br />

Participated in the Peter Kiewit Institute open house in October 26, 2008, by representing ISQA faculty<br />

and programs and MIS Student Organization.<br />

Website Administrator, ISQA Department<br />

Coordinator for the comprehensive exams for the Masters <strong>of</strong> Science in Management Information<br />

Systems program<br />

Faculty advisor for the Management Information Systems Students Organization<br />

Member, ISQA Annual Review Committee.<br />

Member, ISQA Pr<strong>of</strong>essional Development Committee<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Website Administrator, ISQA Department ( 2004- present)<br />

Member, ISQA Pr<strong>of</strong>essional Development Committee (2004-present)<br />

Member and Chair, IS&T Academic Committee. (2005-present)<br />

Member, IS&T Distance Education Steering Committee. (2006-present)<br />

Laboratory Director, PKI Group Decision Support Laboratory, located in PKI 279 (2004-present)<br />

Faculty advisor for the Management Information Systems Students Organization (2004-present)<br />

Coordinator for the comprehensive exams for the Masters <strong>of</strong> Science in Management Information<br />

Systems program (2004-present)<br />

Member, ISQA Annual Review Committee (2004-present)<br />

Member, ISQA Departmental Teaching Award Committee. (2004-2008)<br />

Participated in the Peter Kiewit Institute open house on February 23, 2008, by representing ISQA faculty<br />

and programs in the Group Decision Support Laboratory.<br />

Participated in the Peter Kiewit Institute open house in February 24, 2007 and October 27, 2007, by<br />

demonstrating the Group Decision Support Laboratory to visitors<br />

Interviewed candidates for ISQA position at Decision Sciences Institute annual conference. (Fall 2007)<br />

Participated in the Peter Kiewit Institute open house in October 29, 2006, by staffing the MISSO table in<br />

the PKI atrium.<br />

Participated in the Peter Kiewit Institute open house in February 25, 2006, by demonstrating the Group<br />

-475-


Decision Support Laboratory to visitors.<br />

February 20-23, 2006; participated in IS&T shadow week, meeting with potential IS&T students.<br />

Participated in the Peter Kiewit Institute open house in October 30, 2005, by staffing the MISSO table in<br />

the PKI atrium.<br />

Participated in the Peter Kiewit Institute open house in February 28, 2005, by demonstrating the Group<br />

Decision Support Laboratory to visitors.<br />

February 22-24, 2005; participated in IS&T shadow week, providing a tour <strong>of</strong> the PKI facility for three<br />

potential IS&T students.<br />

Member, ISQA Recruiting Committee. Participated extensively in interviewing 28 candidates at the<br />

AMCIS Conference in <strong>Omaha</strong>, NE (Summer and Fall 2005)<br />

Member, Advisory Committee for the graduate specialty track in the field <strong>of</strong> Bioinformatics <strong>of</strong> the<br />

Pathology and Microbiology department at UNMC (2004-2005 year)<br />

Website administrator, UNMC & UNO Bioinformatics program (2004-2005 year)<br />

Member, ISQA Undergraduate Program Committee (Fall 2004)<br />

Member, ISQA Graduate Program Committee (Fall 2004)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Van Vliet, P.J.A. & Leah R. Pietron (2006). Information Systems Development Education in the Real<br />

World - A project Methodology and Assessment. Journal <strong>of</strong> Information Systems Education. Vol. 17, Nr.<br />

3.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>, Information Technology Services, E-learning Course/Project Minigrant,<br />

May 2006. Awarded $2,500 for the 2006-07 fiscal year<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 4120- System Design and Implementation 3 25<br />

001<br />

ISQA 4120- System Design and Implementation 3 18<br />

002<br />

Fall 2008 CIST 3100 Organizations, Application, and Technology 3 25<br />

ISQA<br />

4100/8106<br />

Information Systems Architecture and<br />

Organization<br />

3 11<br />

-476-


ISQA Decision Support Systems 3 19<br />

4730/8736<br />

Summer 2008 ISQA 4120 System Design and Implementation 3 10<br />

Spring 2008 ISQA 4120- System Design and Implementation 3 27<br />

001<br />

ISQA 4120- System Design and Implementation 3 16<br />

002<br />

Fall 2007 CIST 3100 Organizations, Application, and Technology 3 23<br />

ISQA Information Systems Architecture and 3 10<br />

4100/8106 Organization<br />

ISQA<br />

4730/8736<br />

Decision Support Systems 3 14<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 25 %. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

My research activities focus on systems development education, the assessment <strong>of</strong> its quality, its best<br />

practices, the development methodologies, and – lately – the transition into online education.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-477-


-478-


Sandy Vlasnik<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Sandra Vlasnik<br />

Lecturer<br />

n/a<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Adjunct Instructor January 1998 – May 1999<br />

Adjunct Instructor August 2001 – July 2005<br />

Lecturer<br />

August 2005 - Present<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

BS CS <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> Dec. 1988<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

Masters in Computer Science in progress at <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>.<br />

Coursework completed includes:<br />

Advanced Operating Systems<br />

S<strong>of</strong>tware Specification and Design<br />

Design and Analysis <strong>of</strong> Algorithms<br />

Human Computer Interaction<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Workshops Attended: Reflection, Adobe Connect, Distance Learning and Rubrics<br />

Participated in the Adobe Connect/Web Collaboration Teaching Circle (2008-2009)<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

-479-


Dates Where Duties<br />

2/1999 –<br />

11/2001 and<br />

6/2003 –<br />

11/2003 and<br />

1/2004 –<br />

11/2005<br />

Bellevue <strong>University</strong>,<br />

Bellevue <strong>Nebraska</strong><br />

Instructed undergraduate introduction to programming<br />

courses using C, C++, Java and Visual Basic.Net.<br />

Instructed an online introduction to programming course<br />

in Java.<br />

Developed lesson plans, examinations, and student<br />

projects and evaluate course work.<br />

1/2007-<br />

2/2007<br />

STATPack Project, <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong><br />

Utilized C++, MySQL and GTK to upgrade the STATPack<br />

s<strong>of</strong>tware package for use in the digital image acquisition<br />

<strong>of</strong> lab specimens for transfer from remote sites to<br />

central evaluation laboratories.<br />

1989 - 1996 Harris Corporation, Bellevue<br />

<strong>Nebraska</strong><br />

Employed as a Senior S<strong>of</strong>tware Engineer (promoted from<br />

S<strong>of</strong>tware Engineer)<br />

Analyzes, designed, implemented, tested and<br />

maintained complex systems for the support <strong>of</strong><br />

electronic intelligence gathering, flight planning and<br />

weather forecasting tasks.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

ISQA – UPC – committee member<br />

Committee meets approximately twice monthly during the academic year<br />

Evaluate issues related to the undergraduate program in MIS as needed<br />

IS & T Technology - committee member<br />

Committee meets once per year at a minimum<br />

IS & T Scholarship Committee – member<br />

Committee meets periodically to evaluate available scholarships and scholarship applicants as<br />

needed by the college<br />

Committee meets as needed – up to four times per month during the Spring semester<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

-480-


ISQA UPC – January, 2008 to present<br />

IS & T Technology Committee – January, 2007 – Present<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

none<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

none<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Fall/ 2007 CSCI 1620 Introduction to Programming II 3 31<br />

Fall 2007 ISQA 3300 File Structures 3 22<br />

Fall 2007 ISQA 3310 Managing the Database Environment 3 22<br />

Fall 2007 ISQA 8050 Data Organization and Storage 3 7<br />

Spring CSCI 1620 Introduction to Programming II 3 18<br />

2008<br />

Spring CSCI 1620 Introduction to Programming II 3 15<br />

2008<br />

Spring ISQA 3310 Managing the Database Environment 3 20<br />

2008<br />

Spring ISQA 8050 Data Organization and Storage 3 11<br />

2008<br />

Summer ISQA 3310 Managing the Database Environment 3 10<br />

2008<br />

Fall 2008 CSCI 1620 Introduction to Programming II 3 30<br />

Fall 2008 CSCI 1620 Introduction to Programming II 3 15<br />

Fall 2008 ISQA 3300 File Structures 3 14<br />

Fall 2008 ISQA 8050 Data Organization and Storage 3 11<br />

Spring CSCI 1620 Introduction to Programming II 3 41<br />

2009<br />

Spring CSCI 1620 Introduction to Programming II 3 32<br />

-481-


2009<br />

Spring<br />

2009<br />

Spring<br />

2009<br />

ISQA 3310 Managing the Database Environment 3 20<br />

ISQA 8050 Data Organization and Storage 3 5<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __0___%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

N/A<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-482-


Gerald Wagner<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

G. R. WAGNER<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Distinguished Research<br />

Fellow<br />

Dates Held<br />

September 2001 to date.<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Bachelor <strong>of</strong><br />

Science<br />

Pre-Veterinary<br />

Medicine<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, Lincoln, <strong>Nebraska</strong> 1958<br />

Master <strong>of</strong><br />

Science<br />

Doctor <strong>of</strong><br />

Philosophy<br />

with Honors<br />

Nutrition and<br />

Biochemistry<br />

Statistics,<br />

Nutrition, and<br />

Physiology<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, Lincoln, <strong>Nebraska</strong> 1960<br />

Iowa State <strong>University</strong>, Ames, Iowa, 1964 1964<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area:<br />

Founded the International Academy for Advanced Decision Support (IAADS), organized IAADS Thought<br />

Leaders Conferences, keynote speaker at, presentations at the Decision Sciences Institute.<br />

Systemics, Cybertics and Informatics conference, Keynote Speaker, 2007 and 2009.<br />

-483-


<strong>Nebraska</strong> Educational Technology Conference, speaker, 2009.<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

July 1964 to July 1966 Swift and Company<br />

(Esmark), Chicago,<br />

Illinois<br />

Head, Experimental Statistics, R&D Laboratories<br />

Experimental design <strong>of</strong> research laboratory<br />

experiments.<br />

Analysis <strong>of</strong> research data.<br />

Documentation and presentation <strong>of</strong> research<br />

results.<br />

Recommended new products based upon<br />

scientific research results.<br />

August 1966 to July<br />

1968<br />

August 1968 to August<br />

1969<br />

August 1969 to June<br />

1978<br />

Swift and Company<br />

(Esmark), Chicago,<br />

Illinois<br />

MRI Systems, Austin, TX<br />

College <strong>of</strong> Engineering,<br />

<strong>University</strong> <strong>of</strong> Texas<br />

Managed staff <strong>of</strong> 5 research statisticians.<br />

Manager, Corporate Operations Research<br />

Department<br />

Started corporate Operations<br />

Research/Management Sciences Department.<br />

One <strong>of</strong> the first corporate OR departments in the<br />

world.<br />

Recruited and managed staff <strong>of</strong> 7 pr<strong>of</strong>essional<br />

staff members.<br />

Initiated and implemented several large-scale<br />

corporate modeling projects.<br />

Vice President Consulting Services<br />

In charge <strong>of</strong> consulting and training services for<br />

s<strong>of</strong>tware start-up.<br />

Education support for enterprise database<br />

management s<strong>of</strong>tware product.<br />

Developed and taught executive workshops on<br />

Computer Based Computer Decision Making.<br />

Head, Operations Research<br />

Managed all departmental activities for staff <strong>of</strong> 6<br />

Pr<strong>of</strong>essors and administrative staff.<br />

Taught graduate level Statistics courses.<br />

Received several teaching honors.<br />

Awarded several research grants.<br />

Pioneer research on:<br />

Computer based education.<br />

Expert Systems.<br />

Artificial Intelligence.<br />

Electronic “War Rooms”.<br />

English-like modeling systems.<br />

-484-


July 1978 to June 1984<br />

Spring Semester, 1987<br />

January 1989 to August<br />

1991<br />

Spring Semester 1990<br />

September 1992 to July<br />

1996<br />

Execucom Systems, Inc.,<br />

Austin, TX<br />

<strong>University</strong> <strong>of</strong> Texas,<br />

Management Science<br />

and Information<br />

Systems, Austin, TX<br />

Collaborative<br />

Technologies, Inc.,<br />

Austin TX<br />

Texas A&M <strong>University</strong>,<br />

College Station, TX<br />

Milagro Systems, Inc.,<br />

Santa Fe, New Mexico<br />

July 1999 to November WebIQ, Inc., Austin, Founder and CEO<br />

Founder and CEO<br />

Designed and developed the Interactive Financial<br />

Planning System (IFPS).<br />

Built and managed company from start up to 275<br />

employees and $22 million in sales.<br />

Worldwide sales channels.<br />

Twelve hundred corporate customers in the<br />

Fortune 1500.<br />

Fifteen hundred academic customers worldwide.<br />

First <strong>University</strong> Support Program for a s<strong>of</strong>tware<br />

company.<br />

Venture capital investments after achieving $10<br />

million in revenue.<br />

Legendary success in innovative products,<br />

recruiting and retaining exceptional people and<br />

customer satisfaction.<br />

Original prototypes <strong>of</strong> “electronic war rooms”<br />

and Group Decision Support Systems.<br />

Company acquired by GTE in 1984.<br />

Distinguished Visiting Pr<strong>of</strong>essor<br />

Developed and taught graduate course on Group<br />

Decision Support Systems.<br />

Founder and CEO<br />

Designed and built one <strong>of</strong> the first<br />

groupware/group collaboration s<strong>of</strong>tware<br />

products (VisionQuest for real time electronic<br />

meetings).<br />

Built corporate infrastructure including direct<br />

sales organization.<br />

Venture capital backed.<br />

Acquired by leading competitor.<br />

Distinguished Visiting Pr<strong>of</strong>essor<br />

Developed and taught graduate course on Group<br />

Decision Support Systems.<br />

Obtained research grant to build Group Decision<br />

Support Facility.<br />

Supervisor and committee member on PhD<br />

dissertation.<br />

Faculty and student seminar series on s<strong>of</strong>tware<br />

entrepreneurship.<br />

Founder and CEO<br />

Designed s<strong>of</strong>tware for novice computer users to<br />

create multi-media books.<br />

Web development tools and the Internet caused<br />

the product to be non competitive.<br />

-485-


2000 Texas Designed and developed Web based group<br />

decision support s<strong>of</strong>tware.<br />

Recruited employees and built infrastructure.<br />

Delivered highly regarded product in 6 months.<br />

Built selling partner channel that produced<br />

$100,000 in revenue 3 months after start up <strong>of</strong><br />

marketing strategy.<br />

Fulfilled all roles <strong>of</strong> President, CEO, VP <strong>of</strong> Sales<br />

and VP <strong>of</strong> Marketing.<br />

Venture capital backed.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

2005 STRATCOM Advanced Decision Support Systems Workshop<br />

2005 Union Pacific Train Scheduling Simulator<br />

2006 Northrop Grumman Homeland Security Proposal<br />

2007 Gallup Design and Develop Visualization Lab<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

Developed the proposal for the new Bachelor <strong>of</strong> Science degree in IT Innovation.<br />

Developed the Entrepreneurs Track for Infotec ’09.<br />

Developed and <strong>of</strong>fered the Gallup/AIM Institute/CIS&T seminars and workshops on Web 2.0.<br />

Developed and <strong>of</strong>fered the Gallup/AIM Institute/CIS&T seminars and workshops on Data Visualization.<br />

Formed and lead the Heartland Student Entrepreneurs group.<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.:<br />

Developed simulation and visualization s<strong>of</strong>tware that is being used by several Universities in many<br />

countries.<br />

Wrote chapter for book on Decision Support Systems and Business Intelligence to be published by<br />

Prentice Hall in 2010.<br />

Wrote chapter for book on Intelligent Systems published b Springer, 2007.<br />

-486-


12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

Course<br />

Term/year number<br />

Spring 2009 ISQA 4000<br />

ISQA 8080<br />

MGMT 4000<br />

ECON 8916<br />

Fall 2008 ISQA 4000<br />

ISQA 8080<br />

MGMT 4000<br />

ECON 8916<br />

Spring 2008 ISQA 4000<br />

ISQA 8080<br />

MGMT 4000<br />

ECON 8916<br />

Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Applied Consulting and Model Visualization 3 20<br />

Applied Simulation and Visualization 3 20<br />

Business Simulation Application 3 20<br />

Fall 2007 ISQA 4000 Adv in Data Visualization 3 17<br />

ISQA 8080 Adv in Data Visualization 3 3<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: 65%. Please give a brief<br />

description <strong>of</strong> your major research and scholarly activities:<br />

Mentor the One Innovation Place student intern program; Financial planning s<strong>of</strong>tware targeted at<br />

become the de facto standard for financial literacy training and counseling <strong>of</strong>fered by nonpr<strong>of</strong>its;<br />

Simulation modeling and visualization s<strong>of</strong>tware for use <strong>of</strong> Universities; International Academy for<br />

Advanced Decision Support; Business Strategy Visioning.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the IS program: 90 % for academic year and<br />

none in summer months.<br />

-487-


-488-


Kerry Ward<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Kerry Ward<br />

Assistant Pr<strong>of</strong>essor<br />

Non-tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Associate Pr<strong>of</strong>essor<br />

3. Degrees with fields, institutions, and dates<br />

Dates Held<br />

August 2005 – Present<br />

Degree Field Institution Date<br />

PhD MIS Indiana <strong>University</strong>, Bloomington, IN, Dec. 2005<br />

MBA Finance/MIS <strong>University</strong> <strong>of</strong> Notre Dame, Notre Dame, IN May 1999<br />

BS Business Indiana <strong>University</strong>, Indianapolis, IN May 1992<br />

(Accounting)<br />

BA Psychology Wabash College, Crawfordsville, IN May 1985<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

International Conference on Information Systems (2008)<br />

Academy <strong>of</strong> Management Annual Meeting (2008)<br />

Third Annual Midwest Conference <strong>of</strong> the Association for Information Systems (2008)<br />

International Conference on Information Systems (2007)<br />

Academy <strong>of</strong> Management Annual Meeting (2007)<br />

International Conference on Information Systems (2006)<br />

International Conference on Information Systems (2005)<br />

Teaching Circle on Information Technology for Instruction (2005-2006)<br />

Americas Conference on Information Systems (2005)<br />

International Conference on Information Systems (2004)<br />

-489-


6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

2000 – 2005 Kelley School <strong>of</strong> Business Associate Instructor<br />

1997 – 2002 Avarus Network Solutions CFO and part owner<br />

1996 – 1998 Slattery and Holman, P.C.,<br />

Indianapolis, IN<br />

Senior Accountant<br />

Implemented accounting systems for clients,<br />

including establishment <strong>of</strong> chart accounts,<br />

set up <strong>of</strong> prior accounting information and<br />

training <strong>of</strong> client personnel<br />

In charge responsibilities for clients including<br />

budgeting, quarterly compilation, review <strong>of</strong><br />

payroll and other tax and accounting<br />

functions<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

1999 – 2000 Management Solutions<br />

Group, Deloitte & Touché,<br />

LLC, Dallas TX<br />

Senior Consultant<br />

Performed package selection projects<br />

Cleaned up dysfunctional ERP<br />

implementations<br />

Worked with computer forensic group<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Member <strong>of</strong> the <strong>University</strong> Committee on for the Advancement <strong>of</strong> Teaching (UCAT)<br />

Member <strong>of</strong> the pr<strong>of</strong>essional development committee<br />

Member <strong>of</strong> graduate program committee<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Member <strong>of</strong> the <strong>University</strong> Committee on for the Advancement <strong>of</strong> Teaching (UCAT) (2006 – 2009)<br />

Member <strong>of</strong> the pr<strong>of</strong>essional development committee (2007-2010)<br />

-490-


Member <strong>of</strong> graduate program committee (2006-2009)<br />

IA Recruiting Committee (2007-2008)<br />

ISQA Recruiting Committee (2007-2008)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Ward, Kerry W. Brown, Susan A. and Massey, Anne P. (2005) Organizational Influences on Attitudes in<br />

Mandatory Systems Use Environments: A Longitudinal <strong>Study</strong>, International Journal <strong>of</strong> Business<br />

Information Systems. 1(1&2), (33% Contribution)<br />

H<strong>of</strong>f, Greg, Fruhling, Ann and Ward, Kerry W. (2008) Requirement Prioritization Decision Factors for<br />

Agile Development Environments, Proceedings <strong>of</strong> the 2008 Americas Conference on Information<br />

Systems, (Toronto). (10% Contribution)<br />

Ward, Kerry W., Rees, Jackie and Adu, Prince (2008) Research in Progress: Evaluating the Role <strong>of</strong> Risk<br />

Models in Information Assurance, Proceedings <strong>of</strong> the Third Midwest United States Association for<br />

Information Systems, (Eau Claire) (50%)<br />

Street, Christopher T. and Ward, Kerry W. (2007) Threats to Validity and Reliability in Longitudinal Case<br />

<strong>Study</strong> Timelines, Proceedings <strong>of</strong> the Academy <strong>of</strong> Management Annual Meeting, Philadelphia, PA. (50%<br />

Contribution) – Nominated for Best Paper Award and included in Conference Proceedings<br />

Ward, Kerry W. (2004) Generalizing the Theory <strong>of</strong> Alignment as Guided Adaptation and the Role <strong>of</strong><br />

External Change in the Alignment Factor Adaptation Process, International Conference on Information<br />

Systems (ICIS) Doctoral Consortium, (Washington, D.C.)<br />

Ward, Kerry W. (2001) Impact <strong>of</strong> Industry and Industry Position on IT Focus: An Alternative IT Value<br />

Model, Proceedings <strong>of</strong> the 2001 Americas Conference on Information Systems, (Boston).<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

4/05 – 12/05 Doctoral Student Grant in Aid <strong>of</strong> Research $1,000<br />

9/04 – 12/04 Center for International Business Education Research $2,500<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Course<br />

Semester Class<br />

Term/year number Course title<br />

hrs size<br />

Spring 2009 ISQA 3400 Business Data Communications 3 20<br />

-491-


ISQA 8060 Research in MIS 3 26<br />

Fall 2008 ISQA 3400 Business Data Communications 3 16<br />

ISQA 8060 Research in MIS 3 29<br />

Spring 2008 ISQA 3400 Business Data Communications 3 24<br />

ISQA 8060 Research in MIS 3 20<br />

Fall 2007 CIST 3110- Information Technology Ethics 3 28<br />

001<br />

CIST 3110-<br />

002<br />

Information Technology Ethics 3 27<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: ___50__%. Please give<br />

a brief description <strong>of</strong> your major research and scholarly activities:<br />

Research interests include IS strategy, Information Assurance, IT infrastructure, and organizational<br />

impacts <strong>of</strong> information technology. Experience includes seven years consulting and public accounting<br />

with Deloitte and Touché and PriceWaterhouseCoopers.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-492-


Peter Wolcott<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Peter Wolcott<br />

Associate Pr<strong>of</strong>essor<br />

Tenured<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Associate Pr<strong>of</strong>essor August 2001-present<br />

Assistant Pr<strong>of</strong>essor August 1995 – August 2001<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D. MIS <strong>University</strong> <strong>of</strong> Arizona 1993<br />

B.A. Computer Dartmouth College 1984<br />

Science<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

Difficult Dialogue “Begin to Develop Cross-Cultural Relationships”, April 8, 2008.<br />

2008 National CASTL Summer Institute: Developing Scholars <strong>of</strong> Teaching and Learning. June 5-7, 2008<br />

Attended a three-day workshop “GIS for Web Developers” led by Scott Davis and hosted by Raytheon.<br />

August 26-28, 2008.<br />

Attended ½ day workshop entitled “XBRL: Opportunities and Challenges”, Creighton <strong>University</strong>, College<br />

<strong>of</strong> Business, September 8, 2008.<br />

“Best Assessment Practices Symposium IX” at Rose-Hulman Institute <strong>of</strong> Technology, Terre Haute,<br />

Indiana, April 12-13, 2007. Learned a great deal about ABET-accreditation related assessment practices.<br />

Conducted a 20-hour workshop on Database Administration for a group from ITS, April 30-May 3<br />

“The Learning Horizon: Blending Design, Assessment, and Technology” at UNO, May 15-16, 2007.<br />

“CSAB Computing Accreditation Workshop”, October 5, 2007, Tampa, FL. The workshop was designed<br />

to familiarize those involved with accreditation <strong>of</strong> the new accreditation criteria.<br />

“Cultural Competency 101: Starting Points and Definitions”, at the Center for Human Diversity, Feb. 13,<br />

2008, <strong>Omaha</strong>, NE. I attended the workshop to gain new skills and insights that would help me and my<br />

students develop relationships with microenterprise owners and others in North <strong>Omaha</strong> and elsewhere<br />

in the city.<br />

UNO Speech Center workshop “Incorporating Student Presentations Into Your Class”, presented by<br />

-493-


Marlina Howe, January 26, 2007<br />

EDUCAUSE workshop “Assessing the Efficacy <strong>of</strong> Technology in Promoting Student Learning: Principles<br />

That Anchor Effective Inquiry”, presented by Peggy L. Maki (LSU), September 15, 2006<br />

Oracle Technical Exchange Meeting “Oracle 10g Technology Update: Oracle Service Oriented<br />

Architecture and Oracle Times Ten In-Memory Database,” hosted by Northrup Grumman, Sept. 27,<br />

2006.<br />

Developed three-part on-line lectures on “Data Warehousing, OLAP, and Related Topics” using Camtasia<br />

and Flash. These lectures were designed for and delivered to Agder <strong>University</strong> College as a guest lecture<br />

in a course entitled “Advanced Database Systems”. 2006<br />

Defining graduate certificates in Project Management, Information Assurance, and Systems Analysis and<br />

Design. There certificates were approved and went into effect Fall 2006.<br />

Developed a dual-degree MBA/MS MIS in conjunction with the College <strong>of</strong> Business. Proposal approved<br />

& went into effect Fall 2006.<br />

Organized a “GIS Curriculum Workshop” that drew together two dozen GIS practitioners and educators<br />

from the private and public sectors, at the municipal, county, state, and national levels for a 4-hour<br />

workshop to discuss the requirements for a geographic information systems curriculum. Workshop was<br />

held on December 9, 2005<br />

January 18, 2005. Attended the faculty development workshop entitled “Digital Natives”<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

7. Consulting—list agencies and dates, and briefly describe each project<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Member, Distance Education Advisory Council<br />

Member, UNO Assessment Team<br />

Chair, <strong>University</strong>-wide selection committee for the Peter Kiewit Student Entrepreneurial Award and the<br />

Walter Scott Entrepreneurial Business Award<br />

Chair, ABET Accreditation Steering Committee<br />

Member, Distance Education Steering Committee<br />

Member, Recruiting Committee, CS HPC Position<br />

Director <strong>of</strong> the Masters <strong>of</strong> MIS Program<br />

9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Faculty Senate (2005-2007)<br />

-494-


Co-Chair, Library and Learning Resources Committee (Spring 2007)<br />

Member, Distance Education Advisory Council (2005-2007)<br />

Faculty Senate liason to the Faculty Task Force to Design a Common Course Evaluation Instrument<br />

(Spring, 2007)<br />

Assessment mentor for Academic and Student Affairs (Spring 2007)<br />

IT for Development poster presented at the UNO Strategic Planning Forum, March 2, 2007<br />

Member, Institutional Research Advisory Council (AY 2007)<br />

Member, <strong>University</strong>-wide selection committee for the Peter Kiewit Student Entrepreneurial Award and<br />

the Walter Scott Entrepreneurial Business Award (CY 2008)<br />

Chair, ABET Accreditation Steering Committee (2004-present)<br />

IS&T Personnel Committee (2007-2008)<br />

Distance Education Steering Committee (2007-2008)<br />

Director <strong>of</strong> the Masters <strong>of</strong> MIS Program (2005-)<br />

Member, AQIP Advisory Committee for the myMAPP ePortfolio Action Project (2005-2007)<br />

IS&T Academic Committee (2004-2006)<br />

IS&T Personnel Committee (2004-2006)<br />

IS&T Technology Committee (2004-2006)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Qureshi, S., Kamal, M., and P. Wolcott “Information Technology Therapy for Competitiveness in Micro-<br />

Enterprises.” International Journal <strong>of</strong> E-Business Research. Idea Group International. 5(1), 117-140<br />

January-March 2009.<br />

Wolcott, P., Kamal, M. and S. Qureshi “Meeting the Challenges <strong>of</strong> ICT Adoption by Micro-enterprises”.<br />

Journal <strong>of</strong> Enterprise Information Management. Emerald. Volume 21, Issue 6. 2008.<br />

Qureshi, S., Kamal, M., & Wolcott, P. (2008). Information Technology Therapy for Micro-enterprise<br />

Success: Directions for Sustainable Development. Hawaii International Conference on System Sciences,<br />

Hawaii. Jan. 7-10.<br />

Wolcott, P., Qureshi, S., & Kamal, M. (2007). An Information Technology Therapy Approach to Microenterprse<br />

Adoption <strong>of</strong> ICTs. Americas Conference on Information Systems (AMCIS), Keystone, CO. Aug.<br />

10-12.<br />

Abdelaal, A, Kalmal, M., and Wolcott, P. “Employing Social Capital by Small & Medium Enterprises to<br />

Bear Fruit from Wireless Communications,” Midwest AIS 2007.<br />

"Local E-Government in Norway: Current Status and Emerging Issues," Scandinavian Journal <strong>of</strong><br />

Information Systems, (17, 2), 2005, pp.41-84.<br />

http://www.cs.aau.dk/SJIS/journal/volumes/volume17/no2/05flaketal.pdf. (with Leif Flak, Dag Olsen)<br />

"The Provision <strong>of</strong> Internet Services in India," In Information Systems in Developing Countries, Davison,<br />

R.M., Harris, R.W., Qureshi, S., Vogel, D.R. and de Vreede, G.J. Eds.), <strong>University</strong> <strong>of</strong> Hong Kong Press, Hong<br />

Kong, 2004.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

-495-


“<strong>Nebraska</strong> eTeams for Microenterprise Economic Development” with Sajda Qureshi, Teresa Lamsam,<br />

John Bartle, Ken Kriz, Scott Tarry, Bob Bernier. <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Foundation. ($114,494).<br />

Najjar, L., Khazanchi, D. and Wolcott, P. (12/15/2008 to 5/13/2009). "Business Database Competitive<br />

Audit Project". Awarded a grant <strong>of</strong> $17,603 for conducting a business database audit for InfoUSA.<br />

UCAT funding (2008) to purchase ABET material on rubric development ($149) with Leah Pietron and<br />

Dwight Haworth.<br />

UCAT funding to attend the 2008 National CASTL Institute, June 4-7th, <strong>Omaha</strong>, NE. ($350)<br />

Najjar, L., Khazanchi, D. and Wolcott, P. (1/1/2005 to 5/31/2005). "Business Database Competitive Audit<br />

Project". Awarded a grant <strong>of</strong> $14,575 for conducting a business database audit for InfoUSA. This project<br />

was conducted under the auspices <strong>of</strong> the PKI Technology Development Corp (PKITDC).<br />

12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year Course number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 ISQA 8410-001 Database Management 3 25<br />

Fall 2008 ISQA 4300/8306 Database Administration 3 20<br />

ISQA 4000/8080 IT for Development 3 10<br />

Summer 2008 ISQA 8410-101 Database Management 3 24<br />

Spring 2008 ISQA 8410-001 Database Management 3 17<br />

ISQA 8410-850 Database Management 3 6<br />

Fall 2007 ISQA 4300/8306 Database Administration 3 15<br />

ISQA 4000/8080 IT for Development 3 5<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: __100___%. Please<br />

give a brief description <strong>of</strong> your major research and scholarly activities:<br />

Research: My major stream <strong>of</strong> research at the moment is in the area <strong>of</strong> IT for Development. The focus<br />

<strong>of</strong> the research is on how to facilitate the adoption <strong>of</strong> information technologies by microenterprises to<br />

bring about economic, social, and human development.<br />

Scholarly activities: In addition to teaching responsibilities, primarily in the area <strong>of</strong> database<br />

management and administration, and IT for development, I am the director <strong>of</strong> the MS MIS program and<br />

the chair <strong>of</strong> the ABET accreditation steering committee. In the latter role, I manage assessment and<br />

accreditation activities for the College <strong>of</strong> IS&T.<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-496-


Chi Zhang<br />

1. Name, current academic rank, and tenure status:<br />

Name:<br />

Rank:<br />

Tenure Status:<br />

Chi Zhang<br />

Lecturer<br />

n/a<br />

2. Date <strong>of</strong> original appointment to this faculty, followed by dates and ranks <strong>of</strong> advancement:<br />

Title<br />

Dates Held<br />

Lecturer<br />

August 2007-Present<br />

Instructor August 2001-May 2007<br />

Adjunct Faculty May 2001-June 2001<br />

Graduate Assistant May 1999-May 2001<br />

3. Degrees with fields, institutions, and dates<br />

Degree Field Institution Date<br />

Ph.D.<br />

M.Sc.<br />

M.S.Ed.<br />

B.Sc.<br />

Candidate in<br />

Information<br />

Technology<br />

Computer<br />

Science<br />

Instructional<br />

Technology<br />

Educational<br />

Technologies<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> 2004-<br />

Present<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> 2000<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at Kearney 1998<br />

Beijing Normal <strong>University</strong>, China 1990<br />

4. If you do not have an advanced degree in the program area, describe any course work you may have taken, or<br />

other ways in which you have achieved competence in the program area; there is no necessity to repeat<br />

information here that is contained in later sections <strong>of</strong> this document.<br />

5. Conferences, workshops, and pr<strong>of</strong>essional development programs in which you have participated in the last 5<br />

years to improve teaching and pr<strong>of</strong>essional competence in the program area: (LIST DATA FOR Fall 2004 –<br />

Spring 2009)<br />

-497-


Presented and Attended research conferences (AMCIS 2005, 2007, 2008; ICIS 2007, PACIS 2008, MWAIS<br />

2006, 2007, 2008; Big XII+ IS doctoral students Symposium 2008)<br />

Attended research development activities (UNL Research Fair 2005)<br />

Attended faculty development workshops (Adobe Connect Workshop 2008, Second Life 2008)<br />

Attended CS workshops and CMIT research round table sessions to get to know colleagues’ research<br />

interests (2005-2006)<br />

Participated in blackboard training programs<br />

6. Other related computing experience including teaching, industrial, governmental, etc. (where, when,<br />

description and scope <strong>of</strong> duties):<br />

Dates Where Duties<br />

August 1996-<br />

May 1998<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at<br />

Kearney<br />

Graduate Assistant<br />

Providing technology assistance in Instructional<br />

Technology Center and providing trainings to faculty,<br />

staff and students. Maintaining department web pages.<br />

7. Consulting—list agencies and dates, and briefly describe each project:<br />

Dates Agency Project<br />

May 1997-<br />

August 1998<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at<br />

Kearney<br />

Computer Consultant<br />

Providing technology assistance, updating <strong>of</strong>fice<br />

computer systems, recommending purchases, providing<br />

new application trainings to staff, working with public<br />

computer labs, and creating web pages for the <strong>Nebraska</strong><br />

Student Union and student organizations.<br />

8. For the academic year in which the <strong>Self</strong> <strong>Study</strong> was written list your assigned duties other than for teaching,<br />

(committee membership, advising, etc.) with average hours per week. Indicate which, if any, carry extra<br />

compensation. If you are course coordinator for courses taught by other than full-time or part time faculty,<br />

please indicate here which courses.<br />

(LIST DATA FOR Fall 2008 – Spring 2009)<br />

Undergraduate Program Committee Member, Department <strong>of</strong> Computer Science<br />

-498-


9. For the four years preceding the <strong>Self</strong> <strong>Study</strong>, list all department, college, and/or university committees <strong>of</strong> which<br />

you are/were a member including year(s) served:<br />

(LIST DATA FOR Fall 2004 – Spring 2008)<br />

Undergraduate Program Committee Member, Department <strong>of</strong> Computer Science (2007 - Present)<br />

Peer Review Committee Member (2007)<br />

IS&T Graduate Affairs (2005)<br />

Merit Raise Committee (2005)<br />

10. Principal publications during the last five years. Give in standard bibliographic format.<br />

(LIST DATA FOR Fall 2004 – Spring 2009)<br />

Zhang, C & Zigurs, I (2009), An Exploratory <strong>Study</strong> <strong>of</strong> the Impact <strong>of</strong> a Virtual Learning World Learning<br />

Environment on Student Interaction and Learning Satisfaction, America’s Conference on Information<br />

Systems, AMCIS 2009, San Francisco, CA. August 6-9, 2008.<br />

Zhang, C (2009), Comparing Sense <strong>of</strong> Classroom Community and Learning Satisfaction in a Virtual World<br />

Learning Environment, Midwest Association for Information Systems Conference, MWAIS 2009,<br />

Madison, SD. May 22-23, 2008.<br />

Zhang, C (2009), An Exploratory <strong>Study</strong> <strong>of</strong> the Impact <strong>of</strong> a Virtual Learning World Learning Environment<br />

on Sense <strong>of</strong> Classroom Community and Learning Satisfaction, China Summer Workshop on Information<br />

Management, CSWIM 2009, Guangzhou, China. June 27-28, 2009.<br />

Zhang, C & Zigurs, I (2008), Learning in Virtual Worlds: Understanding the Impact on Social and Cognitive<br />

Processes in Learning, Midwest Association for Information Systems Conference, MWAIS 2008, Eau<br />

Claire, WI. May 23-24, 2008.<br />

Tarmizi, H, Payne, M., Noteboom, C., Zhang, C., Steinhauser, L., Vreede, G.-J. de and Zigurs, I. (2007)<br />

Technical and Environmental Challenge <strong>of</strong> Collaboration Engineering in Distributed Environments. E-<br />

Service Journal, Vol 6, No.1, Fall 2007.<br />

Zhang, C. (2007). Theory and Practice: Review Technology-Mediated Learning Research. Midwest<br />

Association for Information Systems Conference, MWAIS 2007, Springfield, Illinois.<br />

Kamal, M., Zhang, C., Najjar, L., and Qureshi, S. (2007). Human Development through Information &<br />

Communication Technologies: Theoretical & Empirical Support. Midwest Association for Information<br />

Systems Conference, MWAIS 2007, Springfield Illinios.<br />

Tarmizi, H., Payne, M., Noteboom, C., Steinhauser, L., Vreede, G.-J. de and Zigurs, I. (2006). Technical<br />

and Environmental Challenge <strong>of</strong> Collaboration Engineering in Distributed Environments. Proceedings <strong>of</strong><br />

the 12th International Workshop, CRIWG 2006, September 17-21, 2006, Medina del Camp, Spain.<br />

Noteboom, C., Zhang, C., Tarmizi, H., Steinhauser, L., Payne, M., Vreede, G.-J. de and Zigurs, I. (2006).<br />

Research as Teaching and Teaching as Research: Reflections on a Virtual Team Project. Midwest<br />

Association for Information Systems Conference, MWAIS 2006, May 5-6, Grand Rapids, Michigan.<br />

Tarmizi, H., Steinhauser, L., Payne, M., Noteboom, C., Zhang, C., Vreede, G.-J. de and Zigurs, I. (2006). A<br />

Gaming Laboratory to <strong>Study</strong> Distributed Collaboration Processes. Proceedings <strong>of</strong> Collaboration<br />

Engineering Workshop at Hawaii International Conference on System Sciences, HICSS 2006, Kauai, HI.<br />

11. Other scholarly activity during the last 5 years: grants, sabbaticals, s<strong>of</strong>tware development, etc.: (LIST DATA<br />

FOR Fall 2004 – Spring 2009)<br />

-499-


12. Courses taught this and last academic year term-by-term. This year is the academic year in which this <strong>Self</strong>-<br />

<strong>Study</strong> report is prepared; the last year was the year prior to this. If you were on sabbatical leave, please enter<br />

the information for the year prior to the sabbatical. Please list each section <strong>of</strong> the same course separately.<br />

(LIST DATA FOR Fall 2007 – Spring 2009)<br />

Term/year<br />

Course<br />

number Course title<br />

Semester<br />

hrs<br />

Class<br />

size<br />

Spring 2009 CIST 2500- Intro to Applied Stats for IS&T 3 23<br />

001<br />

CIST 2500- Intro to Applied Stats for IS&T 3 22<br />

002<br />

CSCI 2710 Intro to Digital Design Principles 3 10<br />

Fall 2008 CIST 2500- Intro to Applied Stats for IS&T 3 24<br />

850<br />

CIST 3100- Organizations, Applications and Technology 3 25<br />

850<br />

CSCI 2710- Intro to Digital Design Principles 3 13<br />

001<br />

CSCI 2710- Intro to Digital Design Principles 3 7<br />

002<br />

Summer CSCI 2710 Intro to Digital Design Principles 3 11<br />

2008<br />

Spring 2008 CSCI 2710- Intro to Digital Design Principles 3 19<br />

001<br />

CSCI 2710- Intro to Digital Design Principles 3 16<br />

002<br />

Fall 2007 CIST 2500 Intro to Applied Stats for IS&T 3 25<br />

CSCI 1500 Beginning Programming 3 11<br />

CSCI 2710- Intro to Digital Design Principles 3 13<br />

001<br />

CSCI 2710-<br />

002<br />

Intro to Digital Design Principles 3 11<br />

13. Estimate the percentage <strong>of</strong> your time devoted to scholarly and/or research activities: _____%. Please give a<br />

brief description <strong>of</strong> your major research and scholarly activities:<br />

14. If you are a part time faculty member or a full-time faculty member without full-time commitment to the<br />

program, state what percentage <strong>of</strong> full-time you are assigned to the program: _____%.<br />

-500-


APPENDIX 4 – CURRENT LIST OF SERIALS TITLES<br />

Current List <strong>of</strong> Serials Titles for Information Science & Quantitative Analysis (ISQA)<br />

Communications <strong>of</strong> the Association for Information Systems<br />

Computer Security Journal<br />

Data Base for Advances in Information Systems<br />

DECISION SCIENCES - Membership<br />

DECISION SCIENCESDecision support systems.<br />

Electronic Commerce World<br />

E-Service Journal<br />

IEEE transactions on engineering management.<br />

Information & management.<br />

Information economics and policy.<br />

Information resources management journal.<br />

Information systems management.<br />

Information systems research : ISR : a journal <strong>of</strong> the Institute <strong>of</strong><br />

INFORMS journal on computing.<br />

Intelligent enterprise.<br />

International Journal <strong>of</strong> E-collaboration<br />

International Journal <strong>of</strong> Electronic Commerce<br />

International Journal <strong>of</strong> Information Technology and Decision Making<br />

International journal <strong>of</strong> operations and quantitative management : IJOQM.<br />

International Journal <strong>of</strong> Project Management<br />

Journal <strong>of</strong> Computer Information Systems<br />

Journal <strong>of</strong> Information Warfare<br />

Journal <strong>of</strong> management information systems : JMIS.Journal <strong>of</strong> organizational and end user computing.<br />

(ONLINE ONLY).<br />

Journal <strong>of</strong> s<strong>of</strong>tware maintenance and evolution.<br />

Journal <strong>of</strong> the Association for Information Systems<br />

Management science.<br />

MIS quarterly.<br />

Omega.<br />

Telecommunications policy.<br />

Select Engineering Titles<br />

Computer (ONLINE ONLY).<br />

Electronic Design (ONLINE ONLY).IEEE Computer Graphics and Applications (ONLINE ONLY).<br />

IEEE Spectrum (ONLINE ONLY).<br />

-501-


-502-


APPENDIX 5 – STRATEGIC PLAN FOR INFORMATION TECHNOLOGY SERVICE<br />

-503-


INFORMATION TECHNOLOGY SERVICES<br />

Information Technology Services<br />

Strategic Plan<br />

September 2008<br />

through<br />

September 2010<br />

-504-


-505-


AGENCY CONTACT INFORMATION<br />

Primary Agency IT Contact<br />

(List the person responsible for IT in the agency.)<br />

Name John Fiene<br />

Title Associate Vice Chancellor for Technology<br />

Phone 402-554-3670<br />

Email jfiene@unomaha.edu<br />

Information Technology Services (ITS) Contact List<br />

Title Name Email Address<br />

Director <strong>of</strong><br />

Academic<br />

Computing<br />

Director <strong>of</strong><br />

Administrative<br />

Services<br />

Director <strong>of</strong><br />

Information<br />

Technology<br />

Infrastructure<br />

Director <strong>of</strong> IT Project<br />

Management<br />

Assistant Director <strong>of</strong><br />

Academic<br />

Lanyce Keel<br />

Bret Blackman<br />

Steve Lendt<br />

Joyce Crockett<br />

Jay Killion<br />

lkeel@unomaha.edu<br />

bblackma@unomaha.edu<br />

slendt@unomaha.edu<br />

jcrocket@unomaha.edu<br />

jaykillion@unomaha.edu<br />

-506-


Computing<br />

Business Manager Alice Villone avillone@unomaha.edu<br />

Manager <strong>of</strong><br />

Academic<br />

Partnership in<br />

Instruction and<br />

Distance Education<br />

Manager <strong>of</strong><br />

Customer Services<br />

Shelley Schafer<br />

Matt Galardi<br />

sschafer@mail.unomaha.edu<br />

mgalardi@unomaha.edu<br />

-507-


Information Technology Services Mission, Vision and Values<br />

Mission<br />

Information Technology Services (ITS) provides technology leadership by bringing the knowledge<br />

assets <strong>of</strong> the world to the campus via high-speed computer networks. ITS facilitates the innovative<br />

use <strong>of</strong> technology for instruction, research, and outreach via user-centered services and by<br />

stimulating a culture <strong>of</strong> academic discovery that contributes to the world-wide academic community.<br />

Vision<br />

ITS develops effective partnerships with the colleges, administrative units, student organizations, and<br />

central administration to provide needed collaboration for building technology infrastructure, and<br />

providing complementary services. These partnerships address both the principles <strong>of</strong> economies <strong>of</strong><br />

scale and personalized services through the coordination <strong>of</strong> centralized and distributed IT<br />

pr<strong>of</strong>essionals at UNO. Although our goal is innovation, work is done simultaneously at four levels to<br />

build the necessary infrastructure as a foundation. Today’s innovation becomes tomorrow’s<br />

integration.<br />

The application <strong>of</strong> technology is simultaneously performed at four levels:<br />

Automation:<br />

Integration:<br />

creating efficient methods <strong>of</strong> handling routine tasks that allow greater effort to be<br />

focused on the UNO academic mission.<br />

re-engineering to effectively combine shared functions into streamlined<br />

processes that fulfill multiple purposes and reduce redundant efforts.<br />

Communication: enhancing collaboration by diminishing the effect <strong>of</strong> geographical distances for<br />

both synchronous and asynchronous dialog: one to one, in groups, and to the<br />

world.<br />

Innovation:<br />

simply using technology to achieve what was previously not possible.<br />

Values<br />

ITS shares the values <strong>of</strong> the <strong>of</strong>fice <strong>of</strong> Academic and Student Affairs and holds the following values:<br />

Measuring success through the achievements <strong>of</strong> students, faculty, and staff.<br />

-508-


Creating flexible partnerships with campus units to achieve the appropriate balance <strong>of</strong><br />

complimentary centralized and de-centralized functions and services.<br />

Extending the principles <strong>of</strong> shared governance and shared accomplishments.<br />

Enhancing the welfare, talents, and futures <strong>of</strong> ITS employees and expanding pr<strong>of</strong>essional<br />

development.<br />

Encouraging involvement in pr<strong>of</strong>essional IT associations in education and industry consistent<br />

with staff development plans.<br />

Promoting good stewardship through efficient utilization <strong>of</strong> resources.<br />

Exercising good judgment through effective applications <strong>of</strong> technology.<br />

Facilitating meaningful partnerships in our community to enhance learning through the<br />

appropriate use <strong>of</strong> technology.<br />

Leading proactively in the use <strong>of</strong> technology to solve problems.<br />

Encouraging the use <strong>of</strong> technology as a communication tool.<br />

Fostering the use <strong>of</strong> technology in support <strong>of</strong> lifelong learning.<br />

Embracing diversity as an effective model <strong>of</strong> the university’s working environment.<br />

Aligning ITS policies, procedures, and behaviors with the highest pr<strong>of</strong>essional ideals <strong>of</strong> ethics<br />

and legality.<br />

Protecting the privacy and integrity <strong>of</strong> the information resources <strong>of</strong> the academic community<br />

1. Current Assets (Sections 1.1 through 1.4)<br />

Overview <strong>of</strong> the UNO Campus and Technology Services<br />

UNO is a comprehensive public university located on 89 acres in the heart <strong>of</strong> <strong>Nebraska</strong>’s biggest city<br />

with more than 400 faculty <strong>of</strong>fering 95 baccalaureate degrees, 66 advanced degrees including 6 doctoral<br />

programs. UNO is the NU system’s metropolitan university, which means it provides a multitude <strong>of</strong><br />

activities and service learning opportunities in a wide variety <strong>of</strong> settings that are designed to meet the<br />

needs <strong>of</strong> the UNO students and the community.<br />

The value <strong>of</strong> UNO investment in information technology is substantial and must be considered critical to<br />

the daily operations <strong>of</strong> the organization. Technology is thoroughly integrated into every function <strong>of</strong> the<br />

university and it is critically important to accomplish the university mission. The most valuable assets are<br />

the knowledge and social capital that are developed in our information technology pr<strong>of</strong>essionals and<br />

users <strong>of</strong> information technology that allow the university to work together to perform our mission.<br />

UNO Information Technology Services (ITS) is responsible for providing technology leadership by<br />

facilitating the UNO community’s access to network resources that enhance academic excellence and<br />

-509-


administrative effectiveness. ITS strives to achieve effective partnerships with the colleges,<br />

administrative units, and student organizations. These partnerships simultaneously address the principle<br />

<strong>of</strong> economies <strong>of</strong> scale and personalized services to students, faculty, staff, and community.<br />

-510-


Campus Customers/Partners<br />

Statistics in this section copied from the UNO 2007 Fact Book published by UNO Institutional Research<br />

14,156 Undergrad & Grad Students 235 Graduate Assistants<br />

487 Full-time Faculty 393 Part-time Faculty<br />

799 Full-time staff 46 Part-time staff<br />

70,000 Active Pages - Website<br />

Development/ Support<br />

Administrative Information Services<br />

15,000 Students Every Semester Using<br />

E-BRUNO (Electronic Better Registration<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>)<br />

150,000+ Page Views Each Week on Main<br />

UNO Web Page<br />

30,000 Daily Transactions using E-BRUNO<br />

Students<br />

250,000 NU ID’s (adding more each day) 5000+ Courses Annually Graded Using E-<br />

BRUNO/Faculty<br />

30,000 Active Identities 125+ SIS Updates Applied Yearly<br />

30+ Web Template Users 1500+ Ad Hoc WebFocus Reports & 270<br />

Production Reports<br />

1 Datamart 30+ End User WebFocus Support<br />

1,000,000+ Lines <strong>of</strong> COBOL Code<br />

Supported<br />

1 Mainframe Student Information System<br />

(SIS) Supported<br />

-511-


4 Distance Education Synchronous Video<br />

Facilities<br />

Client Services<br />

4,600 PC/Mac Workstations; 100<br />

UNIX/Linux Workstations on Campus<br />

90 Discipline Specific Labs/Computer<br />

Classroom indirect support<br />

42 Kiosk Stations<br />

9 Open Labs w/525 Workstations Support for Over 40 S<strong>of</strong>tware Products<br />

(http://www.unomaha.edu/its/s<strong>of</strong>tware.php)<br />

Hi-Tech Rooms on Campus:<br />

Auditoriums: 16<br />

3 Partnerships for 6 Community Labs<br />

Conference: 21<br />

Labs: 80<br />

Lecture: 183<br />

Total 300<br />

20,000 Helpdesk Calls/Walk-ins (Yearly)<br />

Distance Education<br />

Academic Partnership for Instruction<br />

Training, Instructional Design,<br />

Multimedia and Web Support<br />

10 DE Programs Supported 107 Training courses taught annually<br />

164 DE Courses supported annually 800+ attendees at training sessions<br />

annually<br />

20 New DE Courses supported annually 15 faculty received instructional design<br />

consulting<br />

3,800 DE Student Enrollments annually 15 Multimedia presentations/projects/<br />

documentation<br />

11,700+ DE Student Credit Hours annually 13 Websites created and/or consulted<br />

-512-


McAfee: Anti- Virus and Anti-Spyware for<br />

Campus and Home (Students, Faculty and<br />

Staff)<br />

Micros<strong>of</strong>t: Office, Desktop Operating<br />

system and Servers (Campus Use and<br />

Faculty/Staff Home)<br />

Site Licenses<br />

Statistical and Mathematical Campus<br />

Use:<br />

1. Maple<br />

2. Minitab<br />

3. SAS<br />

4. SPSS<br />

AutoCAD: <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong><br />

Macintosh: OS10<br />

Not Site License - Special prices for<br />

campus use:<br />

Adobe Reseller Campus use<br />

-513-


Significant ITS Custom Applications<br />

Students, faculty and staff use customized technology daily to meet their needs. ITS continuously<br />

collaborates with our clients to provide the optimum technology support that integrates s<strong>of</strong>tware and<br />

support services. The following list are the significant custom applications developed by UNO ITS that<br />

includes “middleware” to integrate commercial systems with existing ones and web based systems to<br />

support critical <strong>University</strong> requirements.<br />

myUNO (Blackboard 8.0)/SIS<br />

The myUNO (Blackboard) course management system was upgraded to version 8.0 the spring <strong>of</strong> 2008. This<br />

version enhanced the level <strong>of</strong> integration with UNO’s SIS system and improved system performance and<br />

stability.<br />

Web<strong>of</strong>fice/myFolder<br />

Platform Development Tools Support<br />

Windows 2003<br />

Windows Active<br />

Directory<br />

In-house IS staff<br />

UNO has created an integrated and enhanced campus-wide file storage system with a unique web<br />

enabled method <strong>of</strong> access. By integrating campus standard products such as Micros<strong>of</strong>t Server, web<br />

browser support and SSL web encryption as well as custom integration s<strong>of</strong>tware, the UNO campus<br />

now has a departmental document storage system called web<strong>of</strong>fice that is available to any UNO<br />

department, and an individual document storage system called myFolder that is available to all UNO<br />

faculty, staff and students. The real value <strong>of</strong> these integrated systems is easy access to documents<br />

from any Internet connected computer.<br />

Identity Management<br />

Campus wide web based systems and forms supported by ITS use a shared account name and<br />

password called the UNO NetID. Custom identity management services include NetID<br />

provisioning/de-provisioning, LDAP population, password resets and creation <strong>of</strong> <strong>University</strong> wide<br />

unique identifiers (NU ID). Identity Management processes are being migrated to Sun<br />

Microsystems’s Identity Management Suite.<br />

Sungard SCT - Student Information System (SISPLUS)<br />

UNO’s Student Information System (SIS) supports the core academic business needs <strong>of</strong> UNO<br />

students. SIS includes Admissions, Records and Registration, Billing and Financial Aid modules.<br />

UNO has created custom enhancements to the base SIS system to meet campus specific policies.<br />

E-BRUNO for Students<br />

Platform<br />

Development Tools Support<br />

-514-


Red Hat Linux PHP, C, Hllapi In-house IS staff<br />

E-BRUNO for Students is UNO's web-based enrollment services system. With E-BRUNO for<br />

Students, students can use their NU ID and PIN to log in and obtain grades, current class schedules,<br />

register for classes, pay tuition via credit card, accept financial aid and much more. E-BRUNO for<br />

Students provides students with web access to UNO’s Student Information System.<br />

(https://ebruno.unomaha.edu/login.html)<br />

E-BRUNO for Faculty<br />

Platform<br />

Development Tools Support<br />

Red Hat Linux PHP, C, Hllapi In-house IS staff<br />

With E-BRUNO for Faculty, a UNO web-based system, faculty can use their NU ID number and PIN<br />

to log in and obtain class rosters, submit course grades and give permits and authorizations, along<br />

with a host <strong>of</strong> special Blackboard functions. (https://ebruno.unomaha.edu/php/facstaff/)<br />

Datamart<br />

Platform<br />

Development Tools Support<br />

Red Hat Linux Web Focus, mySQL In-house IS staff<br />

UNO developed a campus Datamart, built with data from the Student Information System, to meet<br />

census-reporting requirements.<br />

Short Term Loan System (STLS)<br />

Platform<br />

Development Tools Support<br />

Red Hat Linux Postgres, PHP In-house IS staff<br />

UNO developed a STLS to meet the needs <strong>of</strong> short-term student loans from the Student Accounts<br />

<strong>of</strong>fice.<br />

-515-


Data Exchange<br />

Below are the major entities outside <strong>of</strong> the NU System that ITS exchanges data with.<br />

Entity<br />

JSA Technologies<br />

National Student Loan Program<br />

(NSLP)<br />

U.S. Department <strong>of</strong> Education<br />

National Student Clearinghouse<br />

U.S. Immigration and Customs<br />

Enforcement (ICE)<br />

Dragonfly Athletics<br />

General Revenue Corporation<br />

Credit World Services<br />

CashNet<br />

Internal Revenue Service<br />

Various Banks<br />

Description<br />

Web based deposits for Cbord ID card system<br />

Financial Aid loan services<br />

Financial Aid processing<br />

Degree and enrollment verification<br />

Student and Exchange Visitor Program (SEVP)<br />

Athletic Management System<br />

Collection <strong>of</strong> past due student tuition and fees<br />

Collection <strong>of</strong> past due student tuition and fees<br />

Student Accounts system<br />

1098 tax reporting<br />

Student refunding<br />

-516-


Technical Architecture<br />

Our goal is information availability whenever and wherever (24x7 access, ubiquitous/pervasive, and in<br />

real-time where appropriate). Our choice will be via industry standards, higher education best practices<br />

and using products and solutions providing lower Total Cost <strong>of</strong> Ownership (TCO) and best services to<br />

the whole campus.<br />

This table is technical in nature and explains the technical architecture ITS will be following over the next<br />

two years. The following web site will assist in defining terms listed in this table. http://webopedia.com/<br />

Legacy Current Future<br />

Currently in<br />

Research<br />

Hardware/Servers<br />

Gigabit & multi-Gigabit network<br />

backbone X X<br />

Dynamic Disk Storage (SAN)<br />

Dell/Intel servers X X<br />

IBM RS 6000 Limited Limited<br />

IBM S/390 Mainframe – Based X Limited<br />

Intel Based (PC) X X<br />

Wireless networking access X X<br />

Data Bases<br />

IBM DB2/UDB (Database<br />

2/Universal Database) X X Limited<br />

IBM VSAM (Virtual Storage<br />

Access Method) X Limited Limited<br />

Sun Enterprise LDAP Directory<br />

(Lightweight Directory Access<br />

Protocol) X X<br />

-517-


Legacy Current Future<br />

Currently in<br />

Research<br />

Lotus Notes document and<br />

tracking database<br />

Limited<br />

Micros<strong>of</strong>t Active Directory X X<br />

Micros<strong>of</strong>t SQL (Structured Query<br />

Language) server X X<br />

Open source DB (Postgres,<br />

MYSQL) X X<br />

Oracle<br />

X<br />

-518-


Legacy Current Future<br />

Currently in<br />

Research<br />

Server S<strong>of</strong>tware<br />

Apache web server X X<br />

iWay ETL Manager X X<br />

Oracle Application Server<br />

X<br />

Micros<strong>of</strong>t IIS server for web<br />

enabled applications X X<br />

PHP (Php: Hypertext<br />

Preprocessor) for web enabled<br />

applications X X<br />

Tomcat X X<br />

Hibernate X X<br />

Web DAV (Distributed Authoring<br />

And Versioning) X X<br />

WebFOCUS Reporting Server X X<br />

Lotus Notes X X<br />

Blackboard X X<br />

Server Operating Systems<br />

Cisco router language IOS X X<br />

VMware X X<br />

IBM zOS X Limited<br />

Redhat Linux on Intel X X<br />

Micros<strong>of</strong>t 200x Server X X<br />

Languages<br />

C/CGI (Computer Graphics<br />

Interface) X Limited<br />

-519-


Legacy Current Future<br />

Currently in<br />

Research<br />

COBOL (Common Business-<br />

Oriented Language) X X Limited<br />

CSS X X<br />

HLLAPI (High Level Language<br />

Application Program Interface)<br />

screen scraping X X Limited<br />

JAVA /J2EE X X<br />

JavaScript X X<br />

PHP (Php: Hypertext<br />

Preprocessor) Web-scripting<br />

language X X<br />

Structured Query Language<br />

(SQL) X X<br />

WebFOCUS X X X<br />

XHTML<br />

(HyperTextMarkupLanguage) X X<br />

XML<br />

(EXtensibleMarkupLanguage) X X<br />

Oracle PL/SQL<br />

X<br />

-520-


Legacy Current Future<br />

Currently in<br />

Research<br />

Application Development Methodologies and Toolsets<br />

ANT Build Tool for Java X X<br />

Configuration Mgmt Tools (UNIT<br />

testing, etc) X X<br />

Eclipse IDE X X<br />

NetBeans IDE X X<br />

Spring X X<br />

Struts X X<br />

UML X X<br />

Web based Content Mgmt<br />

Systems X X<br />

Web Services X X<br />

Application Delivery Methodologies/Protocols<br />

IBM DB2 (DataBase 2) Connect X X<br />

JDBC (Java DataBase<br />

Connectivity) X X<br />

LDAP (Lightweight Directory<br />

Access Protocol) X X<br />

iWay Data Adapters X X<br />

ODBC (Open<br />

DataBaseConnectivity) X X<br />

SOAP (Simple Object Access<br />

Protocol) X X<br />

UDDI (Universal Description,<br />

Discovery and Integration) X X<br />

-521-


Legacy Current Future<br />

Currently in<br />

Research<br />

WAP (Wireless Application<br />

Protocol) /WML (Wireless Markup<br />

Language) X X<br />

WSDL (Web Services Description<br />

Language) X X<br />

XML (EXtensible Markup<br />

Language) X X<br />

Rich Content Protocols (Video/Audio)<br />

Direct Analog and Digital Video<br />

over fiber X X<br />

H.323 X X<br />

MPEG4 over IP X X<br />

NEB*SAT H.261 Limited Limited<br />

Windows Media Player<br />

Quicktime<br />

Flash X X X<br />

Project Management tools<br />

c.support X X<br />

Micros<strong>of</strong>t Excel X X<br />

Daptiv X X<br />

Subversion X X<br />

Jira Issue Tracking X Limited<br />

Lotus Notes Team Room<br />

Limited<br />

-522-


Legacy Current Future<br />

Currently in<br />

Research<br />

Authentication and Security<br />

TippingPoint IPS X X<br />

FTP X Limited<br />

LDAP with Unique Username X X<br />

PGP X X<br />

Photo ID card with Database X X<br />

PIN (Personal Identification<br />

Number) X X<br />

SAP Personnel Number X Limited<br />

SFTP/SCP X X<br />

SSH Secure Shell X X<br />

SSL/TLS Secure Socket Layer X X<br />

Student ID (SSN) Limited Limited<br />

Foundstone Vulnerability Mgt X X<br />

UNO NetID X X<br />

NU ID X X<br />

VPN Virtual Private Network Limited X<br />

Sun IdM Suite X X<br />

Wireless VPN Limited X X<br />

McAfee Anti-virus and Spyware X X<br />

McAfee Enterprise Policy<br />

Orchestrator (EPO)<br />

X<br />

Cisco Firewalls X X<br />

VLANS X X<br />

-523-


Legacy Current Future<br />

Currently in<br />

Research<br />

Security Event Management<br />

X<br />

Network Environment<br />

General Description<br />

Information Technology Services pr<strong>of</strong>essionally manages many <strong>of</strong> the 'mission critical' computer systems<br />

on campus. These include centralized email servers, centralized file servers, campus inter- and intranetworks,<br />

including local and wide area networks, Internet and World-Wide-Web communications,<br />

application delivery systems, academic and research systems, instructional delivery systems including<br />

web-based mediums, and streaming media systems in support <strong>of</strong> the campus-wide academic mission.<br />

The desktop management s<strong>of</strong>tware being used is Altiris - http://www.altiris.com/ .<br />

The LAN monitoring tools used are:<br />

What’s Up Gold http://www.whatsupgold.com/<br />

Tipping Point http://www.tippingpoint.com/<br />

Pakateer http://www.netequalizer.com/appe.htm<br />

Foundstone http://www.foundstone.com/us/index.asp<br />

Netmri http://www.netcordia.com/<br />

-524-


Network Devices<br />

Current<br />

Planned – See<br />

narrative below<br />

Firewalls (Hardware) 3<br />

Wireless Access Points 116<br />

Video Cameras (USB)*<br />

IP Phones** 35<br />

POP Servers 0<br />

Web Servers<br />

Windows 2003<br />

Red Hat Linus<br />

34***<br />

35****<br />

Application Delivery (e.g. Citrix,<br />

Terminal Services servers)<br />

(Specify)<br />

Remote Desktop Connection<br />

80<br />

* UNO has many video cameras across the campus to enhance security and will continue to add in<br />

the appropriate places.<br />

** ITS is currently testing the use <strong>of</strong> VOIP. The UNO Telecommunications department has set up<br />

VOIP for the Chili Greens location.<br />

*** This only includes ITS-owned & operated systems and 18 <strong>of</strong> the 34 are running on VMWare<br />

**** This only includes ITS-owned & operated systems and 29 <strong>of</strong> the 35 are running on VMWare<br />

With the physical expansion <strong>of</strong> the UNO campus to the south (Pacific and Center streets) the expansion<br />

<strong>of</strong> all IT services will be impacted and we are involved in the planning <strong>of</strong> this growth. On average there<br />

has been a 10% expansion <strong>of</strong> web servers, but with our use <strong>of</strong> VMware this growth may change.<br />

-525-


Future Direction & Intent<br />

Campus IT in the next biennium is likely to be heavily influenced by the implementation <strong>of</strong> a new student<br />

information system across the university system. Such systems represent the core academic business<br />

processes <strong>of</strong> a campus and tend to affect the overall direction and technical architecture <strong>of</strong> the institution.<br />

Both vendors under current consideration use Oracle, as the underlying technology and therefore it<br />

becomes core to the IT operations <strong>of</strong> the campus for development <strong>of</strong> interfaces to other campus systems<br />

as well as for future application development.<br />

In addition, the unprecedented campus physical expansion and renovations planned in the next two<br />

years similarly mandate re-thinking overall campus infrastructure on a new scale. This may include<br />

campus network re-design with consideration <strong>of</strong> a fiber ring from the Dodge Campus to the Center<br />

Campus to assure appropriate business continuity. Another factor contributing to network infrastructure<br />

design is ongoing convergence <strong>of</strong> voice, video and data applications on the IP-based network as well as<br />

ubiquitous wireless access that includes a variety <strong>of</strong> mobile devices.<br />

In response to environmental sustainability, limited capital resources and staffing limitations, UNO ITS is<br />

in the process <strong>of</strong> re-inventing the campus data center. Server virtualization is achieving significant<br />

savings in electrical costs, server hardware expenses, and system administration costs. Elimination <strong>of</strong><br />

major system printing through an output management system and electronic system distribution <strong>of</strong> output<br />

allows the elimination <strong>of</strong> larger system printers, their associated electrical and maintenance costs as well<br />

as paper and other supplies. These steps allow the data center to be managed exclusively by the<br />

systems administration staff with no computer operators. Further work in the “greening” <strong>of</strong> the data<br />

center will continue to produce similar benefits in the next two years.<br />

Regulatory mandates as well as best practice diligence triggers continued attention to data security and<br />

privacy concerns. While much has been done to address these issues, it is ongoing and dynamic in<br />

ways that will continue to make it a priority into the foreseeable future. One <strong>of</strong> the attendant issues is<br />

identity management. The university has purchased the Sun Identity Management system, which will<br />

continue to be implemented and refined over the next two years. Continuity Planning will be further<br />

enhanced by the virtualization <strong>of</strong> alternative site operations.<br />

The Academic Partnership for Instruction (API), a division <strong>of</strong> ITS continues to provide strategic and<br />

operational support to distance education and to dedicate efforts in integrating emerging technologies<br />

with innovative pedagogy, assessment and instructional design for individual faculty and campus<br />

organizations including the Center for Faculty Development, Teaching Circles, the <strong>University</strong> Committee<br />

-526-


for the Advancement <strong>of</strong> Teaching, the Faculty Senate Educational and Resources and Services<br />

Committee, and the Distance Education Advisory Committee.<br />

The increasing viability <strong>of</strong> S<strong>of</strong>tware as a Service and the potential for aspects <strong>of</strong> infrastructure as a<br />

service will play a role in future IT acquisitions. Project management and elements <strong>of</strong> business continuity<br />

are currently done in this way and the ongoing evaluation <strong>of</strong> the success <strong>of</strong> this approach will continue.<br />

2. Staff and Training<br />

Personnel<br />

Information Technology Services has 45 full time employees with 19 part time student workers.<br />

Depending on the project outside contractors can be involved.<br />

IT Related Training<br />

Summarize the agency’s efforts to address training needs relating to information technology, including<br />

training for IT staff and users.<br />

Yearly performance reviews require ITS employees in conjunction with their manager work on personal<br />

development plans that includes training requirements. Employees receive $250 a year to supplement<br />

their personnel development plans. This money is used to contribute toward attending conferences, join<br />

national technical organizations, and subscribe to technology journals, or purchase books or tools that<br />

support new skill development. Training activities include:<br />

All staff has attended local and national conferences and belongs to national technology<br />

associations.<br />

ITS API staff utilizes a course development model that includes presenting new technology<br />

training courses to ITS staff prior to <strong>of</strong>fering them to the campus. This process provides the ITS<br />

instructor with the opportunity to practice and ITS staff with the opportunity to learn about new<br />

technology.<br />

ITS ADIS staff attended 10 days <strong>of</strong> Sun Identity Management training.<br />

Each year ITS participates in NU tech day, a system-wide one day workshop for technology<br />

pr<strong>of</strong>essionals.<br />

-527-


In the last year, the focus <strong>of</strong> training has been on project management. The newly developed ITS<br />

<strong>of</strong>fice <strong>of</strong> project management has developed and implemented extensive training for senior staff,<br />

project management champions and the staff at large.<br />

Technology training for the campus community consists <strong>of</strong> formal presentations about upgrades <strong>of</strong><br />

campus supported s<strong>of</strong>tware such as Micros<strong>of</strong>t 2007, new applications such as the UNO ePortfolio<br />

system used for faculty and staff annual performance appraisals or the campus webpage template, and<br />

new instructional technologies such as clickers. Additionally, ITS staff provides small group and<br />

individual training upon request.<br />

-528-


APPENDIX 6 – COLLEGE OF IS&T SYSTEM OVERVIEW<br />

COLLEGE OF INFORMATION SCIENCE AND TECHNOLOGY<br />

College <strong>of</strong> Information Science &<br />

Technology<br />

Systems Overview<br />

January 2009<br />

-529-


TABLE OF CONTENTS<br />

CONTACT INFORMATION .................................................................................... 3<br />

COMPUTING SUPPORT MODEL ............................................................................ 3<br />

MISSION AND VALUES ........................................................................................ 4<br />

NETWORK CONNECTIVITY AND CONFIGURATION ..................................................... 5<br />

CLASSROOM, LAB, AND RESEARCH COMPUTERS ...................................................... 9<br />

PRINTING....................................................................................................... 11<br />

VIRTUALIZATION REPORT .................................................................................. 14<br />

SERVER INFORMATION .................................................................................. 16<br />

SOFTWARE LIST – CLASSROOM AND LABS .......................................................... 22<br />

MICROSOFT DEVELOPER NETWORK ACADEMIC ALLIANCE...................................... 24<br />

RESEARCH LABS AND PROJECTS ....................................................................... 25<br />

WEBSITES .................................................................................................. 33<br />

POLICIES, PROCEDURES, AND GUIDELINES FOR TECHNOLOGY USAGE ........................ 38<br />

-530-


College <strong>of</strong> IS&T Systems and Support Contact Information<br />

Location and Hours <strong>of</strong> Operation<br />

Location: PKI 356B<br />

Phone: (402)554-4932<br />

Emergency Pager: (402)888-2927<br />

Emergency Email Address: 4028882927@atsbeep.com<br />

Hours <strong>of</strong> Operation: Monday-Friday 8:00am - 5:00pm<br />

Primary IT Contact<br />

Name<br />

Michael Grove<br />

Title<br />

Director<br />

Phone 402-554-2790<br />

Email<br />

mrgrove@unomaha.edu<br />

Email Contact List<br />

The Director will be updating an email list <strong>of</strong> systems contacts. The list will be used to provide general IT<br />

related updates and information to agencies.<br />

Name Title Email Address Phone<br />

James Harr Research Systems Manager jharr@unomaha.edu 554-3219<br />

Joseph Hrabak Production Systems Manager chrabak@unomaha.edu 554-3340<br />

Mohammad Shafiullah Research Systems Manager mshafiullah@unomaha.edu 554-2973<br />

Computing Support Model<br />

The members <strong>of</strong> the Systems Staff at the College <strong>of</strong> Information Science and Technology are dedicated<br />

to providing quality support for faculty, staff, and students. We provide assistance with s<strong>of</strong>tware<br />

installation and troubleshooting, account creation, departmental purchases, printer installation,<br />

hardware repair, security, server configuration and maintenance, backups, web development, and much<br />

more.<br />

Our approach is different than the standard IT support model. Our team pairs up with faculty, staff, and<br />

researchers forming a true symbiotic relationship. We learn about the project or research being<br />

performed, and work to envision new ways to achieve technological goals. In return, the traditional<br />

researcher or program director receives a fully documented computing solution. This allows both<br />

-531-


partners in the process to grow in their understanding <strong>of</strong> the material, and to develop new and<br />

innovative ways to provide IT solutions.<br />

College <strong>of</strong> IS&T Mission and Values<br />

Mission<br />

The College <strong>of</strong> Information Science and Technology (IS&T) represents the joint efforts <strong>of</strong> the <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong>, the State <strong>of</strong> <strong>Nebraska</strong>, and private industry to address the growing global needs for<br />

knowledgeable pr<strong>of</strong>essionals in the area <strong>of</strong> Information Technology. The college is striving to develop<br />

areas <strong>of</strong> national prominence in bioinformatics, wireless networks/mobile computing, management<br />

information systems, information assurance, project management, decision support systems &<br />

visualization, collaboration science, theoretical and applied computing. The college mission is:<br />

To provide comprehensive up-to-date education <strong>of</strong> the highest quality in the various areas <strong>of</strong><br />

information science and technology to individuals at the Metropolitan <strong>Omaha</strong>, state, national<br />

and international level.<br />

To engage in basic and applied research activities to be carried out by students and faculty <strong>of</strong> the<br />

college with collaboration <strong>of</strong> other <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> units as well as pr<strong>of</strong>it and non-pr<strong>of</strong>it<br />

organizations.<br />

To equip college graduates with the knowledge and expertise to contribute significantly to the<br />

work force and to continue to grow pr<strong>of</strong>essionally.<br />

To partner with other university units in the development and utilization <strong>of</strong> information<br />

technology in teaching and service activities.<br />

To partner with local, state, national and international entities in the resolutions <strong>of</strong> information<br />

technology problems and issues.<br />

In order to accomplish the college's mission and vision, the faculty and staff will strive to achieve the<br />

following three strategic goals:<br />

1. Keep students at the center <strong>of</strong> all college efforts;<br />

2. Strive to achieve the highest academic excellence; and<br />

3. Actively lead and collaborate with academic, business and community entities in various projects<br />

related to IS&T.<br />

-532-


Values<br />

The college's overarching philosophy is exemplified by the value statement, "No student will go<br />

unassisted or unchallenged." The college is focused on reaching the next level <strong>of</strong> information technology<br />

innovation through collaboration. This collaboration is fostered by the presence <strong>of</strong> the college in the<br />

Peter Kiewit Institute and is materializing in the form <strong>of</strong> research, teaching and service/outreach<br />

initiatives in partnership with our stakeholders in the community (government, public and private<br />

sector), other academic units across the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> and the rest <strong>of</strong> the <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong> System.<br />

College <strong>of</strong> IS&T Network Connectivity<br />

There are two Gigabit network ports in each faculty and staff <strong>of</strong>fice. If you are experiencing trouble with<br />

your connectivity, please call us at 554-4932. There is also a VPN available and wireless access<br />

throughout the building. See the text below for more information.<br />

VPN<br />

The College <strong>of</strong> IS&T has a Virtual Private Network available for faculty and staff. Connecting to the VPN<br />

allows you to access your files, connect to network shares, print from the wireless network, and more.<br />

Instructions on connecting to the VPN are listed below.<br />

1. Download the IS&T VPN Client. ** If you have a modem in your computer you will need to disable<br />

this. This can be done by opening up the Control Panel and going to Device Manager -> Network<br />

Adapters, then locate your modem and Right-click -> Disable.<br />

2. Navigate to the directory where you saved the file. Double click it to install the application.<br />

3. Click 'Yes' to install the VPN client.<br />

4. Check the box to save a shortcut on your desktop.<br />

5. Double click the 'IS&TVPN - Shortcut' on your desktop to connect to the VPN.<br />

6. You will see a box popup with the UNO logo. Type in your IS&T username and password,<br />

followed by PKI-IST in the 'logon domain' box. (To connect faster in the future, you may check the<br />

'Save Password' or 'Connect Automatically' boxes.)<br />

7. Click connect.<br />

8. You may see your connection status at anytime or disconnect by double clicking the 'IS&TVPN -<br />

Shortcut' on your desktop.<br />

Connecting to My Office PC: Remote Desktop<br />

-533-


You may control your <strong>of</strong>fice computer from a remote location, as long as you are connected to the VPN.<br />

This allows you to have full access to your computers files, printers, programs, etc. See instructions<br />

below.<br />

1. Install the IS&T VPN Client - see instructions above<br />

2. Windows XP: Click Start --> Run --> type 'mstsc' without the quotes, press enter<br />

3. Windows Vista: Click the Windows button (Formerly Start) --> type 'mstsc' without the quotes,<br />

press enter<br />

4. Type the name <strong>of</strong> your computer in the computer field when the remote desktop box appears<br />

and press enter<br />

(example: computer-name.ist.unomaha.edu)<br />

5. You may find your computer name by going to the control panel and clicking 'System'<br />

Wireless Network<br />

The College <strong>of</strong> IS&T provides unencrypted wireless network access based on common 802.11 standards.<br />

Currently there are 30 active access points providing PKI with nearly 100% wireless coverage.<br />

How to use it<br />

You'll need a computer or other portable device with 802.11 wireless networking capability either built<br />

in or with a wireless network card installed. If you do not have or are not sure if your computer or device<br />

has 802.11 wireless networking capabilities, check with the company or person from whom you<br />

obtained the item.<br />

Set your SSID network name <strong>of</strong> 'unowireless'.<br />

The wireless network will attempt to automatically assign the computer or device a network number<br />

using DHCP. You may need to turn the computer or device <strong>of</strong>f and back on so it seeks a network<br />

number. If your computer or device does not have a fairly current version <strong>of</strong> a standard Windows or Mac<br />

operating system, there may be some special steps that system requires you to perform before being<br />

able to use wireless networking with that device. Check the website or call the technical support number<br />

for the device if you're not sure.<br />

-534-


College <strong>of</strong> IS&T Network Configuration<br />

Physical Equipment:<br />

15 Network Switches<br />

1 Core Router<br />

1000 Network Ports<br />

35 Wireless Access Points<br />

Over the past 6 months IS&T Systems has facilitated several network architecture changes in the pursuit<br />

<strong>of</strong> better service to computer users in both performance and security. This portion <strong>of</strong> the document<br />

explains the changes that have been made through the past year.<br />

The use <strong>of</strong> network address translation to increase security<br />

There are several reasons why NAT is common place in current networks. The two most prominent<br />

reasons are a shortage <strong>of</strong> available IP address space and an implicit firewall policy. The network at PKI<br />

uses mixed NAT and public IP addressing. Each has its benefits, but it can also cause problems. The<br />

following diagram is a small part <strong>of</strong> our network 12 months ago.<br />

Private Lab<br />

Networks<br />

Private NAT<br />

Router<br />

PKI Building<br />

Network<br />

PKI Core<br />

Router<br />

Internet<br />

Private<br />

Workstations<br />

Public Workstations<br />

and Servers<br />

IS&T made extensive use <strong>of</strong> private addressing for research networks. The primary goal was to increase<br />

security and that was a success. However, several drawbacks arose. Nearly all traffic is forced through<br />

the Private NAT router. While the NAT router operates at 1000Mbps and UNO’s Internet connection<br />

runs at 100Mbit, a majority <strong>of</strong> burst traffic occurs to/from servers inside PKI. The limited scalability <strong>of</strong><br />

this solution soon became apparent; the NAT router becomes the bottleneck in our design.<br />

To mitigate the bottleneck issue, IS&T took several heavily used servers and multi-homed them. That is<br />

gave them addresses on both public and private networks. While this solution works, it is far from<br />

optimal. It increases management overhead, requires several non-standard tweaks to DNS to keep<br />

clients connecting to the appropriate adapter on a server, and some applications simply don’t function<br />

right under this set up, in particular any application requiring a license server. This is ignoring the fact<br />

that humans do make occasional mistakes and a mistake configuring a DNS entry can render the service<br />

it pertains to useless until it is fixed.<br />

-535-


Transitioning back to all public addresses was not an option and remains so to this day. Several labs use<br />

network sniffers as educational tools and UNO policy dictates that these networks must be isolated on<br />

the layer 1 and 2 network level. A new approach was needed to maintain security, improve<br />

performance, and simplify server management.<br />

A new approach – Internally routable private addresses<br />

IS&T Systems came up with a new network model to solve these issues without increasing our security<br />

footprint. We wanted to make full use <strong>of</strong> the PKI Core. It has the capability to route 1.2Tbps, and has<br />

20Gbps fiber links to the edge switches. Compare this to the 1Gbps the NAT router <strong>of</strong>fers, it is a<br />

phenomenal improvement. We came to the conclusion that we needed to make use <strong>of</strong> the core router<br />

and policy routing to increase performance and decrease management overhead. The following diagram<br />

illustrates our new model, which, excluding a few minor details, has been implemented fully.<br />

Private<br />

Workstations<br />

PKI Border<br />

Router<br />

PKI Building Network<br />

(including the PKI-Core router)<br />

Internet<br />

Public Workstations<br />

and Servers<br />

Private NAT<br />

Router<br />

The new model calls for the core to handle all routing in the building. Private and Public networks are<br />

handled the same. The difference comes when a workstation or server makes a request destined for the<br />

Internet. The core router uses policy routing to forward public addresses directly to the PKI Border<br />

router as usual. However, private addresses are routed to the Private NAT router, now placed at the<br />

border <strong>of</strong> the PKI network. NAT only occurs for packets destined for the Internet or North Campus. The<br />

performance increases and simplification <strong>of</strong> server management became immediately visible to the IS&T<br />

systems staff.<br />

The networks’ bottlenecks have been eliminated and the NAT router is no longer saturated on a daily<br />

basis, research networks are still isolated from the rest <strong>of</strong> the network using VLAN technology, server<br />

-536-


configuration has become significantly simpler, and the NAT router is now able to handle the load<br />

without any question <strong>of</strong> performance.<br />

-537-


College <strong>of</strong> IS&T Classroom, Lab, and Research Computers<br />

The Systems Staff maintains classrooms and computer labs that directly support academic and research<br />

endeavors <strong>of</strong> the College. Each lab is unique in function, and customized to suit student, faculty, and<br />

staff needs. Students, faculty, and staff may login using their UNO netID. Lab hours are posted outside<br />

<strong>of</strong> each room. For s<strong>of</strong>tware installation requests, please contact us at any time.<br />

All computer labs and classrooms have Dell® Precision 390 workstations with the following<br />

specifications:<br />

Intel® Core 2 Duo 2.66Mhz processor<br />

160GB Hard Drive<br />

2GB <strong>of</strong> RAM<br />

NVIDIA® Quadro FX 3500 Video Card<br />

7 USB ports<br />

3 fire wire ports<br />

Audio jacks in the front and rear<br />

DVD/RW Drive<br />

Below is a list <strong>of</strong> classroom and lab functions, number <strong>of</strong> seats, and number <strong>of</strong> computers.<br />

Room Purpose Seats Computers<br />

PKI155 Classroom 45 1<br />

PKI157 Classroom 23 1<br />

PKI158A Public Computer Lab 50 50<br />

PKI158C IST&E Student Computer Lab 42 40<br />

PKI158G “WOW” Room 10 8<br />

PKI158K Data Mining Lab 20 10<br />

PKI160 Instructional Technology Center - Distance Learning 44 1<br />

PKI161 Instructional Technology Center - Distance Learning 26 1<br />

PKI164 Instructional Technology Center - Distance Learning 56 1<br />

PKI172a Dean's Conference Room 8 1<br />

PKI252 Classroom 45 1<br />

PKI256 Classroom 40 1<br />

PKI259 Graduate Student Lab 9 9<br />

PKI260 Instructional Technology Center 45 45<br />

PKI261 Classroom 35 1<br />

PKI263 Classroom 34 1<br />

PKI269 Instructional Technology Center 30 30<br />

PKI270 Classroom 30 1<br />

PKI274 PhD Student Lab 13 13<br />

PKI276 Instructional Technology Center 30 30<br />

PKI277 Conference Room 8 1<br />

PKI278 Instructional Technology Center for Networking 16 16<br />

PKI 279 Instructional Technology Center 30 3<br />

-538-


PKI285A STEAL Lab 3 8 8<br />

PKI335 Classroom 28 1<br />

PKI350 STEAL Lab 1 40 40<br />

PKI355 Graduate Student Lab 2 2<br />

PKI356A One IP Lab 20 7<br />

PKI356C Adjunct Faculty 3 3<br />

PKI357 E-Learning Lab 2 2<br />

PKI356B Systems Office 12 30<br />

PKI359 Classroom 44 1<br />

PKI360 W.I.N.D.S. Research Lab 4 4<br />

PKI361 STEAL Lab 2 25 25<br />

PKI362 CMANTIC Research Lab 4 5<br />

PKI366 Chronoscope Research Lab 5 5<br />

PKI366A Systems Storage 0 4<br />

PKI367 IS&T Attic 12 12<br />

PKI370 MOSAIC Research Lab 4 4<br />

PKI374 Metaverse Research Lab 6 6<br />

PKI375 Multimedia Production Lab 15 15<br />

PKI377 Classroom 30 1<br />

PKI378 Bioinformatics Research Lab 6 6<br />

PKI383 Classroom 32 1<br />

PKI387 Classroom 25 25<br />

Faculty/Staff Office Computers/Laptops 90 120<br />

Laptops Group Decision Support/Systems Checkout 0 24<br />

Totals 1086 607<br />

-539-


College <strong>of</strong> IS&T Printing<br />

Faculty and Staff Printing<br />

There are two Konica Minolta 750 printers available for Faculty and Staff use. They are located in rooms<br />

170 and 270, and have scanning, copying, and stapling functionality built in. These printers are<br />

automatically installed when you login to your <strong>of</strong>fice computer using the IS&T domain. To locate them<br />

on your Windows computer open your control panel and click printers.<br />

Student Printing<br />

All students with a valid UNO Net ID and MavCard may use the printer in lab 158a. For more<br />

information, see instructions here. Graduate and PhD students may print in your respective labs and<br />

<strong>of</strong>fices. If you are experiencing trouble printing, please call us at 554-4932.<br />

Wireless Printing<br />

Faculty and Staff members may print from the wireless network; however you must be connected to our<br />

VPN. After connecting to the VPN, click the install printers link. The 1st and 2nd floor faculty printers will<br />

install automatically.<br />

(Type PKI-IST\your-username and your domain password when prompted)<br />

Step 1) Install IS&T VPN (Windows XP and Vista)<br />

1. Download the IS&T VPN Installer. ** If you have a modem in your computer you will need to<br />

disable this. This can be done by opening up the Control Panel and going to Device Manager -><br />

Network Adapters, then locate your modem and Right-click -> Disable.<br />

2. Navigate to the directory where you saved the file. Double click it to install the application.<br />

3. Click 'Yes' to install the VPN client.<br />

4. Check the box to save a shortcut on your desktop.<br />

5. Double click the 'IS&TVPN - Shortcut' on your desktop to connect to the VPN.<br />

6. You will see a box popup with the UNO logo. Type in your IS&T username and password,<br />

followed by PKI-IST in the 'logon domain' box. (To connect faster in the future, you may check the<br />

'Save Password' or 'Connect Automatically' boxes.)<br />

7. Click connect.<br />

8. You may see your connection status at anytime or disconnect by double clicking the 'IS&TVPN -<br />

Shortcut' on your desktop.<br />

Step 2) Install IS&T Printers (Windows XP and Vista)<br />

1. Download the IS&T Printer Installer.<br />

2. Navigate to the directory where you saved the file. Double click it to install the application.<br />

3. Setup should take anywhere from 10 - 60 seconds. You can watch the status <strong>of</strong> the installation by<br />

going to your Control Panel and opening up the printers folder.<br />

-540-


4. You will receive a success message if the printers install properly, and error message if the install<br />

fails. If you do receive an error message, please contact the systems <strong>of</strong>fice at 554-4932.<br />

Below is a list <strong>of</strong> all printers managed by IS&T Systems. Printers with an * indicate a shared device.<br />

Location<br />

Model<br />

PKI 158A* HP LaserJet 4200n (2)<br />

PKI 170*<br />

Konica Minolta Magicolor<br />

PKI 170B HP Photosmart 1215<br />

PKI 172 HP Laserjet 2200<br />

PKI 172B HP Laserjet 4050<br />

PKI 172C<br />

HP Deskjet 970cxi<br />

PKI 172C HP LaserJet 2200<br />

PKI 172E HP DeskJet 5600<br />

PKI 173A HP Laserjet 4050<br />

PKI 173C Dell 1720<br />

PKI 173D HP LaserJet 2200<br />

PKI 173E HP Officejet 6300<br />

PKI 174C<br />

HP Laserjet 2200DN<br />

PKI 174E HP LaserJet 1018<br />

PKI 174F HP Photosmart 1215<br />

PKI 174G HP PSC 2400<br />

PKI 174H HP LaserJet 4050<br />

PKI 174I HP LaserJet 2200<br />

PKI 175A HP Color Laserjet 4500<br />

PKI 175A<br />

HP Officejet G55<br />

PKI 175c<br />

HP DeskJet 970 CXi<br />

PKI 175D HP LaserJet 3330<br />

PKI 175E HP Laserjet 2100<br />

PKI 176B HP LaserJet 1022<br />

PKI 176C HP DeskJet 5100<br />

PKI 176D*<br />

Magicolor 2300DL<br />

PKI 176D<br />

Konica Minolta 2300DL<br />

PKI 176E HP LaserJet 1022<br />

PKI 177A HP Photosmart 1215<br />

PKI 177A<br />

HP LaserJet4050 Series PS<br />

PKI 177B HP OfficeJet 7400<br />

PKI 177C<br />

HP PhotoSmart C5180<br />

PKI 177D HP Laserjet 2200<br />

PKI 259* HP Laserjet 4050<br />

-541-


PKI 260* HP Laserjet 4050<br />

PKI 269*<br />

HP LaserJet 4350tn Printer<br />

PKI 274*<br />

HP Laserjet 2015DN<br />

PKI 275B<br />

HP LaserJet 1100 Series<br />

PKI 276*<br />

HP LaserJet 4350tn Printer<br />

PKI 279* HP Laserjet 4050<br />

PKI 280A*<br />

HP 4050N<br />

PKI 280B HP Laserjet 4050<br />

PKI 280C HP Color Laserjet 5500<br />

PKI 281A<br />

HP Color Laserjet 2600N<br />

PKI 281C NEC SuperScript 870<br />

PKI 281D HP Color LaserJet 1000<br />

PKI 281E<br />

Hp LaserJet 1320 Series<br />

PKI 282B HP PhotoSmart 1215<br />

PKI 282C HP LaserJet 2200<br />

PKI 282D<br />

HP Pr<strong>of</strong>essional 2000C<br />

PKI 282E HP LaserJet 2420<br />

PKI 282F HP LaserJet 2200<br />

PKI 282G<br />

HP LaserJet 2100TN<br />

PKI 282H HP LaserJet 3030<br />

PKI 282I HP LaserJet 3030<br />

PKI 283B HP PhotoSmart 1215<br />

PKI 283E<br />

HP DeskJet 895C Series<br />

PKI 284A HP PhotoSmart 1215<br />

PKI 284B HP LaserJet 1022<br />

PKI 284C HP LaserJet 1022<br />

PKI 284D hp LaserJet 1320<br />

PKI 284E HP LaserJet 2200<br />

PKI 285A HP PhotoSmart 1215<br />

PKI 286*<br />

HP Laserjet 5550 Color Printer<br />

PKI 355*<br />

HP 2100TN<br />

PKI 356B*<br />

HP LaserJet 4050 Series PS<br />

PKI 360* HP Laserjet 2420<br />

PKI 362*<br />

HP LaserJet 2420 PS<br />

PKI 375 *<br />

Sharp Color Printer<br />

PKI 378* HP LaserJet 2200<br />

PKI 391* HP Laserjet 8100<br />

-542-


College <strong>of</strong> IS&T Virtualization Report – January 2009<br />

During the summer <strong>of</strong> 2008, the PKI Foundation did a round <strong>of</strong> server upgrades for the College <strong>of</strong> IS&T, the<br />

College <strong>of</strong> Engineering, and the PKI Infrastructure group. Virtualization had started to take a foothold in the IT<br />

industry as a cost effective IT tool, so it was debated as to whether to continue using our physical server layout<br />

that we had in the past, or forge ahead with this new technology. After several in depth discussions, it was<br />

decided that all 3 entities would push forward with virtualization. This document gives a broad technical overview<br />

<strong>of</strong> the college <strong>of</strong> IS&T’s virtualization infrastructure.<br />

Virtualization S<strong>of</strong>tware<br />

VMware Infrastructure Enterprise was chosen after a product demo. It proved to be stable, flexible, and was the<br />

industry standard for x86 virtualization at the time (and still is as <strong>of</strong> this document’s publish date). VMware<br />

supports a wide variety <strong>of</strong> features that increase the performance <strong>of</strong> the virtualization farm. A brief summary <strong>of</strong><br />

these features follows:<br />

VMware Virtual Center – A centralized console for managing all aspects <strong>of</strong> the virtualization<br />

cluster.<br />

VMFS – Shared storage file system that runs over Fiber Channel or iSCSI SAN Fabrics.<br />

VMotion/SVMotion – Ability to move a live virtual machine from one ESX host to another<br />

without rebooting, downtime, or loss <strong>of</strong> data.<br />

DRS – Distributed Resource Scheduling. A service that uses VMotion to balance physical server<br />

load to provide optimum VM performance.<br />

VMware HA – A service that monitors hardware health metrics and will evacuate VMs from a<br />

host if hardware failure is eminent.<br />

VMware Consolidated Backup – An API for backup s<strong>of</strong>tware to efficiently back up virtual<br />

machines over the SAN without impacting the performance <strong>of</strong> the cluster.<br />

Performance metrics to measure bottlenecks for cluster performance to help ensure peak<br />

performance.<br />

VMware Converter Enterprise – S<strong>of</strong>tware to convert existing physical servers into virtual servers.<br />

Virtualization Hardware<br />

After reviewing configuration options, 4 Dell 2950 servers were chosen with 8 processor cores, 32GB <strong>of</strong> ram, and<br />

6x1 gigabit network connections. The servers were built with reliability and performance in mind. iSCSI was<br />

chosen as a SAN protocol as it fit into our existing network infrastructure, proved to be more cost-effective than<br />

Fiber-Channel, and is displacing Fiber-Channel as the industry standard storage protocol.<br />

PKI donated space on the EMC CLARiiON to the virtualization farm. The CLARiiON has redundant power, network,<br />

data paths, and data movers. In short, any component can fail without a SAN outage. An EMC AX4-5i was<br />

purchased as a secondary storage medium for backup.<br />

Current State<br />

At the end <strong>of</strong> the summer 2008 semester, the VMware cluster was set up and testing began. The cluster endured<br />

several tests <strong>of</strong> SAN component failure, network failure, hardware failure (memory errors, etc) and still remained<br />

-543-


stable. During the fall semester <strong>of</strong> 2008, virtualization was implemented and IS&T’s existing server infrastructure<br />

was converted over to virtual machines. IS&T maintains a few core servers outside the VMware cluster to keep<br />

vital services operating if the cluster were to suffer a complete failure.<br />

Traditionally, new server hardware requires a fresh Operating System install which lengthens the time required to<br />

implement hardware upgrades. This is no longer true and is a great benefit <strong>of</strong> Virtualization. The decoupling <strong>of</strong><br />

hardware upgrades and s<strong>of</strong>tware upgrades has greatly increased the flexibility and productivity <strong>of</strong> IS&T Systems.<br />

When the next round <strong>of</strong> hardware upgrades come through, a rolling upgrade can and will be performed. That is<br />

upgrade hardware piece by piece while keeping all the VMs operational. This significantly reduces the amount <strong>of</strong><br />

time spent on hardware upgrades and allows s<strong>of</strong>tware upgrades to be performed at a more appropriate time.<br />

Performance<br />

The virtualization cluster has performed beyond expectations. For the month <strong>of</strong> December 2008, CPU load<br />

averaged 11.3% and peaked at 30%; Memory utilization averaged 66%. The cluster currently runs 48 virtual<br />

machines (production, research, and internal R&D VMs). It is important to emphasize that for virtualization<br />

clusters to maintain optimal performance, resource utilization should peak at 80% or below.<br />

Power consumption has been drastically decreased and while metrics for SAN and network are not available, but<br />

the cluster nodes utilize only 800 watts <strong>of</strong> power total, over a 3 fold reduction in power utilization. This has also<br />

reduced the cooling requirements for the production server room. While IS&T does not directly pay for power, it<br />

is an important contribution to keeping the university utility costs down.<br />

The next section <strong>of</strong> the document will list all IS&T servers, both virtual and physical.<br />

-544-


College <strong>of</strong> IS&T Servers<br />

The Systems Staff maintains numerous servers that directly support academic and research endeavors <strong>of</strong> the<br />

College. Each server is unique in function, and customized to suit student, faculty, staff, or project needs.<br />

Production Virtual Machines (16)<br />

VM Hostname Description Contacts<br />

altiris<br />

Deployment Server: Altiris Deployment Server,<br />

Deepfreeze Enterprise Server, DHCP Services for the<br />

Network<br />

-545-<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

bfdc1 Domain Controller for the Blackforest site James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

bfdc2 Domain Controller for the Blackforest site James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

cistvss IST Systems internal SharePoint server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

exchange Mail server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

license1<br />

license2<br />

Licensing server for OPNet, MATLAB, any pooled license<br />

s<strong>of</strong>tware we have.<br />

Redundant license server for MATLAB, any pooled license<br />

s<strong>of</strong>tware we have.<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

manage Production Domain Controller, Production print server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

metis<br />

Production Domain Controller; McAfee E-Policy<br />

Orchestrator Server; Temporary license server for OPNet<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu


James Harr<br />

jharr@ist.unomaha.edu<br />

pf1 NAT Router for private network addresses James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

pf2 Redundant NAT router James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

six 2008 test domain controller Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

sus<br />

Windows Server Update Services (Manages s<strong>of</strong>tware<br />

updates for Micros<strong>of</strong>t products)<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

svn Subversion (revision control) server James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

vpn VPN Server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

windows-web Primary Production Web Server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

-546-


College <strong>of</strong> IS&T Production Non-VM Servers (112 including 56 Blackforest nodes)<br />

VM/Non-VM<br />

Hostname<br />

Short Description<br />

Contacts<br />

acm<br />

Web & Project server for the UNO ACM Association <strong>of</strong><br />

Computing Machinery Chapter<br />

-547-<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

Erin Cox tygrr.v2@gmail.com<br />

apollo Community Outreach Production Zac Fowler<br />

zfowler@unomaha.edu<br />

atticfw Community Outreach Firewall Zac Fowler<br />

zfowler@unomaha.edu<br />

azureus Course development server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

bfnfs Blackforest Cluster Network File System Server James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

biigserver Bioinformatics Development server (Non-VM) James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

biigserver2 biigserver replacement James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

biobase Bioinformatics Course and Development server (Non-VM) James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

bioshare Bioinformatics Sun Storage (Non-VM) Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

Josh Johnston<br />

mociyl@gmail.com<br />

blackforest Blackforest Cluster Web interface (Non-VM) James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

blizzard<br />

Student development server for Programming on the<br />

Internet<br />

Robert Fulkerson<br />

robert.fulkerson@gmail.com<br />

chronoscope Text Mining Lab server (Non-VM) Mohammad Shafiullah<br />

clabsvn<br />

CLAB (Collaborative Laboratory for Applied Bioinformatics)<br />

SVN server (Non-V M)<br />

mshafiullah.ne@gmail.com<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

cmjsp Chad Meyer’s Japanese study web application Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com


Chad Meyer<br />

chadmeyer001@gmail.com<br />

csalpha Computer Science server (Non-VM) Stan Wileman<br />

stanw@unomaha.edu<br />

Csalpha2 Computer Science server (Non-VM) Stan Wileman<br />

stanw@unomaha.edu<br />

Csalpha3 Computer Science server (Non-VM) Stan Wileman<br />

stanw@unomaha.edu<br />

db Community Outreach Database Server Zac Fowler<br />

zfowler@unomaha.edu<br />

callisto Community Outreach Development Server Zac Fowler<br />

zfowler@unomaha.edu<br />

df<br />

Web server for the KEWI (Knowledge Engineering and Web<br />

Intelligence) Group<br />

-548-<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

Josh Johnston<br />

mociyl@gmail.com<br />

elearning Production Faculty/Staff Streaming Media Server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

esx1 Clustered Virtual Server Farm Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

esx2 Clustered Virtual Server Farm Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

esx3 Clustered Virtual Server Farm Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

esx4 Clustered Virtual Server Farm Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

flashcom Community Outreach Streaming Media Server Zac Fowler<br />

zfowler@unomaha.edu<br />

gsaf Gene Sequence Analysis Facility legacy server at UNMC Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

hive<br />

College <strong>of</strong> IST Ubuntu, CentOS, and OpenBSD mirror (Non-<br />

VM)<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

istaudit Nessus Scanner Server Josh Johnston<br />

mociyl@gmail.com<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

James Harr<br />

jharr@ist.unomaha.edu


ist-file College <strong>of</strong> IST user network shares server (Non-VM) Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

irc Systems Administrators’ communication server James Harr<br />

jharr@ist.unomaha.edu<br />

jrt S<strong>of</strong>tware Engineering course server James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

Josh Johnston<br />

mociyl@gmail.com<br />

karp2 Dr. Chundi’s text mining research server James Harr<br />

james.harr@gmail.com<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

kitty Clone <strong>of</strong> blizzard for testing purposes Bob Fulkerson<br />

rfulk@unomaha.edu<br />

klab<br />

private Wiki for CLAB (Collaborative Laboratory for Applied<br />

Bioinformatics) (Non-VM)<br />

-549-<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

lb1 NAT Router for the Blackforest Cluster (Non-VM) James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

lb2<br />

Redundant NAT Router for the Blackforest Cluster (Non-<br />

VM)<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

mascot Web server for the Bioinformatics tool Mascot Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

missouri Community Outreach Webserver Zac Fowler<br />

zfowler@unomaha.edu<br />

mp1 Bioinformatics course server (for Mark Pauley) (Non-VM) Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

mp2 Bioinformatics course server (for Mark Pauley) (Non-VM) Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

necro Linux Server BackupPC solution James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

oracle Database course server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

padev Web server for the tool for the pattern discovery and Joe Hrabak


usage in virtual project management<br />

chrabak@mail.unomaha.edu<br />

pegasus Community Outreach Development Server Zac Fowler<br />

zfowler@unomaha.edu<br />

phpmysql<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

phylogeny<br />

Bioinformatics course<br />

server (for Dhundy Bastola)<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

rain<br />

Rheumatoid Arthritis Investigational Network web server Mohammad Shafiullah<br />

research<br />

(Non-VM)<br />

College <strong>of</strong> IST research Windows Terminal Server (Non-<br />

VM)<br />

mshafiullah.ne@gmail.com<br />

James Harr<br />

jharr@ist.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

sp1<br />

Motif Tools Assessment Project Development server (for<br />

Dan Quest) (Non-VM)<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

sp2<br />

Redundant Motif Tools Assessment Project Development<br />

server (for Dan Quest) (Non-VM)<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

ssp Sharepoint server Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

vulcan Student Programming/Web development James Harr<br />

jharr@ist.unomaha.edu<br />

Joe Hrabak<br />

chrabak@mail.unomaha.edu<br />

Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

zenoss Monitoring server Mohammad Shafiullah<br />

mshafiullah.ne@gmail.com<br />

-550-


College <strong>of</strong> IS&T Classroom and Lab S<strong>of</strong>tware List – Spring 2009<br />

The College <strong>of</strong> IS&T has various s<strong>of</strong>tware available for faculty, staff, and student use in our classroom and labs. Applications with an * indicates site license or open source.<br />

S<strong>of</strong>tware Package 155 157 158a 158c 158k 160 161 164 260 261 269 270 276 278 279 357 359 375 383 387 391<br />

Adobe Reader* x x x x x x x x x x x x x x x x x x x x<br />

Adobe Acrobat Pr<strong>of</strong>essional 8<br />

x<br />

Adobe Creative Suite<br />

x<br />

Adobe Photoshop CS3<br />

x<br />

Adobe Creative Suite 4 Web Prem<br />

AllFusion Suite 7* x x x x x x x x x x x x x x x<br />

ArcView GIS 3.3<br />

x<br />

Camtasia Studio 5<br />

x<br />

CN 3D 4.1 x x x<br />

Clickers* x x x x x x x x x x x x x x x x x x x x<br />

Clickers PowerPoint* x x x x x x x x x x x x x x x x x x x x<br />

ColdFusion Studio<br />

x<br />

Eclipse* x x x x x x x<br />

Firefox* x x x x x x x x x x x x x x x x x x x x<br />

Flash Player* x x x x x x x x x x x x x x x x x x x x<br />

Gimp 2.0* x x x<br />

Gnu Prolog* x x x<br />

Google Earth* x x x<br />

Homesite 4.5* x x x<br />

IBM Rational Requisite Pro x x<br />

Java* x x x x x x x x x x x x x x x x x x x x<br />

Jcreator x x x<br />

Maple x x<br />

MapWin x x<br />

Matlab<br />

x<br />

Maya 7.0<br />

x<br />

McAfee Anti-Virus* x x x x x x x x x x x x x x x x x x x x<br />

Micros<strong>of</strong>t Internet Explorer* x x x x x x x x x x x x x x x x x x x x<br />

Micros<strong>of</strong>t Office 2007* x x x x x x x x x x x x x x x x x x x x<br />

Micros<strong>of</strong>t Project 2007 x x x x x x x x x x x x x x x x x x x x<br />

Micros<strong>of</strong>t Visio 2007 x x x x x x x x x x x x x x x x x x x x<br />

-551-


Micros<strong>of</strong>t Visual Studio 2005* x x x x x x x x<br />

Micros<strong>of</strong>t Visual Studio 2008* x x x x x<br />

Micros<strong>of</strong>t Visual Studio 6* x x x<br />

Micros<strong>of</strong>t Silverlight* x x x x x x x x x x x x x x x x x x x x<br />

Micros<strong>of</strong>t SQL Server x x x<br />

Multisim 7 x x x<br />

Multisim 8 x x x<br />

Netbeans IDE 5.5* x x x<br />

OpNet<br />

x<br />

Oracle x x x x x x x x x x x x x x x x x x<br />

PC Alert* x x x x x x x x x x x x x x x x x x x x<br />

Pov-Ray 3.6 x x x<br />

Primo PDF* x x x x x x x x x x x x x x x x x x x x<br />

Putty* x x x x x x x x x x x x x x x x x x x x<br />

Python* x x x x<br />

Quicktime Player* x x x x x x x x x x x x x x x x x x x x<br />

QT by Trolltech 4.1.1 x x x<br />

Real Player* x x x x x x x x x x x x x x x x x x x x<br />

SAP Front End* x x x<br />

SAS* x x x x x x<br />

See5<br />

x<br />

Shockwave Player* x x x x x x x x x x x x x x x x x x x x<br />

SPSS x x<br />

SQL Yog x x x<br />

SWI Prolog x x x x x x x x x x x x x x x<br />

Terragen x x x<br />

Visual Ham<br />

x<br />

Visual Logic x x<br />

Visual Prolog x x x<br />

WinSCP* x x x x x x x x x x x x x x x x x x x x<br />

-552-


Other S<strong>of</strong>tware Available at the College <strong>of</strong> IS&T<br />

MSDNAA<br />

The Micros<strong>of</strong>t Developer Network Academic Alliance is a program that the College <strong>of</strong> IS&T<br />

subscribes to that allows us to <strong>of</strong>fer free Micros<strong>of</strong>t s<strong>of</strong>tware to Faculty, Staff, and students that<br />

have majors or minors declared in Computer Science, MIS, Bioinformatics, and Information<br />

Assurance. Below is a current list <strong>of</strong> available s<strong>of</strong>tware. For more information, go to<br />

http://www.ist.unomaha.edu/msdnaa . If you would like to provide this to your students,<br />

please send us a class list and course number.<br />

Expression Studio<br />

Micros<strong>of</strong>t Groove 2007<br />

Micros<strong>of</strong>t InfoPath 2007<br />

Micros<strong>of</strong>t OneNote 2007<br />

Micros<strong>of</strong>t Project Pr<strong>of</strong>essional 2007<br />

Micros<strong>of</strong>t SharePoint Designer 2007<br />

Micros<strong>of</strong>t SQL Server 2005 Standard Edition - 32-bit - DVD<br />

Micros<strong>of</strong>t Visio Pr<strong>of</strong>essional 2007<br />

Micros<strong>of</strong>t Visual Studio 2008 Pr<strong>of</strong>essional<br />

Windows Server 2003 R2 Enterprise - 2 Discs<br />

Windows Server 2003 Standard Edition<br />

Windows Server 2003 Web Edition<br />

Windows Server 2008<br />

Windows Services for UNIX<br />

Windows Vista Business (32 and 64bit)<br />

Windows XP Pr<strong>of</strong>essional (32 and 64bit)<br />

-553-


College <strong>of</strong> IS&T Research Labs and Projects<br />

BioCMS<br />

Website: https://biodev.ist.unomaha.edu<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Overview:<br />

BioCMS is a prototype version <strong>of</strong> a Content Management System developed for enhancing the<br />

bioinformatics researcher experience. This project is being undertaken by the Genetic Sequence<br />

Analysis Facility at the College <strong>of</strong> IS&T at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> using WebGUI.<br />

Bioinformatics Lab<br />

Location: PKI378<br />

Director: Dr. Hesham Ali, Dean<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Equipment:<br />

5 Dell Desktops<br />

1 Mac Desktop<br />

1 Printer<br />

Flat Screen LCD TV<br />

Overview:<br />

Bioinformatics merges computer and information science with the study <strong>of</strong> genetic information and<br />

biological structures. Bioinformatics allows researchers to open new windows <strong>of</strong> insight into our genetic<br />

makeup, providing pathways to understanding disease processes and creating novel diagnostic and<br />

treatment strategies. There is an immense and growing need for experts in this field, in order to<br />

capitalize on the growing body o knowledge regarding the genome.<br />

Blackforest Cluster<br />

Location: PKI158B<br />

Director: Mike Grove<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com, James Harr –<br />

jharr@unomaha.edu<br />

Website: http://blackforest.gds.unomaha.edu/<br />

Equipment:<br />

56 IBM Servers<br />

3.2 TB Centralized Storage<br />

-554-


Overview:<br />

The Blackforest Computing Cluster was funded through the National Science Foundation's Biomedical<br />

Research Infrastructure Network, and is located in the College <strong>of</strong> Information Science and Technology at<br />

the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong>. The Blackforest is one <strong>of</strong> four clusters in <strong>Nebraska</strong> funded through<br />

BRIN, each capable <strong>of</strong> utilizing the computational power <strong>of</strong> the others in times <strong>of</strong> need.<br />

Currently the Blackforest Cluster at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> at <strong>Omaha</strong> consists <strong>of</strong> forty nodes, which<br />

run MPICH. MPICH is a freely available, portable implementation <strong>of</strong> MPI, the Standard for messagepassing<br />

libraries. Message passing is a paradigm used widely on certain classes <strong>of</strong> parallel machines<br />

especially those with distributed memory. There is also a proprietary web interface solution we call<br />

"Nazo". This interface allows chemical and biomedical researchers to manage their interaction with the<br />

cluster in a simple, easy to understand manner. All results are stored locally, so that researchers can<br />

retrieve any query/job run in the past. In addition, researchers can apply to house their own custom<br />

BLAST databases on the cluster, for faster searches with near real-time updatability.<br />

Chronoscope<br />

Location: PKI366<br />

Director: Dr. Parvathi Chundi<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Equipment:<br />

3 Dell Desktops<br />

1 IBM Desktop<br />

1 Server(IBM)<br />

Overview:<br />

The objective <strong>of</strong> this project is to extract temporal information by constructing several time<br />

decompositions (time points). Now we are studying the time decomposition problem in the context <strong>of</strong><br />

medical research abstracts. We extract temporal information pertaining to a disease or an organism by<br />

constructing several time decompositions <strong>of</strong> research abstracts and by correlating the meta-information<br />

associated with the abstracts. This experimental study will demonstrate the effectiveness <strong>of</strong> the time<br />

decomposition method on research journal articles in the medical domain.<br />

CMJSP<br />

Website: http://cmjsp.ist.unomaha.edu/<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Overview:<br />

This site is designed to help intermediate and advanced students <strong>of</strong> the Japanese language further<br />

develop their language skills. It works by having the user create lists <strong>of</strong> kanji or words they wish to study<br />

-555-


and then using these lists in review applets. Words can be added to lists by either directly finding words<br />

in the Dictionary, to performing queues on the database to find words that match your criteria. Once<br />

you have a list with all the words you want, go to the Review section to review it.<br />

i3Bio<br />

Website: http://i3bio.gds.unomaha.edu/<br />

Technical Contact: James Harr – jharr@unomaha.edu<br />

Overview:<br />

Advances in medicine such as organ and bone marrow transplantation have increased the number <strong>of</strong><br />

people who are immuno-compromised and susceptible to mycobacterial infections. Mycobacteria in<br />

general and Mycobacterium tuberculosis specifically are known as the great imitators in clinical<br />

medicine because the symptoms that they cause resemble numerous other diseases. The ability to<br />

detect and identify microbial pathogens rapidly for optimal patient management is limited by growthbased<br />

phenotypic testing methods now used in the microbiology laboratory. This limitation is <strong>of</strong> greatest<br />

challenge for the evaluation <strong>of</strong> those pathogens that grow slow, those that require specialized methods<br />

for detection and identification, and for those emerging pathogens that have become more common in<br />

current clinical practice. Organisms commonly associated within this group include, but are not limited<br />

to the Mycobacterium species and fungi.<br />

Cmantic Lab – Collaborative Multi-Agent Networking Technologies and<br />

Intelligent<br />

Location: PKI362<br />

Director: Dr. Raj Dasqupta<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Website: http://prithviraj.dasgupta.googlepages.com/cmanticlabpage<br />

Equipment:<br />

4 Dell Desktops<br />

1 Printer<br />

Overview:<br />

This research lab focuses on the following major topics: multi-agent systems, swarmed robotics and<br />

game theory and computational economics.<br />

Led by Dr. Raj Dasgupta, the research focus for the group is in developing technologies for coordinating<br />

individual resource-constrained components to behave collectively and collaboratively as a single, largescale<br />

distributed system. A major application is controlling a team <strong>of</strong> mobile mini-robots using multiagent<br />

algorithms. The unique contribution <strong>of</strong> this research has been to integrate market-based<br />

techniques for multi-robot coordination with swarm-based techniques for robot control.<br />

We are currently developing technologies for coordinating individual resource-constrained components<br />

-556-


to behave collectively and collaboratively as a single, large-scale distributed system. One <strong>of</strong> our major<br />

applications is controlling a team <strong>of</strong> mobile mini-robots using multi-agent algorithms to collaboratively<br />

perform complex tasks in an unknown environment. The unique contribution <strong>of</strong> our research has been<br />

to integrate market-based techniques for multi-robot coordination with swarm-based techniques for<br />

robot control.<br />

The Collaborative Multi-Agent Networking Technologies and Intelligent Coordination Lab is located at<br />

the Peter Kiewit Institute, Room 362.<br />

Data Mining Lab<br />

Location: PKI158K<br />

Director: Dr. Yong Shi<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Website: http://prithviraj.dasgupta.googlepages.com/cmanticlabpage<br />

Equipment:<br />

9 Dell Desktops<br />

Overview:<br />

The data mining research laboratory was set up by NU foundation to support research and teaching on<br />

data warehousing and data mining, and to allow students, faculty, and industry fellows to conduct<br />

application-oriented projects for analytic customer relationship management (CRM), bioinformatics and<br />

other real-world applications. The multidisciplinary nature <strong>of</strong> these projects means that the laboratory<br />

will significantly enhance the collaboration in the departments <strong>of</strong> IS&T: Computer Science and<br />

Information System and Quantitative Analysis, and between IS&T and other university units, such as the<br />

College <strong>of</strong> Engineering and Technology in the PKI building, the College <strong>of</strong> Business Administration at<br />

UNO, UNMC, and numerous business and industry for joint research and teaching activities in data<br />

mining.<br />

E-learning Lab<br />

Location: PKI357<br />

Director: Dr. Leah Pietron<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Website: http://elearning.ist.unomaha.edu<br />

Equipment:<br />

1 Dell Desktop<br />

1 Mac Desktop<br />

Web cameras<br />

Headsets with voice<br />

-557-


Overview:<br />

The E-Learning Lab is designed for faculty and staff to create classroom material (Videos/Lectures) for<br />

online and distance education.<br />

Group Decision Support Lab<br />

Location: PKI279<br />

Director: Dr. GJ deVreede<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Equipment:<br />

22 Dell Laptops<br />

1 Dell Desktop<br />

3 Projectors<br />

Overview:<br />

The Group Decision Support Lab is an active high-tech meeting room with facilities which enhance faceto-face<br />

meetings in the room, as well as computer-mediated collaborations involving participants<br />

worldwide. The lab contains presentation, display, and communication technologies which enhance the<br />

information exchange for all meeting participants. Research efforts in the Group Decision Support Lab<br />

address meeting facilitation, meeting participation, information exchange, and document collaboration.<br />

MTAP<br />

Website: http://biobase.ist.unomaha.edu<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Overview:<br />

Automated regulatory motif detection is a fundamental problem in molecular biology. Currently, there<br />

are more than 80 different tools for identification <strong>of</strong> cis-regulatory motifs. Consequently, it is extremely<br />

difficult for the molecular biologist to know which tools are effective even on the most simple <strong>of</strong><br />

genomes. A root cause <strong>of</strong> this is a lack <strong>of</strong> good datasets for benchmarking. Recently, Tompa et al. (2005)<br />

proposed a dataset and complementary benchmark for eukaryotes. In this work, we expand upon this<br />

study by introducing a complementary dataset and benchmark for Escherichia coli and Bacillus subtilis.<br />

Using RegulonDB and DBTBS as our true positives, we evaluated sensitivity, specificity and other<br />

important statistics for prokaryote motif detection programs. Even though this domain is less<br />

challenging than eukaryotes, our preliminary data shows that current motif detection programs still fall<br />

short <strong>of</strong> accurate detection <strong>of</strong> regulatory motifs in prokaryotes. We therefore believe that there is still a<br />

great opportunity for improvement in motif discovery methods.<br />

Metaverse Lab – Second Life<br />

-558-


Location: PKI374<br />

Directors: Dr. Khazanchi, Dr. Ilze Zigurs<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Website: http://slurl.com/secondlife/IS&T%20<strong>Nebraska</strong>%20<strong>Omaha</strong>/131/26/37<br />

Equipment:<br />

4 IBM Desktops<br />

1 Dell Desktop<br />

Flat Screen LCD TV<br />

Headsets<br />

Overview:<br />

Metaverses are fully immersive 3-dimensional virtual worlds in which people interact as avatars with<br />

each other and with s<strong>of</strong>tware agents, using the metaphor <strong>of</strong> the real world but without its physical<br />

limitations. The ubiquitous availability <strong>of</strong> high speed Internet access has spurred enormous interest in<br />

virtual worlds like SecondLife and World <strong>of</strong> Warcraft, both in terms <strong>of</strong> user gaming and potential as a<br />

new technological platform for global virtual collaboration. These environments allow for richer, more<br />

engaging collaboration but their capabilities have yet to be studied and explored in depth. The lab was<br />

setup with seed funding from the NU Foundation Tech Fee grant <strong>of</strong> $200,000 with the primary goal to<br />

sustain a cross-disciplinary and collaborative effort that focuses on leveraging virtual world technology<br />

capabilities for facilitating e-learning and conducting research and development in such immersive,<br />

multi-participant 3D environments. Students and faculty in the lab work on creative projects in<br />

collaboration with other UNO colleges while building on research already conducted under the<br />

supervision <strong>of</strong> Drs. Khazanchi and Zigurs over the past year. The overall research goal <strong>of</strong> the lab is to<br />

enhance virtual team and virtual project management practice in the context <strong>of</strong> these new technology<br />

environments.<br />

Multi-Media Lab<br />

Location: PKI375<br />

Technical Contact: Zac Fowler – zfowler@unomaha.edu<br />

Equipment:<br />

10 Dell Desktops<br />

5 Macintosh<br />

Keyboards<br />

Tape Decks<br />

Recording devices<br />

Modeling and Simulation Lab<br />

Location: PKI370<br />

Director: Dr. Mahadevan Subramaniam<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

-559-


Equipment:<br />

4 Dell Desktops<br />

1 Printer<br />

Overview:<br />

The Modeling, Simulation and Automated Inference Center (MOSAIC) conducts collaborative<br />

instruction, research, and development in the areas <strong>of</strong> modeling, simulation, visualization, and<br />

verification <strong>of</strong> complex interdisciplinary applications domains including transportation, public health,<br />

intelligent buildings, web, and financial data studies. The laboratory will address the following research<br />

problems that are cross-cutting across several simulation applications.<br />

<strong>Omaha</strong> Wireless<br />

Website: http://omahawireless.unomaha.edu<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Overview:<br />

<strong>Omaha</strong> Wireless Network is a grassroots effort proposed by a group <strong>of</strong> students at the <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> at <strong>Omaha</strong> to build a wireless Metropolitan Area Network (MAN) in <strong>Omaha</strong>, <strong>Nebraska</strong>, extend<br />

it to the rural areas <strong>of</strong> <strong>Nebraska</strong> and beyond. This is an attempt to provide free, ubiquitous wireless<br />

connectivity to the community. The goal is to build a self-sufficient wireless network that can be used for<br />

various services that may be found on the Internet: web, mail, chat, gaming and resource sharing. Such a<br />

network will not depend on the Internet for content or connectivity. Instead, it can work in conjunction<br />

with the Internet to supplement ways for one to better use connectivity. Users on this wireless network<br />

who wish to share their bandwidth may function as Internet Service Providers (ISPs) and provide access<br />

to the Internet.<br />

Security Technology Evaluation and Analysis Laboratories (STEAL)<br />

Location: PKI350<br />

Director: Dr. Bill Mahoney<br />

Technical Contact: Lucas Wentz – lwentz@unomaha.edu<br />

Equipment:<br />

25 Dell Desktops<br />

Internal, air gapped network<br />

Overview:<br />

The <strong>Nebraska</strong> <strong>University</strong> Consortium on Information Assurance (NUCIA) supports three labs.STEAL One is<br />

designed to be an open laboratory for students to use both for coursework and individual exploration.<br />

The lab is fully configurable, with many different operating systems and application sets to choose from.<br />

-560-


Our goal is to create a flexible environment that can be used to create or simulate any desired computing<br />

capability or environment.<br />

STEAL Two has been designed to be a hands-on instructional laboratory. It has been sized to allow entire<br />

classes (max 28 participants) to collectively engage in academic Information Assurance exercises <strong>of</strong> all<br />

kinds. As with STEAL One, the lab has been designed to be completely flexible, to allow users to simulate<br />

most any type <strong>of</strong> environment imaginable. A set <strong>of</strong> dedicated servers provides backbone services, such<br />

as DNS, DHCP, PXE, TFTP, routing, and the like. Each <strong>of</strong> these services is configurable as well, in order to<br />

allow for more accurate simulations.<br />

STEAL three is a place where NUCIA students, scholars, student workers, Etc congregate and work.<br />

Designed as a lounging area, STEAL 3 generally has a "laid-back" atmosphere where people can relax and<br />

discuss IA topics, get answers to questions from faculty and attend meetings and ad-hoc information<br />

assurance events.<br />

Statpack – (Secure telecommunications application terminal)<br />

Location: PKI364<br />

Technical Contact: Mike Grove – mrgrove@unomaha.edu<br />

Director: Dr. Ann Fruhling<br />

Website: http://statpack.org/<br />

Overview:<br />

The STATPack (Secure Telecommunications Application Terminal) system is an Emergency Response<br />

system for the Public Health Microbiology Laboratories. The STATPack Laboratory is fully equipped to<br />

support this project. The laboratory has 3 client/production computer systems configured for<br />

production support and training, 4 developer work stations for programming and testing, and 3<br />

development servers with version control s<strong>of</strong>tware and server development tools for unit testing,<br />

integration testing and system testing.<br />

Winds Lab – Wireless infrastructure for networks <strong>of</strong> distributed systems<br />

Location: PKI360<br />

Director: Dr. Jong – Hoon Youn<br />

Technical Contact: Mohammad Shafiullah - mshafiullah.ne@gmail.com<br />

Website: http://motes.ist.unomaha.edu<br />

Equipment:<br />

Flat screen LCD TV<br />

5 IBM Desktops<br />

1 Mac Desktop<br />

1 Printer<br />

-561-


Overview:<br />

The Wireless Infrastructure for Networks <strong>of</strong> Distributed Sensors (WINDS) laboratory is specifically<br />

designed to include sensor network testbeds for supporting research activities for the college and other<br />

research groups in <strong>Nebraska</strong>. The main goal <strong>of</strong> the research in this lab is to provide an innovative and<br />

comprehensive research and development program that result in solutions for high-speed wireless data<br />

network connectivity problems in rural as well as urban <strong>Nebraska</strong>. In particular, the following four<br />

objectives have been identified for the lab's research efforts.<br />

Develop a wireless network laboratory with testbeds and a working prototype <strong>of</strong> a highperformance<br />

wireless data network infrastructure for supporting research, education, and<br />

services in wireless sensor networks.<br />

Investigate solutions for a number <strong>of</strong> research problems in wireless sensor networks, which have<br />

inhibited complete utilization <strong>of</strong> high-speed wireless data network technology in critical<br />

applications in agriculture, transportation and bio-security in <strong>Nebraska</strong>.<br />

Employ wireless networks solutions in various real-world applications.<br />

The Wireless Infrastructure for Networks <strong>of</strong> Distributed Sensors (WINDS) Lab is located at the Peter<br />

Kiewit Institute, Room 360.<br />

-562-


College <strong>of</strong> IS&T Websites<br />

The Systems Staff maintains numerous websites that directly support academic and research endeavors<br />

<strong>of</strong> the College. Each website is unique in function, and customized to suit student, faculty, staff, or<br />

project needs.<br />

Community Outreach/Web Development<br />

Website Description Location Contacts<br />

www.ist.unomaha.edu College <strong>of</strong> IS&T Linuxweb Roni Myers<br />

aia.ist.unomaha.edu<br />

Society <strong>of</strong> American Institute <strong>of</strong><br />

Architects - <strong>Omaha</strong> Chapter Job<br />

Shadow<br />

Linuxweb<br />

Roni Myers<br />

Kris Nelson, Leo A<br />

Daly<br />

alumni.ist.unomaha.edu College <strong>of</strong> IS&T Alumni Linuxweb Roni Myers<br />

cmi.unomaha.edu<br />

Juvenile Justice Institute Case<br />

Management Inventory System<br />

Linuxweb Roni Myers<br />

Tomas Helikar<br />

insider.ist.unomaha.edu College <strong>of</strong> IS&T Newsletter Linuxweb Roni Myers<br />

istlive.unomaha.edu IS&T Live Linuxweb Roni Myers<br />

www.lewisandclarkne.org <strong>Nebraska</strong> Lewis and Clark Linuxweb Zac Fowler<br />

Bicentennial Commission<br />

americanhistory.unomaha.edu Teaching American History for<br />

Students<br />

Linuxweb Zac Fowler, Steve<br />

Bullock<br />

tahg.org<br />

Teaching American History<br />

(MOCC)<br />

Linuxweb Zac Fowler, Steve<br />

Bullock<br />

theomahaproject.org Teaching American History (OPS) Linuxweb Zac Fowler, Steve<br />

Bullock<br />

world.unomaha.edu International Studies Website Linuxweb Zac Fowler, Deepak<br />

Khazanchi, Mary<br />

Ellen Turner<br />

lewisclarkandbeyond.com/org/net Lewis, Clark and Beyond Linuxweb Zac Fowler<br />

attic.ist.unomaha.edu IS&T Attic website Linuxweb Zac Fowler<br />

skype.ist.unomaha.edu Skype Trial Blog for IS&T College Linuxweb Zac Fowler<br />

mena.unomaha.edu IS&P MENA Exchange blog Linuxweb Zac Fowler<br />

unmcpda.ist.unomaha.edu<br />

Terrecom.ist.unomaha.edu<br />

UNMC PDA project: mobile SQL<br />

replication service and portal<br />

website<br />

Local company development<br />

website<br />

UNMCPDA<br />

Windows-web<br />

Zac Fowler, Deepak<br />

Khazanchi, Lynne<br />

Buchanan (UNMC)<br />

Roni Myers, Zac<br />

Fowler<br />

-563-


Research/Course Websites<br />

Website Description Location Contacts<br />

http://acm.ist.unomaha.edu<br />

Web server for the UNO ACM<br />

Association <strong>of</strong> Computing<br />

Machinery Chapter<br />

acm<br />

James Harr<br />

Mohammad<br />

Erin Cox<br />

http://biobase.ist.unomaha.edu<br />

https://blackforest.gds.unomaha.edu<br />

http://cmjsp.net<br />

http://gsaf.unmc.edu<br />

http://hive.ist.unomaha.edu<br />

https://jrt.ist.unomaha.edu:9443<br />

http://clab.ist.unomaha.edu<br />

http://gsaf.ist.unomaha.edu<br />

https://klab.ist.unomaha.edu<br />

http://mascot.ist.unomaha.edu/mascot<br />

http://biigserver.ist.unomaha.edu/<br />

http://ccliwiki.ist.unomaha.edu<br />

http://ccli.ist.unomaha.edu<br />

Web server hosting wiki pages<br />

for the Motif Tools<br />

Assessment Project<br />

Blackforest Cluster Web<br />

Interface<br />

Website hosting Chad<br />

Meyer’s Japanese <strong>Study</strong><br />

Program<br />

Gene Sequence Analysis<br />

Facility legacy server at UNMC<br />

hosting the GCG Seqweb<br />

website<br />

Website hosting College <strong>of</strong> IST<br />

Ubuntu, CentOS, and<br />

OpenBSD mirror<br />

IBM Rational Jazz Team<br />

Concert website for Harvey<br />

Siy’s S<strong>of</strong>tware Engineering<br />

course<br />

Public wiki website for CIST<br />

Collaborative Laboratory for<br />

Applied Bioinformatics<br />

Wiki website for the Gene<br />

Sequence Analysis Facility<br />

Internal wiki website for CIST<br />

Collaborative Laboratory for<br />

Applied Bioinformatics<br />

Website hosting the<br />

Bioinformatics tool Mascot<br />

Website hosting home pages<br />

for different Bioinformatics<br />

undergraduate, graduate and<br />

Ph.D. students.<br />

Wiki website for the<br />

Integrated Curriculum for<br />

Bioinformatics project<br />

Website for Integrated<br />

Curriculum for Bioinformatics<br />

project<br />

-564-<br />

biobase<br />

blackforest<br />

reslin<br />

gsaf<br />

hive<br />

jrt<br />

klab<br />

klab<br />

klab<br />

mascot<br />

biigserver<br />

mp1<br />

mp1<br />

Mohammad<br />

Daniel Quest<br />

James Harr<br />

Mohammad<br />

James Harr<br />

Mohammad<br />

Mohammad<br />

James Harr<br />

Mohammad<br />

Dhundy Bastola<br />

Jay Hannah<br />

Mohammad<br />

Dhundy Bastola<br />

Jay Hannah<br />

Mohammad<br />

Dhundy Bastola<br />

Jay Hannah<br />

Mohammad<br />

Mohammad<br />

James<br />

Mohammad<br />

Mark Pauley<br />

Mohammad<br />

Mark Pauley<br />

Mohammad<br />

http://ccli_test.ist.unomaha.edu Development wiki for mp1 Mark Pauley


http://mp1.ist.unomaha.edu/blast<br />

Integrated Curriculum for<br />

Bioinformatics project<br />

Website hosting the<br />

wwwblast bioinformatics tool<br />

mp1<br />

Mohammad<br />

Mark Pauley<br />

Mohammad<br />

http://mp2.ist.unomaha.edu/blast<br />

http://phylogeny.ist.unomaha.edu<br />

https:// rain.ist.unomaha.edu<br />

http://df.ist.unomaha.edu/main/<br />

Another website hosting the<br />

wwwblast bioinformatics tool<br />

Wiki website for<br />

Bioinformatics course by<br />

Dhundy Bastola<br />

Rheumatoid Arthritis<br />

Investigational Network web<br />

server<br />

Website for Knowledge<br />

Engineering and Web<br />

Intelligence project<br />

mp2<br />

phylogeny<br />

rain<br />

df<br />

Mark Pauley<br />

Mohammad<br />

Dhundy Bastola<br />

Mohammad<br />

Abhijeet Maskey<br />

Dhundy Bastola<br />

Mohammad<br />

Bill Mahoney<br />

Haifeng Guo<br />

Qiuming Zhu<br />

Ryan Nickell<br />

Matt Payne<br />

Peter Hospodka<br />

William Sousan<br />

James Harr<br />

Mohammad<br />

-565-


Production/Course Websites<br />

Website Description Location Contacts<br />

itd.ist.unomaha.edu<br />

The Journal <strong>of</strong> Information<br />

Technology for Development<br />

windows-web<br />

criwg.ist.unomaha.edu<br />

accreditation.ist.unomaha.edu<br />

Collaboration Researchers’<br />

International Workshop<br />

windows-web<br />

windows-web<br />

Joseph Hrabak, GJ<br />

deVreede<br />

Joseph Hrabak, GJ<br />

deVreede<br />

Joseph Hrabak, Peter<br />

Wolcott<br />

IS&T ABET Page<br />

windows-web Joseph Hrabak, Jerry<br />

viadesign.ist.unomaha.edu Design & Development<br />

Wagner<br />

faculty.ist.unomaha.edu Faculty pages windows-web Joseph Hrabak<br />

archive.ist.unomaha.edu ISQA Archives windows-web Joseph Hrabak<br />

Joseph Hrabak,<br />

Modeling, Simulation and<br />

Mahadevan<br />

mosaic.ist.unomaha.edu Automated Inference Center windows-web Subramaniam<br />

support.ist.unomaha.edu IS&T Systems and IT Support windows-web Joseph Hrabak<br />

Khazanchi.ist.unomaha.edu Deepak Khazanchi's homepage windows-web Joseph Hrabak<br />

cphi.ist.unomaha.edu<br />

Consortium for Publich Health<br />

Informatics<br />

windows-web<br />

Joseph Hrabak, Ann<br />

Fruhling<br />

cist.ist.unomaha.edu CIST Advisory Committee cistvss<br />

Joseph Hrabak, George<br />

Royce<br />

NWINDS.ist.unomaha.edu<br />

<strong>Nebraska</strong> Wireless Infrastructure<br />

for Networks <strong>of</strong> Distributed<br />

Sensors<br />

windows-web<br />

Mohammad Shafiullah,<br />

Jon Youn<br />

amcis2005.isqa.unomaha.edu AMCIS Conference windows-web<br />

Joseph Hrabak, Peter<br />

Wolcott<br />

gstech.ist.unomaha.edu Student workshop windows-web Joseph Hrabak<br />

sponsorsim.ist.unomaha.edu PM Simulation for Sponsors windows-web<br />

The Institute for Collaboration<br />

ics.ist.unomaha.edu<br />

Science<br />

windows-web<br />

cmit.unomaha.edu<br />

iaads.unomaha.edu<br />

Center for Management <strong>of</strong><br />

Information Technology<br />

International Academy for<br />

Advanced Decision Support<br />

windows-web<br />

windows-web<br />

Joseph Hrabak, Deepak<br />

Khazanchi<br />

Joseph Hrabak, GJ<br />

deVreede<br />

Joseph Hrabak, Deepak<br />

Khazanchi<br />

Joseph Hrabak, Jerry<br />

Wagner<br />

omahawireless.unomaha.edu <strong>Omaha</strong> Wireless Project windows-web Mohammad Shafiullah<br />

dm.ist.unomaha.edu Data Mining windows-web Joseph Hrabak, Yong Shi<br />

msdnaa.ist.unomaha.edu Micros<strong>of</strong>t Academic Alliance windows-web Joseph Hrabak<br />

isqa.unomaha.edu ISQA Departmental Site windows-web<br />

Joseph Hrabak, Paul<br />

VanVliet<br />

Joseph Hrabak, Paul<br />

istis.unomaha.edu Information Technology Council windows-web VanVliet<br />

-566-


secondlife.ist.unomaha.edu Metaverse Project windows-web Roni Myers, John Murphy<br />

misso.unomaha.edu MIS Student Group windows-web Joseph Hrabak<br />

phpmyadmin.ist.unomaha.edu PHP Admin Site windows-web Roni Myers<br />

cisco.ist.unomaha.edu Cisco Networking Course windows-web Joseph Hrabak, Bill Pulte<br />

gatech.ist.unomaha.edu Student workshop windows-web Joseph Hrabak<br />

sigitpm.ist.unomaha.edu<br />

Special Interest Group for<br />

Information Technology Project<br />

Management<br />

windows-web<br />

Joseph Hrabak, Deepak<br />

Khazanchi<br />

-567-<br />

Joseph Hrabak, Deepak<br />

Khazanchi<br />

cmit_mutual.ist.unomaha.edu Project Management windows-web<br />

cbctech.ist.unomaha.edu Summer Camp windows-web Roni Myers<br />

<strong>Nebraska</strong> Health Information<br />

nhip.ist.unomaha.edu<br />

Project<br />

windows-web<br />

divtech.ist.unomaha.edu Summer Camp windows-web Roni Myers<br />

Joseph Hrabak, Ann<br />

Fruhling<br />

mosaic.unomaha.edu Global Diffusion <strong>of</strong> the Internet windows-web<br />

Joseph Hrabak, Peter<br />

Wolcott<br />

mymail.ist.unomaha.edu CIST Exchange Email exchange Joseph Hrabak<br />

nucia.unomaha.edu NUCIA homepage helm Lucas Wentz<br />

pietron.ist.unomaha.edu Leah Pietron Course Site cistvss Joseph Hrabak<br />

Redirect for<br />

ist.unomaha.edu - manage www.ist.unomaha.edu manage Joseph Hrabak<br />

Redirect for<br />

ist.unomaha.edu - metis www.ist.unomaha.edu metis Joseph Hrabak<br />

systems.ist.unomaha.edu Systems Office Portal ssp Joseph Hrabak<br />

vulcan.ist.unomaha.edu Vulcan Server Help/FAQ vulcan<br />

sharepointdev.ist.unomaha.edu<br />

Sharepoint Portal / wolcott's<br />

class??<br />

azureus<br />

groyce.ist.unomaha.edu Groyce Sharepoint Portal azureus<br />

James Harr, Joseph<br />

Hrabak<br />

Joseph Hrabak, Peter<br />

Wolcott<br />

Joseph Hrabak, George<br />

Royce<br />

blizzard.ist.unomaha.edu Web Dev Class Server Info Page blizzard<br />

Bob Fulkerson, Joseph<br />

Hrabak<br />

elearning.ist.unomaha.edu<br />

CIST Online Class Multimedia<br />

Server elearnining Joseph Hrabak<br />

teamnet.ist.unomaha.edu Teamnet teamnet Azad, Joseph Hrabak<br />

pattern Tool for Deepak padev<br />

Joseph Hrabak, Pujak<br />

Arora<br />

Capstone Course Sharepoint<br />

Joseph Hrabak, Ann<br />

portal8950.ist.unomaha.edu<br />

portal8950b.ist.unomaha.edu<br />

squishy.ist.unomaha.edu<br />

Portal<br />

Capstone Course Sharepoint<br />

Portal<br />

Resource Site for Bob's Web<br />

Programming Class<br />

portal8950<br />

portal8950<br />

blizzard<br />

Fruhling<br />

Joseph Hrabak, Ann<br />

Fruhling<br />

Bob Fulkerson, Joseph<br />

Hrabak


Executive Memorandum No. 16<br />

Policy for Responsible Use <strong>of</strong> <strong>University</strong> Computers and Information Systems<br />

OFFICE OF THE PRESIDENT Executive Memorandum No. 16<br />

1. Purpose<br />

It is the purpose <strong>of</strong> this Executive Memorandum to set forth the <strong>University</strong>'s administrative policy and<br />

provide guidance relating to responsible use <strong>of</strong> the <strong>University</strong>'s electronic information systems.<br />

2. General<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> strives to maintain access for its faculty, staff, students, administrators and<br />

Regents (the "users") to local, national and international sources <strong>of</strong> information and to provide an<br />

atmosphere that encourages sharing <strong>of</strong> knowledge, the creative process and collaborative efforts within<br />

the <strong>University</strong>'s educational, research and public service missions. Access to electronic information<br />

systems at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> is a privilege, not a right, and must be treated as such by all users<br />

<strong>of</strong> these systems. All users must act honestly and responsibly. Every user is responsible for the integrity<br />

<strong>of</strong> these information resources. All users must respect the rights <strong>of</strong> other computer users, respect the<br />

integrity <strong>of</strong> the physical facilities and controls, and respect all pertinent license and contractual<br />

agreements related to <strong>University</strong> information systems. All users shall act in accordance with these<br />

responsibilities, and the relevant local, state and federal laws and regulations. Failure to so conduct<br />

oneself in compliance with this Policy may result in denial <strong>of</strong> access to <strong>University</strong> information systems or<br />

other disciplinary action.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> is a provider <strong>of</strong> a means to access the vast and growing amount <strong>of</strong><br />

information available through electronic information resources. The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> is not a<br />

regulator <strong>of</strong> the content <strong>of</strong> that information and takes no responsibility for the content <strong>of</strong> information,<br />

except for that information the <strong>University</strong> itself and those acting on its behalf create. Any persons<br />

accessing information through the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> information systems must determine for<br />

themselves and their charges whether any source is appropriate for viewing.<br />

Accepting any account and/or using the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>'s information systems shall constitute an<br />

agreement on behalf <strong>of</strong> the user or other individual accessing such information systems to abide and be<br />

bound by the provisions <strong>of</strong> this Policy. The <strong>University</strong> may restrict or prohibit the use <strong>of</strong> its information<br />

systems in response to complaints presenting evidence <strong>of</strong> violations <strong>of</strong> <strong>University</strong> policies or state or<br />

federal laws. When it has been determined that there has been a violation, the <strong>University</strong> may restrict<br />

or prohibit access by an <strong>of</strong>fending party to its information systems through <strong>University</strong>-owned or other<br />

computers, remove or limit access to material posted on <strong>University</strong>-owned computers or networks, and,<br />

if warranted, institute other disciplinary action.<br />

3. Definitions<br />

For purposes <strong>of</strong> this policy the following definitions shall apply:<br />

a. Electronic communications shall mean and include the use <strong>of</strong> information systems in the<br />

communicating or posting <strong>of</strong> information or material by way <strong>of</strong> electronic mail, bulletin boards,<br />

-568-


World Wide Web (internet), or other such electronic tools.<br />

b. Information systems shall mean and include computers, networks, servers and other similar devices<br />

that are administered by the <strong>University</strong> and for which the <strong>University</strong> is responsible. "Networks" shall<br />

mean and include video, voice and data networks, routers and storage devices.<br />

c. Obscene with respect to obscene material shall mean (1) that an average person applying<br />

contemporary community standards would find the material taken as a whole predominantly appeals to<br />

the prurient interest or a shameful or morbid interest in nudity, sex, or excretion, (2) the material<br />

depicts or describes in a patently <strong>of</strong>fensive way sexual conduct specifically set out in Neb. Rev. Stat. §§<br />

28-807 to 28-809, as amended, and (3) the material taken as a whole lacks serious literary, artistic,<br />

political, or scientific value.<br />

4. Permitted Uses<br />

<strong>University</strong> Business Use and Limited Personal Use.<br />

<strong>University</strong> information systems are to be used predominately for <strong>University</strong>-related business. However,<br />

personal use is permitted so long as it conforms with this Policy and does not interfere with <strong>University</strong><br />

operations or an employee user's performance <strong>of</strong> duties as a <strong>University</strong> employee. As with permitted<br />

personal use <strong>of</strong> telephones for local calls, limited personal use <strong>of</strong> information systems does not<br />

ordinarily result in additional costs to the <strong>University</strong> and may actually result in increased efficiencies.<br />

Personal use <strong>of</strong> any <strong>University</strong> information system to access, download, print, store, forward, transmit<br />

or distribute obscene material is prohibited. UNDER ALL CIRCUMSTANCES, PERSONAL USE BY<br />

EMPLOYEES MUST COMPLY WITH SUBSECTION b. OF THIS SECTION AND SHALL NOT CONFLICT WITH AN<br />

EMPLOYEE'S PERFORMANCE OF DUTIES AND RESPONSIBILITIES FOR THE UNIVERSITY. Personal use may<br />

be denied when such use requires an inordinate amount <strong>of</strong> information systems resources (e.g. storage<br />

capacity).<br />

Prior Approval Required for Personal Use for Outside Consulting, Business or Employment.<br />

Personal use <strong>of</strong> <strong>University</strong> information systems resources or equipment by any user for personal<br />

financial gain in connection with outside (non-<strong>University</strong>) consulting, business or employment is<br />

prohibited, except as authorized for employees by Section 3.4.5 <strong>of</strong> the Bylaws <strong>of</strong> the Board <strong>of</strong> Regents.<br />

Employee personal use in conjunction with outside pr<strong>of</strong>essional consulting, business or employment<br />

activities is permitted only when such use has been expressly authorized and approved by the <strong>University</strong><br />

Administration or the Board <strong>of</strong> Regents, as appropriate, in accordance with the requirements <strong>of</strong> said<br />

Section 3.4.5 <strong>of</strong> the Bylaws.<br />

5. Access<br />

Unauthorized access to information systems is prohibited. No one should use the ID or password <strong>of</strong><br />

another; nor should anyone provide his or her ID or password to another, except in the cases necessary<br />

to facilitate computer maintenance and repairs. When any user terminates his or her relation with the<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>, his or her ID and password shall be denied further access to <strong>University</strong><br />

computing resources.<br />

6. Misuse <strong>of</strong> Computers and Network Systems<br />

Misuse <strong>of</strong> <strong>University</strong> information systems is prohibited. Misuse includes the following:<br />

Attempting to modify or remove computer equipment, s<strong>of</strong>tware, or peripherals without proper<br />

authorization.<br />

-569-


Accessing without proper authorization computers, s<strong>of</strong>tware, information or networks to which the<br />

<strong>University</strong> belongs, regardless <strong>of</strong> whether the resource accessed is owned by the <strong>University</strong> or the abuse<br />

takes place from a non-<strong>University</strong> site.<br />

c. Taking actions, without authorization, which interfere with the access <strong>of</strong> others to information<br />

systems.<br />

d. Circumventing logon or other security measures.<br />

e. Using information systems for any illegal or unauthorized purpose.<br />

f. Personal use <strong>of</strong> information systems or electronic communications for non-<strong>University</strong> consulting,<br />

business or employment, except as expressly authorized pursuant to Section 3.4.5 <strong>of</strong> the Bylaws <strong>of</strong> the<br />

Board <strong>of</strong> Regents.<br />

g. Sending any fraudulent electronic communication.<br />

h. Violating any s<strong>of</strong>tware license or copyright, including copying or redistributing copyrighted s<strong>of</strong>tware,<br />

without the written authorization <strong>of</strong> the s<strong>of</strong>tware owner.<br />

i. Using electronic communications to violate the property rights <strong>of</strong> authors and copyright owners. (Be<br />

especially aware <strong>of</strong> potential copyright infringement through the use <strong>of</strong> e-mail. See the provisions under<br />

"E-Mail" contained in this Policy.)<br />

j. Using electronic communications to harass or threaten users in such a way as to create an atmosphere<br />

which unreasonably interferes with the education or the employment experience. Similarly, electronic<br />

communications shall not be used to harass or threaten other information recipients, in addition to<br />

<strong>University</strong> users.<br />

k. Using electronic communications to disclose proprietary information without the explicit permission<br />

<strong>of</strong> the owner.<br />

l. Reading other users' information or files without permission.<br />

m. Academic dishonesty.<br />

n. Forging, fraudulently altering or falsifying, or otherwise misusing <strong>University</strong> or non-<strong>University</strong> records<br />

(including computerized records, permits, identification cards, or other documents or property).<br />

o. Using electronic communications to hoard, damage, or otherwise interfere with academic resources<br />

available electronically.<br />

p. Using electronic communications to steal another individual's works, or otherwise misrepresent one's<br />

own work.<br />

q. Using electronic communications to fabricate research data.<br />

r. Launching a computer worm, computer virus or other rogue program.<br />

s. Downloading or posting illegal, proprietary or damaging material to a <strong>University</strong> computer.<br />

t. Transporting illegal, proprietary or damaging material across a <strong>University</strong> network.<br />

u. Personal use <strong>of</strong> any <strong>University</strong> information system to access, download, print, store, forward, transmit<br />

or distribute obscene material.<br />

v. Violating any state or federal law or regulation in connection with use <strong>of</strong> any information system.<br />

7. Privacy<br />

a. User Privacy Not Guaranteed. When <strong>University</strong> information systems are functioning properly, a user<br />

can expect the files and data he or she generates to be private information, unless the creator <strong>of</strong> the file<br />

or data takes action to reveal it to others. Users should be aware, however, that no information system<br />

is completely secure. Persons both within and outside <strong>of</strong> the <strong>University</strong> may find ways to access files.<br />

ACCORDINGLY, THE UNIVERSITY CANNOT AND DOES NOT GUARANTEE USER PRIVACY and users should<br />

be continuously aware <strong>of</strong> this fact.<br />

-570-


. Repair and Maintenance <strong>of</strong> Equipment. Users should be aware that on occasion duly authorized<br />

<strong>University</strong> information systems technological personnel have authority to access individual user files or<br />

data in the process <strong>of</strong> performing repair or maintenance <strong>of</strong> computing equipment the <strong>University</strong> deems<br />

is reasonably necessary, including the testing <strong>of</strong> systems in order to ensure adequate storage capacity<br />

and performance for <strong>University</strong> needs. Information systems technological personnel performing repair<br />

or maintenance <strong>of</strong> computing equipment are prohibited by law from exceeding their authority <strong>of</strong> access<br />

for repair and maintenance purposes or from making any use <strong>of</strong> individual user files or data for any<br />

purpose other than repair or maintenance services performed by them.<br />

c. Response to a Public Records Request, Administrative or Judicial Order or Request for Discovery in the<br />

Course <strong>of</strong> Litigation. Users should be aware that the <strong>Nebraska</strong> public records statutes are very broad in<br />

their application. Certain records, such as unpublished research in progress, proprietary information,<br />

personal information in personnel and student records are protected from disclosure. However, most<br />

other <strong>University</strong> records contained in electronic form require disclosure if a public record request is<br />

made. Users should remember this when creating any electronic information, especially e-mail. Also,<br />

users should be aware that the <strong>University</strong> will comply with any lawful administrative or judicial order<br />

requiring the production <strong>of</strong> electronic files or data stored in the <strong>University</strong>'s information systems, and<br />

will provide information in electronic files or data stored in the <strong>University</strong>'s information systems in<br />

response to legitimate requests for discovery <strong>of</strong> evidence in litigation in which the <strong>University</strong> is involved.<br />

d. Response to Misuse <strong>of</strong> Computers and Network Systems. When for reasonable cause, as such cause<br />

may be determined by the Office <strong>of</strong> the Vice President and General Counsel, it is believed that an act <strong>of</strong><br />

misuse as defined in section 6 above has occurred, then the chief information services <strong>of</strong>ficer serving<br />

Central Administration or serving the relevant campus may access any account, file or other data<br />

controlled by the alleged violator and share such account information, file or other data with those<br />

persons authorized to investigate and implement sanctions in association with the misuse <strong>of</strong> the<br />

<strong>University</strong>'s computer and information systems. Should any <strong>of</strong> the chief information service <strong>of</strong>ficers<br />

reasonably believe that a misuse is present or imminent such that the potential for damage to the<br />

system or the information stored within it, is genuine and serious (e.g. hacking, spamming or theft), then<br />

the chief information <strong>of</strong>ficer may take such action as is necessary to protect the information system and<br />

the information stored in it, including the denial <strong>of</strong> access to any <strong>University</strong> or non-<strong>University</strong> user,<br />

without a determination from the Office <strong>of</strong> the Vice President and General Counsel regarding<br />

reasonable cause; provided however, that the chief information <strong>of</strong>ficer shall contact the Office <strong>of</strong> the<br />

Vice President and General Counsel as soon as possible to confirm that any protective actions taken<br />

were appropriate and within the parameters <strong>of</strong> this executive memorandum. Executive Memorandum No. 16<br />

-571-


e. Access to Information Concerning Business Operations. Employees regularly carry out the business<br />

functions <strong>of</strong> the <strong>University</strong> using the <strong>University</strong>'s information systems. business records, inquiries and<br />

correspondence are <strong>of</strong>ten stored such that individuals may control the access to particular information<br />

stored within the <strong>University</strong>'s information system. Should any employee become unavailable, be<br />

incapacitated due to illness or other reasons, or refuse to provide the information necessary to carry out<br />

the employee's job responsibilities in a reasonably timely manner, then following consultation with and<br />

approval by the Office <strong>of</strong> the Vice President and General Counsel, the chief information <strong>of</strong>ficer <strong>of</strong> Central<br />

Administration or <strong>of</strong> the relevant campus may access the employee's records in order to carry out<br />

<strong>University</strong> business operations on behalf <strong>of</strong> the unavailable or uncooperative employee.<br />

8. E-mail<br />

a. Applicability. ALL POLICIES STATED HEREIN ARE APPLICABLE TO E-MAIL. E-mail should reflect careful,<br />

pr<strong>of</strong>essional and courteous drafting-particularly since it is easily forwarded to others. Never assume that<br />

only the addressee will read your e-mail. Be careful about attachments and broad publication messages.<br />

Copyright laws and license agreements also apply to e-mail.<br />

b. E-mail Retention. E-mail messages should be deleted once the information contained in them is no<br />

longer useful. When e-mail communications are sent, the e-mail information is stored in one or more<br />

backup files for the purposes <strong>of</strong> "disaster recovery", i.e. inadvertent or mistaken deletions, system<br />

failures. In order to provide for the recovery <strong>of</strong> deleted e-mail, while maintaining efficient use <strong>of</strong> storage<br />

capabilities, e-mail information on backup files shall be retained for a period <strong>of</strong> time not to exceed seven<br />

days.<br />

9. Web Pages<br />

The Central Administration and each <strong>University</strong> campus may establish standards for those Web Pages<br />

considered to be "<strong>of</strong>ficial" pages <strong>of</strong> the <strong>University</strong>. All <strong>of</strong>ficial Web Pages shall contain the administrative<br />

unit's logo in the header and footer in order to identify it as an <strong>of</strong>ficial <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> Web Page.<br />

No other Web Pages shall be allowed to use <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> logos without the express<br />

permission <strong>of</strong> the <strong>University</strong>.<br />

Originators <strong>of</strong> all Web Pages using information systems associated with the <strong>University</strong> shall comply with<br />

<strong>University</strong> policies and are responsible for complying with all federal, state and local laws and<br />

regulations, including copyright laws, obscenity laws, laws relating to libel, slander and defamation, and<br />

laws relating to piracy <strong>of</strong> s<strong>of</strong>tware.<br />

The persons creating a Web Page are responsible for the accuracy <strong>of</strong> the information contained in the<br />

Web Page. Content should be reviewed on a timely basis to assure continued accuracy. Web Pages<br />

should include a phone number or e-mail address <strong>of</strong> the person to whom questions/comments may be<br />

addressed, as well as the most recent revision date.<br />

10. Notification<br />

This Policy shall be published in all employee and faculty handbooks and student catalogs, and placed on<br />

the World Wide Web in order to fully notify users <strong>of</strong> its existence.<br />

11. Application and Enforcement<br />

-572-


This Policy applies to all administrative units <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong>. The Central Administration<br />

and each <strong>University</strong> campus is encouraged to provide supplemental policy guidance, consistent with this<br />

Policy, designed to implement the provisions herein.<br />

Each <strong>University</strong> campus shall be responsible for enforcing this Policy in a manner best suited to its own<br />

organization. It is expected that enforcement will require cooperation between such departments as<br />

computer systems administration, human resources, affirmative action, academic affairs and student<br />

affairs. Prior to any denial <strong>of</strong> access or other disciplinary action, a user shall be provided with such due<br />

process as may be recommended by the <strong>University</strong>'s Office <strong>of</strong> the General Counsel.<br />

Reference: August 28, 2001<br />

-573-


IS&T Systems Policies, Procedures, and Guidelines for<br />

Technology Usage<br />

**All policies and guidelines are for internal usage only, and act as an extension <strong>of</strong> and remain<br />

subordinate to Executive Memorandum 16<br />

Guidelines on Anti-Virus Processes<br />

Recommended processes to prevent virus problems:<br />

Always run the standard, supported anti-virus (McAfee) s<strong>of</strong>tware is available from the download<br />

site. Download and run the current version; download and install anti-virus s<strong>of</strong>tware updates as<br />

they become available.<br />

NEVER open any files or macros attached to an email from an unknown, suspicious or<br />

untrustworthy source. Delete these attachments immediately, then "double delete" them by<br />

emptying your Trash.<br />

Delete spam, chain, and other junk email without forwarding, in accordance with the<br />

<strong>University</strong>'s Computer Usage Policy .<br />

Never download files from unknown or suspicious sources.<br />

Avoid direct disk sharing with read/write access unless there is absolutely a business<br />

requirement to do so.<br />

Always scan a media (floppy disks, CD-ROMs, DVD-ROMs, USB devices) from an unknown source<br />

for viruses before using it.<br />

Back-up critical data and system configurations on a regular basis and store the data in a safe<br />

place.<br />

If lab testing conflicts with anti-virus s<strong>of</strong>tware, run the anti-virus utility to ensure a clean<br />

machine, disable the s<strong>of</strong>tware, and then run the lab test. After the lab test, enable the anti-virus<br />

s<strong>of</strong>tware. When the anti-virus s<strong>of</strong>tware is disabled, do not run any applications that could<br />

transfer a virus, e.g., email or file sharing.<br />

New viruses are discovered almost every day. Periodically check your anti-virus s<strong>of</strong>tware for<br />

updates.<br />

-574-


Automatically Forwarded Email Policy<br />

1.0 Purpose<br />

To prevent the unauthorized or inadvertent disclosure <strong>of</strong> sensitive company information.<br />

2.0 Scope<br />

This policy covers automatic email forwarding, and thereby the potentially inadvertent transmission <strong>of</strong><br />

sensitive information by all employees, vendors, and agents operating on behalf <strong>of</strong> the College <strong>of</strong><br />

Information Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>.<br />

3.0 Policy<br />

Employees must exercise utmost caution when sending any email from inside the College <strong>of</strong> Information<br />

Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> to an outside network. Unless approved<br />

by an employee's manager, email will not be automatically forwarded to an external destination.<br />

Sensitive information, as defined in the Information Sensitivity Policy, will not be forwarded via any<br />

means, unless that email is critical to business and is encrypted.<br />

4.0 Definitions<br />

Terms<br />

Email<br />

SMTP.<br />

Forwarded email<br />

Definitions<br />

The electronic transmission <strong>of</strong> information through a mail protocol such as<br />

Programs such as Eudora and Micros<strong>of</strong>t Outlook use SMTP.<br />

Email resent from internal networking to an outside point.<br />

Sensitive information Information is considered sensitive if it can be damaging to the College <strong>of</strong><br />

Information Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> or its reputation or standing.<br />

Unauthorized Disclosure The intentional or unintentional revealing <strong>of</strong> restricted information to<br />

people who do not have a need to know that information.<br />

-575-


Database Password Policy<br />

1.0 Purpose<br />

This policy states the requirements for securely storing and retrieving database usernames and<br />

passwords (i.e., database credentials) for use by a program that will access a database running on one <strong>of</strong><br />

the College <strong>of</strong> Information Science and Technology at the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>’s networks.<br />

Computer programs running on the College <strong>of</strong> Information Science and Technology at the <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> <strong>Omaha</strong>'s networks <strong>of</strong>ten require the use <strong>of</strong> one <strong>of</strong> the many internal database servers. In<br />

order to access one <strong>of</strong> these databases, a program must authenticate to the database by presenting<br />

acceptable credentials. The database privileges that the credentials are meant to restrict can be<br />

compromised when the credentials are improperly stored.<br />

2.0 Scope<br />

This policy applies to all s<strong>of</strong>tware that will access a College <strong>of</strong> Information Science and Technology at the<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> multi-user production database.<br />

3.0 Policy<br />

3.1 General<br />

In order to maintain the security <strong>of</strong> the College <strong>of</strong> Information Science and Technology at the <strong>University</strong><br />

<strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>'s internal databases, access by s<strong>of</strong>tware programs must be granted only after<br />

authentication with credentials. The credentials used for this authentication must not reside in the<br />

main, executing body <strong>of</strong> the program's source code in clear text. Database credentials must not be<br />

stored in a location that can be accessed through a web server.<br />

3.2 Specific Requirements<br />

3.2.1. Storage <strong>of</strong> Data Base User Names and Passwords<br />

Database user names and passwords may be stored in a file separate from the executing body <strong>of</strong><br />

the program's code. This file must not be world readable.<br />

Database credentials may reside on the database server. In this case, a hash number identifying<br />

the credentials may be stored in the executing body <strong>of</strong> the program's code.<br />

Database credentials may be stored as part <strong>of</strong> an authentication server (i.e., an entitlement<br />

directory), such as an LDAP server used for user authentication. Database authentication may<br />

occur on behalf <strong>of</strong> a program as part <strong>of</strong> the user authentication process at the authentication<br />

server. In this case, there is no need for programmatic use <strong>of</strong> database credentials.<br />

Database credentials may not reside in the documents tree <strong>of</strong> a web server.<br />

Pass through authentication (i.e., Oracle OPS$ authentication) must not allow access to the<br />

database based solely upon a remote user's authentication on the remote host.<br />

Passwords or pass phrases used to access a database must adhere to the Password Policy.<br />

3.2.2. Retrieval <strong>of</strong> Database User Names and Passwords<br />

If stored in a file that is not source code, then database user names and passwords must be read<br />

from the file immediately prior to use. Immediately following database authentication, the<br />

memory containing the user name and password must be released or cleared.<br />

-576-


The scope into which you may store database credentials must be physically separated from the<br />

other areas <strong>of</strong> your code, e.g., the credentials must be in a separate source file. The file that<br />

contains the credentials must contain no other code but the credentials (i.e., the user name and<br />

password) and any functions, routines, or methods that will be used to access the credentials.<br />

For languages that execute from source code, the credentials' source file must not reside in the<br />

same browse able or executable file directory tree in which the executing body <strong>of</strong> code resides.<br />

3. Access to Database User Names and Passwords<br />

Every program or every collection <strong>of</strong> programs implementing a single business function must<br />

have unique database credentials. Sharing <strong>of</strong> credentials between programs is not allowed.<br />

Database passwords used by programs are system-level passwords as defined by the Password<br />

Policy.<br />

Developer groups must have a process in place to ensure that database passwords are<br />

controlled and changed in accordance with the Password Policy. This process must include a<br />

method for restricting knowledge <strong>of</strong> database passwords to a need-to-know basis.<br />

4.0 Definitions<br />

Term<br />

Definition<br />

Computer language A language used to generate programs.<br />

Credentials<br />

Something you know (e.g., a password or pass phrase), and/or something that<br />

identifies you (e.g., a user name, a fingerprint, voiceprint, retina print). Something you know and<br />

something that identifies you are presented for authentication.<br />

Entitlement<br />

The level <strong>of</strong> privilege that has been authenticated and authorized. The privileges<br />

level at which to access resources.<br />

Executing body<br />

program.<br />

Hash<br />

The series <strong>of</strong> computer instructions that the computer executes to run a<br />

An algorithmically generated number that identifies a datum or its location.<br />

LDAP<br />

Lightweight Directory Access Protocol, a set <strong>of</strong> protocols for accessing<br />

information directories.<br />

Module<br />

A collection <strong>of</strong> computer language instructions grouped together either logically<br />

or physically. A module may also be called a package or a class, depending upon which computer<br />

language is used.<br />

Name space<br />

A logical area <strong>of</strong> code in which the declared symbolic names are known and<br />

outside <strong>of</strong> which these names are not visible.<br />

Production<br />

implemented or tested.<br />

Ethics Policy<br />

S<strong>of</strong>tware that is being used for a purpose other than when s<strong>of</strong>tware is being<br />

-577-


1. Overview<br />

The College <strong>of</strong> Information Science and Technology systems staff at the <strong>University</strong> <strong>of</strong><br />

<strong>Nebraska</strong> <strong>Omaha</strong>’s purpose for this ethics policy is to establish a culture <strong>of</strong> openness, trust<br />

and integrity in business practices. Effective ethics is a team effort involving the<br />

participation and support <strong>of</strong> every systems employee. All employees should familiarize<br />

themselves with the ethics guidelines that follow this introduction.<br />

The systems staff is committed to protecting employees, partners, vendors and the company<br />

from illegal or damaging actions by individuals, either knowingly or unknowingly. When the<br />

systems staff addresses issues proactively and uses correct judgment, it will help set us apart<br />

from competitors.<br />

The College <strong>of</strong> Information Science and Technology will not tolerate any wrongdoing or<br />

impropriety at anytime. We will take the appropriate measures act quickly in correcting the<br />

issue if the ethical code is broken. Any infractions <strong>of</strong> this code <strong>of</strong> ethics will not be tolerated.<br />

2. Purpose<br />

Our purpose for authoring a publication on ethics is to emphasize the employee’s and<br />

consumer’s expectation to be treated to fair business practices. This policy will serve to<br />

guide business behavior to ensure ethical conduct.<br />

3. Scope<br />

This policy applies to employees, contractors, consultants, temporaries, and other workers at<br />

College <strong>of</strong> Information Science and Technology systems staff, including all personnel<br />

affiliated with third parties.<br />

4. Policy<br />

4.1. Executive Commitment to Ethics<br />

4.1.1. Managers within College <strong>of</strong> Information Science and Technology systems staff<br />

must set a prime example. In any business practice, honesty and integrity must be<br />

top priority for executives.<br />

4.1.2. Executives must have an open door policy and welcome suggestions and concerns<br />

from employees. This will allow employees to feel comfortable discussing any<br />

issues and will alert executives to concerns within the work force.<br />

4.1.3. Executives must disclose any conflict <strong>of</strong> interests regard their position within<br />

College <strong>of</strong> Information Science and Technology.<br />

4.2. Employee Commitment to Ethics<br />

4.2.1. The College <strong>of</strong> Information Science and Technology systems employees will treat<br />

everyone fairly, have mutual respect, promote a team environment and avoid the<br />

intent and appearance <strong>of</strong> unethical or compromising practices.<br />

4.2.2. Every employee needs to apply effort and intelligence in maintaining ethics value.<br />

4.2.3. Employees must disclose any conflict <strong>of</strong> interests regard their position within the<br />

College <strong>of</strong> Information Science and Technology.<br />

4.2.4. Employees will help to increase customer and vendor satisfaction by providing<br />

quality product s and timely response to inquiries.<br />

4.3. Company Awareness<br />

-578-


4.3.1. Promotion <strong>of</strong> ethical conduct within interpersonal communications <strong>of</strong> employees<br />

will be rewarded.<br />

4.3.2. The College <strong>of</strong> Information Science and Technology systems staff will promote a<br />

trustworthy and honest atmosphere to reinforce the vision <strong>of</strong> ethics within the<br />

organization.<br />

4.4. Maintaining Ethical Practices<br />

4.4.1. The College <strong>of</strong> Information Science and Technology systems staff will reinforce<br />

the importance <strong>of</strong> the integrity message and the tone will start at the top. Every<br />

employee, manager, director needs consistently maintain an ethical stance and<br />

support ethical behavior.<br />

4.4.2. Systems employees should encourage open dialogue, get honest feedback and<br />

treat everyone fairly, with honesty and objectivity.<br />

4.4.3. College <strong>of</strong> Information Science and Technology systems staff has established a<br />

best practice disclosure committee to make sure the ethical code is delivered to all<br />

employees and that concerns regarding the code can be addressed.<br />

4.5. Unethical Behavior<br />

4.5.1. Systems employees will avoid the intent and appearance <strong>of</strong> unethical or<br />

compromising practice in relationships, actions and communications.<br />

4.5.2. Harassment or discrimination will not be tolerated.<br />

4.5.3. Unauthorized use <strong>of</strong> company trade secrets & marketing, operational, personnel,<br />

financial, source code, & technical information integral to the success <strong>of</strong> our<br />

organization will not be tolerated.<br />

4.5.4. College <strong>of</strong> Information Science and Technology will not permit impropriety at any<br />

time and we will act ethically and responsibly in accordance with laws.<br />

4.5.5. Systems employees will not use organizational assets or business relationships for<br />

personal use or gain.<br />

-579-


Extranet Policy<br />

1.0 Purpose<br />

This document describes the policy under which third party organizations connect to College <strong>of</strong><br />

Information Science and Technology networks for the purpose <strong>of</strong> transacting business related to the<br />

College <strong>of</strong> Information Science and Technology.<br />

2.0 Scope<br />

Connections between third parties that require access to non-public College <strong>of</strong> Information Science and<br />

Technology resources fall under this policy, regardless <strong>of</strong> whether a Telco circuit (such as frame relay or<br />

ISDN) or VPN technology is used for the connection. Connectivity to third parties such as the Internet<br />

Service Providers (ISPs) that provide Internet access for the College <strong>of</strong> Information Science and<br />

Technology or to the Public Switched Telephone Network does NOT fall under this policy.<br />

3.0 Policy<br />

3.1 Pre-Requisites<br />

3.1.1 Security Review<br />

All new extranet connectivity will go through a security review with the College <strong>of</strong> Information Science<br />

and Technology’s system staff. The reviews are to ensure that all access matches the business<br />

requirements in a best possible way, and that the principle <strong>of</strong> least access is followed.<br />

3.1.2 Third Party Connection Agreement<br />

All new connection requests between third parties and the College <strong>of</strong> Information Science and<br />

Technology require that the third party and the College <strong>of</strong> Information Science and Technology<br />

representatives agree to and sign the Third Party Agreement. This agreement must be signed by<br />

management <strong>of</strong> the Sponsoring Organization as well as a representative from the third party who is<br />

legally empowered to sign on behalf <strong>of</strong> the third party. The signed document is to be kept on file with<br />

the relevant extranet group. Documents pertaining to connections into College <strong>of</strong> Information Science<br />

and Technology labs are to be kept on file with the College <strong>of</strong> Information Science and Technology’s<br />

systems staff.<br />

3.1.3 Business Case<br />

All production extranet connections must be accompanied by a valid business justification, in writing,<br />

that is approved by a project manager in the extranet group. Lab connections must be approved by the<br />

College <strong>of</strong> Information Science and Technology. Typically this function is handled as part <strong>of</strong> the Third<br />

Party Agreement.<br />

3.1.4 Point Of Contact<br />

The Sponsoring Organization must designate a person to be the Point <strong>of</strong> Contact (POC) for the extranet<br />

connection. The POC acts on behalf <strong>of</strong> the Sponsoring Organization, and is responsible for those portions<br />

<strong>of</strong> this policy and the Third Party Agreement that pertain to it. In the event that the POC changes, the<br />

relevant extranet Organization must be informed promptly.<br />

3.2 Establishing Connectivity<br />

-580-


Sponsoring Organizations within the College <strong>of</strong> Information Science and Technology that wish to<br />

establish connectivity to a third party are to file a new site request with the proper extranet group. The<br />

extranet group will engage College <strong>of</strong> Information Science and Technology systems staff to address<br />

security issues inherent in the project. The Sponsoring Organization must provide full and complete<br />

information as to the nature <strong>of</strong> the proposed access to the extranet group and the College <strong>of</strong><br />

Information Science and Technology, as requested.<br />

All connectivity established must be based on the least-access principle, in accordance with the<br />

approved business requirements and the security review. In no case will the College <strong>of</strong> Information<br />

Science and Technology rely upon the third party to protect the College <strong>of</strong> Information Science and<br />

Technology’s network or resources.<br />

3.3 Modifying or Changing Connectivity and Access<br />

All changes in access must be accompanied by a valid business justification, and are subject to security<br />

review. Changes are to be implemented via corporate change management process. The Sponsoring<br />

Organization is responsible for notifying the extranet management group and/or the College <strong>of</strong><br />

Information Science and Technology when there is a material change in their originally provided<br />

information so that security and connectivity evolve accordingly.<br />

3.4 Terminating Access<br />

When access is no longer required, the Sponsoring Organization within the College <strong>of</strong> Information<br />

Science and Technology must notify the extranet team responsible for that connectivity, which will then<br />

terminate the access. This may mean a modification <strong>of</strong> existing permissions up to terminating the circuit,<br />

as appropriate. The extranet and lab security teams must conduct an audit <strong>of</strong> their respective<br />

connections on an annual basis to ensure that all existing connections are still needed, and that the<br />

access provided meets the needs <strong>of</strong> the connection. Connections that are found to be depreciated,<br />

and/or are no longer being used to conduct College <strong>of</strong> Information Science and Technology business,<br />

will be terminated immediately. Should a security incident or a finding that a circuit has been<br />

deprecated and is no longer being used to conduct the College <strong>of</strong> Information Science and Technology<br />

business necessitate a modification <strong>of</strong> existing permissions, or termination <strong>of</strong> connectivity, the College<br />

<strong>of</strong> Information Science and Technology and/or the extranet team will notify the POC or the Sponsoring<br />

Organization <strong>of</strong> the change prior to taking any action.<br />

4.0 Definitions<br />

Terms<br />

Definitions<br />

Circuit<br />

For the purposes <strong>of</strong> this policy, circuit refers to the method <strong>of</strong> network access,<br />

whether it's through traditional ISDN, Frame Relay etc., or via VPN/Encryption technologies.<br />

Sponsoring Organization The organization who requested that the third party have access into<br />

the College <strong>of</strong> Information Science and Technology.<br />

Third Party<br />

A business that is not a formal or subsidiary part <strong>of</strong> the College <strong>of</strong> Information<br />

Science and Technology.<br />

-581-


Information Sensitivity Policy<br />

1.0 Purpose<br />

The Information Sensitivity Policy is intended to help employees determine what information can be<br />

disclosed to non-employees, as well as the relative sensitivity <strong>of</strong> information that should not be<br />

disclosed outside <strong>of</strong> the College <strong>of</strong> Information Science and Technology without proper authorization.<br />

The information covered in these guidelines includes, but is not limited to, information that is either<br />

stored or shared via any means. This includes: electronic information, information on paper, and<br />

information shared orally or visually (such as telephone and video conferencing).<br />

All system employees should familiarize themselves with the information labeling and handling<br />

guidelines that follow this introduction. It should be noted that the sensitivity level definitions were<br />

created as guidelines and to emphasize common sense steps that you can take to protect College <strong>of</strong><br />

Information Science and Technology Confidential information (e.g., Confidential information should not<br />

be left unattended in conference rooms).<br />

Please Note: The impact <strong>of</strong> these guidelines on daily activity should be minimal.<br />

Questions about the proper classification <strong>of</strong> a specific piece <strong>of</strong> information should be addressed to your<br />

manager. Questions about these guidelines should be addressed to the College <strong>of</strong> Information Science<br />

and Technology systems manager.<br />

2.0 Scope<br />

All College <strong>of</strong> Information Science and Technology information is categorized into two main<br />

classifications:<br />

College <strong>of</strong> Information Science and Technology Public<br />

College <strong>of</strong> Information Science and Technology Confidential<br />

College <strong>of</strong> Information Science and Technology Public information is information that has been declared<br />

public knowledge by someone with the authority to do so, and can freely be given to anyone without<br />

any possible damage to the College <strong>of</strong> Information Science and Technology.<br />

College <strong>of</strong> Information Science and Technology Confidential contains all other information. It is a<br />

continuum, in that it is understood that some information is more sensitive than other information, and<br />

should be protected in a more secure manner. Included is information that should be protected very<br />

closely, such as student information, development programs, and other information integral to the<br />

success <strong>of</strong> the organization. Also included in College <strong>of</strong> Information Science and Technology Confidential<br />

is information that is less critical, such as telephone directories, general corporate information,<br />

personnel information, etc..<br />

A subset <strong>of</strong> College <strong>of</strong> Information Science and Technology Confidential information is “College <strong>of</strong><br />

Information Science and Technology Third Party Confidential" information. This is confidential<br />

information belonging or pertaining to another corporation which has been entrusted to the College <strong>of</strong><br />

Information Science and Technology by that company under non-disclosure agreements and other<br />

contracts. Examples <strong>of</strong> this type <strong>of</strong> information include everything from joint development efforts to<br />

vendor lists, customer orders, and supplier information. Information in this category ranges from<br />

-582-


extremely sensitive to information about the fact that we've connected a supplier / vendor into the<br />

College <strong>of</strong> Information Science and Technology's network to support our operations.<br />

College <strong>of</strong> Information Science and Technology personnel are encouraged to use common sense<br />

judgment in securing College <strong>of</strong> Information Science and Technology Confidential information to the<br />

proper extent. If an employee is uncertain <strong>of</strong> the sensitivity <strong>of</strong> a particular piece <strong>of</strong> information, he/she<br />

should contact their manager<br />

3.0 Policy<br />

The Sensitivity Guidelines below provides details on how to protect information at varying sensitivity<br />

levels. Use these guidelines as a reference only, as College <strong>of</strong> Information Science and Technology<br />

Confidential information in each column may necessitate more or less stringent measures <strong>of</strong> protection<br />

depending upon the circumstances and the nature <strong>of</strong> the College <strong>of</strong> Information Science and Technology<br />

Confidential information in question.<br />

3.1 Minimal Sensitivity: General organizational information; some personnel and technical<br />

information<br />

Marking guidelines for information in hardcopy or electronic form.<br />

Note: any <strong>of</strong> these markings may be used with the additional annotation <strong>of</strong> "3rd Party<br />

Confidential".<br />

Marking is at the discretion <strong>of</strong> the owner or custodian <strong>of</strong> the information. If marking is desired,<br />

the words "College <strong>of</strong> Information Science and Technology Confidential" may be written or<br />

designated in a conspicuous place on or in the information in question. Other labels that may be<br />

used include "College <strong>of</strong> Information Science and Technology Proprietary" or similar labels at<br />

the discretion <strong>of</strong> your individual business unit or department. Even if no marking is present,<br />

College <strong>of</strong> Information Science and Technology information is presumed to be "College <strong>of</strong><br />

Information Science and Technology Confidential" unless expressly determined to be College <strong>of</strong><br />

Information Science and Technology Public information by a College <strong>of</strong> Information Science and<br />

Technology employee with authority to do so.<br />

Access: College <strong>of</strong> Information Science and Technology employees, contractors, people with a<br />

business need to know.<br />

Distribution within the College <strong>of</strong> Information Science and Technology: Standard inter<strong>of</strong>fice<br />

mail approved electronic mail and electronic file transmission methods.<br />

Distribution outside <strong>of</strong> College <strong>of</strong> Information Science and Technology internal mail: U.S. mail<br />

and other public or private carriers approved electronic mail and electronic file transmission<br />

methods.<br />

Electronic distribution: No restrictions except that it is sent to only approved recipients.<br />

Storage: Keep from view <strong>of</strong> unauthorized people; erase whiteboards, do not leave in view on<br />

tabletop. Machines should be administered with security in mind. Protect from loss; electronic<br />

information should have individual access controls where possible and appropriate.<br />

Disposal/Destruction: Deposit outdated paper information in specially marked disposal bins on<br />

College <strong>of</strong> Information Science and Technology premises; electronic data should be<br />

expunged/cleared. Reliably erase or physically destroy media.<br />

-583-


Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil<br />

and/or criminal prosecution to the full extent <strong>of</strong> the law.<br />

3.2 More Sensitive: Business, financial, technical, and most personnel information<br />

Marking guidelines for information in hardcopy or electronic form.<br />

Note: any <strong>of</strong> these markings may be used with the additional annotation <strong>of</strong> "3rd Party<br />

Confidential". As the sensitivity level <strong>of</strong> the information increases, you may, in addition or instead<br />

<strong>of</strong> marking the information " College <strong>of</strong> Information Science and Technology Confidential" or<br />

“College <strong>of</strong> Information Science and Technology Proprietary", wish to label the information "<br />

College <strong>of</strong> Information Science and Technology Internal Use Only" or other similar labels at the<br />

discretion <strong>of</strong> your individual business unit or department to denote a more sensitive level <strong>of</strong><br />

information. However, marking is discretionary at all times.<br />

Access: College <strong>of</strong> Information Science and Technology employees and non-employees with<br />

signed non-disclosure agreements who have a business need to know.<br />

Distribution within the College <strong>of</strong> Information Science and Technology: Standard inter<strong>of</strong>fice<br />

mail approved electronic mail and electronic file transmission methods.<br />

Distribution outside <strong>of</strong> College <strong>of</strong> Information Science and Technology internal mail: Sent via<br />

U.S. mail or approved private carriers.<br />

Electronic distribution: No restrictions to approved recipients within the College <strong>of</strong> Information<br />

Science and Technology, but should be encrypted or sent via a private link to approved<br />

recipients outside <strong>of</strong> College <strong>of</strong> Information Science and Technology premises.<br />

Storage: Individual access controls are highly recommended for electronic information.<br />

Disposal/Destruction: In specially marked disposal bins on College <strong>of</strong> Information Science and<br />

Technology premises; electronic data should be expunged/cleared. Reliably erase or physically<br />

destroy media.<br />

Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil<br />

and/or criminal prosecution to the full extent <strong>of</strong> the law.<br />

3.3 Most Sensitive: Trade secrets & marketing, operational, personnel, financial, source code, &<br />

technical information integral to the success <strong>of</strong> our company<br />

Marking guidelines for information in hardcopy or electronic form.<br />

Note: any <strong>of</strong> these markings may be used with the additional annotation <strong>of</strong> "3rd Party<br />

Confidential". To indicate that College <strong>of</strong> Information Science and Technology Confidential<br />

information is very sensitive, you may should label the information “College <strong>of</strong> Information<br />

Science and Technology Internal: Registered and Restricted", " College <strong>of</strong> Information Science<br />

and Technology Eyes Only", " College <strong>of</strong> Information Science and Technology Confidential" or<br />

similar labels at the discretion <strong>of</strong> your individual business unit or department. Once again, this<br />

type <strong>of</strong> College <strong>of</strong> Information Science and Technology Confidential information need not be<br />

marked, but users should be aware that this information is very sensitive and be protected as<br />

such.<br />

-584-


Access: Only those individuals (College <strong>of</strong> Information Science and Technology employees and<br />

non-employees) designated with approved access and signed non-disclosure agreements.<br />

Distribution within the College <strong>of</strong> Information Science and Technology: Delivered direct -<br />

signature required, envelopes stamped confidential, or approved electronic file transmission<br />

methods.<br />

Distribution outside <strong>of</strong> College <strong>of</strong> Information Science and Technology internal mail: Delivered<br />

direct; signature required; approved private carriers.<br />

Electronic distribution: No restrictions to approved recipients within the College <strong>of</strong> Information<br />

Science and Technology, but it is highly recommended that all information be strongly<br />

encrypted.<br />

Storage: Individual access controls are very highly recommended for electronic information.<br />

Physical security is generally used, and information should be stored in a physically secured<br />

computer.<br />

Disposal/Destruction: Strongly Encouraged: In specially marked disposal bins on College <strong>of</strong><br />

Information Science and Technology premises; electronic data should be expunged/cleared.<br />

Reliably erase or physically destroy media.<br />

Penalty for deliberate or inadvertent disclosure: Up to and including termination, possible civil<br />

and/or criminal prosecution to the full extent <strong>of</strong> the law.<br />

4.0 Definitions<br />

Terms and Definitions<br />

Appropriate measures<br />

To minimize risk to the College <strong>of</strong> Information Science and Technology from an outside business<br />

connection. College <strong>of</strong> Information Science and Technology computer use by competitors and<br />

unauthorized personnel must be restricted so that, in the event <strong>of</strong> an attempt to access College <strong>of</strong><br />

Information Science and Technology information, the amount <strong>of</strong> information at risk is minimized.<br />

Configuration <strong>of</strong> College <strong>of</strong> Information Science and Technology -to-other business connections<br />

Connections shall be set up to allow other businesses to see only what they need to see. This involves<br />

setting up both applications and network configurations to allow access to only what is necessary.<br />

Delivered Direct; Signature Required<br />

Do not leave in inter<strong>of</strong>fice mail slot; call the mail room for special pick-up <strong>of</strong> mail.<br />

Approved Electronic File Transmission Methods<br />

Includes supported FTP clients and Web browsers.<br />

Envelopes Stamped Confidential<br />

You are not required to use a special envelope. Put your document(s) into an inter<strong>of</strong>fice envelope, seal<br />

it, address it, and stamp it confidential.<br />

Approved Electronic Mail<br />

Includes all mail systems supported by the College <strong>of</strong> Information Science and Technology systems staff.<br />

These include, but are not necessarily limited to, Lotus Notes and Micros<strong>of</strong>t Exchange. If you have a<br />

business need to use other mailers contact the appropriate support organization.<br />

-585-


Approved Encrypted email and files<br />

Techniques include the use <strong>of</strong> DES and PGP. DES encryption is available via many different public domain<br />

packages on all platforms. PGP use within the College <strong>of</strong> Information Science and Technology is done via<br />

a license. Please contact the appropriate support organization if you require a license.<br />

Company Information System Resources<br />

Company Information System Resources include, but are not limited to, all computers, their data and<br />

programs, as well as all paper information and any information at the Internal Use Only level and above.<br />

Expunge<br />

To reliably erase or expunge data on a PC or Mac you must use a separate program to overwrite data,<br />

supplied as a part <strong>of</strong> Norton Utilities. Otherwise, the PC or Mac's normal erasure routine keeps the data<br />

intact until overwritten. The same thing happens on UNIX machines, but data is much more difficult to<br />

retrieve on UNIX systems.<br />

Individual Access Controls<br />

Individual Access Controls are methods <strong>of</strong> electronically protecting files from being accessed by people<br />

other than those specifically designated by the owner. On UNIX machines, this is accomplished by<br />

careful use <strong>of</strong> the chmod command (use man chmod to find out more about it). On Mac’s and PC's, this<br />

includes using passwords on screensavers, such as Disklock.<br />

Insecure Internet Links<br />

Insecure Internet Links are all network links that originate from a locale or travel over lines that are not<br />

totally under the control <strong>of</strong> the College <strong>of</strong> Information Science and Technology.<br />

Encryption<br />

International issues regarding encryption are complex. Follow organizational guidelines on export<br />

controls on cryptography, and consult your manager and/or corporate legal services for further<br />

guidance.<br />

One Time Password Authentication<br />

One Time Password Authentication on Internet connections is accomplished by using a onetime<br />

password token to connect to College <strong>of</strong> Information Science and Technology's internal network over<br />

the Internet. Contact the systems staff for more information on how to set this up.<br />

Physical Security<br />

Physical security means either having actual possession <strong>of</strong> a computer at all times, or locking the<br />

computer in an unusable state to an object that is immovable. Methods <strong>of</strong> accomplishing this include<br />

having a special key to unlock the computer so it can be used, thereby ensuring that the computer<br />

cannot be simply rebooted to get around the protection. If it is a laptop or other portable computer,<br />

never leave it alone in a conference room, hotel room or on an airplane seat, etc. Make arrangements to<br />

lock the device in a hotel safe, or take it with you. In the <strong>of</strong>fice, always use a lockdown cable. When<br />

leaving the <strong>of</strong>fice for the day, secure the laptop and any other sensitive material in a locked drawer or<br />

cabinet.<br />

Private Link<br />

-586-


A Private Link is an electronic communications path that the College <strong>of</strong> Information Science and<br />

Technology has control over its entire distance. For example, all College <strong>of</strong> Information Science and<br />

Technology networks are connected via a private link.<br />

-587-


Lab Anti-Virus Policy<br />

1.0 Purpose<br />

To establish requirements which must be met by all computers connected to College <strong>of</strong> Information<br />

Science and Technology (IS&T) lab networks to ensure effective virus detection and prevention.<br />

2.0 Scope<br />

This policy applies to all IS&T lab computers that are PC-based or utilize PC-file directory sharing. This<br />

includes, but is not limited to, desktop computers, laptop computers, file/ftp/tftp/proxy servers, and any<br />

PC based lab equipment such as traffic generators.<br />

3.0 Policy<br />

All IS&T PC-based lab computers must have IS&T 's standard, supported anti-virus s<strong>of</strong>tware installed<br />

(McAfee) and scheduled to run at regular intervals. In addition, the anti-virus s<strong>of</strong>tware and the virus<br />

pattern files must be kept up-to-date. Virus-infected computers must be removed from the network<br />

until they are verified as virus-free. Systems Managers are responsible for creating procedures that<br />

ensure anti-virus s<strong>of</strong>tware is run at regular intervals, and computers are verified as virus-free. Any<br />

activities with the intention to create and/or distribute malicious programs into IS&T networks (e.g.,<br />

viruses, worms, Trojan horses, e-mail bombs, etc.) are prohibited, in accordance with the Computer Use<br />

Policy.<br />

Refer to IS&T 's Anti-Virus Recommended Processes to help prevent virus problems.<br />

Noted exceptions: Machines with operating systems other than those based on Micros<strong>of</strong>t products are<br />

exceptions at the current time.<br />

-588-


Password Policy<br />

1.0 Overview<br />

Passwords are an important aspect <strong>of</strong> computer security. They are the front line <strong>of</strong> protection for user<br />

accounts. A poorly chosen password may result in the compromise <strong>of</strong> the College <strong>of</strong> Information Science<br />

and Technology's (IS&T) entire corporate network. As such, all IS&T employees (including contractors<br />

and vendors with access to IS&T systems) are responsible for taking the appropriate steps, as outlined<br />

below, to select and secure their passwords.<br />

2.0 Purpose<br />

The purpose <strong>of</strong> this policy is to establish a standard for creation <strong>of</strong> strong passwords, the protection <strong>of</strong><br />

those passwords, and the frequency <strong>of</strong> change.<br />

3.0 Scope<br />

The scope <strong>of</strong> this policy includes all personnel who have or are responsible for an account (or any form<br />

<strong>of</strong> access that supports or requires a password) on any system that resides at any IS&T facility, has<br />

access to the IS&T network, or stores any non-public IS&T information.<br />

4.0 Policy<br />

4.1 General<br />

All system-level passwords (e.g., root, enable, NT admin, application administration accounts,<br />

etc.) must be changed on at least a quarterly basis.<br />

All production system-level passwords must be part <strong>of</strong> the IS&T administered global password<br />

management database.<br />

All user-level passwords (e.g., email, web, desktop computer, etc.) must be changed at least<br />

every six months. The recommended change interval is every four months.<br />

User accounts that have system-level privileges granted through group memberships or<br />

programs such as "sudo" must have a unique password from all other accounts held by that<br />

user.<br />

Passwords must not be inserted into email messages or other forms <strong>of</strong> electronic<br />

communication.<br />

Where SNMP is used, the community strings must be defined as something other than the<br />

standard defaults <strong>of</strong> "public," "private" and "system" and must be different from the passwords<br />

used to log in interactively. A keyed hash must be used where available (e.g., SNMPv2).<br />

All user-level and system-level passwords must conform to the guidelines described below.<br />

4.2 Guidelines<br />

A. General Password Construction Guidelines<br />

Passwords are used for various purposes at the IS&T. Some <strong>of</strong> the more common uses include: user level<br />

accounts, web accounts, email accounts, screen saver protection, voicemail password, and local router<br />

logins. Since very few systems have support for one-time tokens (i.e., dynamic passwords which are only<br />

used once), everyone should be aware <strong>of</strong> how to select strong passwords.<br />

Poor, weak passwords have the following characteristics:<br />

The password contains less than eight characters<br />

-589-


The password is a word found in a dictionary (English or foreign)<br />

The password is a common usage word such as:<br />

o Names <strong>of</strong> family, pets, friends, co-workers, fantasy characters, etc.<br />

o Computer terms and names, commands, sites, companies, hardware, s<strong>of</strong>tware.<br />

o The words "UNO", " IS&T ", "<strong>Omaha</strong>", “password” or any derivation.<br />

o Birthdays and other personal information such as addresses and phone numbers.<br />

o Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc.<br />

o Any <strong>of</strong> the above spelled backwards.<br />

o Any <strong>of</strong> the above preceded or followed by a digit (e.g., secret1, 1secret)<br />

o Blank password<br />

Strong passwords have the following characteristics:<br />

Contain both upper and lower case characters (e.g., a-z, A-Z)<br />

Have digits and punctuation characters as well as letters e.g., 0-9, !@#$%^&*()_+|~-<br />

=\`{}[]:";'?,./)<br />

Are at least eight alphanumeric characters long and is a passphrase (Ohmy1stu9).<br />

Is not a word in any language, slang, dialect, jargon, etc.<br />

Are not based on personal information, names <strong>of</strong> family, etc.<br />

Passwords should never be written down or stored on-line. Try to create passwords that can be<br />

easily remembered. One way to do this is create a password based on a song title, affirmation,<br />

or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and<br />

the password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.<br />

NOTE: Do not use either <strong>of</strong> these examples as passwords!<br />

B. Password Protection Standards<br />

Do not use the same password for IS&T accounts as for other non- IS&T access (e.g., personal ISP<br />

account, option trading, benefits, etc.). Where possible, don't use the same password for various IS&T<br />

access needs. Select a separate password to be used for an NT account and a UNIX account.<br />

Do not share IS&T passwords with anyone, including administrative assistants or secretaries. All<br />

passwords are to be treated as sensitive, Confidential IS&T information.<br />

Here is a list <strong>of</strong> "dont's":<br />

Don't reveal a password over the phone to ANYONE<br />

Don't reveal a password in an email message<br />

Don't reveal a password to the boss<br />

Don't talk about a password in front <strong>of</strong> others<br />

Don't hint at the format <strong>of</strong> a password (e.g., "my family name")<br />

Don't reveal a password on questionnaires or security forms<br />

Don't share a password with family members<br />

Don't reveal a password to co-workers while on vacation<br />

-590-


If someone demands a password, refer them to this document or have them call someone in the<br />

Information Security Department.<br />

Do not use the "Remember Password" feature <strong>of</strong> applications (e.g., Lotus Notes, Outlook, and Netscape<br />

Messenger).<br />

Again, do not write passwords down and store them anywhere in your <strong>of</strong>fice. Do not store passwords in<br />

a file on ANY computer system (including Palm Pilots or similar devices) without encryption.<br />

Change passwords at least once every six months (except system-level passwords which must be<br />

changed quarterly). The recommended change interval is every four months.<br />

If an account or password is suspected to have been compromised, report the incident to IS&T systems<br />

managers and change all passwords.<br />

C. Application Development Standards<br />

Application developers must ensure their programs contain the following security precautions.<br />

Applications:<br />

should support authentication <strong>of</strong> individual users, not groups.<br />

should not store passwords in clear text or in any easily reversible form.<br />

should provide for some sort <strong>of</strong> role management, such that one user can take over the<br />

functions <strong>of</strong> another without having to know the other's password.<br />

should support TACACS+ , RADIUS and/or X.509 with LDAP security retrieval, wherever possible.<br />

5.0 Definitions<br />

Terms<br />

Definitions<br />

Application Administration Account Any account that is for the administration <strong>of</strong> an application<br />

(e.g., Oracle database administrator, ISSU administrator).<br />

-591-


Personal Communication Devices and Voicemail Policy<br />

1.0 Purpose<br />

This document describes Information Security's requirements for Personal Communication Devices and<br />

Voicemail for the College <strong>of</strong> Information Science and Technology. (IS&T)<br />

2.0 Scope<br />

This policy applies to any use <strong>of</strong> Personal Communication Devices and IS&T Voicemail issued by IS&T or<br />

used for IS&T business.<br />

3.0 Policy<br />

3.1 Issuing Policy<br />

Personal Communication Devices (PCDs) will be issued only to IS&T personnel with duties that require<br />

them to be in immediate and frequent contact when they are away from their normal work locations.<br />

For the purpose <strong>of</strong> this policy, PCDs are defined to include handheld wireless devices, cellular<br />

telephones, laptop wireless cards and pagers. Effective distribution <strong>of</strong> the various technological devices<br />

must be limited to persons for whom the productivity gained is appropriate in relation to the costs<br />

incurred.<br />

Handheld wireless devices may be issued, for operational efficiency, to IS&T personnel who need to<br />

conduct immediate, critical IS&T business. These individuals generally are at the executive and<br />

management level. In addition to verbal contact, it is necessary that they have the capability to review<br />

and have documented responses to critical issues.<br />

3.2 Bluetooth<br />

Hands-free enabling devices, such as the Bluetooth, may be issued to authorized IS&T personnel who<br />

have received approval. Care must be taken to avoid being recorded when peering Bluetooth adapters,<br />

Bluetooth 2.0 Class 1 devices have a range <strong>of</strong> 330 feet.<br />

3.3 Voicemail<br />

Voicemail boxes may be issued to IS&T personnel who require a method for others to leave messages<br />

when they are not available. Voicemail boxes must be protected by a PIN which must never be the<br />

same as the last four digits <strong>of</strong> the telephone number <strong>of</strong> the voicemail box.<br />

3.4 Loss and Theft<br />

Files containing confidential or sensitive data may not be stored in PCDs unless protected by approved<br />

encryption. Confidential or sensitive data shall never be stored on a personal PCD. Charges for repair<br />

due to misuse <strong>of</strong> equipment or misuse <strong>of</strong> services may be the responsibility <strong>of</strong> the employee, as<br />

determined on a case-by-case basis. The cost <strong>of</strong> any item beyond the standard authorized equipment is<br />

also the responsibility <strong>of</strong> the employee. Lost or stolen equipment must immediately be reported.<br />

3.5 Personal Use<br />

PCDs and voicemail are issued for IS&T business. Personal is allowed but should be limited.<br />

3.6 PCD Safety<br />

-592-


Conducting telephone calls or utilizing PCDs while driving can be a safety hazard. Drivers should use<br />

PCDs while parked or out <strong>of</strong> the vehicle. If employees must use a PCD while driving, IS&T requires the<br />

use <strong>of</strong> hands-free enabling devices.<br />

4.0 Definitions<br />

Term<br />

Bluetooth<br />

Definition<br />

Bluetooth is an industrial specification for wireless personal area networks<br />

(PANs), also known as IEEE 802.15.1. Bluetooth provides a way to connect<br />

and exchange information between devices such as personal digital<br />

assistants (PDAs), and mobile phones via a secure, globally unlicensed<br />

short-range radio frequency. Source: Wikipedia<br />

Confidential or sensitive data All data that is not approved for public release shall be considered<br />

confidential or sensitive.<br />

-593-


Power Outage Policy and Procedures for Production Systems<br />

I. Current Building Situation During a Power Outage<br />

a. A pair <strong>of</strong> 40kVA battery backup units operating in parallel will maintain power to the<br />

equipment located in: 158B, 158R, 166, 158C, 158A, and the building keycard security<br />

system.<br />

b. The building’s emergency generator should cut in automatically during a power outage.<br />

However, the transfer switch appears to be incorrectly installed, which requires an<br />

occasional manual start.<br />

c. Building blast/fire doors will close during a power outage<br />

d. Faculty wall power outlets are not on UPS or generator power by default.<br />

e. Backup cooling units located in server rooms are NOT on the UPS, and will disengage<br />

when power fails.<br />

II.<br />

Policies and Priorities<br />

a. The following priorities are to be maintained during a power outage:<br />

1. A monitoring device inside the 158R server room that will collect critical<br />

operating environment and status data will be active at all times. This unit<br />

must have keyboard, mouse, and display access maintained at all times.<br />

2. Power to Primary and Backup Domain Controllers must be maintained at all<br />

times, unless operational failure is imminent due to environmental conditions.<br />

3. Power to Domain Name Servers must be maintained at all times, unless<br />

operational failure due to environmental conditions is imminent.<br />

4. Power to File Servers must be maintained for 30 minutes past the start <strong>of</strong> the<br />

outage, to allow faculty, staff, and students, time to save any open files.<br />

5. Power to E-mail servers must be maintained at all times, unless operational<br />

failure due to environmental conditions is imminent.<br />

6. Power to Certificate Servers must be maintained at all times, unless<br />

operational failure is imminent due to environmental conditions.<br />

7. All other production servers not mentioned above will be shut down 15<br />

minutes after the start <strong>of</strong> the power outage, following the defined<br />

procedures.<br />

b. The following personnel are to be notified immediately at the onset <strong>of</strong> a power outage.<br />

Notification should be <strong>of</strong> an automatic nature, provided by a monitoring service:<br />

1. Senior Systems Managers<br />

2. Production Systems Managers<br />

3. Research Systems Managers<br />

c. The following personnel are to direct the implementation <strong>of</strong> procedures during a power<br />

outage. These personnel are listed in order <strong>of</strong> required response:<br />

1. Assistant Production Systems Managers<br />

2. Senior Production Systems Managers<br />

-594-


3. College Computing Director/Dean’s Office<br />

d. In the event that insufficient College personnel are available to respond to the power<br />

outage, the Senior Systems Manager for the College <strong>of</strong> Engineering Technology should<br />

be contacted by the Senior Production Systems Managers to request aid.<br />

e. Each individually cooled environment (i.e. 158B, 158R, etc) should remain isolated from<br />

the remainder <strong>of</strong> the cooled environments for as long as possible.<br />

f. When power is restored to the building, a waiting period <strong>of</strong> 5 minutes should be<br />

observed to ensure that a subsequent power failure will not occur.<br />

g. When powering up equipment after a power failure, the following priorities should be<br />

observed. Each category should be completely restored before the next category is<br />

begun.<br />

1. Network Infrastructure<br />

2. Primary Domain Controllers<br />

3. Backup Domain Controllers<br />

4. Domain Name Servers<br />

5. File Servers<br />

6. E-mail and Certificate Servers<br />

7. All other systems<br />

h. After power failure ends, e-mail notification should be sent to all students, faculty, and<br />

staff to alert them to the occurrence. Systems Managers should prioritize data and<br />

system recovery over all other assignments for a minimum <strong>of</strong> two hours after a power<br />

failure.<br />

III.<br />

Procedures for Power Outages<br />

These procedures are intended to be followed in order by the person assuming<br />

responsibility during a power outage.<br />

1. Facilities Management and Planning should be notified <strong>of</strong> the outage. If not during<br />

normal working hours (8:00 a.m. to 6:00 p.m.) Campus Security should be notified.<br />

During notification, manual verification <strong>of</strong> the generator’s start should be requested.<br />

2. All College Production and Research Managers should be notified <strong>of</strong> the outage.<br />

3. CET Systems managers should be notified <strong>of</strong> the outage.<br />

4. Wide-area notification mechanisms should be utilized to notify Faculty, Staff and<br />

Students connected to College computing resources <strong>of</strong> the imminent shutdown <strong>of</strong> those<br />

resources, and the time frame for that shutdown. Notifications should be repeated<br />

every 15 minutes during the wait/notification period.<br />

5. Alternative cooling mechanisms should be located and brought to standby positions<br />

near all critical locations. The following locations have priority in the following order:<br />

o 158G – UPS Battery Room<br />

o 158R – Production Systems Server room<br />

o 158B – Research Systems Room<br />

-595-


6. After the required notification and wait period, all non-critical systems should be<br />

powered down.<br />

7. After the required notification and wait period, all File Servers should be shut down.<br />

8. Environmental factors within the monitored areas should be constantly watched. If<br />

environmental conditions continue to deteriorate, alternate cooling mechanisms should<br />

be implemented.<br />

9. Should dangerous conditions occur, a notification/wait period <strong>of</strong> 15 minutes should be<br />

instituted. Should dangerous conditions continue, affected critical systems should be<br />

powered down in the following order:<br />

o Backup Domain Controllers<br />

o E-mail and Certificate Servers<br />

o Domain Name Servers and Primary Domain Controllers.<br />

10. Upon Power restoration, systems should be restored according to policy.<br />

11. All Systems manager should be notified <strong>of</strong> the end <strong>of</strong> the outage.<br />

12. Notification should be sent to all Faculty, Staff, and Students, detailing the power<br />

outage, the duration, and any known effects <strong>of</strong> the outage, including damaged<br />

equipment and procedures for reporting problems to the Systems Office.<br />

13. For a minimum <strong>of</strong> two hours following the outage, Systems Repair Priority should be<br />

allocated to data and systems recovery first.<br />

14. A report should be sent from the responsible systems manager to the rest <strong>of</strong> the<br />

systems managers detailing the outage, duration, effects, and any suggested changes to<br />

better respond to future outages.<br />

-596-


Server Malware Protection Policy<br />

1.0 Overview: The College <strong>of</strong> Information Science and Technology (IS&T) is entrusted with the<br />

responsibility to provide pr<strong>of</strong>essional management <strong>of</strong> clients servers as outlined in each <strong>of</strong> the contracts<br />

with its customers. Inherent in this responsibility is an obligation to provide appropriate protection<br />

against malware threats, such as viruses and spyware applications. Effective implementation <strong>of</strong> this<br />

policy will limit the exposure and effect <strong>of</strong> common malware threats to the systems they cover.<br />

2.0 Purpose: The purpose <strong>of</strong> this policy is to outline which server systems are required to have antivirus<br />

and/or anti-spyware applications.<br />

3.0 Scope: This policy applies to all servers that IS&T is responsible to manage. This explicitly includes<br />

any system for which IS&T has a contractual obligation to administer. This also includes all server<br />

systems setup for internal use by IS&T staff, regardless <strong>of</strong> whether IS&T retains administrative obligation<br />

or not.<br />

4.0 Policy: IS&T operations staff will adhere to this policy to determine which servers will have antivirus<br />

and/or anti-spyware applications installed on them and to deploy such applications as appropriate.<br />

4.1 ANTI-VIRUS<br />

All servers MUST have an anti-virus application installed that <strong>of</strong>fers real-time scanning protection to files<br />

and applications running on the target system if they meet one or more <strong>of</strong> the following conditions:<br />

Non-administrative users have remote access capability<br />

The system is a file server<br />

NBT/Micros<strong>of</strong>t Share access is open to this server from systems used by non-administrative<br />

users<br />

HTTP/FTP access is open from the Internet<br />

Other “risky” protocols/applications are available to this system from the Internet at the<br />

discretion <strong>of</strong> the IS&T systems managers<br />

All servers SHOULD have an anti-virus application installed that <strong>of</strong>fers real-time scanning protection to<br />

files and applications running on the target system if they meet one or more <strong>of</strong> the following conditions:<br />

Outbound web access is available from the system<br />

4.2 MAIL SERVER ANTI-VIRUS<br />

If the target system is a mail server it MUST have either an external or internal anti-virus scanning<br />

application that scans all mail destined to and from the mail server. Local anti-virus scanning<br />

applications MAY be disabled during backups if an external anti-virus application still scans inbound<br />

emails while the backup is being performed.<br />

4.3 ANTI-SPYWARE<br />

All servers MUST have an anti-spyware application installed that <strong>of</strong>fers real-time protection to the target<br />

system if they meet one or more <strong>of</strong> the following conditions:<br />

Any system where non-technical or non-administrative users have remote access to the<br />

system and ANY outbound access is permitted to the Internet<br />

-597-


Any system where non-technical or non-administrative users have the ability to install<br />

s<strong>of</strong>tware on their own<br />

4.4 NOTABLE EXCEPTIONS<br />

An exception to the above standards will generally be granted with minimal resistance and<br />

documentation if one <strong>of</strong> the following notable conditions apply to this system:<br />

The system is a SQL server<br />

The system is used as a dedicated mail server<br />

The system is not a Windows based platform<br />

5.0 Definitions:<br />

TERM DEFINITION<br />

Server For purposes <strong>of</strong> this policy, a server is any computer system residing in the physically<br />

secured data center owned and operated by IS&T. In addition, this includes any system<br />

running an operating system specifically intended for server usage as defined by the<br />

IS&T systems staff that has access to internal secure networks. This includes, but is not<br />

limited to, Micros<strong>of</strong>t Server 2000 and all permutations, Micros<strong>of</strong>t Server 2003 and all<br />

permutations, any Linux/Unix based operating systems, and MAC operating systems<br />

that external users are expected to regularly connect to and VMS.<br />

Malware<br />

Spyware<br />

S<strong>of</strong>tware designed to infiltrate or damage a computer system without the owner's<br />

informed consent. It is a blend <strong>of</strong> the words "malicious" and "s<strong>of</strong>tware". The expression<br />

is a general term used by computer pr<strong>of</strong>essionals to mean a variety <strong>of</strong> forms <strong>of</strong> hostile,<br />

intrusive, or annoying s<strong>of</strong>tware or program code.<br />

Broad category <strong>of</strong> s<strong>of</strong>tware designed to intercept or take partial control <strong>of</strong> a computer's<br />

operation without the informed consent <strong>of</strong> that machine's owner or legitimate user.<br />

While the term taken literally suggests s<strong>of</strong>tware that surreptitiously monitors the user, it<br />

has also come to refer more broadly to s<strong>of</strong>tware that subverts the computer's operation<br />

for the benefit <strong>of</strong> a third party.<br />

Anti-virus S<strong>of</strong>tware<br />

Consists <strong>of</strong> computer programs that attempt to identify, thwart and eliminate computer<br />

viruses and other malicious s<strong>of</strong>tware (malware).<br />

-598-


Server Security Policy<br />

1.0 Purpose<br />

The purpose <strong>of</strong> this policy is to establish standards for the base configuration <strong>of</strong> internal server<br />

equipment that is owned and/or operated by the College <strong>of</strong> Information Science and Technology. (IS&T)<br />

Effective implementation <strong>of</strong> this policy will minimize unauthorized access to IS&T proprietary<br />

information and technology.<br />

2.0 Scope<br />

This policy applies to server equipment owned and/or operated by IS&T, and to servers registered under<br />

any IS&T -owned internal network domain.<br />

This policy is specifically for equipment on the internal IS&T network. For secure configuration <strong>of</strong><br />

equipment external to IS&T on the DMZ, refer to the Internet DMZ Equipment Policy.<br />

3.0 Policy<br />

3.1 Ownership and Responsibilities<br />

All internal servers deployed at IS&T must be owned by an operational group that is responsible for<br />

system administration. Approved server configuration guides must be established and maintained by<br />

each operational group, based on business needs and approved by IS&T Director <strong>of</strong> IT. Operational<br />

groups should monitor configuration compliance and implement an exception policy tailored to their<br />

environment. Each operational group must establish a process for changing the configuration guides,<br />

which includes review and approval by the IS&T Director <strong>of</strong> IT.<br />

Servers must be registered within the corporate enterprise management system. At a minimum,<br />

the following information is required to positively identify the point <strong>of</strong> contact:<br />

o Server contact(s) and location, and a backup contact<br />

o Hardware and Operating System/Version<br />

o Main functions and applications, if applicable<br />

Information in the enterprise management system must be kept up-to-date.<br />

Configuration changes for production servers must follow the appropriate change management<br />

procedures.<br />

3.2 General Configuration Guidelines<br />

Operating System configuration should be in accordance with approved systems guidelines.<br />

Services and applications that will not be used must be disabled where practical.<br />

Access to services should be logged and/or protected through access-control methods, when<br />

possible.<br />

The most recent security patches must be installed on the system as soon as practical, the only<br />

exception being when immediate application would interfere with business requirements.<br />

Trust relationships between systems are a security risk, and their use should be avoided. Do not<br />

use a trust relationship when some other method <strong>of</strong> communication will do.<br />

Always use standard security principles <strong>of</strong> least required access to perform a function.<br />

Do not use root when a non-privileged account will do.<br />

-599-


If a methodology for secure channel connection is available (i.e., technically feasible), privileged<br />

access must be performed over secure channels, (e.g., encrypted network connections using<br />

SSH or IPSec).<br />

Servers should be physically located in an access-controlled environment.<br />

Servers are specifically prohibited from operating from uncontrolled cubicle areas.<br />

3.3 Monitoring<br />

All security-related events on critical or sensitive systems must be logged and audit trails saved<br />

as follows:<br />

o All security related logs will be kept online for a minimum <strong>of</strong> 1 week.<br />

o Daily incremental backups will be retained for at least 1 month.<br />

o Weekly full backups <strong>of</strong> logs will be retained for at least 1 month.<br />

o Monthly full backups will be retained for a minimum <strong>of</strong> 2 years.<br />

Security-related events will be reported to IS&T systems managers, who will review logs and<br />

report incidents to the IS&T Director <strong>of</strong> IT. Corrective measures will be prescribed as needed.<br />

Security-related events include, but are not limited to:<br />

o Port-scan attacks<br />

o Evidence <strong>of</strong> unauthorized access to privileged accounts<br />

o Anomalous occurrences that are not related to specific applications on the host.<br />

3.4 Compliance<br />

Audits will be performed on a regular basis by authorized organizations within the College.<br />

Audits will be managed by the IS&T systems managers, in accordance with the Audit Policy.<br />

Every effort will be made to prevent audits from causing operational failures or disruptions.<br />

Audits will not be used for purposes <strong>of</strong> scanning faculty, staff, and student personal data.<br />

4.0 Definitions<br />

Term<br />

DMZ<br />

Server<br />

Definition<br />

De-militarized Zone. A network segment external to the corporate production network.<br />

For purposes <strong>of</strong> this policy, a Server is defined as an internal IS&T Server. Desktop<br />

machines and Lab equipment are not relevant to the scope <strong>of</strong> this policy.<br />

-600-


Teaching Assistant, Graduate Assistant, PhD Student, and Student<br />

Worker Acceptable Computer Use Policy<br />

The positions this document is directed towards are by their nature desirable and prestigious positions<br />

for students to hold. This also implies that the positions are only awarded to those students who have<br />

the maturity to also bear the responsibility implied in these positions. This document enacts into<br />

College policy those responsible behaviors before signing this policy. After signing this policy,<br />

responsible behavior will be expected. The College <strong>of</strong> Information Science and Technology, in many<br />

cases, provides student workers, graduate assistants, PhD students, and teaching assistants with a<br />

computer to use in the normal course <strong>of</strong> performing their day to day work. These computers are<br />

provided for the express purpose <strong>of</strong> performing College business. College computer users should be<br />

aware these are not personal systems, but rather are intended as utility systems that will be used in<br />

many cases by several people during a given day. IN the interest <strong>of</strong> providing a reliable service and one<br />

in which College computer users are abiding by ethical standards and the laws in effect where this<br />

computer use takes place, this acceptable us policy has been implemented. These policies are not<br />

intended for computers used in research projects or by Faculty. Student users <strong>of</strong> <strong>University</strong> computer<br />

systems agree to the following conditions. Failure to comply with this agreement and the documents<br />

reference in this agreement will result in loss <strong>of</strong> access to these systems and/or services, and possible<br />

other disciplinary or legal action.<br />

May not use these systems to harass or threaten individuals or groups or to create a hostile<br />

environment.<br />

May not store or transfer copyrighted material without the consent or public release by the<br />

legal owner <strong>of</strong> that material, including but not limited to s<strong>of</strong>tware, pictures, video, audio, and<br />

written material as defined by the United States Copyright Office in this document:<br />

http://lcweb.loc.gov/copyright<br />

May not access or attempt to access computing resources without proper authorization,<br />

including unauthorized use <strong>of</strong> someone’s account and password.<br />

May not send or present potentially damaging computer s<strong>of</strong>tware, including but not limited to<br />

computer viruses, and computer worms.<br />

May not use these systems for unsolicited bulk distribution <strong>of</strong> material or information to <strong>of</strong>f<br />

campus systems, including but not limit to mass email. May not use <strong>University</strong> systems or<br />

network resources for distribution <strong>of</strong> copyrighted computer s<strong>of</strong>tware, images, music, video or<br />

documents unless expressly permitted by the copyright holder.<br />

My not load or run peer-to-peer applications that are intended for the distribution <strong>of</strong> s<strong>of</strong>tware<br />

or digital media (music, video, or text). These applications include, but are not limited to Audio<br />

Galaxy, Napster, Bear Share, Lime Wire, mIRC, Bit Torrent, Azureus, and similar systems.<br />

May not store information or use these systems in any ways that violate state or federal laws or<br />

<strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> policies including executive memorandum 16<br />

http://www.nebraska.edu/about/exec_memo16.pdf .<br />

May not sue these systems for commercial, business or any for-pr<strong>of</strong>it use without documented<br />

permission from the systems administrator and the individual to whom that administrator<br />

reports. The documented permission requirement shall include UNO Lotus Notes email or<br />

printed and signed documents.<br />

May not run additional services without documented permission from the <strong>of</strong>ficial administrators<br />

<strong>of</strong> the system.<br />

-601-


May not use these systems, the services on these systems or the network, to capture private<br />

information or content from other systems or to probe for system and service vulnerabilities<br />

without documented permission from the systems<br />

Continued on Next Page <br />

administrator <strong>of</strong> target systems. Loading <strong>of</strong> s<strong>of</strong>tware used for these purposes such as network<br />

sniffers, password crackers, and port scanners onto <strong>University</strong> systems is sufficient cause to<br />

assume this activity is taking place and to cause disciplinary action to be taken.<br />

If an investigation takes place, you understand that any and all <strong>of</strong> your UNO accounts and<br />

computer use may be subject to review by a designated system administrator and/or UNO<br />

Student Affairs and/or UNO security organizations, as accounts are considered to be the<br />

property <strong>of</strong> the <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong>. Your accounts may be disabled during any<br />

investigation.<br />

Signed: ______________________________________________________________________________<br />

Printed Name: _______________________________________<br />

Date: __________________________<br />

Witnessed: __________________________________________<br />

Date: __________________________<br />

-602-


Virtual Private Network (VPN) Policy<br />

1.0 Purpose<br />

The purpose <strong>of</strong> this policy is to provide guidelines for Remote Access IPSec or L2TP Virtual Private<br />

Network (VPN) connections to the College <strong>of</strong> Information Science and Technology (IS&T) corporate<br />

network.<br />

2.0 Scope<br />

This policy applies to all IS&T employees, contractors, consultants, temporaries, and other workers<br />

including all personnel affiliated with third parties utilizing VPNs to access the IS&T network. This policy<br />

applies to implementations <strong>of</strong> VPN that are directed through an IPSec Concentrator.<br />

3.0 Policy<br />

Approved IS&T employees and authorized third parties (customers, vendors, etc.) may utilize the<br />

benefits <strong>of</strong> VPNs, which are a "user managed" service. This means that the user is responsible for<br />

selecting an Internet Service Provider (ISP), coordinating installation, installing any required s<strong>of</strong>tware,<br />

and paying associated fees. Further details may be found in the Remote Access Policy.<br />

Additionally,<br />

1. It is the responsibility <strong>of</strong> employees with VPN privileges to ensure that unauthorized users are<br />

not allowed access to IS&T internal networks.<br />

2. VPN use is to be controlled using either a one-time password authentication such as a token<br />

device or a RADIUS/ldap system with a strong passphrase.<br />

3. When actively connected to the corporate network, VPNs will force all traffic to and from the PC<br />

over the VPN tunnel: all other traffic will be dropped.<br />

4. Dual (split) tunneling is NOT permitted; only one network connection is allowed.<br />

5. VPN gateways will be set up and managed by IS&T systems network operational groups.<br />

6. All computers connected to IS&T internal networks via VPN or any other technology must use<br />

the most up-to-date anti-virus s<strong>of</strong>tware that is the corporate standard (McAfee); this includes<br />

personal computers.<br />

7. VPN users will be automatically disconnected from IS&T 's network after thirty minutes <strong>of</strong><br />

inactivity. The user must then logon again to reconnect to the network. Pings or other artificial<br />

network processes are not to be used to keep the connection open.<br />

8. The VPN concentrator is limited to an absolute connection time <strong>of</strong> 72 hours.<br />

9. Users <strong>of</strong> computers that are not IS&T-owned equipment must configure the equipment to<br />

comply with IS&T's VPN and Network policies.<br />

10. Only IS&T-approved VPN clients may be used.<br />

11. By using VPN technology with personal equipment, users must understand that their machines<br />

are a de facto extension <strong>of</strong> IS&T's network, and as such are subject to the same rules and<br />

regulations that apply to IS&T -owned equipment, i.e., their machines must be configured to<br />

comply with IS&T’s Security Policies.<br />

4.0 Definitions<br />

Term<br />

IPSec Concentrator<br />

Definition<br />

A device in which VPN connections are terminated.<br />

-603-


Wireless Communication Policy<br />

1.0 Purpose<br />

This policy discusses access to College <strong>of</strong> Information Science and Technology (IS&T) research networks<br />

via wireless communication mechanisms. Only wireless systems that meet the criteria <strong>of</strong> this policy or<br />

have been granted an exclusive waiver by IS&T systems managers in conjunction with the PKI Network<br />

Administrator are approved for connectivity to IS&T's networks.<br />

2.0 Scope<br />

This policy covers all wireless data communication devices (e.g., personal computers, cellular phones,<br />

PDAs, etc.) connected to any <strong>of</strong> IS&T 's internal networks. This includes any form <strong>of</strong> wireless<br />

communication device capable <strong>of</strong> transmitting packet data. Wireless devices and/or networks without<br />

any connectivity to IS&T’s networks do not fall under the purview <strong>of</strong> this policy.<br />

3.0 Policy<br />

3.1 Register Access Points and Cards<br />

All wireless Access Points / Base Stations connected to IS&T research networks must be registered and<br />

approved by the IS&T Director <strong>of</strong> IT in conjunction with the PKI Network Administrator. These Access<br />

Points / Base Stations are subject to periodic penetration tests and audits. All wireless Network<br />

Interface Cards (i.e., PC cards) used in laptop or desktop computers must be registered with IS&T<br />

systems staff and the PKI Network Administrator.<br />

3.2 Approved Research Projects<br />

All wireless LAN projects for research must be approved by the Dean <strong>of</strong> the College <strong>of</strong> Information<br />

Science and Technology.<br />

3.3 Technical Implementation/Virtual LAN<br />

All approved projects must be planned and implemented by the IS&T systems staff in conjunction with<br />

the PKI Network Administrator. All computers with wireless LAN devices for research projects must<br />

utilize an approved VLAN. All implementations must not interfere with the production (“unowireless”)<br />

network.<br />

3.4 Setting the SSID<br />

The SSID must be registered with IS&T systems staff and the PKI Network Administrator. The SSID<br />

shall not be named “unowireless”. The SSID shall not contain any identifying information such as<br />

student or employee name, or product identifier.<br />

4.0 Definitions<br />

Terms<br />

User Authentication<br />

VLAN<br />

“unowireless”<br />

Definitions<br />

A method by which the user <strong>of</strong> a wireless system can be verified as a legitimate<br />

user independent <strong>of</strong> the computer or operating system being used.<br />

a method <strong>of</strong> creating independent logical networks within a physical network.<br />

The <strong>University</strong> <strong>of</strong> <strong>Nebraska</strong> <strong>Omaha</strong> production wireless network.<br />

-604-


APPENDIX 7 – ASSESSMENT DATA COLLECTION<br />

This appendix contains examples <strong>of</strong> the instruments used to collect assessment data, or extracts <strong>of</strong><br />

reports that reflect the assessment data. The complete set <strong>of</strong> assessments may be accessed at:<br />

http://accreditation.ist.unomaha.edu/<br />

To log in, use the username: pki-ist\abet<br />

and password: accreditus2<br />

-605-


Program Objectives<br />

Advisory Board<br />

-606-


Student Focus Group<br />

Questions for Student Focus Group 2008-10-24<br />

Initial Evaluation <strong>of</strong> Courses<br />

1. To what extent do you feel that the courses that you took are a valuable part <strong>of</strong> the curriculum?<br />

2. To what extent do you feel that you learned a lot in the courses that you took?<br />

Feedback on Courses<br />

For each course, students identified strengths, weaknesses, their own preparedness, and improvements.<br />

Curriculum Improvements<br />

How can we improve the undergraduate curriculum?<br />

Staying Power<br />

What would it take for you to stay at IS&T and enter the graduate program?<br />

-607-


Alumni Web Survey<br />

Introduction<br />

Thank you for taking the time to respond to this survey. The purpose <strong>of</strong> this survey is to get feedback<br />

from alumni <strong>of</strong> the College <strong>of</strong> IS&T on two important items:<br />

How well the program prepared you for a career in an IT-related pr<strong>of</strong>ession, and<br />

How the program might be improved to better prepare current and future students.<br />

Your opinions are a vital part <strong>of</strong> our on-going efforts to improve our programs.<br />

Survey<br />

1. Please indicate the undergraduate program from which you graduated:<br />

a. BS Information Systems<br />

b. BS Computer Science<br />

c. BS Bioinformatics<br />

2. Which <strong>of</strong> the following have you participated in within the last year (choose all that<br />

apply)?<br />

a. <strong>Self</strong>-paced tutorial<br />

b. Conferences<br />

c. Workshops<br />

d. Training courses<br />

e. College courses<br />

f. Other (explain)<br />

3. Have you taken any graduate courses since you received your bachelor’s degree?<br />

a. Yes<br />

b. No<br />

4. Have you completed a graduate program (e.g. MS, PhD) since you received you<br />

bachelor’s degree?<br />

a. Yes<br />

b. No<br />

5. For each <strong>of</strong> the following, (1) Indicate how important each has been to your work life,<br />

and (2) how well the undergraduate program prepared you to do it.<br />

How important to your How well did the<br />

work life?<br />

undergraduate program<br />

prepared you to do it?<br />

Understanding the role <strong>of</strong><br />

information systems in the<br />

context <strong>of</strong> the entire<br />

Very important<br />

Important<br />

Neither important nor<br />

-608-<br />

Very well<br />

Well<br />

Neither well nor poorly


organization<br />

Having strong analytic,<br />

problem solving, and critical<br />

thinking skills<br />

Having good interpersonal<br />

communication skills<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Poorly<br />

Very poorly<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Having good team skills<br />

Having strong ethical<br />

principles<br />

Designing, implementing,<br />

delivering or managing<br />

technological solutions to<br />

organizational problems or<br />

opportunities<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Building and/or using current<br />

techniques, skills, & tools<br />

appropriate to your job.<br />

Very important<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

-609-<br />

Very well prepared<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

Engaging in continuing Very important Very well prepared


pr<strong>of</strong>essional development<br />

(e.g. classes, workshops,<br />

seminars, conferences, selflearning)<br />

Important<br />

Neither important nor<br />

unimportant<br />

Unimportant<br />

Very unimportant<br />

a.<br />

Well prepared<br />

Neither well prepared nor<br />

poorly prepared<br />

Poorly prepared<br />

Very poorly prepared<br />

6. In your opinion, how well do the program outcomes listed below indicate what a graduate<br />

from the program should know or be able to do?<br />

a. Very well<br />

b. Well<br />

c. Neither well nor poorly<br />

d. Poorly<br />

e. Very poorly<br />

Students will have an ability to apply knowledge <strong>of</strong> computing and mathematics appropriate to<br />

the discipline.<br />

Students will understand the local and global role <strong>of</strong> IS in supporting and enabling processes and<br />

strategies at the individual, organizational, and societal level.<br />

Students will communicate effectively to a range <strong>of</strong> audiences through listening and through<br />

oral, written, and visual presentation.<br />

Students will work effectively in a team environment and collaborate with others to accomplish<br />

a common goal.<br />

Students will understand and apply appropriate types <strong>of</strong> computer-based tools to support<br />

communication.<br />

Students will understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong> conduct.<br />

Students will understand and model organizational processes and data.<br />

-610-


Students will design, integrate, implement, and evaluate a computer-based system, process,<br />

component, or program to meet desired needs.<br />

Students will manage projects.<br />

Students will manage IS with a specified application environment.<br />

Students will manage change.<br />

Students will recognize the need for continuing pr<strong>of</strong>essional development.<br />

7. How could this list be improved? (open ended)<br />

8. Are there some topics or learning experiences that were missing from the program when<br />

you were in it that you feel should be a part <strong>of</strong> the program today?<br />

9. Envisioning the evolution <strong>of</strong> the role <strong>of</strong> information technologies in our world over the<br />

next five years, are there particular topics, issues, trends, tools, or practices that you feel<br />

we should pay particular attention to?<br />

10. Please suggest some changes not mentioned elsewhere that, if implemented, would<br />

improve the quality <strong>of</strong> the program from which you graduated.<br />

-611-


Survey <strong>of</strong> Graduates<br />

1. From which program are you graduating?<br />

a. Bachelor <strong>of</strong> Science in Bioinformatics<br />

b. Bachelor <strong>of</strong> Science in Computer Science<br />

c. Bachelor <strong>of</strong> Science in Information Assurance<br />

d. Bachelor <strong>of</strong> Science in Information Systems<br />

2. In the year following graduation, I will<br />

a. Stay in <strong>Nebraska</strong><br />

b. Leave <strong>Nebraska</strong><br />

c. Don’t know<br />

3. In the year following graduation, I am going to (check all that apply):<br />

a. Attend graduate school<br />

i. At UNO<br />

ii. Elsewhere<br />

b. Work in the IT field<br />

i. I am currently employed in IT (provide job title)<br />

ii. I have an <strong>of</strong>fer for a job in IT (provide job title)<br />

iii. I am searching for a job in IT<br />

c. Work in a non-IT field<br />

d. Other (specify)<br />

e. Don’t know<br />

4. Which <strong>of</strong> the following types <strong>of</strong> pr<strong>of</strong>essional development do you plan on taking within the next<br />

year? (Check all that apply)<br />

a. College course<br />

b. Training course<br />

c. Workshop<br />

d. <strong>Self</strong>-paced tutorial (e.g. web-based)<br />

e. Other (specify)<br />

5. Please provide one or more suggestions for improving the undergraduate program from which<br />

you are graduating.<br />

-612-


College Statistics Report<br />

Objective #2: Students receiving a bachelor’s degree from the College <strong>of</strong> IS&T are employed in a job that makes use <strong>of</strong> their education<br />

Measure Data collected AY 2002-2003 AY 2003-2004 AY 2004-2005 AY 2006-2007<br />

UO2.M4 Retention rates (CS) Fall-to-fall retention rates for full-time,<br />

73% 77% 88% 84%<br />

Retention rates (IS) degree-seeking freshmen taking courses<br />

82% 90% 100% 73%<br />

Retention rates (Total) within IS&T<br />

75% 80% 89% 80%<br />

UO2.M5 Minority retention rates (CS) Fall-to-fall retention rates for first-time,<br />

75% 86% 100% 67%<br />

Minority retention rates (IS) full-time minority degree-seeking students 100% 100% n/a 100%<br />

Minority retention rates<br />

(Total)<br />

within IS&T<br />

78% 88% 100% 71%<br />

Objective #6: Students, faculty, and staff in the College <strong>of</strong> IS&T participate in community and pr<strong>of</strong>essional outreach<br />

Measure Data collected 2002 2004 2005 2006<br />

UO6.M2 Internships<br />

Number <strong>of</strong> internships (calendar year) 84 79 64 56<br />

Number <strong>of</strong> firms involved 54 51 (est)<br />

Number <strong>of</strong> internship opportunities<br />

91 324 476 1176<br />

<strong>of</strong>fered from Career Resource Center<br />

(calendar year)<br />

Number <strong>of</strong> Career Resource Center<br />

200 (est) 430 600 750<br />

partner organizations<br />

UO6.M9 Funding from the community Dollar amount $ 452,943 $ 1,100,000<br />

Number <strong>of</strong> funded projects 11 19<br />

Access to education Number <strong>of</strong> distance education enabled<br />

25 20 1 3<br />

UO6.M12<br />

course sections<br />

Number <strong>of</strong> students enrolled in distance ed<br />

263 34 1 15<br />

courses<br />

UO6.M13 Events encouraging Number <strong>of</strong> events 15 22 22 13<br />

participation <strong>of</strong> underrepresented<br />

Number <strong>of</strong> individuals involved 585 438 719 932<br />

groups<br />

Objective #7: Resources available in the College <strong>of</strong> IS&T are appropriate to the programs <strong>of</strong>fered and are used in an<br />

efficient and effective manner.<br />

Measure Data collected AY 2002-2003 AY 2004-2005 AY 2005-2006 AY 2006-2007<br />

UO7.M1 Human Resources<br />

Student/Faculty ratio 31 27 23 21<br />

Faculty/Admin support staff (FTE) ratio 7.4 6.8 6.3 6.5<br />

Faculty/ Tech support staff (FTE) ratio 12.3 5.2 6.3 5.6<br />

Student/Tech support staff (FTE) ratio 379 143 145 115<br />

Student/ Advisor (FTE) ratio 413 412 387 357<br />

Student/ Admin support (FTE) ratio 227.4 185.6 145 133.8<br />

UO7.M3 IS&T financial assistance/ student ratio 0 $ 16.98 $ 18.90 $ 22.18<br />

Financial Resources Annual budget for physical and human $ 5,364,108 $ 6,058,836 $ 6,726,702 $ 7,300,862<br />

UO7.M4<br />

resources in IS&T<br />

UO7.M7 Physical Resources<br />

Number <strong>of</strong> sections <strong>of</strong> IS&T classes 459 471 443 268<br />

Number <strong>of</strong> sections IS&T classes not<br />

22 22 13 6<br />

<strong>of</strong>fered at PKI because <strong>of</strong> space<br />

constraints<br />

UO7.M9<br />

Number <strong>of</strong> students enrolled in IS&T /<br />

workstations ratio<br />

3.5 2.9 2.7 2.5<br />

-613-


Faculty Annual Reviews<br />

Objective #4<br />

Objective #5<br />

Objective #6<br />

2003 2005 2007 2009<br />

Faculty in the College <strong>of</strong> IS&T contribute to the advancement <strong>of</strong> their disciplines through<br />

scholarly activity<br />

Peer-reviewed journal articles 20 15 22 28<br />

Peer-reviewed proceedings 29 16 35 37<br />

Conference presentations 11 14 13 8<br />

Book chapters 7 18 9 10<br />

Monographs / Books 2 3 2 2<br />

Editorial board service 22 25 24 30<br />

Other editorial activity (e.g. conference<br />

section chair) 20 18 20 13<br />

Grants funded (No.) 12 19 11 13<br />

Grants funded ($) $ 374,507 $ 422,339 $ 1,643,474 $ 891,207<br />

Grants submitted (unfunded) 20 3 10 21<br />

Scholarly activity with direct relevance to UG<br />

students 6 1 0 38<br />

Faculty and staff in the College <strong>of</strong> IS&T regularly update their pr<strong>of</strong>essional knowledge and skills<br />

and continually develop and enhance programs to meet the needs <strong>of</strong> our students and<br />

community.<br />

Count <strong>of</strong> pr<strong>of</strong>essional development activities<br />

related to courses in various categories 2 5 13 20<br />

Count <strong>of</strong> pr<strong>of</strong>essional development activities<br />

related to advising & support 0 0 1 0<br />

New courses 12 15 6 1<br />

Courses with major change 6 12 11 6<br />

Courses with minor change 26 11 10 32<br />

Students, faculty, and staff in the College <strong>of</strong> IS&T participate in community and pr<strong>of</strong>essional<br />

outreach.<br />

Number <strong>of</strong> projects with external clients<br />

(graduate) 49 58 16 12<br />

Number <strong>of</strong> projects with external clients<br />

(undergraduate) 30 24 22 26<br />

Membership in corporate, pr<strong>of</strong>essional,<br />

advisory, or civic boards 6 2 2 0<br />

Pr<strong>of</strong>essional publications and media<br />

appearances 1 0 5 0<br />

Speaches to popular conferences, civic<br />

groups, meetings 15 9 13 22<br />

Training, consulting, technology transfer<br />

activities 1 3 4 4<br />

Contributions to other institutes 1 8 1 1<br />

Volunteer work 10 1 0 1<br />

-614-


Faculty Questionnaire<br />

General<br />

1. With which department are you affiliated?<br />

Library Facilities<br />

1. The library resources are adequate to enable you to meet your responsibilities and pr<strong>of</strong>essional needs.<br />

2. The process by which you may request the library to order books or subscriptions is adequate<br />

[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />

3. The pr<strong>of</strong>essional librarians and library support staff adequately support your responsibilities and pr<strong>of</strong>essional needs<br />

[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />

4. Access to the library’s system for locating and obtaining information is adequate.<br />

[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />

Classroom Equipment<br />

5. The equipment available in classrooms where you teach is adequate for your teaching needs.<br />

[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />

Faculty Offices<br />

Labs<br />

6. Your <strong>of</strong>fice enables you to meet your responsibilities and pr<strong>of</strong>essional needs<br />

[Strongly Agree/Somewhat Agree/Neither/Somewhat Disagree/Strongly Disagree/No Opinion]<br />

7. The special purpose labs (e.g. those on the 3rd floor) are adequate to meet your needs.<br />

Support Staff<br />

8. The number <strong>of</strong> support staff is adequate to enable you to meet your responsibilities and pr<strong>of</strong>essional needs.<br />

Comment<br />

If you wish, please elaborate on any answer given above.<br />

-615-


Task list, resource list<br />

Economic Feasibility Analysis<br />

Statement <strong>of</strong> work<br />

Enterprise model<br />

Workflow<br />

Baseline Project Plan<br />

Meeting minutes, other comm.<br />

process model<br />

IDEF0<br />

use cases<br />

work flow<br />

Tracking GANTT<br />

Update <strong>of</strong> project plan<br />

IDEF1X ER Diagram<br />

Database Design<br />

Computer Architecture Design<br />

Control plan<br />

Interface design<br />

Structure Charts (proprietary s<strong>of</strong>tware)<br />

Testing plan<br />

Implementation plan<br />

Maintenance plan<br />

Documentation<br />

System construction/prototyping<br />

Final GANTT diagram<br />

Rework <strong>of</strong> Economic Feasibility Analysis<br />

Post project evaluation<br />

Correspondence between original<br />

requirements analysis and final deliverables<br />

Group presentation<br />

Program Outcomes<br />

Capstone project review<br />

M2 M4 M5 M6 M8 M9<br />

M1 M3 M7 Other<br />

PROJECT:<br />

EVALUATOR:<br />

DATE:<br />

U - Unsatisfactory<br />

E - Emerging<br />

P - Pr<strong>of</strong>icient<br />

D - Distinguished<br />

NO - Not Observed<br />

Objective (a) Students w ill have an ability to apply know ledge <strong>of</strong> computing<br />

and mathematics appropriate to the discipline.<br />

Objective (b) Students w ill have a broad organizational and real-w orld<br />

perspective<br />

(1) Understand the local and global role <strong>of</strong> information systems in supporting<br />

and enabling processes and strategies at the individual, organizational, and<br />

societal level<br />

Objective (c) Students w ill have strong analytic, problem solving, and critical<br />

thinking skills<br />

(1) Apply traditional and contemporary analysis and design techniques to<br />

identify and analyze organizational problems or opportunities, formulate<br />

appropriate strategies and solutions using information technologies, and<br />

evaluate the effectiveness <strong>of</strong> propos<br />

Objective (d) Students w ill have good interpersonal communication, team<br />

skills, and strong ethical principles<br />

(1) Communicate effectively to a range <strong>of</strong> audiences through listening and<br />

through oral, written, and visual presentation<br />

(2) W ork effectively in a team environment and collaborate with others to<br />

accomplish a common goal.<br />

(3) Understand and apply appropriate types <strong>of</strong> computer-based tools to<br />

support communication.<br />

(4) Understand and apply pr<strong>of</strong>essional, legal, and ethical standards <strong>of</strong><br />

conduct<br />

Objective (e) Students w ill be able to design, implement, deliver, and<br />

manage technological solutions to organizational problems or to take<br />

advantage <strong>of</strong> opportunities.<br />

(1) Understand and model organizational processes and data<br />

(2) Design, integrate, implement, and evaluate a computer-based system,<br />

process, component, or program to meet desired needs.<br />

(3) Manage projects.<br />

(4) Manage information systems within a specific application environment<br />

(5) Manage organizational change<br />

(6) Manage project change<br />

Principal strengths:<br />

Principal weaknesses:<br />

Suggestions for improving the content or pedagogy <strong>of</strong> ISQA 4110 and ISQA 4120:<br />

-616-


Writing sample<br />

-617-


Topic area exam<br />

ISQA 3300 File Structures<br />

-618-


CIST 2500 Statistics<br />

-619-


Ethics case study<br />

-620-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!